DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=34716>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=34716





------- Additional Comments From [EMAIL PROTECTED]  2005-12-07 22:21 -------
You are all clear in the understanding that the various 'firewall' software
products, anti-virus 'internet protection', and other add ins all insert 
themselves into the network socket stack?

Some of the vendors of this software haven't implemented (correctly) the
entire WinSock2 advanced API.  You can test this by completely disabling
the product and rebooting the machine, and if that fails, uninstalling the
product, rebooting and retesting.

Also there are several options which cripple Apache to use older API's that
are less likely to demonstrate these bugs in 3rd party socket stack drivers,
you can try adding these directives globally to your server, one at a time,
and report back which directive did resolve this double-headers bug;

  Win32DisableAcceptEx
  EnableSendfile off
  EnableMMap off

I'm not excluding the possibility of a bug, but trying to narrow down under
what conditions the bug might exhibit itself, and at least getting your
servers up and operating.

Those others who see this flaw, what extra software (MS Firewall, AV products,
etc) are you running on the sockets?




-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to