welcome hpws docs hp-ux webservers home contact hp support
hp logo - invent  hp-ux web server suite

Release Notes HP-UX Web Server Suite

TABLE OF CONTENTS

Overview What's New - HP-UX Apache-based Web Server - HP-UX Tomcat-based Servlet Engine - HP-UX Webmin-based Admin Documentation Miscellaneous Legal Notices Notes: Please refer to /opt/hpws22/LICENSES/ to view HP's license, terms, and warranty for all components.

OVERVIEW

The HP-UX Web Server Suite is a free product that can be downloaded for the HP-UX platform. It includes key software products necessary to deploy, manage, and implement mission critical web servers. The suite is comprised of: HP-UX Apache-based Web Server HP-UX Tomcat-based Servlet Engine HP-UX Webmin-based Admin These components are based on software developed by the Apache Software Foundation (http://www.apache.org) and Webmin (http://www.webmin.com/). - HP-UX Apache-based Web Server combines numerous popular modules from other Open Source projects and provides HP value-added features for the HP-UX platform * Scripting capabilities: PHP, mod_perl, CGI * Content management: WebDAV, FrontPage Server Extensions * Security: authentication through an LDAP server, Chrooted environment, SSL and TLS support, Webproxy - HP-UX Webmin-based Admin is a Configuration and Administration GUI with extensive enhancements for the HP-UX Apache-based Web Server. - HP-UX Tomcat-based Servlet Engine provides customers Java-based extensions for dynamic content generation via Servlets and JavaServer Pages (JSPs). HP enhances the software in the areas of performance, encryption, reliability, customization and administration. HP ensures the suite of products work together with the HP-UX 11.x operating environment. Additionally Oracle, BEA, Siebel and other application vendors have developed application plug-ins for the HP-UX Web Server Suite. The different components of the HP-UX Web Server Suite have demonstrated leadership in the following areas: Reliability, Availability, Serviceability, Internet and Web Application Services, Scalability, Directory and Security Services. The HP-UX Web Server Suite is supported at no additional charge for customers with HP-UX support agreements. The HP-UX Web Server Suite runs on a wide array of HP hardware to match your workload and cost effectiveness requirements. The suite runs with HP-UX 11.0 and HP-UX 11i on the PA-RISC family of 64-bit RP hardware servers. It also operates with HP-UX 11i on the Intel Itanium 64-bit family of hardware servers. The same HP-UX Web Server Suite runs on both low-end and high-end HP-UX servers to provide you with consistent administration and high returns on your IT investment. For the latest information on the HP-UX Web Server Suite, see http://www.hp.com/go/webserver/

WHAT'S NEW

Depending on what you've chosen to install, the following new features may be available for you. Their respective Release Notes and Admin Guides will provide detail about their features.

HP-UX Apache-based Web Server

HP-UX Apache-based Web Server B.2.2.15.06: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 - Bug Fixes: Apache gets Segmentation fault coredump in buffer_write() function Apache gets Segmentation fault coredump in apr_bucket_alloc() function Secure client renegotiations are not accepted correctly Apache gives child pid exit signal Bus error (10) SSLInsecureRenegotiation option is not working correctly Note: HP Apache 2.2 uses "SSLRenegBufferSize" directive instead of the earlier directive "SSLMaxIOBuffer" used by HP Apache 2.0 for defining the size for the SSL renegotiation buffer. Overview of new features in Apache 2.2 Additional features - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn't show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. Authn/Authz The bundled authentication and authorization modules have been refactored. The new mod_authn_alias module can greatly simplify Certain authentication configurations. Caching mod_cache, mod_disk_cache, and mod_mem_cache have undergone a lot of changes, and are now considered production-quality. htcacheclean has been introduced to clean up mod_disk_cache setups. Configuration The default configuration layout has been simplified and modularised. Configuration snippets which can be used to enable Commonly-used features are now bundled with Apache, and can be easily added to the main server config. Graceful stop The prefork, worker and event MPMs now allow httpd to be shutdown gracefully via the graceful-stop signal. The GracefulShutdownTimeout Directive has been added to specify an optional timeout, after which httpd will terminate regardless of the status of any requests being Served. Proxying The new mod_proxy_balancer module provides load balancing services for mod_proxy. The new mod_proxy_ajp module adds support for the Apache JServ Protocol version 1.3 used by Apache Tomcat. Regular Expression Library Updated Version 5.0 of the Perl Compatible Regular Expression Library (PCRE) is now included. httpd can be configured to use a system Installation of PCRE by passing the --with-pcre flag to configure. Smart Filtering mod_filter introduces dynamic configuration to the output filter chain. It enables filters to be conditionally inserted, Based on any Request or Response header or environment variable, and dispenses with the more problematic dependencies and Ordering problems in the 2.0 architecture. Large File Support Httpd is now built with support for files larger than 2GB on modern 32-bit Unix systems.Support for handling >2GB request bodies has also been added. Event MPM The event MPM uses a separate thread to handle Keep Alive requests and accepting connections. Keep Alive requests have traditionally Required httpd to dedicate a worker to handle it. This dedicated worker could not be used again until the Keep Alive timeout was reached. SQL Database Support mod_dbd, together with the apr_dbd framework, brings direct SQL support to modules that need it.Supports connection pooling in Threaded MPMs. Module Enhancements Authn/Authz Modules in the aaa directory have been renamed and offer better support for digest authentication. For example,mod_auth is now split into mod_auth_basic and mod_authn_file; mod_auth_dbm is now called mod_authn_dbm; mod_access has been renamed mod_authz_host. There is also a new mod_authn_alias module for simplifying certain authentication configurations. mod_authnz_ldap This module is a port of the 2.0 mod_auth_ldap module to the 2.2 Authn/Authz framework. New features include using LDAP attribute values and complicated search filters in the Require directive. mod_authz_owner A new module that authorizes access to files based on the owner of the file on the file system mod_version A new module that allows configuration blocks to be enabled based on the version number of the running server. mod_info Added a new ?config argument which will show the configuration directives as parsed by Apache,including their file Name and line number. The module also shows the order of all request hooks and additional build information, similar to httpd -V mod_ssl Added a support for RFC 2817, which allows connections to upgrade from clear text to TLS encryption. mod_imagemap mod_imap has been renamed to mod_imagemap to avoid user confusion. Program Enhancements httpd A new command line option -M has been added that lists all modules that are loaded based on the current configuration.Unlike the -l option, this list includes DSOs loaded via mod_so. httxt2dbm A new program used to generate dbm files from text input, for use in RewriteMap with the dbm map type. Module Developer Changes APR 1.0 API Apache 2.2 uses the APR 1.0 API. All deprecated functions and symbols have been removed from APR and APR-Util. Authn/Authz The bundled authentication and authorization modules have been renamed along the following lines: * mod_auth_* -> Modules that implement an HTTP authentication mechanism * mod_authn_* -> Modules that provide a backend authentication provider * mod_authz_* -> Modules that implement authorization (or access) * mod_authnz_*-> Module that implements both authentication & authorization There is a new authentication backend provider scheme which greatly eases the construction of new authentication backend. Connection Error Logging A new function, ap_log_cerror has been added to log errors that occur with the client's connection. When logged, The message includes the client IP address. Test Configuration Hook Added A new hook, test_config has been added to aid modules that want to execute special code only when the user passes -t to httpd. Set Threaded MPM's Stacksize A new directive, ThreadStackSize has been added to set the stack size on all threaded MPMs. This is required for Some third-party modules on platforms with small default thread stack size. Protocol handling for output filters In the past, every filter has been responsible for ensuring that it generates the correct response headers Where it affects them. Filters can now delegate common protocol management to mod_filter, using the ap_register_output_filte_protocol Or ap_filter_protocol calls. Monitor hook added Monitor hook enables modules to run regular/scheduled jobs in the parent(root) process. Regular expression API changes The pcreposix.h header is no longer available; it is replaced by the new ap_regex.h header. The POSIX.2 regex.h Implementation exposed by the old header is now available under the ap_ namespace from ap_regex.h Calls to regcomp,Regexec and so on can be replaced by calls to ap_regcomp, ap_regexec. DBD Framework (SQL Database API) With Apache 1.x and 2.0, modules requiring an SQL backend had to take responsibility for managing it themselves. Apart from reinventing the wheel, this can be very inefficient, for example when several modules each maintain their Own connections. Apache 2.1 and later provides the ap_dbd API for managing database connections (including optimised strategies for Threaded and unthreaded MPMs), while APR 1.2 and later provides the apr_dbd API for interacting with the database. New modules SHOULD now use these APIs for all SQL database operations. Existing applications SHOULD be upgraded to Use it where feasible, either transparently or as a recommended option to their users. - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later.

PREVIOUS RELEASES

HP-UX Apache-based Web Server B.2.2.15.03: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452 - Bug Fixes: QXCR1001061071: ScriptMultipleDaemons directive doesn't work correctly in HP Apache 2.2 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.15.02: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412 - Bug Fixes: QXCR1001070163: SSLSessionCacheTimeout Inactive directive doesn't work Apache version 2.0.59.12 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.15.01: - Apache upgraded to 2.2.15: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - Bug Fixes: QXCR1001049547:Apache 2.2 to work with OpenSSL 0.9.8 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl A.00.09.08n.011 for HP-UX 11i v2 version and later. - Apache2.2.x depends on Openssl A.00.09.08n.012 for HP-UX 11i v3 version and later. HP-UX Apache-based Web Server B.2.2.8.10: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - PHP upgraded to 5.2.13 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.13 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.09: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 Bug Fixes QXCR1001020782 - Fix for Apache 2.2.x.x by default sets HPWS22_APACHE_START=1 Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.06: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 Bug Fixes - Replace mkstmp with tmpnum in MOD_AUTH_KERB Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version and later. HP-UX Apache-based Web Server B.2.2.8.05: - Apache upgraded to 2.2.8: This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - mod_jk upgraded to 1.2.23, the following security flaws were addressed http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860 Bug Fixes - Fixed ftp.sl to support ftp socket functions like ftp_put() & ftp_get(). - Fixed ftp.sl to resolve Segmentation fault when using "ftp_mdtm" with PHP. - mod_auth_kerb: Fix a SIGBUS that occurs when used with KRBCLIENT 1.6.2. Additional features - Added support for mod_tga module. - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl - mod_auth_kerb module upgraded to Version 5.3 - A new Directive "KrbAppendRealm" has been added to mod_auth_kerb module, which strips the domain name (@domain) from the user name - Introduced new module called mod_auth_xradius(0.4.6) to authenticate RADIUS server. Dependencies - mod_auth_kerb module depends on D.1.6.2 Kerberos client and later. - mod_perl depends on perl D.5.8.8.D version. - Apache2.2.x depends on Openssl 00.09.07m.021 version. This information is related to Apache 2.0 release - Apache upgraded to 2.0.64 This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 - Bug Fixes: QXCR1001084281: Apache gives child pid exit signal Bus error (10) QXCR1001102052: Apache gets Segmentation fault coredump in buffer_write() function QXCR1001102054: Apache gets Segmentation fault coredump in apr_bucket_alloc() function QXCR1001104660: Secure client renegotiations are not accepted correctly QXCR1001086887: SSLInsecureRenegotiation option is not working correctly Additional feature: - New option "NoSessionIdContext" in "SSLOptions" directive has been added to fix the problem where "inactive" option in "SSLSessionCacheTimeout" directive doesn.t show expected behavior for Netscape Browser, while using client certificates. This new option "NoSessionIdContext" is not required for Internet Explorer Browser. - Also extra option "SSLInsecureRenegotiation on" needs to be specified in Apache configuration file in order for any browser to work with client certificates for this new option "NoSessionIdContext" in "SSLOptions" directive with OpenSSL 0.9.8m version and above. - Note: With this new option "NoSessionIdContext", Apache RFC 2817 support, which allows connections to upgrade from clear text to TLS encryption and Apache Server Same Indication (SNI) support will not work. Note: HP-UX Apache-based Web Server v.2.x powered by Apache Tomcat Webmin ends support starting April 01, 2011 Between now and end of March 2011, the HP-UX Apache-based Web Server v.2.x powered by Apache Tomcat Webmin releases will only consist of fixes to critical defects. Starting April 01, 2011, the HP-UX Apache-based Web Server v.2.x powered by Apache Tom cat Webmin will no longer be supported by HP. It is recommended to migrate to the newer Apache bundle"HP-UX Apache-based Web Server v.3.x powered by Apache Tomcat Webmin". http://www.hp.com/softwarereleases/releases-media2/notices/082010Apache.pdf - PHP version 5.2.13 upgraded to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - OpenSSL upgraded to 0.9.8n Dependencies - mod_perl depends on perl version D.5.8.8.D or higher. - mod_auth_kerb depends on D.1.6.2 or later Kerberos client.(On 11.11 Kerberos V5 Client Version 1.3.5.06 ) - hpuxwsApache 11.11 binary has a runtime dependency on the following pathches. - PHCO_36184 ( libc cumulative patch ) - PHSS_37517 ( ld and linker tools cumulative patch ) - PHSS_33946 ( HP aC++ -AA runtime libraries (aCC A.03.85) )

PREVIOUS RELEASES

- Apache upgraded to 2.0.63 - PHP version 5.2.13 upgraded to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 - OpenSSL upgraded to 0.9.8n This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 Dependencies - mod_perl depends on perl version D.5.8.8.D or higher. - mod_auth_kerb depends on D.1.6.2 or later Kerberos client.(On 11.11 Kerberos V5 Client Version 1.3.5.06 ) - hpuxwsApache 11.11 binary has a runtime dependency on the following pathches. - PHCO_36184 ( libc cumulative patch ) - PHSS_37517 ( ld and linker tools cumulative patch ) - PHSS_33946 ( HP aC++ -AA runtime libraries (aCC A.03.85) ) Enhancements - The "SSL Configuration" section in SSL Admin Guide has been updated with the information to use HP-UX Apache-based Web Server with SSL and Tomcat-based Servlet Engine. For more information on configuring this directives refer to, SSL Admin Guide This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.59 This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863 - Tomcat This version fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333 - PHP upgraded to 5.2.6 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.6 This version fixes the following security vulnerabilities: -Fixed possible stack buffer overflow in FastCGI SAPI. -Properly address incomplete multibyte chars inside escapeshellcmd() -Fixed security issue detailed in CVE-2008-0599. -Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz. -Upgraded PCRE to version 7.6 - mod_jk upgraded to 1.2.23, the following security flaws were addressed http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860 Bug Fixes - This version will fix the bugs listed in http://www.php.net/ChangeLog-5.php#5.2.6 - Problem where httpd consumes 100% CPU and stops responding with dbm Cache enabled is fixed - Fixed incorrect path to librt library which was causing PHP binary to crash - A http request with OPTIONS method including cgi path does not execute the cgi script now - Fixed httpd crashes with SIGBUS/SIGSEGV errors when using mod_ssl with client certificates - mod_cgid looping in the accept() call returning ECONNABORT has been fixed - apachectl script of the webproxy instance is not overwritten during an upgrade - Fixed unresolved symbol issues while loading mod_auth_kerb module on 11.11 This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969 - PHP upgraded to 5.2.0 - PHP extension, oci8 upgraded to 1.2.2 - Added support for 64bit MySQL extension - Added a new PHP extension, SOAP. - OpenSSL upgraded to 0.9.8d - mod_perl supports perl 5.8.8 - mod_jk upgraded to 1.2.19 - Bug Fixes - CGI process does not get terminated on graceful restart. - httpd's size does not get larger on a graceful restart. - Large POST message handled by cgid daemon. - Apachectl of webproxy not corrupted on an upgrade. - mod_perl returns 404 not found if a page is not found instead of 200 OK. - cgid restarts on killing it in Chroot environment. - php has IPV6 enabled. - Apache on using ldap does not cause a Segmentation fault. - pwck does not throw errors for users of Apache. - Reverse proxy does not cause high CPU utilization. - Included fix for Apache bug #12355. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.58 The following security vulnerabilities have been fixed in this release. mod_rewrite: Fix an off-by-one security problem in the ldap scheme handling. For some RewriteRules this could lead to a pointer being written out of bounds. Reported by Mark Dowd of McAfee Avert Labs. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747 mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357 Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352 - mod_perl supports perl 5.8.7 - mod_jk upgraded to 1.2.15 - mod_jk2 upgraded to 2.0.5 - PHP extension, oci8 upgraded to 1.1 - Bug Fixes Added a new Apache module, mod_auth_kerb. Added a new PHP extension, openssl. Added OCSP support for mod_ssl. auth_ldap is no longer shipped with HP-UX Web Server Suite. mod_perl fixed to display the entire process name on inclusion of <Perl> directive in the configuration file. Openldap fixed to prevent core dump on loading and unloading of ldap.sl, a PHP extension. mod_jk2 now recognizes ipv6 addresses. The PHP extension pgsql.sl now links to the latest version of libpq. Running multiple instances of Apache has been documented. libtool fixed to not refer to /CLO/BUILD_ENV. SSL admin guide updated with the updatecrl option. mod_ssl doesn't conflict with RSA's sslc library. The correct version of Openssl binary is now displayed on the command prompt. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390 The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969 - Bug Fixes Apache is fixed to solve the problem of Content-Length header not being present in HEAD response when used as a front-end server mod_perl fixed to honor Perl's $| "OUTPUT_AUTOFLUSH" for STDOUT Apache is fixed to stop without errors in Chrooted environment mod_proxy is fixed to solve the problem of data loss with httpd-2.0.55 reverse proxy method=post. This release of HP-UX Apache-based Web Server is a security and bug fix release. - Apache upgraded to 2.0.55 The following security vulnerabilities have been fixed in this release. Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491 Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268 More details are available at The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728 Apache 2.0.45 and 1.3.29, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088 - Bug Fixes Added support for Nested mutexes. To enable C++ modules, the following 3 lines must be added to the httpd.conf file, if not present. For 11iv2 IA 64-bit platforms, the directives to load the standard C++ libraries are provided. LoadFile /usr/lib/hpux64/libunwind.so LoadFile /usr/lib/hpux64/libCsup.so LoadFile /usr/lib/hpux64/libstd_v2.so For 11iv2 IA 32-bit platforms, the directives to load the standard C++ libraries are provided. LoadFile /usr/lib/hpux32/libunwind.so LoadFile /usr/lib/hpux32/libCsup.so LoadFile /usr/lib/hpux32/libstd_v2.so For all other flavors, the directives to load the classic C++ libraries are provided. LoadFile /usr/lib/libCsup.sl LoadFile /usr/lib/libstream.sl LoadFile /usr/lib/libstd.sl NOTE: To use the LoadFile directive, the following patches are required. For 11iv1: PHSS_30968 - ld(1) and linker tools cumulative patch PHSS_32573 - s700_800 11.11 HP aC++ -AA runtime libraries (aCC A.03.61) For 11.00: PHSS_30969 s700_800 11.00 ld(1) and linker tools cumulative patch PHSS_32574 s700_800 11.X HP aC++ -AA runtime libraries (aCC A.03.61) For 11iv2: No patches are required Please note that the LoadFile directive must precede the LoadModule directive for C++ modules. Note : There is a known problem with mod_perl. mod_perl does not honor Perl's $| (OUTPUT_AUTOFLUSH) for STDOUT. The fix for this problem could not be included in this release and will be available in the next release. Please contact your RCE if you need the fix. HP-UX Apache-based Web Server A.2.0.54.02: This release of HP-UX Apache-based Web Server is a bug fix release. mod_ssl in Apache webserver 2.0.54.00 and earlier, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. The MySQL extension for PHP is provided as an external library on HP-UX 11i and HP-UX 11iv2 32 bit versions. HP-UX Apache-based Web Server A.2.0.54.00: This release of HP-UX Apache-based Web Server is a bug fix release. - Apache upgraded to 2.0.54 - mod_jk upgraded to 1.2.10 - OpenSSL upgraded to 0.9.7g - mod_perl supports perl 5.8.3 - PHP upgraded to 5.0.4 HP-UX Apache-based Web Server 2.0.53: This release of HP-UX Apache-based Web Server is primarily a security and defect fix release. - Apache upgraded to 2.0.53 Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 Added longuname support. - Added perl 5.8.2 support for mod_perl. HP-UX Apache-based Web Server 2.0.52: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release. - Apache upgraded to 2.0.52 The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786 Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault). More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748 The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809 Vulnerability in Apache 2.0.51 prevents the merging of the Satisfy directive, which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 - mod_perl upgraded to 1.99_16 HP-UX Apache-based Web Server 2.0.50: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release with two enhancements. - Apache upgraded to 2.0.50 A remotely triggered memory leak in http header parsing can allow a denial of service attack due to excessive memory consumption. [CAN-2004-0493] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a (trusted) client certificate subject DN which exceeds 6K in length. [CAN-2004-0488] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 - PHP upgraded to 4.3.8 The memory_limit functionality, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete. [CAN-2004-0594] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594 The strip_tags function, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities. [CAN-2004-0595] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595 - Apache(mod_ssl): Extended support for 'RequestHeader' directive When the Proxy feature is used, the RequestHeader directive can be used to send any environment variables/values to the backend server. - Apache(mod_ssl): Support for updating CRL without re-starting the web server A new option 'updatecrl' was added to apachectl. This new option will allow to update the Certificate Revocation List without taking down the web server. - Bug fixes: mod_ssl: Fix a SEGV that occurs when small cache size is specified. mod_cgi: Fix a hang problem with scripts that used timeouts (ex. ping) HP-UX Apache-based Web Server 2.0.49.00: This release of HP-UX Apache-based Web Server is primarily a security and bug fix release which addresses the following vulnerablities and problems: - Apache upgraded to 2.0.49: Apache does not filter terminal escape sequences from error logs, which could make it easier for attackers to insert those sequences into terminal emulators. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 Starvation issue on listening sockets occurs when a short-lived connection on a rarely-accessed listening socket will cause a child to hold the accept mutex and block out new connections. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 Memory leak in mod_ssl allows a remote denial of service attack against a SSL-enabled server by sending plain HTTP requests to the SSL port. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 Bug fixes: mod_ssl: Send the "Close Notify" alert message before closing the socket. mod_ssl: Support for recognizing SSL variables in mod_rewrite. mod_ssl: Disable extra session caching in OpenSSL to prevent memory leak. mod_ssl: Changed SSLMutex to use 'pthread' and 'shm' as an option. Apache : Fix segmentation violation when no Listen directive is specified. - OpenSSL upgraded to 0.9.7.d The do_change_cipher_spec function in OpenSSL allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that triggers a null dereference. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 The SSL/TLS handshaking, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that causes an out-of-bounds read. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 PKCS7-S/MIME encryption fails with memory fault core dump - C++ plug-in modules C++ plug-in modules on IPF should now be built with the Standard C++ runtime libraries. This is a change from previous versions which used Classic C++ runtime libraries. Plug-ins for PA should continue to use the Classic C++ runtime libraries. From more information see, Apache Admin Guide

HP-UX Tomcat-based Servlet Engine

This release of HP-UX Tomcat-based Servlet Engine B.5.5.30.05 contains Tomcat 5.5.30 which implements Servlet 2.4 and JSP 2.0 specifications. This release contains Tomcat version 5.5.30. Apart from being an implementation of new specifications of Servlet and JSP, it includes several new features, enhancements, performance optimizations, and bug fixes over the previous releases (Tomcat 4.1.x). This is primarily a security and bugfix release. The following security vulnerabilities have been fixed in this release. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0013 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3718 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476 Bug Fixes: - Cannot start tomcat as non-root user - Tomcat does not start up during boot time - Fixed fileUpload version 1.0 memory leak fix by using FileCleaner from Commons IO to clean up temp files, rather than File.deleteOnExit(). NOTE: From B.4.1.29.00 and onwards mod_jk and mod_jk2 will be shipped with the HP-UX Apache-based Web Server Product. Please refer to the Apache admin guide for more information. NOTE: If you're upgrading from HP-UX Tomcat 4.1.29.x to HP-UX Tomcat-based Servlet Engine B.5.5.30.05, the following files will have to be manually updated (after a careful review) by the System Administrator. This information will also be present in /var/adm/sw/swagent.log after performing the upgrade. % cp /opt/hpws22/tomcat/newconfig/opt/hpws22/tomcat/conf/server.xml \ /opt/hpws22/tomcat/conf/server.xml % cp /opt/hpws22/tomcat/newconfig/opt/hpws22/tomcat/conf/tomcat-users.xml \ /opt/hpws22/tomcat/conf/tomcat-users.xml % cp /opt/hpws22/tomcat/newconfig/opt/hpws22/tomcat/conf/web.xml \ /opt/hpws22/tomcat/conf/web.xml To preserve the behavior of newconfig, please do not use the "mv" command instead of "cp" above. Sample Servlets and JSPs:sed Admin A.1.070.13: The location of the sample Servlets and JSPs in this release of Tomcat has been changed. In the previous version these were located under /opt/hpws22/tomcat/webapps/servlets-examples/ and /opt/hpws22/tomcat/webapps/jsp-examples/ respectively for Servlets and JSPs. The new locations are /opt/hpws22/tomcat/webapps/servlets-examples/ and /opt/hpws22/tomcat/webapps/jsp-examples/ respectively for Servlets and JSPs. To access the sample servlets in this release from a browser, start Tomcat and point your browser to http://yourserver.com:8081/servlets-examples and similarily for Aaccessing JSPs type http://yourserver.com:8081/jsp-examples in your browser.

HP-UX Webmin-based Admin

HP-UX Webmin-based Admin A.1.070.13: This release of HP-UX Webmin-based Admin is a bug fix release: - Webmin issues while creating new Virtual Server This release also includes enhancements/bug fixes from A.1.070.01 - fixed webmin to enable/disable mod_jk through Webmin apache Modules page. - The 'Upgrade Webmin' button on the configuration page is disabled since HP does not support an upgrade to Webmin from www.webmin.org - Disabled read access to module configuration for normal users - DOS attack(Locking out other users) when logging in using space in username - Support for 32-bit Apache (if installed) - Enhanced look and feel (new icons, intuitive forms, Javascript event handlers) - Backup, version management(RCS) and retrieval of Apache configuration files. (See below) - Direct access to launching HP-UX Tomcat-based Servlet Engine invoking Tomcat's Management and Admin tools (See below) - Consolidated log display page which now provides a single portal for viewing all log files. (See below) - Support for easy management of log rotation - Intuitive server status and info configuration and viewing - Enhanced certificate management including addition of PEM pass phrases to keys and deploying a key/certificate pair to a Virtual Server. (See below) - Support for Virtual Host additions and management - Improved parsing of Apache configuration files to accurately handle directives within Virtual Hosts, Directory, and other containers. - Various bug fixes This release of HP-UX Webmin-based Admin is a security/bug fix release that addresses the following vulnerablilties: - corruption of the SSL virtual server configuration (JAGaf41910).

DOCUMENTATION

The Release Notes, Admin Guides, User Guides and Migration Guides included in this bundle can be found in /opt/hpws22/hp_docs/ Depending on which components are installed, these documents can also be accessed from the following servers if they were started with the default configurations: HP-UX Apache-based Web Server http://yourserver.com/ HP-UX Tomcat-based Servlet Engine http://yourserver.com:8081/ HP-UX Webmin-based Admin http://yourserver.com:10000/ ***************************************************************************