DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=34716>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=34716 ------- Additional Comments From [EMAIL PROTECTED] 2005-12-07 22:21 ------- You are all clear in the understanding that the various 'firewall' software products, anti-virus 'internet protection', and other add ins all insert themselves into the network socket stack? Some of the vendors of this software haven't implemented (correctly) the entire WinSock2 advanced API. You can test this by completely disabling the product and rebooting the machine, and if that fails, uninstalling the product, rebooting and retesting. Also there are several options which cripple Apache to use older API's that are less likely to demonstrate these bugs in 3rd party socket stack drivers, you can try adding these directives globally to your server, one at a time, and report back which directive did resolve this double-headers bug; Win32DisableAcceptEx EnableSendfile off EnableMMap off I'm not excluding the possibility of a bug, but trying to narrow down under what conditions the bug might exhibit itself, and at least getting your servers up and operating. Those others who see this flaw, what extra software (MS Firewall, AV products, etc) are you running on the sockets? -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
