On 8/4/19 4:51 PM, Dennis Clarke wrote:
> On 8/3/19 9:51 AM, Daniel Ruggeri wrote:
>> Hi, all;
>> Please find below the proposed release tarball and signatures:
>> https://dist.apache.org/repos/dist/dev/httpd/
>>
>> I would like to call a VOTE over the next few days to release this
>> candidate
On 8/4/2019 3:30 AM, Rainer Jung wrote:
> Hi there,
>
> this one fails for me when the server uses OpenSSL 1.1.1 (no other
> variant tested yet) but the client uses something before 1.1.1. In
> this case I get Status 500 instead of the expected 403 in the client.
>
> Another older test t/security
On 8/3/19 9:51 AM, Daniel Ruggeri wrote:
> Hi, all;
> Please find below the proposed release tarball and signatures:
> https://dist.apache.org/repos/dist/dev/httpd/
>
> I would like to call a VOTE over the next few days to release this
> candidate tarball as 2.4.40:
> [ ] +1: It's not just good
Gregg Smith in gmane.comp.apache.devel (Sat, 3 Aug 2019 08:43:21 -0700):
>Opps, looks like the APLOGNO's didn't get filled in. I'm still ok with
>releasing .40 w/o them.
>
>mod_md.c(386): warning C4003: not enough actual parameters for macro
>'APLOGNO'
>mod_md.c(391): warning C4003: not enough ac
Hi there,
this one fails for me when the server uses OpenSSL 1.1.1 (no other
variant tested yet) but the client uses something before 1.1.1. In this
case I get Status 500 instead of the expected 403 in the client.
Another older test t/security/CVE-2005-2700.t uses
ok !t_cmp($r->code, 200, ".
+---+
| Bugzilla Bug ID |
| +-+
| | Status: UNC=Unconfirmed NEW=New ASS=Assigned