welcome hpws docs hp-ux webservers home contact hp support
hp logo - invent  hp-ux web server suite

Release Notes
HP-UX Apache-based Web Server B.2.2.15.14
on HP-UX 11i version 2 & 3 for Itanium(R) processor family-based systems

TABLE OF CONTENTS

What's New Previous Releases Features - Secure Socket Layer (SSL) - Dynamic Shared Objects (DSOs) - Standard Features in HP-UX Apache-based Web Server - Utilities Documentation Miscellaneous Known Bugs Legal Notices Note: Please refer to /opt/hpws22/LICENSES/ to view HP's license, terms, and warranty for all components. For the latest information on all HP-UX Apache-based Web Servers, see http://www.hp.com/go/webserver By default, the HP-UX Apache-based Web Server runs under port number 80, while the secure web server runs under port 443.

WHAT'S NEW

HP-UX Apache-based Web Server B.2.2.15.14: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities in Apache http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929 Overview of new features in Apache 2.2 Authn/Authz The bundled authentication and authorization modules have been refactored. The new mod_authn_alias module can greatly simplify Certain authentication configurations. Caching mod_cache, mod_disk_cache, and mod_mem_cache have undergone a lot of changes, and are now considered production-quality. htcacheclean has been introduced to clean up mod_disk_cache setups. Configuration The default configuration layout has been simplified and modularised. Configuration snippets which can be used to enable Commonly-used features are now bundled with Apache, and can be easily added to the main server config. Graceful stop The prefork, worker and event MPMs now allow httpd to be shutdown gracefully via the graceful-stop signal. The GracefulShutdownTimeout Directive has been added to specify an optional timeout, after which httpd will terminate regardless of the status of any requests being Served. Proxying The new mod_proxy_balancer module provides load balancing services for mod_proxy. The new mod_proxy_ajp module adds support for the Apache JServ Protocol version 1.3 used by Apache Tomcat. Regular Expression Library Updated Version 5.0 of the Perl Compatible Regular Expression Library (PCRE) is now included. httpd can be configured to use a system Installation of PCRE by passing the --with-pcre flag to configure. Smart Filtering mod_filter introduces dynamic configuration to the output filter chain. It enables filters to be conditionally inserted, Based on any Request or Response header or environment variable, and dispenses with the more problematic dependencies and Ordering problems in the 2.0 architecture. Large File Support Httpd is now built with support for files larger than 2GB on modern 32-bit Unix systems.Support for handling >2GB request bodies has also been added. Event MPM The event MPM uses a separate thread to handle Keep Alive requests and accepting connections. Keep Alive requests have traditionally Required httpd to dedicate a worker to handle it. This dedicated worker could not be used again until the Keep Alive timeout was reached. SQL Database Support mod_dbd, together with the apr_dbd framework, brings direct SQL support to modules that need it.Supports connection pooling in Threaded MPMs. Module Enhancements Authn/Authz Modules in the aaa directory have been renamed and offer better support for digest authentication. For example,mod_auth is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain authentication configurations. mod_authnz_ldap This module is a port of the 2.0 mod_auth_ldap module to the 2.2 Authn/Authz framework. New features include using LDAP attribute values and complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows configuration blocks to be enabled based on the version number of the running server. mod_info Added a new ?config argument which will show the configuration directives as parsed by Apache,including their file Name and line number. The module also shows the order of all request hooks and additional build information, similar to httpd -V mod_ssl Added a support for RFC 2817, which allows connections to upgrade from clear text to TLS encryption. mod_imagemap mod_imap has been renamed to mod_imagemap to avoid user confusion. Program Enhancements httpd A new command line option -M has been added that lists all modules that are loaded based on the current configuration.Unlike the -l option, this list includes DSOs loaded via mod_so. httxt2dbm A new program used to generate dbm files from text input, for use in RewriteMap with the dbm map type. Module Developer Changes APR 1.0 API Apache 2.2 uses the APR 1.0 API. All deprecated functions and symbols have been removed from APR and APR-Util. Authn/Authz The bundled authentication and authorization modules have been renamed along the following lines: * mod_auth_* -> Modules that implement an HTTP authentication mechanism * mod_authn_* -> Modules that provide a backend authentication provider * mod_authz_* -> Modules that implement authorization (or access) * mod_authnz_*-> Module that implements both authentication & authorization There is a new authentication backend provider scheme which greatly eases the construction of new authentication backend. Connection Error Logging A new function, ap_log_cerror has been added to log errors that occur with the client's connection. When logged, The message includes the client IP address. Test Configuration Hook Added A new hook, test_config has been added to aid modules that want to execute special code only when the user passes -t to httpd. Set Threaded MPM's Stacksize A new directive, ThreadStackSize has been added to set the stack size on all threaded MPMs. This is required for Some third-party modules on platforms with small default thread stack size. Protocol handling for output filters In the past, every filter has been responsible for ensuring that it generates the correct response headers Where it affects them. Filters can now delegate common protocol management to mod_filter, using the ap_register_output_filte_protocol Or ap_filter_protocol calls. Monitor hook added Monitor hook enables modules to run regular/scheduled jobs in the parent(root) process. Regular expression API changes The pcreposix.h header is no longer available; it is replaced by the new ap_regex.h header. The POSIX.2 regex.h Implementation exposed by the old header is now available under the ap_ namespace from ap_regex.h Calls to regcomp,Regexec and so on can be replaced by calls to ap_regcomp, ap_regexec. DBD Framework (SQL Database API) With Apache 1.x and 2.0, modules requiring an SQL backend had to take responsibility for managing it themselves. Apart from reinventing the wheel, this can be very inefficient, for example when several modules each maintain their Own connections. Apache 2.1 and later provides the ap_dbd API for managing database connections (including optimised strategies for Threaded and unthreaded MPMs), while APR 1.2 and later provides the apr_dbd API for interacting with the database. New modules SHOULD now use these APIs for all SQL database operations. Existing applications SHOULD be upgraded to Use it where feasible, either transparently or as a recommended option to their users. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later.

PREVIOUS RELEASES

HP-UX Apache-based Web Server B.2.2.15.13: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities in Apache http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153 HP-UX Apache-based Web Server B.2.2.15.12: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities in Apache http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607 - Bug Fixes Server setup with wp_create cannot be started as modules cannot be found. Install creates links in /var/jail/wp_interent/opt/hpws22/apache/htdocs directory. Improved fix for CVE-2011-3192, which further fixes the handling of byte-range requests, where a range of '0-' will now return 206 instead of 200. HP-UX Apache-based Web Server B.2.2.15.11: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities in PHP 5.2.17 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243 HP-UX Apache-based Web Server B.2.2.15.10: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148 - PHP upgraded to 5.2.17 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.17 - Bug Fix Potential pattern expansion problem when mod_proxy and mod_rewrite are used together. (CVE-2011-3368, CVE-2011-3639, CVE-2011-4317) HP-UX Apache-based Web Server B.2.2.15.09: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348 - Bug Fixes: Improved fix for CVE-2011-3192, which further fixes the handling of byte-range requests to use less memory, to avoid denial of service. HP-UX Apache-based Web Server B.2.2.15.08: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419 - Bug Fixes: Apache crashes with mod_auth_kerb modules. HP-UX Apache-based Web Server B.2.2.15.07: - Apache upgraded to 2.2.15: - Bug Fixes: SMH issue resolved(Unsatisfied code symbol) while apache version upgrade. Note: It is recommended to use mod_jk instead of mod_jk2 as Apache Tomcat connector. HP-UX Apache-based Web Server B.2.2.15.05: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 - Bug Fixes: Apache gets Segmentation fault coredump in buffer_write() function Apache gets Segmentation fault coredump in apr_bucket_alloc() function Secure client renegotiations are not accepted correctly Apache gives child pid exit signal Bus error (10) SSLInsecureRenegotiation option is not working correctly Note: HP Apache 2.2 uses "SSLRenegBufferSize" directive instead of the earlier directive "SSLMaxIOBuffer" used by HP Apache 2.0 for defining the size for the SSL renegotiation buffer. Additional features - SSLRenegBufferSize directory used to configure the size of the SSL IO Buffer in mod_ssl instead of SSLMaxIOBuffer. HP-UX Apache-based Web Server B.2.2.15.03: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452 - Bug Fixes: QXCR1001061071: ScriptMultipleDaemons directive doesn't work correctly in HP Apache 2.2 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.15.02: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412 - Bug Fixes: QXCR1001070163: SSLSessionCacheTimeout Inactive directive doesn't work Apache version 2.0.59.12 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.15.01: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - Bug Fixes: QXCR1001049547:Apache 2.2 to work with OpenSSL 0.9.8 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.8.10: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.09: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 Bug Fixes QXCR1001020782 - Fix for Apache 2.2.x.x by default sets HPWS22_APACHE_START=1 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.06: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 Bug Fixes - Replace mkstmp with tmpnum in MOD_AUTH_KERB Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.05: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - mod_jk upgraded to 1.2.23, the following security flaws were addressed http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860 Bug Fixes - Fixed ftp.sl to support ftp socket functions like ftp_put() & ftp_get(). - Fixed ftp.sl to resolve Segmentation fault when using "ftp_mdtm" with PHP. - mod_auth_kerb: Fix a SIGBUS that occurs when used with KRBCLIENT 1.6.2. Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version. This information is related to Apache 2.0 release - Apache upgraded to 2.0.64 This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 - Bug Fixes: Apache gives child pid exit signal Bus error (10) Apache gets Segmentation fault coredump in buffer_write() function Apache gets Segmentation fault coredump in apr_bucket_alloc() function Secure client renegotiations are not accepted correctly SSLInsecureRenegotiation option is not working correctly Additional feature: - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. - Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. - Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. Note: HP-UX Apache-based Web Server v.2.x powered by Apache Tomcat Webmin ends support starting April 01, 2011 Between now and end of March 2011, the HP-UX Apache-based Web Server v.2.x powered by Apache Tomcat Webmin releases will only consist of fixes to critical defects. Starting April 01, 2011, the HP-UX Apache-based Web Server v.2.x powered by Apache Tomcat Webmin will no longer be supported by HP. It is recommended to migrate to the newer Apache bundle"HP-UX Apache-based Web Server v.3.x powered by Apache Tomcat Webmin". http://www.hp.com/softwarereleases/releases-media2/notices/082010Apache.pdf - PHP version 5.2.13 upgraded to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - OpenSSL upgraded to 0.9.8n Dependencies - mod_perl depends on perl version D.5.8.8.D or higher. - mod_auth_kerb depends on D.1.6.2 or later Kerberos client.(On 11.11 Kerberos V5 Client Version 1.3.5.06 ) - hpuxwsApache 11.11 binary has a runtime dependency on the following pathches. - PHCO_36184 ( libc cumulative patch ) - PHSS_37517 ( ld and linker tools cumulative patch ) - PHSS_33946 ( HP aC++ -AA runtime libraries (aCC A.03.85) )

PREVIOUS RELEASES

- Apache upgraded to 2.0.63 - PHP version 5.2.13 upgraded to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - OpenSSL upgraded to 0.9.8n This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 Dependencies - mod_perl depends on perl version D.5.8.8.D or higher. - mod_auth_kerb depends on D.1.6.2 or later Kerberos client.(On 11.11 Kerberos V5 Client Version 1.3.5.06 ) - hpuxwsApache 11.11 binary has a runtime dependency on the following pathches. - PHCO_36184 ( libc cumulative patch ) - PHSS_37517 ( ld and linker tools cumulative patch ) - PHSS_33946 ( HP aC++ -AA runtime libraries (aCC A.03.85) ) Enhancements - The "SSL Configuration" section in SSL Admin Guide has been updated with the information to use HP-UX Apache-based Web Server with SSL and Tomcat-based Servlet Engine. For more information on configuring this directives refer to, SSL Admin Guide This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.59 This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863 - Tomcat This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 This version fixes the following security vulnerabilities: -Fixed possible stack buffer overflow in FastCGI SAPI. -Properly address incomplete multibyte chars inside escapeshellcmd() -Fixed security issue detailed in CVE-2008-0599. -Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz. -Upgraded PCRE to version 7.6 - mod_jk upgraded to 1.2.23, the following security flaws were addressed http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860 Bug Fixes - This version will fix the bugs listed in http://www.php.net/ChangeLog-5.php#5.2.6 - Problem where httpd consumes 100% CPU and stops responding with dbm Cache enabled is fixed - Fixed incorrect path to librt library which was causing PHP binary to crash - A http request with OPTIONS method including cgi path does not execute the cgi script now - Fixed httpd crashes with SIGBUS/SIGSEGV errors when using mod_ssl with client certificates - mod_cgid looping in the accept() call returning ECONNABORT has been fixed - apachectl script of the webproxy instance is not overwritten during an upgrade - Fixed unresolved symbol issues while loading mod_auth_kerb module on 11.11 This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969 - PHP upgraded to 5.2.0 - PHP extension, oci8 upgraded to 1.2.2 - Added support for 64bit MySQL extension - Added a new PHP extension, SOAP. - OpenSSL upgraded to 0.9.8d - mod_perl supports perl 5.8.8 - mod_jk upgraded to 1.2.19 - Bug Fixes - CGI process does not get terminated on graceful restart. - httpd's size does not get larger on a graceful restart. - Large POST message handled by cgid daemon. - Apachectl of webproxy not corrupted on an upgrade. - mod_perl returns 404 not found if a page is not found instead of 200 OK. - cgid restarts on killing it in Chroot environment. - php has IPV6 enabled. - Apache on using ldap does not cause a Segmentation fault. - pwck does not throw errors for users of Apache. - Reverse proxy does not cause high CPU utilization. - Included fix for Apache bug #12355. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.58 The following security vulnerabilities have been fixed in this release. mod_rewrite: Fix an off-by-one security problem in the ldap scheme handling. For some RewriteRules this could lead to a pointer being written out of bounds. Reported by Mark Dowd of McAfee Avert Labs. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747 mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357 Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352 - mod_perl supports perl 5.8.7 - mod_jk upgraded to 1.2.15 - mod_jk2 upgraded to 2.0.5 - PHP extension, oci8 upgraded to 1.1 - Bug Fixes Added a new Apache module, mod_auth_kerb. Added a new PHP extension, openssl. Added OCSP support for mod_ssl. auth_ldap is no longer shipped with HP-UX Web Server Suite. mod_perl fixed to display the entire process name on inclusion of <Perl> directive in the configuration file. Openldap fixed to prevent core dump on loading and unloading of ldap.sl, a PHP extension. mod_jk2 now recognizes ipv6 addresses. The PHP extension pgsql.sl now links to the latest version of libpq. Running multiple instances of Apache has been documented. libtool fixed to not refer to /CLO/BUILD_ENV. SSL admin guide updated with the updatecrl option. mod_ssl doesn't conflict with RSA's sslc library. The correct version of Openssl binary is now displayed on the command prompt. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390 The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969 - Bug Fixes Apache is fixed to solve the problem of Content-Length header not being present in HEAD response when used as a front-end server mod_perl fixed to honor Perl's $| "OUTPUT_AUTOFLUSH" for STDOUT Apache is fixed to stop without errors in Chrooted environment mod_proxy is fixed to solve the problem of data loss with httpd-2.0.55 reverse proxy method=post. This release of HP-UX Apache-based Web Server is a security and bug fix release. - Apache upgraded to 2.0.55 The following security vulnerabilities have been fixed in this release. Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491 Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268 More details are available at The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728 Apache 2.0.45 and 1.3.29, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088 - Bug Fixes Added support for Nested mutexes. To enable C++ modules, the following 3 lines must be added to the httpd.conf file, if not present. For 11iv2 IA 64-bit platforms, the directives to load the standard C++ libraries are provided. LoadFile /usr/lib/hpux64/libunwind.so LoadFile /usr/lib/hpux64/libCsup.so LoadFile /usr/lib/hpux64/libstd_v2.so For 11iv2 IA 32-bit platforms, the directives to load the standard C++ libraries are provided. LoadFile /usr/lib/hpux32/libunwind.so LoadFile /usr/lib/hpux32/libCsup.so LoadFile /usr/lib/hpux32/libstd_v2.so For all other flavors, the directives to load the classic C++ libraries are provided. LoadFile /usr/lib/libCsup.sl LoadFile /usr/lib/libstream.sl LoadFile /usr/lib/libstd.sl NOTE: To use the LoadFile directive, the following patches are required. For 11iv1: PHSS_30968 - ld(1) and linker tools cumulative patch PHSS_32573 - s700_800 11.11 HP aC++ -AA runtime libraries (aCC A.03.61) For 11.00: PHSS_30969 s700_800 11.00 ld(1) and linker tools cumulative patch PHSS_32574 s700_800 11.X HP aC++ -AA runtime libraries (aCC A.03.61) For 11iv2: No patches are required Please note that the LoadFile directive must precede the LoadModule directive for C++ modules. Note : There is a known problem with mod_perl. mod_perl does not honor Perl's $| (OUTPUT_AUTOFLUSH) for STDOUT. The fix for this problem could not be included in this release and will be available in the next release. Please contact your RCE if you need the fix. HP-UX Apache-based Web Server A.2.0.54.02: This release of HP-UX Apache-based Web Server is a bug fix release. mod_ssl in Apache webserver 2.0.54.00 and earlier, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. The MySQL extension for PHP is provided as an external library on HP-UX 11i and HP-UX 11iv2 32 bit versions. HP-UX Apache-based Web Server A.2.0.54.00: This release of HP-UX Apache-based Web Server is a bug fix release. - Apache upgraded to 2.0.54 - mod_jk upgraded to 1.2.10 - OpenSSL upgraded to 0.9.7g - mod_perl supports perl 5.8.3 - PHP upgraded to 5.0.4 HP-UX Apache-based Web Server 2.0.53: This release of HP-UX Apache-based Web Server is primarily a security and defect fix release. - Apache upgraded to 2.0.53 Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 Added longuname support. - Added perl 5.8.2 support for mod_perl. HP-UX Apache-based Web Server 2.0.52: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release. - Apache upgraded to 2.0.52 The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786 Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault). More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748 The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809 Vulnerability in Apache 2.0.51 prevents the merging of the Satisfy directive, which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 - mod_perl upgraded to 1.99_16 HP-UX Apache-based Web Server 2.0.50: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release with two enhancements. - Apache upgraded to 2.0.50 A remotely triggered memory leak in http header parsing can allow a denial of service attack due to excessive memory consumption. [CAN-2004-0493] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a (trusted) client certificate subject DN which exceeds 6K in length. [CAN-2004-0488] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 - PHP upgraded to 4.3.8 The memory_limit functionality, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete. [CAN-2004-0594] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594 The strip_tags function, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities. [CAN-2004-0595] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595 - Apache(mod_ssl): Extended support for 'RequestHeader' directive When the Proxy feature is used, the RequestHeader directive can be used to send any environment variables/values to the backend server. - Apache(mod_ssl): Support for updating CRL without re-starting the web server A new option 'updatecrl' was added to apachectl. This new option will allow to update the Certificate Revocation List without taking down the web server. - Bug fixes: mod_ssl: Fix a SEGV that occurs when small cache size is specified. mod_cgi: Fix a hang problem with scripts that used timeouts (ex. ping) HP-UX Apache-based Web Server 2.0.49.00: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release which addresses the following vulnerablities and problems: - Apache upgraded to 2.0.49: Apache does not filter terminal escape sequences from error logs, which could make it easier for attackers to insert those sequences into terminal emulators. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 Starvation issue on listening sockets occurs when a short-lived connection on a rarely-accessed listening socket will cause a child to hold the accept mutex and block out new connections. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 Memory leak in mod_ssl allows a remote denial of service attack against a SSL-enabled server by sending plain HTTP requests to the SSL port. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 Bug fixes: mod_ssl: Send the "Close Notify" alert message before closing the socket. mod_ssl: Support for recognizing SSL variables in mod_rewrite. mod_ssl: Disable extra session caching in OpenSSL to prevent memory leak. mod_ssl: Changed SSLMutex to use 'pthread' and 'shm' as an option. Apache : Fix segmentation violation when no Listen directive is specified. - OpenSSL upgraded to 0.9.7.d The do_change_cipher_spec function in OpenSSL allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that triggers a null dereference. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 The SSL/TLS handshaking, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that causes an out-of-bounds read. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 PKCS7-S/MIME encryption fails with memory fault core dump - C++ plug-in modules C++ plug-in modules on IPF should now be built with the Standard C++ runtime libraries. This is a change from previous versions which used Classic C++ runtime libraries. Plug-ins for PA should continue to use the Classic C++ runtime libraries. From more information see, Apache Admin Guide

FEATURES

The HP-UX Apache-based Web Server B.2.2.15.14 is a 64-bit product for HP-UX, based on Apache HTTP Server 2.2 (version 2.2.15) software from the Apache Software Foundation (ASF). The HP-UX Apache-based Web Server is built with the "worker" Multi-Processing Module (MPM). This module implements a hybrid, multi-process, multi-threaded server and provides high scalability with improved performance. In the worker MPM a single control process is responsible for launching child processes. Each child process creates a fixed number of threads as specified in the ThreadsPerChild directive. The individual threads then listen for connections and serve them when they arrive. MaxRequestsPerChild controls how frequently the server recycles processes by killing old ones and launching new ones. The server adjusts to handle load by increasing or decreasing the number of processes. The HP-UX Apache-based Web Server is an HTTP/1.1 compliant server which implements the latest protocols, including RFC2616. It is precompiled and preconfigured to run on HP-UX 11i for Itanium(R) Product family-based products.

Secure Socket Layer (SSL)

The HP-UX Apache-based Web Server is delivered with 128-bit strong encryption capability. The base Apache HTTP Server includes an SSL module (mod_ssl) to provide secure communication via the Secure Socket Layer and Transport Layer Security protocols. The SSL module (mod_ssl) uses the Open Source toolkit OpenSSL for performing the cryptographic operations. SSL tuning information is available in SSL Admin Guide SSL connections to the HP-UX Apache-based Web Server use a default dummy server certificate. Note that you must obtain certificates from authorized agencies for commercial purposes. After obtaining a certificate, make the necessary changes in /opt/hpws22/apache/conf/extra/httpd-ssl.conf to use it. The default dummy key certificate does not include a PEM ENCODED Pass Phrase. The SSL Admin Guide contains instructions on adding and removing a PEM Pass Phrase for a server key. By default, the HP-UX Apache-based Web Server runs under port number 80, while the secure web server runs under port 443.

Dynamic Shared Objects (DSOs)

The HP-UX Apache-based Web Server supports Dynamic Shared Objects (DSO), a special type of shared library. The HP-UX Apache-based Web Server can load or unload DSOs as needed. All standard Apache modules are compiled as DSOs in the HP-UX Apache-based Web Server to provide maximum flexibility. These can be added or removed dynamically at runtime. You can customize the HP-UX Apache-based Web Server by writing your own DSOs using Apache's module APIs. New APIs are available in Apache 2.x over what was provided in Apache 1.3. Changes were also made to the APIs that were carried forward from Apache 1.3 to Apache 2.x. For example, many data types were moved to the Apache Portable Runtime (APR) library. As a result, Apache 1.3 modules will require some modification for Apache 2.x. Changes to the Apache API have also occurred since the previous releases of HP Apache-based Web Server 2.x. Any modules written and compiled for the previous releases of may also need to be reviewed. See the Apache Admin Guide for more information For documentation on developing new Apache 2.x modules and on porting existing Apache 1.3 modules, please see the Migration guide HP Apache-based Web Server version 1.3.x to HP-UX Web Server Suite. Other online resources can be found at http://apr.apache.org and http://httpd.apache.org/docs-2.0/developer.

Standard Features in HP-UX Apache-based Web Server

SECURITY Webproxy Webproxy is a secure reverse proxy solution that can enhance the security of any application service delivered through a web portal. It mediates between clients on the Internet and application servers on the intranet, providing a safe passage for application data between authenticated users and authorized resources. Scripts have been provided for easy setup and removal of the webproxy server. A Chroot jail is automatically created for each server. Webproxy is installed in /opt/hpws22/apache/webproxy. Detailed information is included in the Webproxy Admin Guide Note: An upgrade from a version of Apache older than 2.0.54.00 to a version between 2.0.54.00 and 2.0.58.00 will corrupt the apachectl script of the existing webproxy instances. A further upgrade will throw up an error in swagent.log. However this will not cause any problem if any of the webproxy instance is not running on the machine during the upgrade. Chroot Chroot causes the named directory to become the root directory, the starting point for path searches. A malicious user cannot get to the root file system. Our chroot includes SSL enhancements. We include a script, /opt/hpws22/apache/util/chroot_os_cp.sh, that can be used to copying OS files to your chroot directory. HP-UX Bastille HP-UX Bastille is a security hardening/lockdown tool which can be used to enhance the security of the HP-UX operating system. The HP-UX Apache-based Web Server fully supports Bastille functionality. For more information about HP-UX Bastille, search for HP-UX Bastille at http://www.software.hp.com. OpenSSL 0.9.7m OpenSSL is a fully-featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols With full-strength cryptography worldwide. OpenSSL is installed in /opt/hpws22/apache/bin/openssl. auth_ldap 1.5.4 Auth_ldap is a connector module between Apache and an LDAP directory server which allows Apache to authenticate HTTP clients by using entries in an LDAP directory. Auth_ldap supports iPlanet(Netscape) Directory Server and OpenLDAP Server and can be configured to use the stunnel program for secure SSL queries to the LDAP server. More information on setting up auth_ldap and stunnel can be found in LDAP Admin Guide mod_authnz_ldap Mod_authnz_ldap is a connector between Apache and an LDAP directory server which allows Apache to authenticate HTTP clients by using entries in an LDAP directory. Mod_auth_ldap supports iPlanet(Netscape) Directory Server and OpenLDAP Server and can be configured to use the stunnel program for secure SSL queries to the LDAP server. More information on setting up mod_authnz_ldap, mod_ldap (mod_auth_ldap caching module), and stunnel can be found in LDAP Admin Guide suEXEC suEXEC provides the ability to run CGI and SSI programs under user IDs different from the user ID of the web-server. Normally, a CGI or SSI program executes as the same user who is running the web server. For more information, please see: suEXEC Admin Guide SCRIPTING mod_perl 1.99.16 mod_perl is an add-on Apache module that glues together the Perl runtime library, server software and an object-oriented Perl interface to Apache's C language API. It enables Apache modules to be written entirely in Perl and improves performance of Perl cgi scripts. The Prerequisites section in the Apache Admin Guide contains requirements for mod_perl. mod_perl is still under development because of its dependency on Apache's API. PHP 5.2.6 PHP is an HTML embedded, server-side, cross-platform, scripting language with support for database access. For more information on PHP, please see PHP Admin Guide and PHP User Guide. PHP Extensions Extensions provide additional functionality for PHP scripting. These include support for Oracle connectivity, XML parsing, Image manipulation and more. For more information, please see PHP Admin Guide. CONTENT MANAGEMENT FrontPage Server Extensions 2002 FrontPage Server Extensions enable FrontPage authoring on the server. Entire FrontPage-extended web sites or individual web pages can be published from a FrontPage client to the server or directly created and edited on the server itself. MS FrontPage Support is only available on HP-UX 11.0 and 11i (PA-RISC) systems. For more information, please see: Admin Guide for MS FrontPage Support WebDAV WebDAV ("Web-based Distributed Authoring and Versioning") is a set of extensions to the HTTP protocol which allows users to create, move, copy, and delete resources (files) and collections (directories) on a remote server. For example, WebDAV can be used to edit HTML files. This version of Apache provides class 1 and class 2 WebDAV using the mod_webdav module. More information on WebDAV is available at http://www.webdav.org/ or in the product FAQ. IPv6 Provides support for IPv6 and IPv4 protocols for HP-UX 11i version 2. The emergence of the IPv6 technology will increase the number of available IP addresses and add many improvements over IPv4. For more information, please see: Apache Admin Guide. GENERAL MC/ServiceGuard Support HP-UX Apache-based Web Server is certified with MC/ServiceGuard. A toolkit that integrates HP-UX Apache with ServiceGuard is available in the ECMT, version B.02.00. The change to apachectl documented in the ECMT Release Notes, version B.02.00, in "Problems/Workarounds" is no longer required with this release of HP-UX Apache. The change is now incorporated into the HP-UX Apache product. mod_deflate This standard Apache module provides a filter to compress content from your server before sending it to the client. It can also decompress a gzip-compressed request body. For more information on mod_deflate requirements, please see: Apache Admin Guide apr_shm apr_shm is a library that abstracts the usage of shared memory on UNIX platforms. apr_shm support allows the SSLSessionCache directives to be used in the following manner: SSLSessionCache shmht:/opt/hpws22/apache/logs/ssl_scache(51200) SSLSessionCache shmcb:/opt/hpws22/apache/logs/ssl_scache(51200) 51200 represents the size of the shared memory being created and can be changed based on the system resources. Shmht refers to the hash table method of session caching and shmcb refers to the circular buffer method of session caching. Please note that either shmht or shmcb can be specified. Apache modules in C++ HP-UX Apache-based Web Server supports loading of Apache modules written in C++. More information regarding building and using C++ modules can be found in /opt/hpws22/apache/build/examples/README and in the FAQ under Troubleshooting - "Why does my C++ module fail to load?". Automatic Restart of Apache/Tomcat/Webmin Apache/Tomcat/Webmin can be started automatically on reboot. More information on customization/configuration of this feature can be found in Apache Admin Guide. The Apache product is built with options that provide maximum flexibility to allow enabling of new modules or disabling of existing modules. The modules included by default as shared objects with the HP-UX Apache-based Web Server are listed below. These modules are located in the /opt/hpws22/apache/modules/ directory. For a detailed description of the standard Apache modules, please see http://httpd.apache.org/docs-2.0/mod/index.html. * Modules marked with a "*" were not part of HP Apache-based Web Server 1.3. auth_ldap mod_access mod_actions mod_alias mod_asis mod_auth mod_auth_anon mod_auth_dbm * mod_auth_digest * mod_auth_ldap mod_autoindex * mod_cache * mod_case_filter * mod_case_filter_in mod_cern_meta mod_cgi * mod_cgid * mod_charset_lite * mod_dav * mod_dav_fs * mod_deflate mod_dir * mod_disk_cache mod_env mod_expires * mod_ext_filter * mod_file_cache * mod_log_forensic mod_headers mod_imap mod_include mod_info * mod_jk * mod_jk2 * mod_ldap mod_log_config * mod_mem_cache mod_mime mod_mime_magic mod_negotiation mod_perl mod_php4 mod_proxy * mod_proxy_connect * mod_proxy_ftp * mod_proxy_http mod_rewrite mod_setenvif mod_speling * mod_ssl mod_status * mod_suexec mod_unique_id mod_userdir mod_usertrack mod_vhost_alias

Utilities

The following utilities are part of this product. These are found in /opt/hpws22/apache/util. For more information on the specific utility, please see Apache Utilities User Guide General Utilities User Guide altroot.sh Alternate Root Utility. After installing HP-UX Apache-based Web Server into the default /opt/hpws22/apache/ directory, this script can be used to move it into another directory. cache_util.pl This interactive utility helps in the creation of cache.conf file for use with mod_file_cache. Performance of HP-UX Apache-based Web Server can be improved for serving of static content by using mod_file_cache. Frequently accessed static files can be pre-loaded into memory and served directly in order to avoid frequent disk access. Files to be cached by mod_file_cache are listed in cache.conf file. chroot_os_cp.sh Chroot Copy utility. This is a helper script that sets up chroot by copying typical files used by HP-UX Apache-based Web Server into the chroot directory. The copied set of files allows demo web pages to run. A very secure Apache may require some of these files to be deleted. If you need additional things to be done as part of chroot set-up, you are encouraged to customize this script for your site. mkcert.sh SSL Certificate Generation Utility. This script generates private keys, certificate signing requests, and certificates for the CA, server, and client. ports.sh Port List Utility. This script lists the ports being configured by the HP-UX Apache-based Web Server. In this distribution, there are ports being configured for Apache, Apache(SSL), Tomcat, mod_jk, Webmin, and LDAP.

DOCUMENTATION

The Release Notes, Admin Guides and User Guides included in this bundle can be found in /opt/hpws22/hp_docs/apache/ or if your server has been started with the default configuration, at http://yourserver.com/hp_docs/. The Migration Guides shipped with the HP-UX Webmin-based Admin can be found at /opt/hpws22/hp_docs/ or if your server has been started with the default configuration, at http://yourserver.com/hp_docs/. The FAQ included shipped with the HP-UX Webmin-based Admin can be found at the following URL if the server was started with the default configuration: http://yourserver.com/hp_docs/faq/index.html For the latest information on the HP-UX Apache-based Web Server, including the most up-to-date version of the FAQ, see http://www.hp.com/go/webserver/ For the Apache 2.0 User's Manual, see http://yourserver.com/manual/ (included with the product bundle) or http://httpd.apache.org/docs-2.0/ For the OpenSSL User's Guide, see http://www.openssl.org/docs/ For the mod_ssl User's Guide, see http://www.modssl.org/docs/ For the PHP User's Guide, see http://www.php.net/docs.php

MISCELLANEOUS

For general information on Apache's HTTP Web Server, see http://httpd.apache.org/ For general information on mod_perl module, see http://perl.apache.org/ For the Apache Software Foundation, see http://www.apache.org/ For general information on PHP, see http://www.php.net/ For OpenLDAP SDK information and software, see http://www.openldap.org/ For iPlanet(Netscape) Directory Server on HP-UX see, http://www.software.hp.com For information about auth_ldap LDAP authentication module, http://www.rudedog.org/auth_ldap/ For information about WebDAV, http://www.webdav.org/ For background information on Bastille, http://www.bastille-linux.org/ For information about IPv6, http://www.ipv6.org/

KNOWN BUGS

For known bugs in this release, please see Apache Admin guide. NOTE 1.Any modules built with Apache2.0 may not function as expected with Apache 2.2, and might need to be recompiled using Apache2.2 libraries. 2.We are discontinuing xmltools starting WSS 3.0 release, which was there as a part of WSS 2.0 releases. We continue to support it under WSS 2.0 3. Before installing WSS3.0 depot please remove the WSS 3.0 beta depot if it is already installed. 4.While performing IDT (Installation/Uninstallation) on 11iv3 platform, software spec will be shown as "fa=HP-UX_B.11.23_IA/PA",which can be ignored. 5. MOD_JK2 is officially unsupported by OpenSource More details are available at: http://tomcat.apache.org/connectors-doc/news/20041100.html We will be discontinuing this modules from WSS Suite in 6 months down the line. 6. Altroot.sh may not work as expected. This issue will be taken care in future release. ***************************************************************************