RE: HTTP response status line doesn't have reason phrase.

2016-11-22 Thread Chandrashekar H . S
Chris, -Original Message- From: Christopher Schultz [mailto:ch...@christopherschultz.net] Sent: 23 November 2016 04:37 To: Tomcat Users List Subject: Re: HTTP response status line doesn't have reason phrase. -BEGIN PGP SIGNED MESSAGE- Hash: SHA256

Re: 8.5.4 to 8.5.5 SSL Issue

2016-11-22 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 William, On 11/16/16 1:06 PM, William Boyd wrote: > On Tue, Nov 15, 2016 at 2:17 PM, > wrote: >> >> I haven't been following this super closely, but it sounds like >> there is a lot of trial and error going on so let

Re: Multi-level context path

2016-11-22 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 To whom it may concern, On 11/17/16 12:39 PM, Growingob2 wrote: > > I can't get my multi-level context path to deploy correctly. In > Tomcat 5.5.26 foo#bar.war placed in my webapps directory deploys to > /foo/bar. This is how I think is should

Re: Sanity Check

2016-11-22 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 André, On 11/22/16 5:51 AM, André Warnier (tomcat) wrote: > So now, considering that such a thing would seem to have overall > an overwhelming positive effect and no negative effect that we can > think of, how would one go about proposing it ? For

Re: HTTP response status line doesn't have reason phrase.

2016-11-22 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Chandra, On 11/21/16 11:06 PM, Chandrashekar H.S wrote: > Hi All, > > We have a multiple tomcat servers which are monitored by F5 health > manager, all tomcat web servers contain a httpstatuscheck web > service. > > The F5 does the heath ping

Re: Sanity Check

2016-11-22 Thread tomcat
On 21.11.2016 18:09, Christopher Schultz wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 André, :) On 11/19/16 12:31 PM, André Warnier (tomcat) wrote: With respect, this is not only "André's problem". Agreed. I apologize if it seemed like I was suggesting that you are the only one

[SECURITY] CVE-2016-6817 Apache Tomcat Denial of Service

2016-11-22 Thread Mark Thomas
CVE-2016-6817 Apache Tomcat Information Disclosure Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.0.M11 Apache Tomcat 8.5.0 to 8.5.6 Earlier versions are not affected. Description The HTTP/2 header parser entered an infinite loop if

[SECURITY] CVE-2016-8735 Apache Tomcat Remote Code Execution

2016-11-22 Thread Mark Thomas
CVE-2016-8735 Apache Tomcat Remote Code Execution Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.0.M11 Apache Tomcat 8.5.0 to 8.5.6 Apache Tomcat 8.0.0.RC1 to 8.0.38 Apache Tomcat 7.0.0 to 7.0.72 Apache Tomcat 6.0.0 to 6.0.47 Earlier,

[SECURITY] CVE-2016-6816 Apache Tomcat Information Disclosure

2016-11-22 Thread Mark Thomas
CVE-2016-6816 Apache Tomcat Information Disclosure Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.0.M11 Apache Tomcat 8.5.0 to 8.5.6 Apache Tomcat 8.0.0.RC1 to 8.0.38 Apache Tomcat 7.0.0 to 7.0.72 Apache Tomcat 6.0.0 to 6.0.47