Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 899213 (JBEWS-291)

Summary: EWS on Windows x64: Can't start httpd - "(OS109) The pipe has been ended"
Product: [JBoss] JBoss Enterprise Web Server 1 Reporter: Ondřej Žižka <ozizka>
Component: unspecifiedAssignee: Permaine Cheung <pcheung>
Status: CLOSED NEXTRELEASE QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: EWS 1.0.1CC: mturk
Target Milestone: ---   
Target Release: EWS 1.0.1   
Hardware: Unspecified   
OS: Unspecified   
URL: http://jira.jboss.org/jira/browse/JBEWS-291
Whiteboard: apache dns httpd listen ssl windows
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
OS Name: Microsoft Windows Server 2008 R2 Datacenter OS Version: 6.1.7600 N/A Build 7600 System Type: x64-based PC IP address(es) [01]: 10.34.33.14 [02]: fe80::195f:96ef:46d3:7fec [03]: fec0::f101:195f:96ef:46d3:7fec Both x64 and i386 EWS distributions.
Last Closed: 2010-08-16 13:27:08 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
logs-debug-level.zip none

Description Ondřej Žižka 2010-02-08 21:01:25 UTC
Date of First Response: 2010-02-09 02:13:08
project_key: JBEWS

When trying to start httpd, it fails. Full server log content below.

I've run it as Administrator.
I've tried to run it in a console or as a service, with the same result.
I've tried disabling Windows firewall, no success.
I've tried to use Win32DisableAcceptEx (just to try), didn't help.

No other error messages elsewhere (in Windows Events or in the console).
Nothing else is listening on any port.


[Mon Feb 08 19:53:29 2010] [notice] Digest: generating secret for digest authentication ...
[Mon Feb 08 19:53:29 2010] [notice] Digest: done
[Mon Feb 08 19:53:30 2010] [notice] Apache/2.2.14 (Win32) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 configured -- resuming normal operations
[Mon Feb 08 19:53:30 2010] [notice] Server built: Jan 26 2010 21:51:47
[Mon Feb 08 19:53:30 2010] [notice] Parent: Created child process 2368
[Mon Feb 08 19:53:31 2010] [notice] Digest: generating secret for digest authentication ...
[Mon Feb 08 19:53:31 2010] [notice] Digest: done
[Mon Feb 08 19:53:32 2010] [notice] Child 2368: Child process is running
[Mon Feb 08 19:53:32 2010] [crit] (OS 109)The pipe has been ended.  : setup_inherited_listeners: Unable to read socket data from parent
[Mon Feb 08 19:53:32 2010] [crit] Parent: child process exited with status 3 -- Aborting.

Comment 1 Ondřej Žižka 2010-02-08 21:46:42 UTC
http://img268.imageshack.us/img268/1456/ipv6win2008disable.png

(22:34:40) mturk: Right. Can be IPV6 issue then. Make sure you enter Listen [IPV4 address]:80
(22:35:01) ozizka: httpd.conf only has  Listen 127.0.0.1:80
(22:36:13) mturk: Hmm. For start edit the Network adapter settings and disable IPV6 protocol, just to rule that out.
(22:38:37) mturk: OK. Works?
(22:39:47) ozizka: Still the same
(22:40:43) mturk: OK, so it's not IPV6. That's actually good :)

Comment 2 Ondřej Žižka 2010-02-09 00:04:50 UTC
Link: Added: This issue is incorporated by JBQA-3040


Comment 3 Ondřej Žižka 2010-02-09 01:07:31 UTC
Attachment: Added: logs-debug-level.zip


Comment 4 Ondřej Žižka 2010-02-09 01:13:04 UTC
It's SSL. After removing ssl.conf, it works fine.
SSL log complains about the certificates (repeats 4x):

    [Mon Feb 08 18:52:27 2010] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)


Comment 5 Mladen Turk 2010-02-09 07:13:08 UTC
Here is what I have found doing some Googling:

Also of note, I received this error:
[warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
...on an Apache 2.2.11 server. The problem was that I had changed the IP for the VirtualHost in the httpd-ssl.conf but had forgotten to change the IP for the host name in the DNS server as well.
So the server was listening on the right IP, but my DNS server wasn't pointing there. Seems like a strange error to receive in that instance, but so it goes.

And the fix is to change the
Listen 443 to 
Listen localhost:443
inside comf.d/ssl.conf

I have change the config so it always uses that notion as part of r1019
Next build; http://hudson.qa.jboss.com/hudson/job/RHATews-1-windows/78/ will have that fixed

Comment 6 Ondřej Žižka 2010-02-09 17:17:34 UTC
Chaning ssl.conf  line to 
 
   Listen localhost:443 

solved this. Closing.

Comment 7 Rajesh Rajasekaran 2010-02-09 17:19:36 UTC
Ondrej, please close issues after you have verified them in an official build, there might be a chance the fixes could be missing from the builds we ship finally.

Comment 8 Mladen Turk 2010-02-09 17:29:58 UTC
How can we then mark the issue as verified?
The issue was fixed by the build which I listed, which may or may not be the one that we will finally release.


Comment 9 Ondřej Žižka 2010-02-10 01:56:56 UTC
Ok, I am changing this to "Resolved". Will "Close" once I verify this with an official build.

Comment 10 Ondřej Žižka 2010-02-17 01:29:20 UTC
OK in CR2.

Comment 11 Miroslav Novak 2010-08-16 10:44:48 UTC
When i wanted to configure ews to work with mod_cluster i've got this error again. i checked if the solution here was applied - Listen localhost:443 -> ssl.conf - and it is. Still getting exactly the same error on the same platform (Windows Server 2008 x86_64).

Error message from error_log:

[Mon Aug 16 10:28:22 2010] [notice] Child 7924: Child process is running
[Mon Aug 16 10:28:22 2010] [crit] (OS 109)The pipe has been ended.  : setup_inherited_listeners: Unable to read socket data from parent
[Mon Aug 16 10:28:22 2010] [crit] Parent: child process exited with status 3 -- Aborting.

No other errors were logged.

Comment 12 Miroslav Novak 2010-08-16 11:04:56 UTC
On 32bit Windows Server 2008 is there the same error.

Comment 13 Miroslav Novak 2010-08-16 13:26:03 UTC
Ok - my fault. There was a mistake in my mod_cluster configuration and firewall.