OK - I tired a new setting in my mail client - let me know if this comes as
plain text.
Responses are in-line.
And here is new chain of thought:
After studying Ethereal traces taken during the problem, this problem
appears to occur anytime my browser attempts to re-use the SSL session ID.
I have attempted 2 things to try and work around - disabling SSLv3 in my
browser - the problem still occurs (see trace) and disabling SSL session
caching - also no luck.
I have noted that my server is creating the SSL cache file but it's not
creating the SSL mutex file.
Below are the Ethereal traces:
No. Time Source Destination Protocol
Info
- new ssl session key - it works
189 12.585475 10.129.149.250 204.151.176.150 TCP
1689 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
190 12.586075 204.151.176.150 10.129.149.250 TCP
https > 1689 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
191 12.586101 10.129.149.250 204.151.176.150 TCP
1689 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
192 12.609405 10.129.149.250 204.151.176.150 SSLv2
Client Hello
193 12.609945 204.151.176.150 10.129.149.250 TCP
https > 1689 [ACK] Seq=1 Ack=46 Win=50400 Len=0
194 12.610493 204.151.176.150 10.129.149.250 SSLv2
Server Hello
195 12.611325 10.129.149.250 204.151.176.150 SSLv2
Client Master Key
196 12.611846 204.151.176.150 10.129.149.250 TCP
https > 1689 [ACK] Seq=762 Ack=186 Win=50400 Len=0
199 12.636118 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
200 12.636369 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data
201 12.636960 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
202 12.637632 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data, [Unreassembled Packet]
203 12.637686 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data, [Unreassembled Packet]
204 12.638546 204.151.176.150 10.129.149.250 TCP
https > 1689 [ACK] Seq=832 Ack=1769 Win=50400 Len=0
205 12.639477 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
206 12.640166 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
207 12.640209 10.129.149.250 204.151.176.150 TCP
1689 > https [ACK] Seq=1769 Ack=2416 Win=64512 Len=0
208 12.640244 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
209 12.640351 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
210 12.640367 10.129.149.250 204.151.176.150 TCP
1689 > https [ACK] Seq=1769 Ack=4936 Win=64512 Len=0
262 17.493514 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
267 17.630522 10.129.149.250 204.151.176.150 TCP
1689 > https [ACK] Seq=1769 Ack=6196 Win=64512 Len=0
268 17.631444 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, Encrypted Data, [Unreassembled Packet]
269 17.631501 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
270 17.631524 10.129.149.250 204.151.176.150 TCP
1689 > https [ACK] Seq=1769 Ack=7596 Win=64512 Len=0
271 17.632893 10.129.149.250 204.151.176.150 TCP
1689 > https [FIN, ACK] Seq=1769 Ack=7596 Win=64512 Len=0
272 17.633372 204.151.176.150 10.129.149.250 TCP
https > 1689 [ACK] Seq=7596 Ack=1770 Win=50400 Len=0
- resuse ssl session key - does not work
430 21.122033 10.129.149.250 204.151.176.150 TCP
1690 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
432 21.122548 204.151.176.150 10.129.149.250 TCP
https > 1690 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
433 21.122565 10.129.149.250 204.151.176.150 TCP
1690 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
434 21.122999 10.129.149.250 204.151.176.150 SSLv2
Client Hello
435 21.123501 204.151.176.150 10.129.149.250 TCP
https > 1690 [ACK] Seq=1 Ack=62 Win=50400 Len=0
436 21.124812 204.151.176.150 10.129.149.250 TCP
https > 1690 [FIN, ACK] Seq=1 Ack=62 Win=50400 Len=0
437 21.124837 10.129.149.250 204.151.176.150 TCP
1690 > https [ACK] Seq=62 Ack=2 Win=64512 Len=0
438 21.124952 10.129.149.250 204.151.176.150 TCP
1690 > https [FIN, ACK] Seq=62 Ack=2 Win=64512 Len=0
439 21.125686 204.151.176.150 10.129.149.250 TCP
https > 1690 [ACK] Seq=2 Ack=63 Win=50400 Len=0
- new ssl session key - it works
440 21.126169 10.129.149.250 204.151.176.150 TCP
1691 > https [SYN] Seq=0 Ack=0 Win=64512 Len=0 MSS=1260
441 21.126715 204.151.176.150 10.129.149.250 TCP
https > 1691 [SYN, ACK] Seq=0 Ack=1 Win=50400 Len=0 MSS=1460
442 21.126733 10.129.149.250 204.151.176.150 TCP
1691 > https [ACK] Seq=1 Ack=1 Win=64512 Len=0
443 21.127044 10.129.149.250 204.151.176.150 SSLv2
Client Hello
444 21.127552 204.151.176.150 10.129.149.250 TCP
https > 1691 [ACK] Seq=1 Ack=46 Win=50400 Len=0
445 21.128681 204.151.176.150 10.129.149.250 SSLv2
Server Hello
446 21.129254 10.129.149.250 204.151.176.150 SSLv2
Client Master Key
447 21.129833 204.151.176.150 10.129.149.250 TCP
https > 1691 [ACK] Seq=762 Ack=186 Win=50400 Len=0
449 21.154045 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
450 21.154309 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data
451 21.154853 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
452 21.156212 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data, [Unreassembled Packet]
453 21.156271 10.129.149.250 204.151.176.150 SSLv2
Encrypted Data, [Unreassembled Packet]
454 21.157126 204.151.176.150 10.129.149.250 TCP
https > 1691 [ACK] Seq=832 Ack=1769 Win=50400 Len=0
455 21.158075 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data
456 21.158841 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
457 21.158885 10.129.149.250 204.151.176.150 TCP
1691 > https [ACK] Seq=1769 Ack=2416 Win=64512 Len=0
458 21.158919 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
459 21.159024 204.151.176.150 10.129.149.250 SSLv2
Encrypted Data, [Unreassembled Packet]
460 21.159040 10.129.149.250 204.151.176.150 TCP
1691 > https [ACK] Seq=1769 Ack=4936 Win=64512 Len=0
461 21.159272 204.151.176.150 10.129.149.250 TCP
[TCP Previous segment lost] https > 1691 [FIN, ACK] Seq=7595 Ack=1769
Win=50400 Len=0
462 21.159286 10.129.149.250 204.151.176.150 TCP
[TCP Dup ACK 460#1] 1691 > https [ACK] Seq=1769 Ack=4936 Win=64512 Len=0
SLE=2522522687 SRE=2522522688
661 26.013635 204.151.176.150 10.129.149.250 SSLv2
[TCP Retransmission] Encrypted Data, [Unreassembled Packet]
666 26.157727 10.129.149.250 204.151.176.150 TCP
1691 > https [ACK] Seq=1769 Ack=6196 Win=64512 Len=0 SLE=2522522687
SRE=2522522688
667 26.158646 204.151.176.150 10.129.149.250 SSLv2
[TCP Retransmission] Encrypted Data, [Unreassembled Packet]
668 26.158697 204.151.176.150 10.129.149.250 SSLv2
[TCP Retransmission] Encrypted Data, [Unreassembled Packet]
669 26.158716 10.129.149.250 204.151.176.150 TCP
1691 > https [ACK] Seq=1769 Ack=7596 Win=64512 Len=0 SLE=2522522687
SRE=2522522688
670 26.159292 10.129.149.250 204.151.176.150 TCP
1691 > https [FIN, ACK] Seq=1769 Ack=7596 Win=64512 Len=0
671 26.159765 204.151.176.150 10.129.149.250 TCP
https > 1691 [ACK] Seq=7596 Ack=1770 Win=50400 Len=0
>From the frist session - no session key is passed:
No. Time Source Destination Protocol
Info
192 12.609405 10.129.149.250 204.151.176.150 SSLv2
Client Hello
Frame 192 (99 bytes on wire, 99 bytes captured)
Ethernet II, Src: 00:08:02:da:21:42, Dst: 00:00:0c:07:ac:00
Internet Protocol, Src Addr: 10.129.149.250 (10.129.149.250), Dst Addr:
204.151.176.150 (204.151.176.150)
Transmission Control Protocol, Src Port: 1689 (1689), Dst Port: https
(443), Seq: 1, Ack: 1, Len: 45
Secure Socket Layer
SSLv2 Record Layer: Client Hello
Length: 43
Handshake Message Type: Client Hello (1)
Version: SSL 2.0 (0x0002)
Cipher Spec Length: 18
Session ID Length: 0
Challenge Length: 16
Cipher Specs (6 specs)
Challenge
>From the 2nd session - session key is passed:
No. Time Source Destination Protocol
Info
434 21.122999 10.129.149.250 204.151.176.150 SSLv2
Client Hello
Frame 434 (115 bytes on wire, 115 bytes captured)
Ethernet II, Src: 00:08:02:da:21:42, Dst: 00:00:0c:07:ac:00
Internet Protocol, Src Addr: 10.129.149.250 (10.129.149.250), Dst Addr:
204.151.176.150 (204.151.176.150)
Transmission Control Protocol, Src Port: 1690 (1690), Dst Port: https
(443), Seq: 1, Ack: 1, Len: 61
Secure Socket Layer
SSLv2 Record Layer: Client Hello
Length: 59
Handshake Message Type: Client Hello (1)
Version: SSL 2.0 (0x0002)
Cipher Spec Length: 18
Session ID Length: 16
Challenge Length: 16
Cipher Specs (6 specs)
Session ID (16 bytes)
Challenge
Thank you.
Chuck Borton
JPMorgan Chase & Co.
Global Network Engineering
Office: 614-213-8757
Cell: 614-477-4334
Pager: [EMAIL PROTECTED]
|---------+---------------------------->
| | "Boyle Owen" |
| | <[EMAIL PROTECTED]|
| | om> |
| | |
| | 06/13/2005 03:27 |
| | AM |
| | Please respond to|
| | users |
|---------+---------------------------->
>------------------------------------------------------------------------------------------------------------------------------|
|
|
| To: <[email protected]>
|
| cc:
|
| Subject: RE: [EMAIL PROTECTED] Fw: signal Bus error with apache
Apache/2.0.54 with SSL pages |
>------------------------------------------------------------------------------------------------------------------------------|
You must've missed my earlier plea for plain text... I can't inline quote
HTML mail.
Did you cross reference the errors to the access log and find they were
caused by requests for GIFs? - Yes - the cross reference links mostly to
gif files but some times html pages or javascript files.
How are the GIFs obtained - from a file on a local disk or by some magic
(DB access, generation by a script or external application, proxy from
another server etc)? - The gifs are on the local disk with no magic.
Can you reproduce the errors by requesting individual GIFs directly? - Yes.
I can reproduce the errors at will.
What is your OS - were there any trauma during compilation? - The os is -
SunOS ino0s093 5.9 Generic_117171-17 sun4u sparc SUNW,Sun-Fire-280R - there
were no issues during the compile.
Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored.
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Samstag, 11. Juni 2005 06:00
To: [email protected]
Subject: RE: [EMAIL PROTECTED] Fw: signal Bus error with apache Apache/2.0.54
with SSL pages
Boyle,
Thanks for the info.
When I upgraded to 2.0, I did clean compile and installed into a new
directory. Based upon your comments, I checked by startup script to verify
that I'm not referring to any old libraries. All references are to apache
2 directories.
The problem I'm experiencing (around 60% of all SSL pages but not normal
pages) is occurring on straight html pages with gif images. For example,
if I load a page with 10 gif images, I may get success on 4 images and
failure and bus errors on 6. Usually by the 3rd refresh, I get all of the
images. It's not restricted to just images. Sometimes, a straight html
page or javascript file will fail with the same bus error.
Any other suggestions?
One question I have - what is the minimum version of openssl that is
required with apache 2.0? I have - openssl-0.9.6l.
Thank you.
Chuck Borton
JPMorgan Chase & Co.
Global Network Engineering
Office: 614-213-8757
Cell: 614-477-4334
Pager: [EMAIL PROTECTED]
Charles E Borton "Boyle Owen" <[EMAIL PROTECTED]>
06/09/2005 05:08 AM
Please respond to users
To: <[email protected]>
cc:
Subject: RE: [EMAIL PROTECTED] Fw: signal Bus error with apache
Apache/2.0.54 with SSL pages
Plain text please...
To recap, you upgraded from 1.3 to 2 and now you get occassional bus
errors.
My guess is that certain requests are triggering a call to a function in an
extension module or library and that the module was compiled for 1.3 and is
not compatible with apache 2.
To find the request, cross reference, using the timestamp, the error log
with the access log. That will tell you what module is being accessed. Then
recompile it for apache 2.
Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored.
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Mittwoch, 8. Juni 2005 18:50
To: [email protected]
Subject: [EMAIL PROTECTED] Fw: signal Bus error with apache Apache/2.0.54 with
SSL pages
All,
My apologies. I forgot to include the error message:
[Wed Jun 08 11:11:37 2005] [notice] child pid 14430 exit signal Bus error
(10)
Thank you.
Chuck Borton
JPMorgan Chase & Co.
Global Network Engineering
Office: 614-213-8757
Cell: 614-477-4334
Pager: [EMAIL PROTECTED]
----- Forwarded by Charles E Borton/OH/ONE on 06/08/2005 12:45 PM -----
Charles E Borton Charles E Borton
06/08/2005 11:33 AM
To: [email protected]
cc:
Subject: signal Bus error with apache Apache/2.0.54 with SSL
pages
Hi,
I have recently upgraded to 2.0.54 from 1.3.29.
In my new install, when users try to access the HTTPs portion of my site,
they get some (around 605) broken links (often on images but sometime on
whole pages).
The broken links map to errors in the error log that look like this:
Has anyone seen this before?
Thank you.
Chuck Borton
JPMorgan Chase & Co.
Global Network Engineering
Office: 614-213-8757
Cell: 614-477-4334
Pager: [EMAIL PROTECTED]
This transmission may contain information that is privileged, confidential
and/or exempt from disclosure under applicable law. If you are not the
intended recipient, you are hereby notified that any disclosure, copying,
distribution, or use of the information contained herein (including any
reliance thereon) is STRICTLY PROHIBITED. If you received this transmission
in error, please immediately contact the sender and destroy the material in
its entirety, whether in electronic or hard copy format. Thank you.
Diese E-mail ist eine private und pers�nliche Kommunikation. Sie hat keinen
Bezug zur B�rsen- bzw. Gesch�ftst�tigkeit der SWX Gruppe. This e-mail is of
a private and personal nature. It is not related to the exchange or
business activities of the SWX Group. Le pr�sent e-mail est un message
priv� et personnel, sans rapport avec l'activit� boursi�re du Groupe SWX.
This message is for the named person's use only. It may contain
confidential, proprietary or legally privileged information. No
confidentiality or privilege is waived or lost by any mistransmission. If
you receive this message in error, please notify the sender urgently and
then immediately delete the message and any copies of it from your system.
Please also immediately destroy any hardcopies of the message. You must
not, directly or indirectly, use, disclose, distribute, print, or copy any
part of this message if you are not the intended recipient. The sender's
company reserves the right to monitor all e-mail communications through
their networks. Any views expressed in this message are those of the
individual sender, except where the message states otherwise and the sender
is authorised to state them to be the views of the sender's company.
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
" from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
" from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
" from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]