Apache, iPrint and SSL/nile.nlm

Hi,
Getting various abends on a daily basis. Server is running as a vm on ESX 4.1 on an AMD platform. The running process is not always the same (apache_workprocess, seg.nlm, pcountdp.nlm) but the type of abend seems to be very consistent. It is the "Kernel detected an attempted context switch in an MPK Fast WTD". Another consistency seems to be that SSL and nile.nlm are high up on the stack - but maybe that is just normal for any iPrint server with secure iprint enabled on every printer (about 400 printer agents).
Thinking it might be a bad cert I have tried using both the self-signed "SSL CertificateDNS" cert and a third-party (Thawte) cert. Same result in either case. I have also tried the various tweaks on ESX for NetWare guest vm's :
- setting the memory reservation
- settting cpu affinity,
- setting the virtualization method to use hardware (Intel/AMD mmu and Intel/AMD instruction set) rather than automatic,
- removing the acpidrv.psm module from startup.ncf
- I have NOT set the NUMA memory node affinity.
The last thing I can think of to try is to turn off secure iPrint. If I do that, can I load apache without it listening on port 443 and not break any iPrint services? I do have iManager running on this same guest as well but I do not need it there.
Any other ideas?
Thanks,
Ron
Below are two recent abends, one with pcountdp.nlm and the second with apache_worker process. I've cut the nlm list on the second abend to get it to fit into this post.
Server N05 halted Monday, November 21, 2011 12:53:52.463 pm
Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
Registers:
CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
ESI = 00000006 EDI = A00D19D8 EBP = FBF138DB ESP = 8FD9DE9C
EIP = 0021AB7A FLAGS = 00000002
0021AB7A 83C404 ADD ESP, 00000004
EIP in SERVER.NLM at code start +00019B5Ah
The violation occurred while processing the following instruction:
0021AB7A 83C404 ADD ESP, 00000004
0021AB7D 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
, 00000000
0021AB84 7482 JZ 0021AB08
0021AB86 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
0021AB8D 0F84D5000000 JZ 0021AC68
0021AB93 85DB TEST EBX, EBX
0021AB95 0F84BA000000 JZ 0021AC55
0021AB9B 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
0021ABA1 53 PUSH EBX
0021ABA2 E8CFDBEFFF CALL LOADER.NLM|Abend
Running process: PCOUNTDP.NLM 236 Process
Thread Owned by NLM: PCOUNTDP.NLM
Stack pointer: 8FD9E1A8
OS Stack limit: 8FD9B360
CPU 0 (Thread A52305C0) is in a NO SLEEP state
Scheduling priority: 67371008
Wait state: 5050010 Blocked on a Mutex
Stack: --FBF138DB ?
--A00D19E0 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--A00D19C0 ?
002186BC (SERVER.NLM|SchedSwitch+48)
--00000001 (LOADER.NLM|KernelAddressSpace+1)
--A00D19E0 ?
--A00D19D8 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--A00D19C0 ?
002064BC (SERVER.NLM|kMutexLock+1AC)
--A00D19E4 ?
--A00D1A40 ?
--8FD9DEF0 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--04B4E504 ?
--9D96379C ?
883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
--A00D19C0 ?
--04B4E504 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--8FD9DEFC ?
9EDD3AF1 (NILE.NLM|SSL_library_init+26C)
--9D96379C ?
--8FD9DF20 ?
9EDE3ABF (NILE.NLM|CRYPTO_lock+8F)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-9FE9C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
-9FEC9448 (NILE.NLM|serverPostFix+1968)
--8FD9DF24 ?
--04B4E504 ?
--8FD9DF48 ?
9EDE3B44 (NILE.NLM|CRYPTO_add_lock+5A)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-9FE9C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
-9FEC9448 (NILE.NLM|serverPostFix+1968)
--04B4E504 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--8FD9DF70 ?
9EDE00AF (NILE.NLM|RSA_free+2E)
--04B6E43C ?
--FFFFFFFF ?
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-9FE9C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
-9FEC9448 (NILE.NLM|serverPostFix+1968)
--04B4E504 ?
--04B4E504 ?
--8FD9DF80 ?
9EDE7A81 (NILE.NLM|EVP_PKEY_free+97)
--04B6E404 ?
--00000002 (LOADER.NLM|KernelAddressSpace+2)
--8FD9DF94 ?
9EDE7A2A (NILE.NLM|EVP_PKEY_free+40)
--046B3A84 ?
9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--8FD9DFA8 ?
9EDF3660 (NILE.NLM|PKCS7_DIGEST_free+35)
--046B3A84 ?
-9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
--047E85C4 ?
--8FD9DFEC ?
9EDF8E7A (NILE.NLM|ASN1_item_ex_free+2A6)
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--009052DC ?
-9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
--A00D1540 ?
-9FEA2C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
-9FEA2C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
--A00D1540 ?
--8FD9DFE8 ?
-9FEA2C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
9EDF3641 (NILE.NLM|PKCS7_DIGEST_free+16)
--00000002 (LOADER.NLM|KernelAddressSpace+2)
--046DFC84 ?
--047E85C4 ?
--04B4E504 ?
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--8FD9E010 ?
9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
--009052DC ?
-9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--04622844 ?
--00000005 (LOADER.NLM|KernelAddressSpace+5)
--009052DC ?
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--8FD9E050 ?
9EDF8E55 (NILE.NLM|ASN1_item_ex_free+281)
--009052DC ?
-9FE9B6C4 (NILE.NLM|OID_AES256+760)
--0000000A (LOADER.NLM|KernelAddressSpace+A)
-9FE9B6C4 (NILE.NLM|OID_AES256+760)
-9FE9B6C4 (NILE.NLM|OID_AES256+760)
Additional Information:
The NetWare OS detected a problem with the system while executing a process owned by SERVER.NLM. It may be the source of the problem or there may have been a memory corruption.
Loaded Modules:
PCOUNTWI.NLM Pcounter Web Interface
Version 5.50 October 27, 2011
Code Address: A13A6000h Length: 00006A0Ch
Data Address: A653C000h Length: 00003AA0h
NDPSGW.NLM NDPS Gateway
Version 4.01.02 March 2, 2010
Code Address: A5D20000h Length: 0000E7FCh
Data Address: A5199000h Length: 0000737Ch
PCOUNTDP.NLM Pcounter for NDPS
Version 5.50 October 27, 2011
Code Address: A5CE3000h Length: 0002230Bh
Data Address: A3071000h Length: 00005154h
NETDB.NLM Network Database Access Module
Version 4.11.05 January 6, 2005
Code Address: A5CC9000h Length: 0001394Dh
Data Address: A5CDD000h Length: 000025FCh
FPSM.NLM Novell Floating-Point Support Module for NLMs [debugging, 0A10]
Version 5.90.01 December 12, 2000
Code Address: A2E26000h Length: 0000003Ch
Data Address: 00000000h Length: 00000000h
LPR2NDPS.NLM NDPS Utility to accept UNIX jobs via LPR
Version 4.00.06 April 16, 2010
Code Address: A5CB9000h Length: 00009975h
Data Address: A2D9B000h Length: 00001AE8h
NDPSM.NLM NDPS Manager
Version 3.03.02 May 18, 2010
Code Address: A2A97000h Length: 00083318h
Data Address: A5C48000h Length: 00025E80h
RMANSRVR.NLM NDPS Resource Manager
Version 3.07.02 March 2, 2010
Code Address: A5C01000h Length: 0001DE5Fh
Data Address: A2188000h Length: 00004A24h
NIPPZLIB.NLM General Purpose ZIP File Library for NetWare
Version 1.00.01 November 28, 2005
Code Address: A5BE7000h Length: 00002A23h
Data Address: A2760000h Length: 00000048h
ZLIB.NLM ZLIB 1.1.4 General Purpose Compression Library for NetWare
Version 1.01.04 December 20, 2002
Code Address: A5BF5000h Length: 0000BAB4h
Data Address: A273B000h Length: 000014D8h
BROKER.NLM NDPS Broker
Version 3.00.12 February 20, 2008
Code Address: A5B9B000h Length: 0000FFECh
Data Address: A137A000h Length: 000071A5h
DBNET6.NLM Debug Network IO Support
Version 1.45.02 March 16, 2006
Code Address: A5508000h Length: 0001B831h
Data Address: A5524000h Length: 000127B8h
IPMCFG.NLM Web Interface for IP Address Management
Version 1.01.16 October 22, 2005
Code Address: A54AC000h Length: 0000A479h
Data Address: A54B7000h Length: 0000B610h
NIRMAN.NLM TCPIP - NetWare Internetworking Remote Manager
Version 1.06.04 September 18, 2007
Code Address: A2492000h Length: 00060760h
Data Address: A542C000h Length: 00018FCAh
TCPSTATS.NLM Web Interface for Protocol Monitoring
Version 6.50.10 June 20, 2003
Code Address: A5412000h Length: 0000E5ECh
Data Address: A1318000h Length: 00005460h
HWDETECT.NLM Novell Hardware Insertion/Removal Detection
Version 1.19.05 February 20, 2003
Code Address: A53E2000h Length: 00002B33h
Data Address: A0F11000h Length: 00000D3Ch
IPPSRVR.NLM Novell iPrint Server
Version 4.02.02 June 16, 2010
Code Address: A39CF000h Length: 00017550h
Data Address: A39E7000h Length: 000081F8h
DPLSV386.NLM NetWare 6.x Distributed Print Library - DPLSV386
Version 1.15.03 April 16, 2010
Code Address: A2FF3000h Length: 000541E9h
Data Address: A39A8000h Length: 0000C724h
NIPPED.NLM NetWare 5.x, 6.x INF File Editing Library - NIPPED
Version 1.03.09 February 26, 2010
Code Address: A1571000h Length: 00005345h
Data Address: A398C000h Length: 0000016Ch
DPRPCNLM.NLM Novell NDPS RPC Library NLM
Version 3.00.17 October 10, 2006
Code Address: A1547000h Length: 00005324h
Data Address: A13DB000h Length: 00001F20h
MONITOR.NLM NetWare Console Monitor
Version 12.02.02 April 4, 2006
Code Address: A38FD000h Length: 00022BEFh
Data Address: A1312000h Length: 00005F15h
NWSNUT.NLM NetWare NLM Utility User Interface
Version 7.00.01 July 11, 2008
Code Address: A38CC000h Length: 000134EBh
Data Address: A38E1000h Length: 00000790h
ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
Version 2.00.63 April 25, 2008
Code Address: A3200000h Length: 000009F9h
Data Address: A3201000h Length: 00000438h
ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
Version 2.00.63 April 25, 2008
Code Address: A31E1000h Length: 000009F9h
Data Address: A31E2000h Length: 00000438h
REWRITE.NLM Apache 2.0.63 Rewrite Module
Version 2.00.63 April 25, 2008
Code Address: A15A1000h Length: 00006C99h
Data Address: A31DB000h Length: 00001EA8h
HEADERS.NLM Apache 2.0.63 Headers Module
Version 2.00.63 April 25, 2008
Code Address: A31BE000h Length: 00000E39h
Data Address: A31BF000h Length: 00000538h
EXPIRES.NLM Apache 2.0.63 Expires Module
Version 2.00.63 April 25, 2008
Code Address: A31BA000h Length: 00000B89h
Data Address: A31BB000h Length: 00000388h
MOD_IPP.NLM iPrint Module
Version 1.00.04 June 7, 2006
Code Address: A31B4000h Length: 00000B76h
Data Address: A31B5000h Length: 000004CCh
AUTHLDDN.NLM LdapDN Module
Version 1.00 November 9, 2005
Code Address: A31AF000h Length: 00001926h
Data Address: A31B1000h Length: 00000EC8h
UTILLDP2.NLM LdapDN Module
Version 1.00 November 9, 2005
Code Address: A1544000h Length: 00002A56h
Data Address: A3194000h Length: 00001E80h
JNET.NLM Java jnet (based on 1.4.2_18)
Version 1.43 October 16, 2008
Code Address: A153D000h Length: 0000653Eh
Data Address: A318E000h Length: 00001100h
MOD_JK.NLM Apache 2.0 plugin for Tomcat
Version 1.02.23 April 25, 2008
Code Address: A315B000h Length: 00025B33h
Data Address: A3181000h Length: 0000CDD0h
LIBGCC_S.NLM gcc runtime and intrinsics support
Version 3.04.03 April 29, 2005
Code Address: A13B5000h Length: 00004ABCh
Data Address: A1086000h Length: 00000A74h
AUTHLDAP.NLM Apache 2.0.63 LDAP Authentication Module
Version 2.00.63 April 25, 2008
Code Address: 9D909000h Length: 00001BB9h
Data Address: 9EC05000h Length: 000019D0h
UTILLDAP.NLM Apache 2.0.63 LDAP Authentication Module
Version 2.00.63 April 25, 2008
Code Address: A12A0000h Length: 000034A9h
Data Address: A12A4000h Length: 00002598h
TSAFS.NLM SMS - File System Agent for NetWare 6.X
Version 6.53.03 October 16, 2008
Code Address: A1467000h Length: 0005F9A2h
Data Address: A14C7000h Length: 0000D7B0h
SMDR.NLM SMS - Storage Data Requestor
Version 6.58.01 October 16, 2008
Code Address: A101B000h Length: 00047EF8h
Data Address: A1364000h Length: 0000D8E0h
SMSUT.NLM SMS - Utility Library for NetWare 6.X
Version 1.01.03 June 26, 2008
Code Address: A12CB000h Length: 00010201h
Data Address: A12DC000h Length: 00001DF0h
LLDAPX.NLM NetWare Extension APIs for LDAP SDK (LibC version)
Version 3.05.01 October 26, 2010
Code Address: A1297000h Length: 0000754Ch
Data Address: A129F000h Length: 00000F70h
LLDAPSSL.NLM NetWare SSL Library for LDAP SDK (LibC version)
Version 3.05.01 October 26, 2010
Code Address: A109B000h Length: 0009CD03h
Data Address: A1138000h Length: 0002FFD0h
APACHE2.NLM Apache Web Server 2.0.63
Version 2.00.63 April 25, 2008
Code Address: A0EBF000h Length: 00039D29h
Data Address: A0EF9000h Length: 00011A9Ch
APRLIB.NLM Apache Portability Runtime Library 0.9.17
Version 0.09.17 April 25, 2008
Code Address: A0E4E000h Length: 0002E688h
Data Address: A0E7D000h Length: 00008088h
SASL.NLM Simple Authentication and Security Layer 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: A0CA6000h Length: 00000C7Ch
Data Address: A0CA7000h Length: 00000160h
LBURP.NLM LDAP Bulkload Update/Replication Protocol service extension for Novell eDirectory 8.8.
Version 20504.02 May 24, 2010
Code Address: A0CA3000h Length: 0000111Ch
Data Address: A0CA5000h Length: 00000444h
LDAPXS.NLM (Clib version)
Version 3.05.01 October 26, 2010
Code Address: A0C9B000h Length: 000047F3h
Data Address: A0CA0000h Length: 000008FCh
NMASLDAP.NLM NMAS LDAP Extensions 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: A07EC000h Length: 00004E5Ch
Data Address: A0C6D000h Length: 000007D0h
SEG.NLM NetWare Memory Analyzer
Version 2.00.25 April 27, 2009
Code Address: A0C03000h Length: 00032CB4h
Data Address: A0C36000h Length: 0001C656h
AFREECON.NLM AdRem Free Remote Console (NCPE)
Version 6.00 February 28, 2006
Code Address: A0801000h Length: 00005A8Dh
Data Address: A0807000h Length: 00002490h
RCONAG6.NLM RConsole Agent for Netware
Version 6.11 November 20, 2007
Code Address: A0425000h Length: 00006C5Bh
Data Address: 9EEC0000h Length: 00003304h
SAS.NLM Secure Authentication Services
Version 1.75 March 13, 2004
Code Address: A0864000h Length: 00056640h
Data Address: A0B8B000h Length: 0001E890h
NLDAP.NLM LDAP Agent for Novell eDirectory 8.8 SP5
Version 20506.05 December 30, 2010
Code Address: A091C000h Length: 0008F8BBh
Data Address: A09AC000h Length: 00052D20h
PMPORTAL.NLM NetWare License Information Portal
Version 2.16 November 21, 2003
Code Address: 9FD18000h Length: 000071C9h
Data Address: 9FD20000h Length: 00004360h
NDSIMON.NLM NDS iMonitor 8.8.5 SP5
Version 20506.01 December 24, 2010
Code Address: A02D0000h Length: 00113D69h
Data Address: 9FC46000h Length: 00091E24h
LANGMANI.NLM Novell Cross-Platform Language Manager
Version 20504.01 May 24, 2010
Code Address: 9F92A000h Length: 000040F2h
Data Address: 9EC71000h Length: 00001084h
XI18N.NLM Novell Cross-Platform Internationalization Package
Version 10310.53 August 2, 2005
Code Address: A0ABE000h Length: 0001CA12h
Data Address: 9F753000h Length: 00007EC8h
PORTAL.NLM Novell Remote Manager NLM
Version 4.03 September 22, 2008
Code Address: A0540000h Length: 0010147Ch
Data Address: 9FBDC000h Length: 00069EA4h
NWIDK.NLM CDWare Volume Module
Version 3.01.01 September 19, 2003
Code Address: 9EF30000h Length: 00004640h
Data Address: 9EFF9000h Length: 00000730h
BTCPCOM.NLM BTCPCOM.NLM v7.90.000, Build 253
Version 7.90 July 9, 2003
Code Address: 9ED88000h Length: 00004450h
Data Address: 9EF96000h Length: 00000CECh
HTTPSTK.NLM Novell Small Http Interface
Version 4.03 September 4, 2008
Code Address: 9FFB3000h Length: 000317C6h
Data Address: 9FFE5000h Length: 00019C10h
WSPSSL.NLM NetWare Winsock Service 1.0 NLM for SSL
Version 6.26 December 4, 2007
Code Address: 9FEEF000h Length: 00008AFFh
Data Address: 9FEF8000h Length: 0001095Fh
NILE.NLM Novell N/Ties NLM ("") Release Build with symbols
Version 7.00.01 August 20, 2007
Code Address: 9EDC3000h Length: 00090A31h
Data Address: 9FE99000h Length: 00030C70h
PKI.NLM Novell Certificate Server
Version 3.33 April 16, 2009
Code Address: 9F79D000h Length: 0017C9E5h
Data Address: 9ECAA000h Length: 00092270h
PKIAPI.NLM Public Key Infrastructure Services
Version 2.23.10 November 20, 2004
Code Address: 9FE61000h Length: 00037721h
Data Address: 9ECA3000h Length: 00006A14h
NWUTIL.NLM Novell Utility Library NLM (_NW65[SP7]{""})
Version 3.00.02 August 20, 2007
Code Address: 9FE13000h Length: 0000EE40h
Data Address: 9FE22000h Length: 00023BD4h
NWBSRVCM.NLM NWBSRVCM.NLM v7.90.000, Build 230
Version 7.90 March 20, 2001
Code Address: 9EBB4000h Length: 00006776h
Data Address: 9FDCA000h Length: 00000AD0h
VOLSMS.NLM NSS Distributed Volume Manager (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9FD48000h Length: 00018771h
Data Address: 9D8FD000h Length: 00001780h
VLRPC.NLM DFS Volume Location Database (VLDB) RPC interface (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9EBA4000h Length: 00003383h
Data Address: 9FD45000h Length: 000002FDh
VMRPC.NLM DFS Volume Manager RPC interface (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9EB83000h Length: 00003703h
Data Address: 9FD43000h Length: 000002FDh
JSTCP.NLM Jetstream TCP Transport Layer (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9EDBD000h Length: 000050F0h
Data Address: 9FB0F000h Length: 000001E0h
JSMSG.NLM Jetstream Message Layer (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9EDB6000h Length: 00006E80h
Data Address: 9FAF2000h Length: 00000220h
DFSLIB.NLM DFS Common Library (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 9F680000h Length: 000005C3h
Data Address: 9F681000h Length: 00000080h
NLSTRAP.NLM NetWare License Server Trap
Version 5.02 February 19, 2004
Code Address: 9E448000h Length: 0000298Ah
Data Address: 9F1F9000h Length: 00000695h
ZIP.NLM Java zip (based on 1.4.2_18)
Version 1.43 October 16, 2008
Code Address: 9F667000h Length: 0000ADCCh
Data Address: 9D972000h Length: 00001C90h
JVMLIB.NLM Java jvmlib (based on 1.4.2_18)
Version 1.43 October 16, 2008
Code Address: 9F62C000h Length: 00017134h
Data Address: 9F644000h Length: 00008670h
VERIFY.NLM Java verify (based on 1.4.2_18)
Version 1.43 October 16, 2008
Code Address: 9F5D5000h Length: 000087B4h
Data Address: 9D4B1000h Length: 00001BC0h
JVM.NLM Java Hotspot 1.4.2_18 Interpreter
Version 1.43 October 16, 2008
Code Address: 9F230000h Length: 00222FFFh
Data Address: 9F064000h Length: 00065A60h
LIBPERL.NLM Perl 5.8.4 - Script Interpreter and Library
Version 5.00.05 September 13, 2005
Code Address: 9F0EE000h Length: 000B3D60h
Data Address: 9F1A2000h Length: 0001ADE0h
IPMGMT.NLM TCPIP - NetWare IP Address Management
Version 1.03.01 May 29, 2007
Code Address: 9EA5B000h Length: 000307CDh
Data Address: 9EA8C000h Length: 0000D778h
JSOCK6X.NLM NetWare 6.x Support For Java Sockets (JDK 1.4.2)
Version 1.43 October 16, 2008
Code Address: 9EA47000h Length: 0000FDB1h
Data Address: 9EA57000h Length: 00002C44h
JAVA.NLM java.nlm (based on 1.4.2_18) Build 08101613
Version 1.43 October 16, 2008
Code Address: 9E99D000h Length: 000385DEh
Data Address: 9E9D6000h Length: 0003DD40h
JSOCK.NLM Support For Java Sockets (loader)
Version 1.43 October 16, 2008
Code Address: 9E97C000h Length: 00000086h
Data Address: 9E97D000h Length: 00000064h
CRLSM.NLM Challenge Response LSM v2.8.1.0
Version 2.08.01 October 28, 2008
Code Address: 9E926000h Length: 00021E46h
Data Address: 9E948000h Length: 00009456h
LCMCIFS2.NLM Windows Native File Access Login Methods (Build 83 SP)
Version 2.00.09 July 25, 2005
Code Address: 9E862000h Length: 0000E011h
Data Address: 9E871000h Length: 000016B0h
LSMCIFS2.NLM Windows Native File Access Login Methods (Build 94 SP)
Version 2.00.07 July 25, 2005
Code Address: 9E834000h Length: 0000F051h
Data Address: 9E844000h Length: 000017B0h
LSMAFP3.NLM Macintosh Native File Access Login Methods (Build 106 SP)
Version 2.00.11 January 3, 2005
Code Address: 9E80D000h Length: 0000F24Eh
Data Address: 9E81D000h Length: 000013C0h
NMASGPXY.NLM NMAS Generic Proxy 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: 9E7EA000h Length: 0000159Ch
Data Address: 9E7EC000h Length: 000000E0h
VMWTOOL.NLM VMware Tools
Version 1.01 May 24, 2010
Code Address: 9E795000h Length: 0001F9A0h
Data Address: 9E7B5000h Length: 00019A20h
PWDLCM.NLM Novell Simple Password Proxy LCM 2.8.2.1 20090422
Version 28210904.22 April 22, 2009
Code Address: 9E764000h Length: 0000E228h
Data Address: 9E773000h Length: 000014B0h
PWDLSM.NLM Novell Simple Password LSM 2.8.2.1 20090422
Version 28210904.22 April 22, 2009
Code Address: 9E720000h Length: 00010538h
Data Address: 9E731000h Length: 00001A60h
ACPISBD.NLM System Bus Driver for ACPI compliant systems
Version 1.05.16 January 16, 2007
Code Address: 9DA39000h Length: 00002BBAh
Data Address: 9E6F4000h Length: 000004E1h
NCM.NLM Novell Configuration Manager
Version 1.15.01 October 20, 2004
Code Address: 9E6ED000h Length: 000054CCh
Data Address: 9E6F3000h Length: 00000FB0h
LSMCIFS.NLM NMAS Login Server Module for CIFS - MS Windows File System for NetWare
Version 1.20 March 5, 2003
Code Address: 9E6A0000h Length: 0000EB2Ah
Data Address: 9E6AF000h Length: 00001610h
SLPTCP.NLM SERVICE LOCATION TCP/UDP INTERFACE (RFC2165/RFC2608)
Version 2.13 November 15, 2005
Code Address: 9DA32000h Length: 0000386Ah
Data Address: 9E60F000h Length: 0000108Ch
NSPDNS.NLM NetWare Winsock 2.0 NSPDNS.NLM Name Service Providers
Version 6.20.03 September 8, 2003
Code Address: 9DA36000h Length: 00002527h
Data Address: 9E604000h Length: 000004E4h
WSPIP.NLM NetWare Winsock Service 1.0 NLM for TCP and UDP
Version 6.24 December 4, 2007
Code Address: 9E4B3000h Length: 000124C4h
Data Address: 9DA2F000h Length: 0000287Ch
NCPIP.NLM NetWare NCP Services over IP
Version 6.02.01 September 30, 2008
Code Address: 9E41C000h Length: 000168E9h
Data Address: 9DA23000h Length: 00003540h
BSDSOCK.NLM Novell BSDSOCK Module (Domestic)
Version 6.92.02 December 23, 2009
Code Address: 9E38A000h Length: 00012099h
Data Address: 9E39D000h Length: 0000C0E0h
TCPIP.NLM Novell TCP/IP/IPSec Module (Domestic) NICI Enabled
Version 6.92.02 September 30, 2009
Code Address: 9D9A3000h Length: 00078AB4h
Data Address: 9D468000h Length: 000405F0h
TCP.NLM Novell TCP/IP Stack - Transport module (Domestic)
Version 6.92.05 December 23, 2009
Code Address: 9DB5A000h Length: 00025862h
Data Address: 9DB80000h Length: 00082F60h
NETLIB.NLM Novell TCPIP NETLIB Module
Version 6.50.22 February 12, 2003
Code Address: 9DA7C000h Length: 00005AACh
Data Address: 9DA82000h Length: 000D0710h
CSLIND.NLM TCPIP CSL INDEPENDENCE MODULE 7Dec99 7Dec99
Version 4.21 December 7, 1999
Code Address: 9D97D000h Length: 000003CCh
Data Address: 9D97E000h Length: 000024E0h
E1000.LAN Intel(R) PRO/1000 PCI/PCI-X Network Connections Driver
Version 8.24 December 22, 2005
Code Address: 9D84B000h Length: 00016B5Dh
Data Address: 006A7000h Length: 00009973h
ETHERTSM.NLM Novell Ethernet Topology Specific Module
Version 3.90 March 20, 2006
Code Address: 9D847000h Length: 000024CEh
Data Address: 9D84A000h Length: 000002BCh
MSM.NLM Novell Multi-Processor Media Support Module
Version 4.12 August 22, 2007
Code Address: 9D831000h Length: 0000E5B3h
Data Address: 9D840000h Length: 00003DFCh
LSAPI.NLM NLS LSAPI Library
Version 5.02 January 7, 2003
Code Address: 9D817000h Length: 0000A51Bh
Data Address: 9D822000h Length: 00001B00h
NLSAPI.NLM NLSAPI
Version 5.02 August 7, 2003
Code Address: 9D7EB000h Length: 000124DBh
Data Address: 9D740000h Length: 000022A4h
NLSLSP.NLM NLS - License Service Provider
Version 5.02 May 25, 2005
Code Address: 9D74E000h Length: 0006DF03h
Data Address: 9D7BC000h Length: 000205DCh
CSL.NLM NetWare Call Support Layer For NetWare
Version 2.06.02 January 13, 2000
Code Address: 9D71A000h Length: 0000CB32h
Data Address: 90203000h Length: 000028F4h
BTRIEVE.NLM BTRIEVE.NLM v7.90.000
Version 7.90 March 21, 2001
Code Address: 8FEF1000h Length: 000013BFh
Data Address: 8FEF3000h Length: 00000980h
NWMKDE.NLM NWMKDE.NLM v7.94.251.000
Version 7.94 December 11, 2001
Code Address: 8FCB5000h Length: 00053D55h
Data Address: 9D127000h Length: 0000F784h
NWENC103.NLM NWENC103.NLM v7.90.000 (Text Encoding Conversion Library)
Version 7.90 February 24, 2001
Code Address: 8FEA0000h Length: 0004D0F5h
Data Address: 9CF76000h Length: 001B0208h
NWAIF103.NLM nwaif103.nlm v7.94, Build 251 ()
Version 7.94 November 30, 2001
Code Address: 9CF5C000h Length: 00010E51h
Data Address: 8FC86000h Length: 00006828h
PSVCS.NLM Portability Services
Version 251.00 November 30, 2001
Code Address: 9CF25000h Length: 0001270Fh
Data Address: 9CF38000h Length: 00009464h
NWUCMGR.NLM NWUCMGR.NLM v1.5 Build 230
Version 1.05 March 14, 2001
Code Address: 9CEF5000h Length: 0000D920h
Data Address: 8FC49000h Length: 000078D4h
SPMDCLNT.NLM Novell SPM Client for DClient 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: 9CE6F000h Length: 000145E8h
Data Address: 8F9DB000h Length: 00001370h
NPKIAPI.NLM Public Key Infrastructure Services
Version 3.33 April 16, 2009
Code Address: 9CE17000h Length: 00038627h
Data Address: 9CE50000h Length: 0001E73Fh
LDAPSDK.NLM LDAP SDK Library (Clib version)
Version 3.05.02 October 26, 2010
Code Address: 9CDF5000h Length: 00021500h
Data Address: 8F4FE000h Length: 000065ADh
SNMP.NLM Netware 4.x/5.x/6.x SNMP Service
Version 4.18 July 25, 2006
Code Address: 9CDB2000h Length: 00013E90h
Data Address: 8F432000h Length: 00003220h
TLI.NLM NetWare Transport Level Interface Library
Version 4.30.02 December 19, 2000
Code Address: 8F423000h Length: 00003859h
Data Address: 8F427000h Length: 00000164h
Global Code Address: 8F428000h Length: 00001000h
Global Data Address: 8F429000h Length: 00002000h
DHOST.NLM Novell DHost Portability Interface 1.0.0 SMP
Version 10010.97 September 18, 2006
Code Address: 8F224000h Length: 00006621h
Data Address: 8F0CD000h Length: 0000234Ch
CONLOG.NLM System Console Logger
Version 3.01.02 August 8, 2006
Code Address: 8EF13000h Length: 0000243Ch
Data Address: 8EF16000h Length: 00001CE0h
NPKIT.NLM Public Key Infrastructure Services
Version 3.33 April 16, 2009
Code Address: 9028C000h Length: 0002E5BEh
Data Address: 902BB000h Length: 000166ABh
LLDAPSDK.NLM LDAP SDK Library (LibC version)
Version 3.05.02 October 26, 2010
Code Address: 90269000h Length: 00022600h
Data Address: 8EF0A000h Length: 000065C0h
NSPNDS.NLM NetWare Winsock 2.0 NSPNDS.NLM Name Service Provider
Version 6.20 November 12, 2001
Code Address: 896E7000h Length: 00006547h
Data Address: 88206000h Length: 00000518h
DS.NLM Novell eDirectory Version 8.8 SP5 SMP
Version 20506.07 March 18, 2011
Code Address: 8FF37000h Length: 002CBA43h
Data Address: 8F338000h Length: 0008D794h
ROLLCALL.NLM RollCall NLM (101, API 1.0)
Version 5.00 July 27, 1998
Code Address: 80133000h Length: 0000055Dh
Data Address: 88258000h Length: 000002D4h
NTLS.NLM NTLS 2.0.5.0 based on OpenSSL 0.9.7m
Version 20510.01 March 11, 2009
Code Address: 8F44B000h Length: 000A72C6h
Data Address: 8FEFD000h Length: 0003915Fh
DSLOG.NLM DS Log for Novell eDirectory 8.8.0
Version 20219.15 May 12, 2009
Code Address: 8EEFC000h Length: 00003CCFh
Data Address: 8966E000h Length: 0000B06Ch
SPMNWCC.NLM Novell SPM Client for NWCC 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: 8FA66000h Length: 00011688h
Data Address: 8FA78000h Length: 00001340h
NMAS.NLM Novell Modular Authentication Service 3.3.2.3 20091224
Version 33230912.24 December 24, 2009
Code Address: 8F1C9000h Length: 0005AB78h
Data Address: 8FA54000h Length: 0000D5A0h
GAMS.NLM Graded Authentication Management Service
Version 2.00.01 September 2, 2008
Code Address: 8FA44000h Length: 0000DFC7h
Data Address: 8FA52000h Length: 00001348h
NDSAUDIT.NLM Directory Services Audit
Version 2.09 May 22, 2003
Code Address: 8FA33000h Length: 00010844h
Data Address: 8EEF6000h Length: 00002ED0h
SAL.NLM Novell System Abstraction Layer Version 8.8.0
Version 20504.01 May 24, 2010
Code Address: 8F9FC000h Length: 000086E6h
Data Address: 8FA05000h Length: 00001554h
NICISDI.NLM Security Domain Infrastructure
Version 27610.01.01 March 30, 2009
Code Address: 8F9BD000h Length: 0000ADA2h
Data Address: 006A5000h Length: 00001320h
SASDFM.NLM SAS Data Flow Manager
Version 27610.01.01 March 30, 2009
Code Address: 8F9A0000h Length: 000040AEh
Data Address: 32D56000h Length: 00000980h
CALNLM32.NLM NetWare NWCalls Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F971000h Length: 0001CEB9h
Data Address: 8F25F000h Length: 00000510h
POLIMGR.NLM NetWare License Policy Manager
Version 6.27 November 3, 2005
Code Address: 8F918000h Length: 00013F5Ch
Data Address: 8F92C000h Length: 00008E90h
TIMESYNC.NLM NetWare Time Synchronization Services
Version 6.61.01 October 14, 2005
Code Address: 8F8EF000h Length: 0000E13Ch
Data Address: 8F835000h Length: 00004240h
CLXNLM32.NLM NetWare NWCLX Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F833000h Length: 000011F3h
Data Address: 8F245000h Length: 000001B0h
DSAPI.NLM NetWare NWNet Runtime Library
Version 6.00.04 January 27, 2006
Code Address: 8F243000h Length: 00000043h
Data Address: 8F244000h Length: 00000024h
DSEVENT.NLM NetWare DSEvent Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F241000h Length: 00000633h
Data Address: 8F242000h Length: 00000034h
NETNLM32.NLM NetWare NWNet Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F8B9000h Length: 00035B77h
Data Address: 8F82A000h Length: 00004DA5h
NCPNLM32.NLM NetWare NWNCP Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F899000h Length: 0001F473h
Data Address: 00000000h Length: 00000000h
CLNNLM32.NLM NetWare NWClient Runtime Library
Version 6.01.03 August 26, 2008
Code Address: 8F824000h Length: 00001CC2h
Data Address: 8F240000h Length: 00000150h
CLIB.NLM (Legacy) Standard C Runtime Library for NLMs
Version 5.90.15 March 10, 2008
Code Address: 8F85B000h Length: 0001898Eh
Data Address: 8EEA4000h Length: 00002FB0h
NIT.NLM NetWare Interface Tools Library for NLMs
Version 5.90.15 March 10, 2008
Code Address: 8F83E000h Length: 0001C694h
Data Address: 8F23E000h Length: 00000690h
NLMLIB.NLM Novell NLM Runtime Library
Version 5.90.15 March 10, 2008
Code Address: 8F7F5000h Length: 000263EDh
Data Address: 8EE9D000h Length: 000038C0h
STREAMS.NLM NetWare STREAMS PTF
Version 6.00.06 May 4, 2005
Code Address: 8F7DA000h Length: 0001206Dh
Data Address: 8F7ED000h Length: 000010A0h
Global Code Address: 8F23D000h Length: 00001000h
REQUESTR.NLM Novell NCP Requestor for NLMs
Version 5.90.15 March 10, 2008
Code Address: 8F7A0000h Length: 00020DE3h
Data Address: 8F7C1000h Length: 000010D0h
THREADS.NLM Novell Threads Package for NLMs
Version 5.90.15 March 10, 2008
Code Address: 8F775000h Length: 00018CF8h
Data Address: 8F78E000h Length: 000116A0h
LIB0.NLM Novell Ring 0 Library for NLMs
Version 5.90.15 March 10, 2008
Code Address: 8F506000h Length: 000250EAh
Data Address: 8F52C000h Length: 00228070h
MASV.NLM Mandatory Access Control Service
Version 2.00.01 September 2, 2008
Code Address: 8F1B6000h Length: 00012386h
Data Address: 8EE91000h Length: 000023A0h
NSPSLP.NLM NetWare Winsock 2.0 NSPSLP.NLM Name Service Provider
Version 6.20.04 December 6, 2007
Code Address: 8F119000h Length: 00005ED3h
Data Address: 8F11F000h Length: 00000B30h
PMLODR.NLM PMLodr for NW65
Version 1.26 October 7, 2005
Code Address: 8F123000h Length: 0000E63Ah
Data Address: 8F132000h Length: 00001658h
SLP.NLM SERVICE LOCATION PROTOCOL (RFC2165/RFC2608)
Version 2.13 November 15, 2005
Code Address: 8F0EC000h Length: 0001A658h
Data Address: 8F107000h Length: 00005384h
CCS.NLM Controlled Cryptography Services from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8F081000h Length: 00019EE4h
Data Address: 006A2000h Length: 00002F90h
DSLOADER.NLM Novell eDirectory Version 8.8.5 Loader SMP
Version 20506.07 March 18, 2011
Code Address: 8F002000h Length: 0000CB1Ch
Data Address: 8F00F000h Length: 00001720h
XENGUSC.NLM NICI U.S./Worldwide XENG from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8EFEE000h Length: 00000058h
Data Address: 00000000h Length: 00000000h
XNGAUSC.NLM NICI U.S./Worldwide XMGR Assistant XENG from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8EFBB000h Length: 000153E4h
Data Address: 00098000h Length: 00004864h
XENGEXP.NLM NICI Import Restricted XENG from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8961D000h Length: 00050DD4h
Data Address: 0068D000h Length: 00014C3Ch
XENGNUL.NLM NICI NULL XENG from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8EFAE000h Length: 00001DC9h
Data Address: 32EC4000h Length: 00000860h
XMGR.NLM NICI XMGR from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8EE2D000h Length: 00025F01h
Data Address: 00682000h Length: 0000AA10h
XSUP.NLM NICI XSUP from Novell, Inc.
Version 27610.01.01 March 30, 2009
Code Address: 8EDB8000h Length: 00006EF2h
Data Address: 0065E000h Length: 00023170h
XIM.XLM Novell NICI Signed Loader
Version 27510.02.01 August 25, 2008
Code Address: 8ED56000h Length: 0002C680h
Data Address: 00656000h Length: 00007CE4h
WS2_32.NLM NetWare Winsock 2.0 NLM
Version 6.24.01 February 14, 2008
Code Address: 8E5C0000h Length: 00037F28h
Data Address: 8E5F8000h Length: 00011B84h
NCP.NLM NetWare Core Protocol (NCP) Engine
Version 5.61.01 September 30, 2008
Code Address: 8E577000h Length: 00026DEFh
Data Address: 8E59E000h Length: 00018B24h
QUEUE.NLM NetWare Queue Services NLM
Version 5.60 May 24, 2001
Code Address: 8E56E000h Length: 00006D8Dh
Data Address: 8E575000h Length: 00000473h
VDISK.NLM NetWare Virtual Disk
Version 1.00 November 30, 2004
Code Address: 8E52A000h Length: 00001FEEh
Data Address: 8E52D000h Length: 00001160h
NWTERMIO.NLM NetWare Terminal Emulation
Version 1.00 September 11, 2006
Code Address: 89DB8000h Length: 00007570h
Data Address: 89DC0000h Length: 00004560h
MALHLP.NLM NSS Configure help messages (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89547000h Length: 000000BAh
Data Address: 89548000h Length: 0000002Ah
CDDVD.NSS NSS Loadable Storage System (LSS) for CD/UDF (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89DC9000h Length: 00014B00h
Data Address: 89972000h Length: 00001050h
NSSIDK.NSS NSS Pool Configuration Manager (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 8943D000h Length: 000039C5h
Data Address: 89544000h Length: 00000090h
PARTAPI.NLM Partition APIs for NetWare 6.1
Version 2.00 April 17, 2002
Code Address: 89543000h Length: 00000007h
Data Address: 00000000h Length: 00000000h
VOLMN.NSS NSS Distributed Volume Manager (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89D99000h Length: 0000A6A3h
Data Address: 8953C000h Length: 000005B0h
NWSA.NSS NSS NetWare Semantic Agent (NWSA) (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 898B3000h Length: 0004ADEEh
Data Address: 89CE6000h Length: 000A1390h
ZLSS.NSS NSS Journaled Storage System (ZLSS) (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89C0C000h Length: 000CD166h
Data Address: 89CDA000h Length: 0000BE30h
MAL.NSS NSS Media Access Layer (MAL) (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89439000h Length: 00003196h
Data Address: 89531000h Length: 00000170h
MANAGE.NSS NSS Management Functions (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89914000h Length: 0004F275h
Data Address: 8952F000h Length: 00000C20h
COMN.NSS NSS Common Support Layer (COMN) (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 899F5000h Length: 000EF408h
Data Address: 89AE5000h Length: 00015E50h
NSS.NLM NSS (Novell Storage Services) (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 8978E000h Length: 00030420h
Data Address: 8949D000h Length: 00091830h
SYSLOG.NLM NetWare Logfile Daemon
Version 6.05.03 October 22, 2007
Code Address: 89417000h Length: 0000616Ah
Data Address: 89727000h Length: 00026140h
LIBNSS.NLM Generic Library used by NSS (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89428000h Length: 0000464Ch
Data Address: 8949C000h Length: 000003D0h
NSSWIN.NLM NSS ASCI Window API Library (Build 212 MP)
Version 3.27.02 November 11, 2009
Code Address: 89423000h Length: 000047DCh
Data Address: 8949A000h Length: 000000FCh
LOCNLM32.NLM NetWare NWLocale Runtime Library
Version 6.00.04 November 29, 2005
Code Address: 89412000h Length: 000044BBh
Data Address: 89499000h Length: 00000B30h
UNICODE.NLM NetWare Unicode Runtime Library (UniLib-based) [optimized]
Version 7.00 October 26, 2004
Code Address: 89619000h Length: 000016F5h
Data Address: 89466000h Length: 00000504h
FILESYS.NLM NetWare File System NLM
Version 5.14 April 16, 2008
Code Address: 89567000h Length: 0008E4E7h
Data Address: 895F6000h Length: 00012C90h
LFS.NLM NetWare Logical File System NLM
Version 5.12 September 21, 2005
Code Address: 89481000h Length: 000098A2h
Data Address: 8948B000h Length: 000084BCh
CONNMGR.NLM NetWare Connection Manager NLM
Version 5.60.01 September 7, 2006
Code Address: 89443000h Length: 0001172Bh
Data Address: 89402000h Length: 00003CE8h
ACPIPWR.NLM ACPI Power Management Driver for ACPI compliant systems
Version 1.05.16 January 16, 2007
Code Address: 89421000h Length: 00000C9Ah
Data Address: 89422000h Length: 00000904h
ACPICMGR.NLM ACPI Component Manager for ACPI compliant systems
Version 1.05.16 January 16, 2007
Code Address: 89400000h Length: 00000A6Fh
Data Address: 89401000h Length: 000002F4h
LSIMPTNW.HAM LSI Corporation Common Architecture NWPA-HAM SAS/Fibre/SCSI Driver.
Version 5.03.01 January 23, 2008
Code Address: 89396000h Length: 00033686h
Data Address: 00A40000h Length: 0000787Eh
SCSIHD.CDM Novell NetWare SCSI Fixed Disk Custom Device Module
Version 3.03.10 May 30, 2008
Code Address: 89380000h Length: 00005523h
Data Address: 00A4B000h Length: 000017C0h
ACPIDRV.PSM ACPI Platform Support Module for ACPI compliant systems
Version 1.05.19 January 16, 2007
Code Address: 89339000h Length: 0000AD1Eh
Data Address: 00A4D000h Length: 0000C694h
ACPICA.NLM ACPI Component Architecture for ACPI compliant systems
Version 1.05.16 January 16, 2007
Code Address: 892BD000h Length: 0002BA90h
Data Address: 892E9000h Length: 00011C74h
ACPIASL.NLM ACPI Architecture Services Layer for ACPI compliant systems
Version 1.05.16 January 16, 2007
Code Address: 88DE1000h Length: 00000F9Bh
Data Address: 88DE2000h Length: 0000019Ch
CIOS.NLM Consolidated IO System
Version 1.60 February 12, 2008
Code Address: 89230000h Length: 00042C15h
Data Address: 31961000h Length: 00008B4Ah
LSL.NLM Novell NetWare Link Support Layer
Version 4.86 February 2, 2006
Code Address: 88DE4000h Length: 0000A7A7h
Data Address: 88DEF000h Length: 00009EC8h
NWPALOAD.NLM NetWare 5 NWPA Load Utility
Version 3.00 July 10, 2000
Code Address: 88D08000h Length: 00000007h
Data Address: 00000000h Length: 00000000h
NWPA.NLM NetWare 6.5 NetWare Peripheral Architecture NLM
Version 3.21.02 October 29, 2008
Code Address: 88CE5000h Length: 00016C82h
Data Address: 8823A000h Length: 00002A5Ch
MM.NLM ENG TEST - NetWare 6.5 Media Manager
Version 3.22.08 April 24, 2009
Code Address: 88D1A000h Length: 0004C524h
Data Address: 88C90000h Length: 0000B84Ch
SGUID.NLM NetWare GUID Services
Version 6.01 September 27, 2002
Code Address: 88C8E000h Length: 00000E04h
Data Address: 88C8F000h Length: 0000018Ah
NBI.NLM NetWare Bus Interface
Version 3.01.01 July 13, 2007
Code Address: 88C80000h Length: 0000D72Dh
Data Address: 88233000h Length: 00003D8Dh
NEB.NLM Novell Event Bus
Version 5.60 September 27, 2004
Code Address: 88CA6000h Length: 00005843h
Data Address: 88316000h Length: 0000097Ch
DIAG500.NLM Diagnostic/coredump utility for NetWare 6.x
Version 3.04.03 October 31, 2007
Code Address: 88C06000h Length: 00007FC0h
Data Address: 88C0F000h Length: 0001DF84h
CPUCHECK.NLM NetWare Processor Checking Utility
Version 5.60.01 December 6, 2007
Code Address: 88344000h Length: 00001B5Ch
Data Address: 88CAE000h Length: 00004B3Ch
NWKCFG.NLM NetWare Kernel Config NLM
Version 2.16 June 24, 2005
Code Address: 88228000h Length: 00003F4Fh
Data Address: 8822C000h Length: 00003CA4h
CDBE.NLM NetWare Configuration DB Engine
Version 6.01 September 21, 2006
Code Address: 88995000h Length: 000116E6h
Data Address: 889A7000h Length: 000161FAh
FATFS.NLM FAT Filesystem Module for NetWare
Version 1.24 August 27, 2007
Code Address: 8844F000h Length: 00020526h
Data Address: 88470000h Length: 0002B32Fh
LIBC.NLM Standard C Runtime Library for NLMs [optimized, 7]
Version 9.00.05 October 3, 2008
Code Address: 8834B000h Length: 000D0CD6h
Data Address: 80140000h Length: 000415E0h
PVER500.NLM NetWare 6.XX Version Library
Version 3.00 February 1, 2007
Code Address: 80135000h Length: 00000837h
Data Address: 80136000h Length: 000003DCh
SERVER.NLM NetWare Server Operating System
Version 5.70.08 October 3, 2008
Code Address: 00201020h Length: 0016A000h
Data Address: 00401020h Length: 00216FE0h
Memory at EAX
Invalid dump address
Memory at EBX
Invalid dump address
Memory at ECX
Invalid dump address
Memory at EDX
00090009 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090019 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090029 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090039 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090049 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090059 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090069 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090079 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090089 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
00090099 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900A9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900B9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900C9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900D9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900E9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
000900F9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
Memory at ESI
Invalid dump address
Memory at EDI
A00D19D8 A52305C0 A52305C0-00000000 00000000 %#.@ %#.@ .... ....
A00D19E8 00000000 00000000-00000000 00000000 .... .... .... ....
A00D19F8 00000000 00000000-72687470 20646165 .... .... rhtp dae
A00D1A08 6574756D 00000078-00000000 00000000 etum ...x .... ....
A00D1A18 00000000 00000000-00000000 00000000 .... .... .... ....
A00D1A28 00000000 00000000-00000000 00000000 .... .... .... ....
A00D1A38 00000000 00000000-893CA160 A00D1B04 .... .... .<!` ...
A00D1A48 A00D1984 0000008F-00000001 00000000 ... .... .... ....
A00D1A58 00000000 00000000-00000000 00000000 .... .... .... ....
A00D1A68 00000000 00000000-00000000 00000000 .... .... .... ....
A00D1A78 00000000 34343434-1515071E 00000000 .... 4444 .... ....
A00D1A88 A52305C0 00000000-000052E6 00000000 %#.@ .... ..Rf ....
A00D1A98 00000000 A00D1A98-00000000 00000000 .... ... .... ....
A00D1AA8 00000000 00000000-00000000 00000000 .... .... .... ....
A00D1AB8 00000000 00000000-72687470 20646165 .... .... rhtp dae
A00D1AC8 6574756D 00000078-00000000 00000000 etum ...x .... ....
Memory at EBP
FBF138DB 6E72654B 64206C65-63657465 20646574 nreK d le cete det
FBF138EB 61206E61 6D657474-64657470 6E6F6320 a na mett detp noc
FBF138FB 74786574 69777320-20686374 61206E69 txet iws hct a ni
FBF1390B 504D206E 6146204B-57207473 002E4454 PM n aF K W ts ..DT
FBF1391B 616E550A 20656C62-61206F74 636F6C6C anU. elb a ot coll
FBF1392B 20657461 6F6D656D-66207972 6420726F eta omem f yr d ro
FBF1393B 20617461 65657274-0A000A73 61766E49 ata eert ...s avnI
FBF1394B 2064696C 6E616853-206E6F6E 6146202D dil nahS non aF -
FBF1395B 54206F6E 0A656572-65520A00 70206461 T on .eer eR.. p da
FBF1396B 20747361 20646E65-7220666F 20646165 tsa dne r fo dae
FBF1397B 66667562 000A7265-7272450A 2520726F ffub ..re rrE. % ro
FBF1398B 65722064 6E696461-6F732067 65637275 er d nida os g ecru
FBF1399B 6C696620 43000A65-00344D4F 434F4C43 lif C..e .4MO COLC
FBF139AB 4C00244B 2044414F-6F72705B 74636574 L.$K DAO orp[ tcet
FBF139BB 5D6E6F69 61705B20-6C5D6874 6164616F ]noi ap[ l]ht adao
FBF139CB 5F656C62 75646F6D-5B20656C 61726170 _elb udom [ el arap
Memory at ESP
8FD9DE9C FBF138DB A00D19E0-00000006 A00D19C0 {q8[ ..` .... ..@
8FD9DEAC 002186BC 00000001-A00D19E0 A00D19D8 .!.< .... ..` ..X
8FD9DEBC 00000006 A00D19C0-002064BC A00D19E4 .... ..@ . d< ..d
8FD9DECC A00D1A40 8FD9DEF0-00000000 04B4E504 ..@ .Y^p .... .4e.
8FD9DEDC 9D96379C 883E6AC9-A00D19C0 04B4E504 ..7. .>jI ..@ .4e.
8FD9DEEC 00000006 8FD9DEFC-9EDD3AF1 9D96379C .... .Y^| .]:q ..7.
8FD9DEFC 8FD9DF20 9EDE3ABF-00000009 00000009 .Y_ .^:? .... ....
8FD9DF0C 9FE9C114 000000F6-9FEC9448 8FD9DF24 .iA. ...v .l.H .Y_$
8FD9DF1C 04B4E504 8FD9DF48-9EDE3B44 00000009 .4e. .Y_H .^;D ....
8FD9DF2C 00000009 9FE9C114-000000F6 00000000 .... .iA. ...v ....
8FD9DF3C 9FEC9448 04B4E504-00000006 8FD9DF70 .l.H .4e. .... .Y_p
8FD9DF4C 9EDE00AF 04B6E43C-FFFFFFFF 00000009 .^./ .6d< .... ....
8FD9DF5C 9FE9C114 000000F6-9FEC9448 04B4E504 .iA. ...v .l.H .4e.
8FD9DF6C 04B4E504 8FD9DF80-9EDE7A81 04B6E404 .4e. .Y_. .^z. .6d.
8FD9DF7C 00000002 8FD9DF94-9EDE7A2A 046B3A84 .... .Y_. .^z* .k:.
8FD9DF8C 9EDF8F2C 00000000-8FD9DFA8 9EDF3660 ._., .... .Y_( ._6`
Stack Walk
Current EIP: 0021AB7A SERVER.NLM|ProcessSchedulerAbendTriggers+82
Stack Contents
8FD9DEAC 002186BC SERVER.NLM|SchedSwitch+48
8FD9DEB0 00000001
8FD9DEC4 002064BC SERVER.NLM|kMutexLock+1AC
8FD9DEE0 883E6AC9 LIBC.NLM|pthread_mutex_lock+A9
8FD9DEF4 9EDD3AF1 NILE.NLM|SSL_library_init+26C
8FD9DEF8 9D96379C A00D19C0 4E8B2056 20500124 8B244811 @.. V .N$.P .H$.
8FD9DEFC 8FD9DF20 8FD9DF48 9EDE3B44 00000009 00000009 H_Y.D;^.........
8FD9DF00 9EDE3ABF NILE.NLM|CRYPTO_lock+8F
8FD9DF04 00000009
8FD9DF08 00000009
8FD9DF0C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
8FD9DF10 000000F6
8FD9DF24 9EDE3B44 NILE.NLM|CRYPTO_add_lock+5A
8FD9DF28 00000009
8FD9DF2C 00000009
8FD9DF30 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
8FD9DF34 000000F6
8FD9DF4C 9EDE00AF NILE.NLM|RSA_free+2E
8FD9DF50 04B6E43C 00000001 00000006 00000000 00000000 ................
8FD9DF54 FFFFFFFF
8FD9DF58 00000009
8FD9DF5C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
8FD9DF60 000000F6
8FD9DF74 9EDE7A81 NILE.NLM|EVP_PKEY_free+97
8FD9DF78 04B6E404 00000000 00000000 9FEAF3AC 00000008 ........,sj.....
8FD9DF7C 00000002
8FD9DF84 9EDE7A2A NILE.NLM|EVP_PKEY_free+40
8FD9DF88 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
8FD9DF8C 9EDF8F2C C90CC483 55C3C9C3 5653E589 8310EC83 .D.ICICU.eSV.l..
8FD9DF98 9EDF3660 NILE.NLM|PKCS7_DIGEST_free+35
8FD9DF9C 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
8FD9DFA0 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
8FD9DFAC 9EDF8E7A NILE.NLM|ASN1_item_ex_free+2A6
8FD9DFB0 00000003
8FD9DFB4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
8FD9DFB8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
8FD9DFF0 9EDF8F2C NILE.NLM|ASN1_template_free+8A
8FD9DFF4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
8FD9DFF8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
8FD9DFFC 00000000
8FD9E014 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
8FD9E018 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
8FD9E01C 9FE9B6C4 00000000 00000000 00000018 9FE9B627 ............'6i.
8FD9E020 0000000A
8FD9E054 9EDF8F2C NILE.NLM|ASN1_template_free+8A
8FD9E058 04622844 009052C4 00000000 00000000 00000000 DR..............
8FD9E05C 9FE9B720 00000001 00000010 9FE9B64C 0000000A ........L6i.....
8FD9E060 00000000
8FD9E078 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
8FD9E07C 04622844 009052C4 00000000 00000000 00000000 DR..............
8FD9E080 9FE9B768 00000000 00000000 00000000 9FE9B754 ............T7i.
8FD9E084 0000000A
8FD9E0B8 9EDF8BCD NILE.NLM|ASN1_item_free+11
8FD9E0BC 8FD9E0D0 04622844 9FE9B7AC 8FD9E0F0 9EDD8B5E D(b.,7i.p`Y.^.].
8FD9E0C0 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
8FD9E0C4 00000000
8FD9E0CC 9EDD7D2F NILE.NLM|X509_free+10
8FD9E0D0 04622844 009052C4 00000000 00000000 00000000 DR..............
8FD9E0D4 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
8FD9E0D8 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
8FD9E0DC 9EDD8B5E NILE.NLM|ssl_cert_free+8E
8FD9E0E0 04622844 009052C4 00000000 00000000 00000000 DR..............
8FD9E0E4 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
8FD9E0F4 9EDD09AF NILE.NLM|SSL_CTX_free+D1
8FD9E0F8 046F6964 046F6984 00000000 00000000 00000000 .io.............
8FD9E0FC 55325B84 00000020 00908E64 9EDC3710 00000000 ...d....7\.....
8FD9E108 9EDC4825 NILE.NLM|SSLDeRegister+A5
8FD9E10C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
8FD9E118 9FEF5542 WSPSSL.NLM|WSPSSL_deleteSktProc+1D2
8FD9E11C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
8FD9E134 9FEEFE5A WSPSSL.NLM|SSLMapSessnReleaseWTD+EE
8FD9E138 9EBBE8A0 00000000 8E7792A0 00000080 0000000A .... .w.........
8FD9E154 9FEEFD8D WSPSSL.NLM|SSLMapSessnReleaseWTD+21
8FD9E158 8E7792A0 9FEF83CC 9FEF8430 00000001 00000000 L.o.0.o.........
8FD9E164 00361298 SERVER.NLM|kDoFastWorkToDo+28
8FD9E168 9FD2D020 00000000 9FEEFD6C 9FD74C00 00000000 ....l}n..LW.....
8FD9E184 0022476C SERVER.NLM|kWorkToDoCheckAllRunFast+A4
8FD9E19C 00224EE8 SERVER.NLM|MpkSystemWork+68
8FD9E1A8 002181C4 SERVER.NLM|SchedThreadYield+340
8FD9E1BC 003615F1 SERVER.NLM|TimerInterruptHandlerBackEnd+9A
8FD9E260 00000000
EIP invalid.
Novell Open Enterprise Server, NetWare 6.5
PVER: 6.50.08
Server N05 halted Wednesday, November 23, 2011 10:35:58.629 am
Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
Registers:
CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
ESI = 00000006 EDI = 9FE40018 EBP = FBF138DB ESP = A4930264
EIP = 002231BA FLAGS = 00000002
002231BA 83C404 ADD ESP, 00000004
EIP in SERVER.NLM at code start +00019B5Ah
The violation occurred while processing the following instruction:
002231BA 83C404 ADD ESP, 00000004
002231BD 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
, 00000000
002231C4 7482 JZ 00223148
002231C6 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
002231CD 0F84D5000000 JZ 002232A8
002231D3 85DB TEST EBX, EBX
002231D5 0F84BA000000 JZ 00223295
002231DB 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
002231E1 53 PUSH EBX
002231E2 E8AF38EFFF CALL LOADER.NLM|Abend
Running process: Apache_Worker 66 Process
Thread Owned by NLM: APACHE2.NLM
Stack pointer: A4931E20
OS Stack limit: A4922FC0
CPU 0 (Thread A4921600) is in a NO SLEEP state
Scheduling priority: 67371008
Wait state: 5050010 Blocked on a Mutex
Stack: --FBF138DB ?
--9FE40020 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--9FE40000 ?
00220CFC (SERVER.NLM|SchedSwitch+48)
--00000001 (LOADER.NLM|KernelAddressSpace+1)
--9FE40020 ?
--9FE40018 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--9FE40000 ?
0020EAFC (SERVER.NLM|kMutexLock+1AC)
--9FE40024 ?
--9FE40080 ?
--A49302B8 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--04719004 ?
--9D9A589C ?
883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
--9FE40000 ?
--04719004 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--A49302C4 ?
9F92FAF1 (NILE.NLM|SSL_library_init+26C)
--9D9A589C ?
--A49302E8 ?
9F93FABF (NILE.NLM|CRYPTO_lock+8F)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-A007C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
-A00A9448 (NILE.NLM|serverPostFix+1968)
--A49302EC ?
--04719004 ?
--A4930310 ?
9F93FB44 (NILE.NLM|CRYPTO_add_lock+5A)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-A007C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
-A00A9448 (NILE.NLM|serverPostFix+1968)
--04719004 ?
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--A4930338 ?
9F93C0AF (NILE.NLM|RSA_free+2E)
--046F21BC ?
--FFFFFFFF ?
--00000009 (LOADER.NLM|KernelAddressSpace+9)
-A007C114 (NILE.NLM|RSA_version+28)
--000000F6 (LOADER.NLM|KernelAddressSpace+F6)
-A00A9448 (NILE.NLM|serverPostFix+1968)
--04719004 ?
--04719004 ?
--A4930348 ?
9F943A81 (NILE.NLM|EVP_PKEY_free+97)
--046F2184 ?
--00000002 (LOADER.NLM|KernelAddressSpace+2)
--A493035C ?
9F943A2A (NILE.NLM|EVP_PKEY_free+40)
--04790FC4 ?
9F954F2C (NILE.NLM|ASN1_template_free+8A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--A4930370 ?
9F94F660 (NILE.NLM|PKCS7_DIGEST_free+35)
--04790FC4 ?
-A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
--047571A4 ?
--A49303B4 ?
9F954E7A (NILE.NLM|ASN1_item_ex_free+2A6)
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--046C809C ?
-A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
--9FD8FB40 ?
-A0082C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
-A0082C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
--9FD8FB40 ?
--A49303B0 ?
-A0082C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
9F94F641 (NILE.NLM|PKCS7_DIGEST_free+16)
--00000002 (LOADER.NLM|KernelAddressSpace+2)
--04772F24 ?
--047571A4 ?
--04719004 ?
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--A49303D8 ?
9F954F2C (NILE.NLM|ASN1_template_free+8A)
--046C809C ?
-A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--04748004 ?
--00000005 (LOADER.NLM|KernelAddressSpace+5)
--046C809C ?
--00000003 (LOADER.NLM|KernelAddressSpace+3)
--A4930418 ?
9F954E55 (NILE.NLM|ASN1_item_ex

Maybe Hamish Speirs can explain it - it was his post in another thread that gave me the idea and commands to try (see http://forums.novell.com/forums/nove...r-10038-a.html).
We had a confluence of changes at the beginning of the semester (Sept) that no doubt helped contribute to the problem and yet also mask the real cause to a certain extent.
1. The Thawte cert expired and was replaced with a new cert - Thawte does not support doing renewals on NetWare. This happened around the start of Sept.
2. School semester begins. Thousands of students return.
3. We use Pcounter for pay-for-print and it uses httpstk to provide a webpage for students to authorize print jobs.
4. Printing activity in general goes way up.
5. All printers are Secure.
6. Apache, iPrint and httpstk all use the same Thawte certificate
7. The print server was also hosting the netstorage service which also uses the Thawte cert (via apache).
8. The print server was recently (August) virtualized (via p2v using the excellent Portlock Storage Manager)
Eventually I built a new NetWare vm to host print services and got a new cert so at least the netstorage and print services were no longer running together. I suspected at that point that the likely source of the abends was NetStorage since Nile and SSL were almost always involved in the abends.
After the separation the issues continued - so it wasn't netstorage's fault. Desparate searching of the 'net lead to H.'s post. The rest is history!
It has now been 9 days up uptime without a single nile/ssl related abend ( I had one abend in pcounter but services survived).
Ron
"Seasoned Greasings and Happy New Rear!"

Similar Messages

  • Apache Vhosts and SSL

    Hi all,
    Iam having this problem with Virtual Hosts and SSL.
    The subdomains work fine but the problem is when you try to connect to the one with SSL then you get "ssl_error_rx_record_too_long"
    Its not a permission error and the certificate is created with the ssh.mydomain.com as FQDN name if that is of any importance
    Listen 443
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/www
    ServerName www.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/glype
    ServerName proxy.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/forum
    ServerName forum.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:443>
    DocumentRoot /srv/http/ssh
    ServerName ssh.mydomain.com
    SSLEngine ON
    SSLCertificateKeyFile "/etc/httpd/certs/server.key"
    SSLCertificateFile "/etc/httpd/certs/server.crt"
    SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
    CustomLog logs/ssl_request_log \
    "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
    ProxyRequests Off
    <Proxy *>
    Order deny,allow
    Allow from all
    </Proxy>
    ProxyPass / http://localhost:8100/
    ProxyPassReverse / http://localhost:8100/
    </VirtualHost>
    Iam grateful for all the help i can recieve.

    neddie_seagoon wrote:SSL needs to run on a dedicated IP (and responds to all https requests on that IP) so you can't have multiple vhosts with SSL on the same IP. You would need to bring up more IPs and then configure your other vhosts to use them.
    fyi: recent builds of apache and openssl can now do SNI.
    http://wiki.apache.org/httpd/NameBasedSSLVHostsWithSNI
    Also, if you use wildcard certificates, and your vhosts are all subdomains of the same top level domain, then that would work too. I have done this a few times before. Apache squaks a little when it starts up, but it works fine.
    But in the general case, and when using older builds of apache, you are correct regarding the ip requirements.
    Last edited by cactus (2009-08-29 18:44:16)

  • 6.1 SP 2 certificate authenticator fails with Apache plugin and SSL

    Hi,
    Does anybody have a certificate authenticator working in WebLogic 6.1
    SP 2, in combination with the Apache HTTP Server plugin and SSL?
    We implemented a certificate authenticator that works correctly in
    WebLogic 6.1 SP 2 when we configure SSL with "Client Certificate
    Required", and access it directly from a browser (the browser hits the
    SSL port of the WebLogic server, like 7002).
    This certificate authenticator also works correctly with a proxy web
    server. We set up a Stronghold server (web server based on Apache) on
    Linux with the Apache HTTP Server plugin from BEA, configured the
    plugin to use SSL, and configured our WebLogic 6.1 SP 1 server without
    "Client Certificate Required". The certificate authenticator gets the
    end user's certificate correctly.
    This same architecture with the proxy web server does not work when we
    upgrade the WebLogic Server to SP 2. WebLogic Server logs the
    "incorrect or missing client cert" error, our certificate
    authenticator is never called, and the browser gets a 401 Unauthorized
    error.
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). So it appears to us that the plugin encodes the
    certificate in the request header in such a way that a SP 1 server can
    extract it, but an SP 2 server cannot. We were wondering whether
    there might be changes to the plugin to stay in step with the SP 2
    server that never got ported to Linux, or whether an updated Linux
    plugin never got included in the installer packages.
    So: has anybody gotten a system like
    Apache/Stronghold + WebLogic Plugin <-- SSL --> WebLogic 6.1 SP 2 +
    Cert Auth
    to work?
    Thanks in advance for any help,
    Jim Doyle
    [email protected]

    A correction, I think:
    Now that I rolled back a system to 6.1 SP 1, it looks like 6.1 SP 1
    does include a different mod_wl_ssl.so from that in SP 2. I believe I
    was comparing the wrong file. In fact, trying to compare versions of
    the mod_wl_ssl.so makes things rather confusing:
    A mod_wl_ssl.so from a straight weblogic610sp2_generic.zip install has
    a cksum of "1853014778 1132467".
    A mod_wl_ssl.so from a weblogic610sp1_generic.zip install with a
    subsequent SP 2 upgrade install has a cksum of "1350917183 1147927".
    A mod_wl_ssl.so from a plain 6.1 install with subsequent SP 1 and SP 2
    upgrade installs, followed by an SP 2 uninstall and another SP 1
    upgrade install, has a cksum of "1471948065 1136501".
    I think I may be looking at three different plugin versions here: 6.1,
    6.1 SP 1, and 6.1 SP 2, assuming the upgrade installs don't actually
    change mod_wl_ssl.so. I'm not sure whether there's an easier way to
    verify what version of the plugin you have.
    In any case, we did try each plugin version, and none of them works
    against a 6.1 SP 2 WebLogic server.
    Jim
    [email protected] (Jim Doyle) wrote in message news:<[email protected]>...
    [snip]
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). [snip]

  • Apache proxy and SSL

    Hi,
    I've been trying to set up the Apache proxy plug-in on Linux to handle SSL.
    However, there seems to be no documentation on this and among the many
    threads about this dilema, no one seems to have a solution. Can BEA post
    any documentation on this subject to clarify things?
    In case anyone has found a solution or is able to help, I was able to
    successfully proxy JSP requests to Weblogic using the mod_wl.so. However,
    when I swapped this for mod_wl_ssl.so, Apache never reached the Weblogic
    again. It seemed to look into its own root directory to locate and JSP file
    (of course, it's not going to find it there) and reported a 404 back.
    Here's a snippet of the Apache httpd.conf file, hopefully you can see
    something fishy.
    ############################Begin .conf
    LoadModule weblogic_module modules/mod_wl_ssl.so
    <Location /weblogic>
    SetHandler weblogic-handler
    # Of course, we tried toggling this value too, but no luck
    # PathTrim /weblogic
    </Location>
    <Files *.jsp>
    SetHandler weblogic-handler
    </Files>
    <IfModule mod_weblogic.c>
    WebLogicCluster [IP1]:7001,[IP2]:7001
    </IfModule>
    ##############################End of .conf
    Any help is greatly appreciated.
    Thanks,
    -Vu

    ok, we recompiled Apache, and now it works fine.
    "Vu Nguyen" <[email protected]> wrote in message
    news:3a2ea2bc$[email protected]..
    Hi,
    I've been trying to set up the Apache proxy plug-in on Linux to handleSSL.
    However, there seems to be no documentation on this and among the many
    threads about this dilema, no one seems to have a solution. Can BEA post
    any documentation on this subject to clarify things?
    In case anyone has found a solution or is able to help, I was able to
    successfully proxy JSP requests to Weblogic using the mod_wl.so. However,
    when I swapped this for mod_wl_ssl.so, Apache never reached the Weblogic
    again. It seemed to look into its own root directory to locate and JSPfile
    (of course, it's not going to find it there) and reported a 404 back.
    Here's a snippet of the Apache httpd.conf file, hopefully you can see
    something fishy.
    ############################Begin .conf
    LoadModule weblogic_module modules/mod_wl_ssl.so
    <Location /weblogic>
    SetHandler weblogic-handler
    # Of course, we tried toggling this value too, but no luck
    # PathTrim /weblogic
    </Location>
    <Files *.jsp>
    SetHandler weblogic-handler
    </Files>
    <IfModule mod_weblogic.c>
    WebLogicCluster [IP1]:7001,[IP2]:7001
    </IfModule>
    ##############################End of .conf
    Any help is greatly appreciated.
    Thanks,
    -Vu

  • Apache-Mod_jk-Tomcat and SSL certificate

    Hi all.
    I have Apache 2.0.55 working with Tomcat 5.5 via mod_jk connector.
    I have generated a self-signed cerificate for Apache using openssl, and I use it to encrypt both URLs served by Apache and URLs served by Tomcat through mod_jk.
    When a "https URL" is forwarded to Tomcat, an exception is thrown by the webapp, unless the certificate has not been set as "trusted" on Tomcat side.
    So, it seems like I have to do the following:
    1) generate a a self-signed cerificate for Apache using openssl.
    2) import this certificate in a keystore
    3) set the keystore as trusted (System.setProperty("javax.net.ssl.trustStore", PATH_TO_KEYSTORE));
    I'm wondering if there's a better way to accomplish that, not forcing me to do all this steps and, above all, allowing me to "break" the link between the apache cert and the tomcat keystore.
    Any help will be very appreciated!

    usually u generate a keystore for client, and mention that in ur SSL connector of tomcat
    in apache, we need to configure things in ssl.conf

  • Apache and ssl

    Hi gurus,
    I know this is not the rite place to post this issue.But i gues someone has faced this problem.
    I want to configure ssl on Apache
    if there are any good documents or steps please let me know..
    I already have a certificate,genetrated by CA
    So i just need to configure http.conf file and ssl.conf..
    I have configured Appche and OAS10g,my url opens with default apache port now just want this configuration for https,want configure basically 443 port
    please help
    Thanks in Advance
    Fabian

    Hi Fabs,
    Bhai Try this one...
    Unsecuring the AS Control Application
    To unsecure the AS Control, follow these steps:
    1.     Stop the AS Control $ emctl stop iasconsole
    2.     Update AS Control's standalone OC4J container to support unsecure port in $ORACLE_HOME/sysman/j2ee/config/emd-web-site.xml
    Change the following line:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="true">
    Into:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="false">
    3.     In the same file (emd-web-site.xml), you also need to modify the ssl-config section at the bottom of the file
    Change the following line:
    <ssl-config needs-client-auth="true" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    Into:
    <ssl-config needs-client-auth="false" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    4.     Update AS Control Local Management Agent to support the unsecure HTTP protocol.
    The EMD_URL property in $ORACLE_HOME/sysman/config/emd.properties needs to get switched back to the HTTP (non-secure) protocol.
    Change:
    EMD_URL=https://<hostname>:<port>/emd/main
    Into:
    EMD_URL=http://<hostname>:<port>/emd/main
    5.     Update the standAloneConsoleURL property of oracle_ias target.
    Edit the file $ORACLE_HOME/sysman/emd/targets.xml to change the StandaloneConsoleURL property of oracle_ias target to switch back to the HTTP (non-secure) protocol.
    Change the following lines:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="https://<hostname>:<port>/emd/console"/>
    Into:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="http://<hostname>:<port>/emd/console"/>
    6.     Start the AS Control Application: $ emctl start iasconsole
    thanks,
    Santosh.

  • Apache reverse proxy and SSL termination

    Hi Guru's
        Can anyone tell me, how to do SSL termination at apache reverse proxy. I am using apache reverse proxy for accesing portal from internet. Apache is configured for SSL and portal is NON SSL.
    I am using header variable login module in portal. i wanted to terminate SSL at apache reverse proxy and then all traffic after that should be clear text.
    should i maitain any property. is there any documentation for it.
    Please help me
    Tom

    The majority of the work here is around configuring your Web Dispatcher and Apache Reverse proxy. The work on the portal is straight forward enabling of SSL.
    You can follow http://help.sap.com/saphelp_nw2004s/helpdata/en/f1/2de3be0382df45a398d3f9fb86a36a/frameset.htm for setting this up.
    what level I need to configure SSL and how do I proceed in both scenarios?
    Your question itself says where you need SSL. SSL is required where ever you need HTTPS communication.
    how do I proceed in both scenarios?
    From a portal perspective, the configuration should remain the same.
    Do I have to install SSL at portal, web dispatcher or at Apache level?
    SSL needs to be configured at all the 3 levels if you are looking at end to end SSL implementation.
    See the following for possible SSL implementation options:
    http://help.sap.com/saphelp_nw04/helpdata/en/d8/a922d7f45f11d5996e00508b5d5211/frameset.htm
    https://cw.sdn.sap.com/cw/docs/DOC-115509
    Will SSL termination work for scenario 2?
    Yes this should work - see http://help.sap.com/saphelp_nw2004s/helpdata/en/36/fd39eacf4cde4a8fe32d7f29b3db16/frameset.htm
    However in case of SSL Termination, the request to your portal from the web dispatcher will be sent as HTTP.
    I would recommend you to take a step by step (backward approach).
    First, enable SSL on your portal and make sure it works - going directly to the server.
    Then, you can introduce the Web Dispatcher - and test if every thing works going through the web dispatcher.
    Finally - you can test the end to end flow - with your Reverse proxy involved.
    - Shanti

  • Securing file download with standard web security and ssl

    Hi,
    I want to put some files for download in my webapp. At the same time, I want to protect these files using standard servlet security and ssl. So I added <security-constraint> in my web.xml and configured tomcat to allow SSL connection. Now I got the files protected as I expected. When I try to access the file directly from browser, tomcat shows me the login page. However, after correct login, I.E. pops up an error saying something like "Internet Explorer cannot download XXX from XXX. The file could not be written to the cache.". The log file showed the following exception:
    javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1154)
         at com.sun.net.ssl.internal.ssl.AppInputStream.available(AppInputStream.java:40)
         at org.apache.tomcat.util.net.TcpConnection.shutdownInput(TcpConnection.java:90)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:752)
         at org.apache.tomcat.util.net.PoolTcpEndpoint.processSocket(PoolTcpEndpoint.java:526)
         at org.apache.tomcat.util.net.LeaderFollowerWorkerThread.runIt(LeaderFollowerWorkerThread.java:80)
         at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:684)
         at java.lang.Thread.run(Thread.java:595)
    Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:166)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1476)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1443)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1407)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:64)
         at org.apache.coyote.http11.InternalOutputBuffer.realWriteBytes(InternalOutputBuffer.java:747)
         at org.apache.tomcat.util.buf.ByteChunk.flushBuffer(ByteChunk.java:403)
         at org.apache.coyote.http11.InternalOutputBuffer.endRequest(InternalOutputBuffer.java:400)
         at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:961)
         at org.apache.coyote.Response.action(Response.java:182)
         at org.apache.coyote.Response.finish(Response.java:304)
         at org.apache.catalina.connector.OutputBuffer.close(OutputBuffer.java:281)
         at org.apache.catalina.connector.Response.finishResponse(Response.java:473)
         at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:151)
         at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:825)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:738)
         ... 4 more
    Caused by: java.net.SocketException: Connection reset by peer: socket write error
         at java.net.SocketOutputStream.socketWrite0(Native Method)
         at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:92)
         at java.net.SocketOutputStream.write(SocketOutputStream.java:136)
         at com.sun.net.ssl.internal.ssl.OutputRecord.writeBuffer(OutputRecord.java:283)
         at com.sun.net.ssl.internal.ssl.OutputRecord.write(OutputRecord.java:272)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:663)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:59)
         ... 15 more
    I've tried separating concerns, for example protect files but not require SSL, and enable SSL but do not protect files. Both works respectively but not together. I also tried using a download4j's DownloadServlet. Still doesn't work.
    Have any of you encouter the same situation? If so, could you enlight me what I did wrong? It maybe just a simple SSL configuration or something. Thanks in advance!
    Jack

    My environment setup is:
    JDK 1.5.01
    Tomcat 5.5.7
    For downloading files, I just use plain old <a href> method. I simply right-click the link and choose "save target as...".
    Thanks,
    Jack

  • Apache XML-RPC & SSL

    I have a client desktop program that should connect to the server via xml-rpc and SSL. I use SecureXmlRpcClient and get the exception while execute method call:
    Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/commons/codec/DecoderException
         at org.apache.xmlrpc.XmlRpc.createTypeFactory(XmlRpc.java:238)
         at org.apache.xmlrpc.XmlRpc.<init>(XmlRpc.java:193)
         at org.apache.xmlrpc.XmlRpcClientResponseProcessor.<init>(XmlRpcClientResponseProcessor.java:48)
         at org.apache.xmlrpc.XmlRpcClientWorker.<init>(XmlRpcClientWorker.java:43)
         at org.apache.xmlrpc.XmlRpcClient.getWorker(XmlRpcClient.java:347)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:190)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:184)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:177)
         at ClientOTK.main(ClientOTK.java:48)
    What does it mean and what should I do ?

    Hi JZ,
    Did you get the answer for your problem? I am using the jars xml-rpc 2.0.1 and common-codec 1.2. I could run the http transaction successfully. But having problem with SSL. I kept getting SocketException :
    java.net.SocketException: Unexpected end of file from server
         at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:818)
         at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:711)
         at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:816)
         at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:711)
         at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:635)
         at org.apache.xmlrpc.DefaultXmlRpcTransport.sendXmlRpc(DefaultXmlRpcTransport.java:87)
         at org.apache.xmlrpc.XmlRpcClientWorker.execute(XmlRpcClientWorker.java:72)
    I appreciate the comments to resolve this exception.
    thanks jassi

  • Reverse Proxy Configuration - Apache as an SSL reverse-proxy

    Hi,
    We have EP 6.0 SP 14 installed with SSL configured.
    We are in need to open the application to internet.
    For the same we have set up a reverse proxy server (Apache as SSL
    Reverse Proxy).
    Our requirement is to open the application to the internet with
    web address https://abc.domain.com.
    The issue is we are able to access the application from internet only when
    https://abc.domain.com/irj/potal is typed.
    (ie.) Mapping is working fine for
    https://abc.domain.com/irj/portal to
    our EP Portal address https://abc2.domain.com:50001/irj/portal
    And not working for mapping https://abc.domain.com to our EP Portal
    address https://abc2.domain.com:50001/irj/portal
    We have been working on to resolve this issue for days together but have been really unsuccessful
    Kindly help us in resolving the same asap.
    Note : The references we used are:
    1. SAP's document:
    "Apache Reverse Proxy Configuration for J2ee 6.20 and 6.40 Web Applications"
    2. Weblogs:
    The Reverse Proxy Series -- Part 1: Introduction
    The Reverse Proxy Series -- Part 3: Apache as a reverse-proxy
    The Reverse Proxy Series -- Part 3.1: Apache as an SSL reverse-proxy
    Regards,
    venkat.

    Thanks much for the feedback. We're using the default settings on the HTTP rule we have set up for the portal on the ISA server. We'll be looking into the details of what the default rule settings are, however we did find a note in the Microsoft Knowledge base detailing with the ISA server screening high bits in URL strings for Outlook Web Access (OWA). This generates a similar error message. Here is the link to the detailed note on the Microsoft web site:
    http://support.microsoft.com/?scid=kb;en-us;837865
    Also,we are going to be applying the SP1 upgrade to the ISA server (released in March) to see if this might be some type of issue that may have been identified and corrected by the service pack. We'll see what happens with that.
    One area where we can recreate the problem at will is when we set up the system landscape configuration. We can navigate to a system configuration object, however when we attempt to right click to edit the object we get the error. There are other circumstances where we get errors but that is one that occurs for sure. Anyone have any idea as to what might be special about that type of transaction??
    Thanks again.
    Rich

  • OC4J and SSL

    Hi all,
    I am trying to configure SSL and OC4J (without using Apache!) and am looking for instructions on how to do this. Note that I also don't need the keys to be signed with a certificate either.
    Please let me know what I have to do to accomplish this.
    thanks.
    -Jason

    Hi,
    I have followed these instructions, but could you look at
    SSL config on Standalone OC4J
    my problem is described in this thread.
    Thanks in advance,
    Rémy

  • Applet and SSL

    Hi guys,
    I need to download an applet (and then use it!) from an Apache Web Server + SSL (mod_ssl).
    This is my "quest":
    If I configure in mod_ssl.conf
    # SSLVerifyClient require
    # SSLVerifyDepth 1
    I can load my applet and I can use it with SSL without(!) problem.
    But if I configure in mod_ssl.conf
    SSLVerifyClient require
    SSLVerifyDepth 1
    my browser can't load the applet and launch this exception
    java.net.SocketException: Software caused connection abort: JVM_recv in socket input stream read
    at java.net.SocketInputStream.socketRead0(Native Method)
    at java.net.SocketInputStream.read(Unknown Source)
    at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
    at com.sun.net.ssl.internal.ssl.Handshaker.sendChangeCipherSpec(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.g(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(DashoA6275)
    at com.sun.net.ssl.internal.ssl.Handshaker.process_record(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.AppOutputStream.write(DashoA6275)
    at java.io.OutputStream.write(Unknown Source)
    Where's my error?
    Is it necessary sign the applet?
    Thanks

    Is your browser IE6 ?
    I've got the same ...
    If you have the answer please e-mail me.
    [email protected]
    thanks

  • Apex Listener/Apache Tomact and filenames with spaces

    I've installed the Apex Listener with Apache Tomcat, and all seems to work fine. Except when I try to do a CSV file data upload via the utilities screen in apex. If the filename/directory path contains spaces, then Apex reports "File Must Be Specified" error - yet if I do this same operation via EPG instead of Tomcat, it works. Are there any restrictions in Tomcat to using spaces??

    Look at this thread. Re: File upload problem
    regards.

  • Sql server service wont start after disabling TLS 1.0 and SSL 3.0 on windows

    We have been hardening our servers for some time now and recently we disabled SSL 3.0 because of the poodle attack. When I did this on one of our test servers SQL Server failed to start up after the restart.
    I have been able to reproduce this on Windows Server 2012 and Windows 7 by disabling TLS 1.0 and SSL 3.0 through the registry. I am using SQL Server 2012 on the server machine. On my windows 7 machine sql server 2012 and sql server 2005 will not start with
    those disabled.
    These are the event log errors I get: 
    Application Logs: 
    (28/10/2014 8:38:54 AM) SQL Server could not spawn FRunCM thread. Check the SQL Server error log and the Windows event logs for information about possible related problems. 
    (28/10/2014 8:38:54 AM) Could not start the network library because of an internal error in the network library. To determine the cause, review the errors immediately preceding this one in the error log. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x1. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x80. 
    System Logs: 
    (28/10/2014 8:38:54 AM) The SQL Server (MSSQLSERVER) service terminated with service-specific error %%-2146893007. 
    (28/10/2014 8:38:54 AM) A fatal error occurred while creating an SSL server credential. The internal error state is 10013. 
    Done anyone know have we can keep SSL 3.0 and TLS 1.0 disabled and get SQLServer server to start?

    Hi Don,
    I already have TLS 1.0 Disabled to prevent the BEAST exploit. So the values I have for:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Server
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Client
    Both have enabled set to ("Enabled"=dword:00000000).
    If change both of these back to ("Enabled"=dword:00000001)
    to enable TLS 1.0, and restart then SQLServer is able to start again. But we are now vulnerable to the BEAST attack once again.
    If I keep server enabled and disable the client or vice versa and restart. Then SQLServer starts but I
    am unable to connect to it. When I check the Event logs I get the same errors as my original past.
    With your last post, do you mean to backup SCHANNEL and delete it so it gets recreated? If that is the case it will probably work because if I re enable SSL 3.0 or TLS 1.0 from here it fix's the issue,  but I then I won't have the exploits patched and
    we need this for some of our customers.
    This is my SCHANNEL Export:
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]
    "Enabled"=dword:00000000

  • IE browser and Web Cache and SSL - Internet Explorer cannot display the web page

    When using IE8, IE9, or IE10 with Web Cache and SSL certain pages which display a lot of data returns the error - "Internet Explorer cannot display the web page."
    if we eliminate SSL but continue to use Web Cache, the error does *not* reproduce & If we eliminate Web Cache altogether the error again does *not* reproduce.  The error is only reproducible when we use SSL with Web Cache and if we use IE and we access *large* pages. The error is not reproducible with Firefox or Chrome. This is a Web Tier 11.1.1.7 installation with WebLogic 10.3.6 & Red Hat Enterprise 5 Linux x86-64
    Event_log shows below errors.
    [2013-06-13T16:34:35-04:00] [webcache] [NOTIFICATION:1] [WXE-09002] [logging] [ecid: ] Generated by Oracle Web Cache on Thu Jun 13 16:34:35 2013 - Build 11.1.1.7.0 130113.0721
    [2013-06-13T16:34:36-04:00] [webcache] [NOTIFICATION:1] [WXE-08513] [logging] [ecid: ] Cache server process ID 4469 is starting up.
    [2013-06-13T16:34:36-04:00] [webcache] [NOTIFICATION:1] [WXE-09612] [main] [ecid: ] Oracle Web Cache 11g (11.1.1.6), Build 11.1.1.7.0 130113.0721
    [2013-06-13T16:34:37-04:00] [webcache] [NOTIFICATION:1] [WXE-13002] [config] [ecid: ] Maximum allowed incoming connections are 1000
    [2013-06-13T16:35:00-04:00] [webcache] [NOTIFICATION:1] [WXE-09441] [stats] [ecid: ] DMS enabled
    [2013-06-13T16:35:28-04:00] [webcache] [NOTIFICATION:1] [WXE-12209] [cluster] [ecid: ] A 1 node cluster successfully initialized
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09614] [main] [ecid: ] The following Oracle Web Cache internal files are pre-populated to the cache: [[
            /nssb-p.adm.fit.edu:7785/_oracle_http_server_webcache_static_.html
            /nssb-p.adm.fit.edu:4448/_oracle_http_server_webcache_static_.html
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09614] [main] [ecid: ]  [[
    The following Oracle Web Cache internal files are pre-populated to the cache: [[
            /nssb-p.adm.fit.edu:7785/_oracle_http_server_webcache_checkserviceavailability_.html
            /nssb-p.adm.fit.edu:4448/_oracle_http_server_webcache_checkserviceavailability_.html
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09608] [main] [ecid: ] The cache server process started successfully.
    [2013-06-13T16:35:29-04:00] [webcache] [WARNING:1] [WXE-12104] [utl] [ecid: ] Oracle Web Cache process has page faulted
    [2013-06-13T16:44:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55145
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:27-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55144
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:27-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55148
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:35-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:44:35-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:18-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:18-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:45:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:41-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:41-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    Any help or suggestions are greatly appreciated
    Tnx a lot,
    Lokesh

    Hello ,
    Try Below Workarounds:
    Workaround 1:
    Open Central Admin
    àApplication Management  à
    Configure Alternate access mapping-->Edit your web application zone and add your server name in Intranet zone. So default can be serverIP and intranet could be servername.
    Workaround 2:
    Might be there is some issue with DNS and try to check that WebApplication is pointing to correct IP or not.  
    Also try to access your Sharepoint site using ip Address .. If you still gets error Kindly share the logs .. 
    Best
    Regards Kuldeep Verma
    Please remember to click "Mark As Answer"
    if a post solves your problem or "Vote As Helpful" if it was useful.

Maybe you are looking for

  • 64 Bit XML libraries for Sun Solaris

    Will the libxml8.a and libxmlc8.a libraries be included in the 8.1.7 (64) release for Sun Solaris?

  • EHDs and Time Capsule

    Okay I know this has been dealt with numerous times but.... I need to get an external hard drive here in Canada where the choices are not huge. I need a reliable 500Gb-1 T which requires no setup and that will work seamlessly with Time Machine and no

  • Clearing Document Number (AUGBL)

    Hello Experts, Can anybody tell me that where we can see the clearing document number in Transactions.My requirement is to get the Clearing Document Number by giving Document number. Thanks in advance.

  • Impossibility to send a fax after upgrade to 10.6

    Hello, I've just upgraded to 10.6.2 from 10.4.11 and the "send fax" function via the external Mac modem ("MA034") doesn't work ("receive" is OK). The error message is cupsRasterInterpretPPD had an error: Unknown operator "level2"! My local Apple deal

  • How to burn .cue files in itunes

    so...how do you do it?? it was so easy with nero...but I cant figure out how to do it with itunes...