Re: [VOTE] Release httpd-2.4.59-rc1 as httpd-2.4.59

2024-04-03 Thread Cory McIntire
+1

CentOS 6
CentOS 7
AlmaLinux 8
AlmaLinux 9
Ubuntu 20
Ubuntu 22

Thanks for RM’n.

Regards,
Cory McIntire | Release Manager
cory.mcint...@webpros.com<mailto:cory.mcint...@webpros.com> | cPanel – a 
webpros company



From: Eric Covener 
Date: Wednesday, April 3, 2024 at 07:26
To: Apache HTTP Server Development List 
Subject: [VOTE] Release httpd-2.4.59-rc1 as httpd-2.4.59
Hi all,

I would like to call a SHORTENED VOTE to release
this candidate tarball httpd-2.4.59-rc1 as 2.4.59:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.



Re: [VOTE] Release httpd-2.4.58-rc3 as httpd-2.4.58

2023-10-16 Thread Cory McIntire
+1

Built/tested on:
CentOS 6
CentOS 7
AlmaLinux 9
Ubuntu 20.04
Ubuntu 22.04


Regards,
Cory McIntire | Lead – cPanel Application Security Team | Release Manager – 
EasyApache
cory.mcint...@webpros.com<mailto:cory.mcint...@webpros.com> | cPanel – a 
webpros company



From: Stefan Eissing via dev 
Date: Monday, October 16, 2023 at 10:08
To: dev@httpd.apache.org 
Cc: Stefan Eissing 
Subject: [VOTE] Release httpd-2.4.58-rc3 as httpd-2.4.58
Hi all,

after fixing my merge mistake in rc2 (sorry!), we go again:

Please find below the proposed release tarball and signatures:

https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdist.apache.org%2Frepos%2Fdist%2Fdev%2Fhttpd%2F=05%7C01%7Ccory%40cpanel.net%7Ce5c41228d1ce4a24971208dbce59cb59%7Cf8497356a834406086b6d4b1d8059ee0%7C0%7C0%7C638330657304238920%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C=Hvd0FLQKHpx%2F4%2Flfj2iYh2mCcE4jNevfMZDL0piuolQ%3D=0<https://dist.apache.org/repos/dist/dev/httpd/>

I would like to call a VOTE over the next few days to release
this candidate tarball httpd-2.4.58-rc3 as 2.4.58:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha256: 503a7da4a4a27fd496037998b17078dc9fe004db32c657c96cce8356b8aa2eb6 
*httpd-2.4.58-rc3.tar.gz
sha512: 
5c11faf0572035ef67b27775d975999411c689cb774553175299a9e99b63d3d7138b0c7f15048ec28038494d8513689f916202c2289d557947d8b190d46ca9f3
 *httpd-2.4.58-rc3.tar.gz

The SVN candidate source is found at tags/2.4.58-rc3-candidate.

Cheers,
Stefan


Re: [VOTE] Release httpd-2.4.52-rc1 as httpd-2.4.52

2021-12-17 Thread Cory McIntire
+1

CentOS 6
CentOS 7
AlmaLinux 8
Ubuntu 20.04

Regards,
Cory McIntire
PO – cPanel Security Team
Release Manager – EasyApache
cPanel / WebPros


From: Stefan Eissing 
Date: Thursday, December 16, 2021 at 8:03 AM
To: dev@httpd.apache.org 
Subject: [VOTE] Release httpd-2.4.52-rc1 as httpd-2.4.52

Hi all,

Please find below the proposed release tarball and signatures:

https://dist.apache.org/repos/dist/dev/httpd/

I would like to call a VOTE over the next few days to release
this candidate tarball httpd-2.4.52-rc1 as 2.4.52:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha256: 296c74a8adde1a8acd6617b21fc3d19719ff4fa39319b2bdbd898aca4d5df97f 
*httpd-2.4.52-rc1.tar.gz
sha512: 
b9012096d6658f7d34a3c655eac31b39ffd439c11de6f3e6e9f309d55f4186a4fb26134eb97522e416ae8ca10ed008a14e96fa01a3e3105d9e547f72e2dc3bc2
 *httpd-2.4.52-rc1.tar.gz

The SVN candidate source is found at tags/candidate-2.4.52-rc1.

Kind Regards,
Stefan


Re: Season Greetings

2021-12-11 Thread Cory McIntire
Happy Holidays to all and thanks to everyone involved in this little webserver 
that powers so many of our lives.

Cheers,
Cory McIntire
PO – cPanel Security Team
Release Manager – EasyApache
cPanel / WebPros


From: Steffen Land 
Date: Saturday, December 11, 2021 at 2:29 AM
To: dev@httpd.apache.org 
Subject: Season Greetings
Happy holidays to all the HTTPD Community developers and users and
enjoy the holidays !

We wish for you, your friends and your families time to reconnect,
enjoy traditions, and to find some rest during the holiday season.
Whatever you celebrate, I hope you take a moment to reflect on the
year that is closing and on your goals for 2022 as it approaches.

For the next weeks, I'll be spending time with my family enjoying
Christmas and end of year festivities. As exciting as computers and
servers can be, this year will also forever serve as a reminder of
what is really important: family, friends and the compassion of
strangers.

Steffen




Re: [VOTE] Release httpd-2.4.51-rc1 as httpd-2.4.51

2021-10-07 Thread Cory McIntire
+1  Cent6/7/8  Ubuntu 20.04

Thanks,
Cory McIntire
PO – cPanel Security Team
Release Manager – EasyApache
cPanel / WebPros


From: ste...@eissing.org 
Date: Thursday, October 7, 2021 at 8:17 AM
To: dev@httpd.apache.org 
Subject: [VOTE] Release httpd-2.4.51-rc1 as httpd-2.4.51
Hi all,

due to found security weaknesses in our 2.4.50 release, the security team
feels it is necessary to do a new release on very short notice. We will skip
the usual 3 day voting period and close the vote once we feel comfortable
with our testing.

Please find below the proposed release tarball and signatures:

https://dist.apache.org/repos/dist/dev/httpd/

I would like to call a VOTE over the next few days^h^h^h^hhours to release
this candidate tarball httpd-2.4.51-rc1 as 2.4.51:
[ ] +1: It's not just good, it's hopefully good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha1: 516128e5acb7311e6e4d32d600664deb0d12e61f *httpd-2.4.51-rc1.tar.gz
sha256: c2cedb0b47666bea633b44d5b3a2ebf3c466e0506955fbc3012a5a9b078ca8b4 
*httpd-2.4.51-rc1.tar.gz
sha512: 
507fd2bbc420e8a1f0a90737d253f1aa31000a948f7a840fdd4797a78f7a4f1bd39250b33087485213a3bed4d11221e98eabfaf4ff17c7d0380236f8a52ee157
 *httpd-2.4.51-rc1.tar.gz

The SVN candidate source is found at tags/candidate-2.4.51-rc1.

Kind Regards,
Stefan


Re: [VOTE] Release httpd-2.4.50-rc1 as httpd-2.4.50

2021-10-01 Thread Cory McIntire
+1: It's not just good, it's good enough!

Looks good for us, Cent6/7/8 Alma8

Thanks for RM’n.

Cory McIntire
PO – cPanel Security Team
Release Manager – EasyApache
cPanel / WebPros


From: ste...@eissing.org 
Date: Friday, October 1, 2021 at 9:41 AM
To: dev@httpd.apache.org 
Subject: [VOTE] Release httpd-2.4.50-rc1 as httpd-2.4.50
Hi, all;
   Please find below the proposed release tarball and signatures:
https://dist.apache.org/repos/dist/dev/httpd/

I would like to call a VOTE over the next few days to release
this candidate tarball httpd-2.4.50-rc1 as 2.4.50:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha1: afac1bf6aaa84ea2878c56ed56a49f5efdd7ff73 *httpd-2.4.50-rc1.tar.gz
sha256: feb87f9cc60e02782d795d30cd60a36e918c82fe9a2e7363b0ae28a78be9613a 
*httpd-2.4.50-rc1.tar.gz
sha512: 
3b5e06d8428f14bae8173dbb27921496831c7c14c31850d2df0c0d6f69e931bbf0e4e71c6a250b4f5c0d646d1b7da813bbe61711f8a79ab5f80d39dfd176f57c
 *httpd-2.4.50-rc1.tar.gz

The SVN candidate source is found at tags/candidate-2.4.50-rc1.

Kind Regards,
Stefan


Re: [VOTE] Release httpd-2.4.48

2021-05-18 Thread Cory McIntire
Hello All,

+1: It's not just good, it's good enough!

CentOS6, CentOS7, and CentOS8 builds and passes test suite for us.


Thanks,
Cory McIntire
PO – cPanel Security Team
Release Manager – EasyApache
cPanel, L.L.C.



From: Christophe JAILLET 
Date: Monday, May 17, 2021 at 4:37 PM
To: dev@httpd.apache.org 
Subject: [VOTE] Release httpd-2.4.48
Hi, all;
Please find below the proposed release tarball and signatures:
https://dist.apache.org/repos/dist/dev/httpd/

I would like to call a VOTE over the next few days to release this
candidate tarball as 2.4.48:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha1: b581bcfdd939fe77c3821f7ad3863c7307374919 *httpd-2.4.48.tar.gz
sha256: 315c0bc50206b866fb17c2cdc28c1973765a8d59ca168b80286e8cb077d0510e
*httpd-2.4.48.tar.gz
sha512:
91980f757fc0dede8c6cbf54ed973f82a63098aa50d0fce15fe3537687b4ffbb48ed50cdb4ae14eb4a8703450f032daf73f4f3d5e2dd0f75721948e12a9c6dfb
*httpd-2.4.48.tar.gz

The SVN tag is '2.4.48' at r1889975.

--
Christophe JAILLET


Re: 2.4.38

2018-11-08 Thread Cory McIntire
I’m all for this as well, because people want the new hotness. That said, for 
people downstream that have to support 
httpd, y’all are releasing really fast. I get it, and we haven’t really had any 
problems (minus a weird semaphore issue we
haven’t tracked down yet), I’m noticing an increase of releases lately.

Just curious what is the rush lately? Is this all a build up to 2.6 coming out 
or something else?



> On Nov 8, 2018, at 3:11 AM, Stefan Eissing  
> wrote:
> 
> 
>> Am 07.11.2018 um 16:15 schrieb Jim Jagielski :
>> 
>> Now that we have a 2.4.37 out, one in which the number of enhancements and 
>> fixes and feature were limited, it makes sense to consider having a 2.4.38 
>> release somewhat "soonish", esp considering the number of backports that 
>> lack only a single vote.
>> 
>> Comments?
> 
> I am all for it. And I have reasons! :-)
> 
> 1. We are well on track to automate the whole thing nicely. We need some more 
> iterations to make it tight. This is easier done in short intervals.
> 2. I think regular releases are good for the people here and motivate people 
> from outside to contribute.
> 3. h2 and Let's Encrypt still get attention and there are some small 
> improvements I'd like to throw out there. Nothing serious, just would be nice.
> 
> Cheers,
> 
> Stefan

Super off topic but this is one of the best communities I deal with in my day 
to day, even when
y’all are mad you’re good to each other, means a lot to those of us that just 
need to follow the feed.
Thank you all for that.

Thanks,
Cory McIntire
Release Manager - EasyApache 
cPanel, L.L.C.



smime.p7s
Description: S/MIME cryptographic signature


Re: [VOTE] Release httpd-2.4.37

2018-10-22 Thread Cory McIntire
Just a note, the date here is Sept instead of Oct :) 

http://httpd.apache.org/dev/dist/Announcement2.4.html
http://httpd.apache.org/dev/dist/Announcement2.4.txt

(I realize this might not be final version of said text.. just wanted to 
mention)

Thanks
Cory McIntire
Release Manager - EasyApache 
cPanel, L.L.C.


> On Oct 22, 2018, at 9:08 AM, Daniel Ruggeri  wrote:
> 
> On 2018-10-18 09:36, Daniel Ruggeri wrote:
>> Hi, all;
>>   Please find below the proposed release tarball and signatures:
>> https://dist.apache.org/repos/dist/dev/httpd/
>> I would like to call a VOTE over the next few days to release this
>> candidate tarball as 2.4.37:
>> [ ] +1: It's not just good, it's good enough!
>> [ ] +0: Let's have a talk.
>> [ ] -1: There's trouble in paradise. Here's what's wrong.
>> The computed digests of the tarball up for vote are:
>> sha1: b0521606d1df54bb425adcdecf6348f126aa352c *httpd-2.4.37.tar.gz
>> sha256:
>> aa97a834a32d51974be8d8a013b561e28d327387cb1da2c3c2762acd0146aabd
>> *httpd-2.4.37.tar.gz
> 
> Hello, all;
>   I am pleased to announce that the release vote has PASSED with the 
> following recorded votes.
> 
> PMC
> druggeri, jorton, jim, icing, jailletc36, ylavic, rjung
> 
> Community
> Dennis Radford
> 
> I will begin the process of syncing the mirrors and preparing the final 
> Announce text.
> 
> I'd like to give a big thank you for all the folks who put effort into 
> creating the code for this release and the effort spent testing this release!
> 
> -- 
> Daniel Ruggeri







smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-08-28 Thread Cory McIntire
Hi Luca,

We’ve tested this in house and it does seem to resolve the issues from the 
previous patch. Looks good to us. :) 

Thanks,
Cory

> On Aug 27, 2018, at 8:50 AM, Cory McIntire  wrote:
> 
> Hello Luca,
> 
> Sorry for late reply, we’re digging into and testing this version of the 
> patch now, will update this week
> with more info, preliminary results seem to be positive however. 
> 
> Thanks,
> Cory McIntire
> Release Manager - EasyApache
> cPanel, Inc.
> 
>> On Aug 23, 2018, at 11:25 AM, Luca Toscano  wrote:
>> 
>> Hi Cory,
>> 
>> Il giorno gio 2 ago 2018 alle ore 14:10 Yann Ylavic
>>  ha scritto:
>>> 
>>> On Fri, Jul 27, 2018 at 6:56 PM, Cory McIntire  wrote:
>>>> 
>>>> {quote}
>>>> While it will probably resolve the issues we saw, I’d be hesitant to
>>>> move forward with that patch as it modifies how all output filters
>>>> work with HEAD requests, this is too large a change, especially when
>>>> the bug(s) being addressesed are in a single module.
>>>> 
>>>> I’d recommend making mod_ratelimit do the same “optimization” hack
>>>> that other modules for HEAD requests instead, and keep the surface
>>>> area for this bug fix isolated to mod_ratelimit only.
>>>> 
>>>> Something like what mod_brotli does:
>>>> 
>>>>if (r->header_only && r->bytes_sent) {
>>>>ap_remove_output_filter(f);
>>>>return ap_pass_brigade(f->next, bb);
>>>>}
>>>> {quote}
>>>> 
>>>> If there are any further adjustments to this patch we’d be happy to
>>>> take a look, just let us know.
>>> 
>>> Sorry, I missed that proposal.
>>> 
>>> So, AIUI, the above plus moving the ratelimit filter after the "CHUNK"
>>> filter, right?
>>> Otherwise I don't see where we address the "header
>>> ratelimited/retained before chunking" case (regardless of
>>> HEAD/GET/..).
>>> IOW, the patch (limited to mod_ratelimit) would be something like:
>>> 
>>> @@ -123,6 +123,13 @@ rate_limit_filter(ap_filter_t *f, apr_bucket_briga
>>>APR_BRIGADE_PREPEND(bb, ctx->holdingbb);
>>>}
>>> 
>>> +if (f->r->header_only && f->r->bytes_sent) {
>>> +ap_remove_output_filter(f);
>>> +rv = ap_pass_brigade(f->next, bb);
>>> +apr_brigade_cleanup(bb);
>>> +return rv;
>>> +}
>>> +
>>>while (!APR_BRIGADE_EMPTY(bb)) {
>>>apr_bucket *e;
>>> 
>>> @@ -327,7 +334,7 @@ static void register_hooks(apr_pool_t *p)
>>>ap_register_output_filter(RATE_LIMIT_FILTER_NAME, rate_limit_filter,
>>> -  NULL, AP_FTYPE_PROTOCOL + 3);
>>> +  NULL, AP_FTYPE_CONNECTION - 1);
>>> 
>>> I think it does not work for the case where a HEAD response has a
>>> large header but "Content-Length: 0", such that rate_limit_filter()
>>> retains the last buckets but is never called to release them (i.e.
>>> EOS).
>>> Really we shouldn't have any (protocol) filter that eats EOS, this is
>>> the garantee that each request filter sees when it should terminate
>>> and bail out (that's also the purpose of
>>> ap_finalize_request_protocol() for instance).
>>> 
>>> r1837130 looks like the right fix to me.
>> 
>> sorry for the late ping but I was on holidays. I know that you and
>> your team expressed some doubts about the fix for mod_ratelimit, but
>> it seems that Yann's fix is the correct way to go for me too. Any
>> thoughts? It would be great to reach some consensus within the
>> community before proceeding :)
>> 
>> Thanks!
>> 
>> Luca
> 



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-08-27 Thread Cory McIntire
Hello Luca,

Sorry for late reply, we’re digging into and testing this version of the patch 
now, will update this week
with more info, preliminary results seem to be positive however. 

Thanks,
Cory McIntire
Release Manager - EasyApache
cPanel, Inc.

> On Aug 23, 2018, at 11:25 AM, Luca Toscano  wrote:
> 
> Hi Cory,
> 
> Il giorno gio 2 ago 2018 alle ore 14:10 Yann Ylavic
>  ha scritto:
>> 
>> On Fri, Jul 27, 2018 at 6:56 PM, Cory McIntire  wrote:
>>> 
>>> {quote}
>>> While it will probably resolve the issues we saw, I’d be hesitant to
>>> move forward with that patch as it modifies how all output filters
>>> work with HEAD requests, this is too large a change, especially when
>>> the bug(s) being addressesed are in a single module.
>>> 
>>> I’d recommend making mod_ratelimit do the same “optimization” hack
>>> that other modules for HEAD requests instead, and keep the surface
>>> area for this bug fix isolated to mod_ratelimit only.
>>> 
>>> Something like what mod_brotli does:
>>> 
>>> if (r->header_only && r->bytes_sent) {
>>> ap_remove_output_filter(f);
>>> return ap_pass_brigade(f->next, bb);
>>> }
>>> {quote}
>>> 
>>> If there are any further adjustments to this patch we’d be happy to
>>> take a look, just let us know.
>> 
>> Sorry, I missed that proposal.
>> 
>> So, AIUI, the above plus moving the ratelimit filter after the "CHUNK"
>> filter, right?
>> Otherwise I don't see where we address the "header
>> ratelimited/retained before chunking" case (regardless of
>> HEAD/GET/..).
>> IOW, the patch (limited to mod_ratelimit) would be something like:
>> 
>> @@ -123,6 +123,13 @@ rate_limit_filter(ap_filter_t *f, apr_bucket_briga
>> APR_BRIGADE_PREPEND(bb, ctx->holdingbb);
>> }
>> 
>> +if (f->r->header_only && f->r->bytes_sent) {
>> +ap_remove_output_filter(f);
>> +rv = ap_pass_brigade(f->next, bb);
>> +apr_brigade_cleanup(bb);
>> +return rv;
>> +}
>> +
>> while (!APR_BRIGADE_EMPTY(bb)) {
>> apr_bucket *e;
>> 
>> @@ -327,7 +334,7 @@ static void register_hooks(apr_pool_t *p)
>> ap_register_output_filter(RATE_LIMIT_FILTER_NAME, rate_limit_filter,
>> -  NULL, AP_FTYPE_PROTOCOL + 3);
>> +  NULL, AP_FTYPE_CONNECTION - 1);
>> 
>> I think it does not work for the case where a HEAD response has a
>> large header but "Content-Length: 0", such that rate_limit_filter()
>> retains the last buckets but is never called to release them (i.e.
>> EOS).
>> Really we shouldn't have any (protocol) filter that eats EOS, this is
>> the garantee that each request filter sees when it should terminate
>> and bail out (that's also the purpose of
>> ap_finalize_request_protocol() for instance).
>> 
>> r1837130 looks like the right fix to me.
> 
> sorry for the late ping but I was on holidays. I know that you and
> your team expressed some doubts about the fix for mod_ratelimit, but
> it seems that Yann's fix is the correct way to go for me too. Any
> thoughts? It would be great to reach some consensus within the
> community before proceeding :)
> 
> Thanks!
> 
> Luca



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-27 Thread Cory McIntire
Hi Luca,

Sorry for the delay in response.. we did look into it further.. 

On of our devs had been looking into it and came up with the following:

{quote}
While it will probably resolve the issues we saw, I’d be hesitant to move 
forward with that patch as it modifies how all output filters work with HEAD 
requests, 
this is too large a change, especially when the bug(s) being addressesed are in 
a single module.

I’d recommend making mod_ratelimit do the same “optimization” hack that other 
modules for HEAD requests instead, and keep the surface area for this bug fix 
isolated to mod_ratelimit only.

Something like what mod_brotli does:

 if (r->header_only && r->bytes_sent) {
 ap_remove_output_filter(f);
 return ap_pass_brigade(f->next, bb);
 }
 {quote}

If there are any further adjustments to this patch we’d be happy to take a 
look, just let us know.

Thanks,
Cory McIntire
Release Manager - EasyApache 
cPanel, Inc.


> On Jul 27, 2018, at 10:46 AM, Luca Toscano  wrote:
> 
> Hi Cory,
> 
> 2018-07-20 13:47 GMT+02:00 Yann Ylavic :
>> Hi Cory,
>> 
>> On Thu, Jul 19, 2018 at 11:23 PM, Cory McIntire  wrote:
>>> 
>>> We’re going to revert to the 2.4.33 version of mod_ratelimit for now.
>>> 
>>> HEAD requests with large amount of headers were still problematic in our 
>>> testing with both versions of the patch applied.
>> 
>> Thanks for letting us know.
>> 
>> I think the right fix is the attached patch (tested with GET/HEAD with
>> large header and/or body, seems to work).
>> If by any chance you can give it a try...
> 
> In the meantime, other people are testing Yann's last patch in
> https://bz.apache.org/bugzilla/show_bug.cgi?id=62568 (it is attached
> in there). If you could chime in whenever you have time and let us
> know your thoughts it would be really great.
> 
> Thanks in advance!
> 
> Luca





smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hi all,

We’re going to revert to the 2.4.33 version of mod_ratelimit for now.

HEAD requests with large amount of headers were still problematic in our 
testing with both versions of the patch applied.

Thanks,
Cory McIntire
Release Manager - EasyApache 
cPanel, Inc.


> On Jul 19, 2018, at 3:36 PM, Yann Ylavic  wrote:
> 
> On Thu, Jul 19, 2018 at 10:30 PM, Yann Ylavic  wrote:
>> Hi,
>> 
>> On Thu, Jul 19, 2018 at 10:16 PM, Cory McIntire  wrote:
>>> 
>>> Upon some initial testing of the patch we have found some conditions to 
>>> which this will still break, consider the following:
>>> 
>>> Put something like this into your php file,
>>> 
>>>for ($i = 1; $i <= 2000; $i++) {
>>>header("x$i: $i");
>>>}
>> 
>> Yes I was thinking about this, currently mod_ratelimit is not able to
>> ratelimit headers when chunked encoding is to be used for the body.
>> 
>> This is because the http (header) filter assumes nothing retains the
>> headers in between itself and the chunked filter (which itself assumes
>> everything it receives is the body).
>> 
>> I'm looking at the best way to address this, possibly mod_ratelimit's
>> filter should be moved after the "CHUNK" filter (i.e.
>> AP_FTYPE_TRANSCODE)? The requirement seems to be after deflate but
>> before network filter...
> 
> The patch would be something like this (instead of the previous one):
> 
> Index: modules/filters/mod_ratelimit.c
> ===
> --- modules/filters/mod_ratelimit.c(revision 1835556)
> +++ modules/filters/mod_ratelimit.c(working copy)
> @@ -327,7 +327,7 @@ static void register_hooks(apr_pool_t *p)
> {
> /* run after mod_deflate etc etc, but not at connection level,
> ie, mod_ssl. */
> ap_register_output_filter(RATE_LIMIT_FILTER_NAME, rate_limit_filter,
> -  NULL, AP_FTYPE_PROTOCOL + 3);
> +  NULL, AP_FTYPE_TRANSCODE + 1);
> }
> 
> --
> 
> This seems to work for me too...



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hello,

Upon some initial testing of the patch we have found some conditions to which 
this will still break, consider the following:

Put something like this into your php file,

for ($i = 1; $i <= 2000; $i++) {
header("x$i: $i");
}

Set your rate limit pretty low and it will cause the headers to be larger than 
the chunk size, 
and you will see an error with those responses such as this:

curl -H'Host: cptestaddon.com' http://10.215.218.12/
curl: (56) Illegal or missing hexadecimal sequence in chunked-encoding

which of course means the page doesn’t load.

Real world how often is it set that low is unknown but thought we’d share our 
findings.

Cory

> On Jul 19, 2018, at 2:53 PM, Cory McIntire  wrote:
> 
> Hello Yann,
> 
> We can confirm this patch works on our end. We’ll apply this and send out an 
> update. 
> 
>> On Jul 19, 2018, at 2:41 PM, Yann Ylavic  wrote:
>> 
>> On Thu, Jul 19, 2018 at 8:23 PM, Luca Toscano  wrote:
>>> 
>>> Yann, any idea?
>> 
>> Looks like we missed the simplest case :/
>> 
>> Index: modules/filters/mod_ratelimit.c
>> ===
>> --- modules/filters/mod_ratelimit.c(revision 1835556)
>> +++ modules/filters/mod_ratelimit.c(working copy)
>> @@ -208,7 +208,7 @@ rate_limit_filter(ap_filter_t *f, apr_bucket_briga
>>ap_remove_output_filter(f);
>>}
>>else if (!APR_BUCKET_IS_FLUSH(e)) {
>> -if (APR_BRIGADE_EMPTY(bb)) {
>> +if (ctx->do_sleep && APR_BRIGADE_EMPTY(bb)) {
>>/* Wait for more (or next call) */
>>break;
>>}
>> _
> 
> Much appreciated,
> Cory
> 



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hello Yann,

We can confirm this patch works on our end. We’ll apply this and send out an 
update. 

> On Jul 19, 2018, at 2:41 PM, Yann Ylavic  wrote:
> 
> On Thu, Jul 19, 2018 at 8:23 PM, Luca Toscano  wrote:
>> 
>> Yann, any idea?
> 
> Looks like we missed the simplest case :/
> 
> Index: modules/filters/mod_ratelimit.c
> ===
> --- modules/filters/mod_ratelimit.c(revision 1835556)
> +++ modules/filters/mod_ratelimit.c(working copy)
> @@ -208,7 +208,7 @@ rate_limit_filter(ap_filter_t *f, apr_bucket_briga
> ap_remove_output_filter(f);
> }
> else if (!APR_BUCKET_IS_FLUSH(e)) {
> -if (APR_BRIGADE_EMPTY(bb)) {
> +if (ctx->do_sleep && APR_BRIGADE_EMPTY(bb)) {
> /* Wait for more (or next call) */
> break;
> }
> _

Much appreciated,
Cory



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hi Luca,

Sorry for quick reply but we were able to replicate it just now:

# setup a brand new install of wp on a domain (don't have to go through the 
'db' setup process, just configure wp-config.php to get to install.php redirect)
# install mod_ratelimit, and setup a vhost.conf with the ratelimit config for 
the domain
# restart apache
# visit site, see you are getting the "redirect" content instead of actually 
being redirected:

•  curl -H'Host: cptestaddon.com' http://10.215.218.12/
• HTTP/1.1 302 Moved Temporarily
• Date: Thu, 19 Jul 2018 16:47:07 GMT
• Server: Apache
• X-Powered-By: PHP/5.6.36
• Expires: Wed, 11 Jan 1984 05:00:00 GMT
• Cache-Control: no-cache, must-revalidate, max-age=0
• Pragma: no-cache
• Location: http://cptestaddon.com/wp-admin/install.php
• Transfer-Encoding: chunked
• Content-Type: text/html; charset=UTF-8
• 0

It is any CGI app but WP was an easy target to replicate on. 

If you confirm I will create a bug report for it, basically mod_ratelimit 
causes CGI-style apps to emit plaintext. 

Thanks,
Cory McIntire
Release Manager - EasyApache 
cPanel, Inc.

> On Jul 19, 2018, at 10:32 AM, Luca Toscano  wrote:
> 
> Hi Cory,
> 
> 2018-07-19 16:10 GMT+02:00 Cory McIntire :
> Hello all,
> 
> We’re starting to see some issues where mod_ratelimit change here:
> 
>   *) mod_ratelimit: fix behavior when proxing content. PR 62362.
>  [Luca Toscano, Yann Ylavic]
> 
> Is causing some sites to load in plain text/source code…
> 
> We haven’t found the connection beyond unloading mod_ratelimit which resolves 
> the issue,
>  and its not happening everywhere, just curious if anyone else is seeing this?
> 
> I’ll report back once I have more info on further factors involved. 
> 
> Thanks a lot for reporting this. Can you add a bit more info about how to 
> reproduce (httpd config I mean)? Anything relevant in the error logs?
> 
> Luca 
> 



smime.p7s
Description: S/MIME cryptographic signature


Re: Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hi Luca,

So far we’ve not seen much in the logs of our customer reports, however I was
able to get the following settings:



SetOutputFilter RATE_LIMIT
SetEnv rate-limit 512
SetEnv rate-initial-burst 625



When removed/commented out and/or removing mod_ratelimit the site would begin 
to work again.

When in a broken state we would see things like the following when visiting the 
page:

HTTP/1.1 200 OK
Date: Thu, 19 Jul 2018 13:33:05 GMT
Server: Apache
X-Frame-Options: SAMEORIGIN
X-Pingback: 
http:///xmlrpc.php

Link: <
http://X/wp-json/>; rel="https://api.w.org/;, <http://X/>;
 rel=shortlink
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
….
….
 

We are working internally to attempt to get more of these answers.. having 
trouble so far reproducing in house.

Sorry I don’t have more info but I will reply again if we can get it 
reproducible. 

Thanks for your quick response! 
Cory McIntire
Release Manager - EasyApache 
cPanel, Inc.

 
> On Jul 19, 2018, at 10:32 AM, Luca Toscano  wrote:
> 
> Hi Cory,
> 
> 2018-07-19 16:10 GMT+02:00 Cory McIntire :
> Hello all,
> 
> We’re starting to see some issues where mod_ratelimit change here:
> 
>   *) mod_ratelimit: fix behavior when proxing content. PR 62362.
>  [Luca Toscano, Yann Ylavic]
> 
> Is causing some sites to load in plain text/source code…
> 
> We haven’t found the connection beyond unloading mod_ratelimit which resolves 
> the issue,
>  and its not happening everywhere, just curious if anyone else is seeing this?
> 
> I’ll report back once I have more info on further factors involved. 
> 
> Thanks a lot for reporting this. Can you add a bit more info about how to 
> reproduce (httpd config I mean)? Anything relevant in the error logs?
> 
> Luca 
> 



smime.p7s
Description: S/MIME cryptographic signature


Bug in mod_ratelimit?

2018-07-19 Thread Cory McIntire
Hello all,

We’re starting to see some issues where mod_ratelimit change here:

  *) mod_ratelimit: fix behavior when proxing content. PR 62362.
 [Luca Toscano, Yann Ylavic]

Is causing some sites to load in plain text/source code…

We haven’t found the connection beyond unloading mod_ratelimit which resolves 
the issue,
 and its not happening everywhere, just curious if anyone else is seeing this?

I’ll report back once I have more info on further factors involved. 

Thank you,
Cory McIntire
Release Manager - EasyApache 
cPanel, Inc.




smime.p7s
Description: S/MIME cryptographic signature