Bug 72692

Summary: Dummy connections spamming SSL error log
Product: [Retired] Red Hat Linux Reporter: Joe Orton <jorton>
Component: httpdAssignee: Joe Orton <jorton>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 8.0   
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: 2.0.40-3 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2003-05-19 14:10:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Joe Orton 2002-08-26 18:07:20 UTC
Description of Problem:
The Apache 2.0 pipe-of-death code makes dummy connections to the local server to  
force a child process to quit, and these may go to the SSL port, causing
mod_ssl to regularly leave log messages in the ssl_error_log.

Version-Release number of selected component (if applicable):
httpd-2.0.40-3

How Reproducible:
Always

Steps to Reproduce:
1. load httpd and mod_ssl packages
2. start server
3. benchmark to port 80 with 'ab' or so on

Actual Results:
Many error messages like below in ssl_error_log:
[Mon Aug 26 19:17:30 2002] [error] SSL handshake interrupted by system [Hint:
Stop button pressed in browser?!]

Expected Results:
No error messages in ssl_error_log.

Comment 1 Joe Orton 2002-08-30 16:19:38 UTC
Simple workaround to use the first configured listener for dummy connections in
2.0.40-3, a config change (e.g. an SSL-only server) can still thwart this.

Comment 2 Joe Orton 2003-05-19 14:10:35 UTC
Workaround seems sufficient.