Apache Vhosts and SSL

Hi all,
Iam having this problem with Virtual Hosts and SSL.
The subdomains work fine but the problem is when you try to connect to the one with SSL then you get "ssl_error_rx_record_too_long"
Its not a permission error and the certificate is created with the ssh.mydomain.com as FQDN name if that is of any importance
Listen 443
<VirtualHost 172.16.2.250:80>
DocumentRoot /srv/http/www
ServerName www.mydomain.com
</VirtualHost>
<VirtualHost 172.16.2.250:80>
DocumentRoot /srv/http/glype
ServerName proxy.mydomain.com
</VirtualHost>
<VirtualHost 172.16.2.250:80>
DocumentRoot /srv/http/forum
ServerName forum.mydomain.com
</VirtualHost>
<VirtualHost 172.16.2.250:443>
DocumentRoot /srv/http/ssh
ServerName ssh.mydomain.com
SSLEngine ON
SSLCertificateKeyFile "/etc/httpd/certs/server.key"
SSLCertificateFile "/etc/httpd/certs/server.crt"
SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
CustomLog logs/ssl_request_log \
"%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
ProxyRequests Off
<Proxy *>
Order deny,allow
Allow from all
</Proxy>
ProxyPass / http://localhost:8100/
ProxyPassReverse / http://localhost:8100/
</VirtualHost>
Iam grateful for all the help i can recieve.

neddie_seagoon wrote:SSL needs to run on a dedicated IP (and responds to all https requests on that IP) so you can't have multiple vhosts with SSL on the same IP. You would need to bring up more IPs and then configure your other vhosts to use them.
fyi: recent builds of apache and openssl can now do SNI.
http://wiki.apache.org/httpd/NameBasedSSLVHostsWithSNI
Also, if you use wildcard certificates, and your vhosts are all subdomains of the same top level domain, then that would work too. I have done this a few times before. Apache squaks a little when it starts up, but it works fine.
But in the general case, and when using older builds of apache, you are correct regarding the ip requirements.
Last edited by cactus (2009-08-29 18:44:16)

Similar Messages

  • Apache, iPrint and SSL/nile.nlm

    Hi,
    Getting various abends on a daily basis. Server is running as a vm on ESX 4.1 on an AMD platform. The running process is not always the same (apache_workprocess, seg.nlm, pcountdp.nlm) but the type of abend seems to be very consistent. It is the "Kernel detected an attempted context switch in an MPK Fast WTD". Another consistency seems to be that SSL and nile.nlm are high up on the stack - but maybe that is just normal for any iPrint server with secure iprint enabled on every printer (about 400 printer agents).
    Thinking it might be a bad cert I have tried using both the self-signed "SSL CertificateDNS" cert and a third-party (Thawte) cert. Same result in either case. I have also tried the various tweaks on ESX for NetWare guest vm's :
    - setting the memory reservation
    - settting cpu affinity,
    - setting the virtualization method to use hardware (Intel/AMD mmu and Intel/AMD instruction set) rather than automatic,
    - removing the acpidrv.psm module from startup.ncf
    - I have NOT set the NUMA memory node affinity.
    The last thing I can think of to try is to turn off secure iPrint. If I do that, can I load apache without it listening on port 443 and not break any iPrint services? I do have iManager running on this same guest as well but I do not need it there.
    Any other ideas?
    Thanks,
    Ron
    Below are two recent abends, one with pcountdp.nlm and the second with apache_worker process. I've cut the nlm list on the second abend to get it to fit into this post.
    Server N05 halted Monday, November 21, 2011 12:53:52.463 pm
    Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
    Registers:
    CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
    EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
    ESI = 00000006 EDI = A00D19D8 EBP = FBF138DB ESP = 8FD9DE9C
    EIP = 0021AB7A FLAGS = 00000002
    0021AB7A 83C404 ADD ESP, 00000004
    EIP in SERVER.NLM at code start +00019B5Ah
    The violation occurred while processing the following instruction:
    0021AB7A 83C404 ADD ESP, 00000004
    0021AB7D 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
    , 00000000
    0021AB84 7482 JZ 0021AB08
    0021AB86 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
    0021AB8D 0F84D5000000 JZ 0021AC68
    0021AB93 85DB TEST EBX, EBX
    0021AB95 0F84BA000000 JZ 0021AC55
    0021AB9B 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
    0021ABA1 53 PUSH EBX
    0021ABA2 E8CFDBEFFF CALL LOADER.NLM|Abend
    Running process: PCOUNTDP.NLM 236 Process
    Thread Owned by NLM: PCOUNTDP.NLM
    Stack pointer: 8FD9E1A8
    OS Stack limit: 8FD9B360
    CPU 0 (Thread A52305C0) is in a NO SLEEP state
    Scheduling priority: 67371008
    Wait state: 5050010 Blocked on a Mutex
    Stack: --FBF138DB ?
    --A00D19E0 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A00D19C0 ?
    002186BC (SERVER.NLM|SchedSwitch+48)
    --00000001 (LOADER.NLM|KernelAddressSpace+1)
    --A00D19E0 ?
    --A00D19D8 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A00D19C0 ?
    002064BC (SERVER.NLM|kMutexLock+1AC)
    --A00D19E4 ?
    --A00D1A40 ?
    --8FD9DEF0 ?
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04B4E504 ?
    --9D96379C ?
    883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
    --A00D19C0 ?
    --04B4E504 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --8FD9DEFC ?
    9EDD3AF1 (NILE.NLM|SSL_library_init+26C)
    --9D96379C ?
    --8FD9DF20 ?
    9EDE3ABF (NILE.NLM|CRYPTO_lock+8F)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --8FD9DF24 ?
    --04B4E504 ?
    --8FD9DF48 ?
    9EDE3B44 (NILE.NLM|CRYPTO_add_lock+5A)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --04B4E504 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --8FD9DF70 ?
    9EDE00AF (NILE.NLM|RSA_free+2E)
    --04B6E43C ?
    --FFFFFFFF ?
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --04B4E504 ?
    --04B4E504 ?
    --8FD9DF80 ?
    9EDE7A81 (NILE.NLM|EVP_PKEY_free+97)
    --04B6E404 ?
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --8FD9DF94 ?
    9EDE7A2A (NILE.NLM|EVP_PKEY_free+40)
    --046B3A84 ?
    9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --8FD9DFA8 ?
    9EDF3660 (NILE.NLM|PKCS7_DIGEST_free+35)
    --046B3A84 ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --047E85C4 ?
    --8FD9DFEC ?
    9EDF8E7A (NILE.NLM|ASN1_item_ex_free+2A6)
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --009052DC ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --A00D1540 ?
    -9FEA2C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
    -9FEA2C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
    --A00D1540 ?
    --8FD9DFE8 ?
    -9FEA2C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
    9EDF3641 (NILE.NLM|PKCS7_DIGEST_free+16)
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --046DFC84 ?
    --047E85C4 ?
    --04B4E504 ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --8FD9E010 ?
    9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
    --009052DC ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04622844 ?
    --00000005 (LOADER.NLM|KernelAddressSpace+5)
    --009052DC ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --8FD9E050 ?
    9EDF8E55 (NILE.NLM|ASN1_item_ex_free+281)
    --009052DC ?
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    --0000000A (LOADER.NLM|KernelAddressSpace+A)
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    Additional Information:
    The NetWare OS detected a problem with the system while executing a process owned by SERVER.NLM. It may be the source of the problem or there may have been a memory corruption.
    Loaded Modules:
    PCOUNTWI.NLM Pcounter Web Interface
    Version 5.50 October 27, 2011
    Code Address: A13A6000h Length: 00006A0Ch
    Data Address: A653C000h Length: 00003AA0h
    NDPSGW.NLM NDPS Gateway
    Version 4.01.02 March 2, 2010
    Code Address: A5D20000h Length: 0000E7FCh
    Data Address: A5199000h Length: 0000737Ch
    PCOUNTDP.NLM Pcounter for NDPS
    Version 5.50 October 27, 2011
    Code Address: A5CE3000h Length: 0002230Bh
    Data Address: A3071000h Length: 00005154h
    NETDB.NLM Network Database Access Module
    Version 4.11.05 January 6, 2005
    Code Address: A5CC9000h Length: 0001394Dh
    Data Address: A5CDD000h Length: 000025FCh
    FPSM.NLM Novell Floating-Point Support Module for NLMs [debugging, 0A10]
    Version 5.90.01 December 12, 2000
    Code Address: A2E26000h Length: 0000003Ch
    Data Address: 00000000h Length: 00000000h
    LPR2NDPS.NLM NDPS Utility to accept UNIX jobs via LPR
    Version 4.00.06 April 16, 2010
    Code Address: A5CB9000h Length: 00009975h
    Data Address: A2D9B000h Length: 00001AE8h
    NDPSM.NLM NDPS Manager
    Version 3.03.02 May 18, 2010
    Code Address: A2A97000h Length: 00083318h
    Data Address: A5C48000h Length: 00025E80h
    RMANSRVR.NLM NDPS Resource Manager
    Version 3.07.02 March 2, 2010
    Code Address: A5C01000h Length: 0001DE5Fh
    Data Address: A2188000h Length: 00004A24h
    NIPPZLIB.NLM General Purpose ZIP File Library for NetWare
    Version 1.00.01 November 28, 2005
    Code Address: A5BE7000h Length: 00002A23h
    Data Address: A2760000h Length: 00000048h
    ZLIB.NLM ZLIB 1.1.4 General Purpose Compression Library for NetWare
    Version 1.01.04 December 20, 2002
    Code Address: A5BF5000h Length: 0000BAB4h
    Data Address: A273B000h Length: 000014D8h
    BROKER.NLM NDPS Broker
    Version 3.00.12 February 20, 2008
    Code Address: A5B9B000h Length: 0000FFECh
    Data Address: A137A000h Length: 000071A5h
    DBNET6.NLM Debug Network IO Support
    Version 1.45.02 March 16, 2006
    Code Address: A5508000h Length: 0001B831h
    Data Address: A5524000h Length: 000127B8h
    IPMCFG.NLM Web Interface for IP Address Management
    Version 1.01.16 October 22, 2005
    Code Address: A54AC000h Length: 0000A479h
    Data Address: A54B7000h Length: 0000B610h
    NIRMAN.NLM TCPIP - NetWare Internetworking Remote Manager
    Version 1.06.04 September 18, 2007
    Code Address: A2492000h Length: 00060760h
    Data Address: A542C000h Length: 00018FCAh
    TCPSTATS.NLM Web Interface for Protocol Monitoring
    Version 6.50.10 June 20, 2003
    Code Address: A5412000h Length: 0000E5ECh
    Data Address: A1318000h Length: 00005460h
    HWDETECT.NLM Novell Hardware Insertion/Removal Detection
    Version 1.19.05 February 20, 2003
    Code Address: A53E2000h Length: 00002B33h
    Data Address: A0F11000h Length: 00000D3Ch
    IPPSRVR.NLM Novell iPrint Server
    Version 4.02.02 June 16, 2010
    Code Address: A39CF000h Length: 00017550h
    Data Address: A39E7000h Length: 000081F8h
    DPLSV386.NLM NetWare 6.x Distributed Print Library - DPLSV386
    Version 1.15.03 April 16, 2010
    Code Address: A2FF3000h Length: 000541E9h
    Data Address: A39A8000h Length: 0000C724h
    NIPPED.NLM NetWare 5.x, 6.x INF File Editing Library - NIPPED
    Version 1.03.09 February 26, 2010
    Code Address: A1571000h Length: 00005345h
    Data Address: A398C000h Length: 0000016Ch
    DPRPCNLM.NLM Novell NDPS RPC Library NLM
    Version 3.00.17 October 10, 2006
    Code Address: A1547000h Length: 00005324h
    Data Address: A13DB000h Length: 00001F20h
    MONITOR.NLM NetWare Console Monitor
    Version 12.02.02 April 4, 2006
    Code Address: A38FD000h Length: 00022BEFh
    Data Address: A1312000h Length: 00005F15h
    NWSNUT.NLM NetWare NLM Utility User Interface
    Version 7.00.01 July 11, 2008
    Code Address: A38CC000h Length: 000134EBh
    Data Address: A38E1000h Length: 00000790h
    ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
    Version 2.00.63 April 25, 2008
    Code Address: A3200000h Length: 000009F9h
    Data Address: A3201000h Length: 00000438h
    ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
    Version 2.00.63 April 25, 2008
    Code Address: A31E1000h Length: 000009F9h
    Data Address: A31E2000h Length: 00000438h
    REWRITE.NLM Apache 2.0.63 Rewrite Module
    Version 2.00.63 April 25, 2008
    Code Address: A15A1000h Length: 00006C99h
    Data Address: A31DB000h Length: 00001EA8h
    HEADERS.NLM Apache 2.0.63 Headers Module
    Version 2.00.63 April 25, 2008
    Code Address: A31BE000h Length: 00000E39h
    Data Address: A31BF000h Length: 00000538h
    EXPIRES.NLM Apache 2.0.63 Expires Module
    Version 2.00.63 April 25, 2008
    Code Address: A31BA000h Length: 00000B89h
    Data Address: A31BB000h Length: 00000388h
    MOD_IPP.NLM iPrint Module
    Version 1.00.04 June 7, 2006
    Code Address: A31B4000h Length: 00000B76h
    Data Address: A31B5000h Length: 000004CCh
    AUTHLDDN.NLM LdapDN Module
    Version 1.00 November 9, 2005
    Code Address: A31AF000h Length: 00001926h
    Data Address: A31B1000h Length: 00000EC8h
    UTILLDP2.NLM LdapDN Module
    Version 1.00 November 9, 2005
    Code Address: A1544000h Length: 00002A56h
    Data Address: A3194000h Length: 00001E80h
    JNET.NLM Java jnet (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: A153D000h Length: 0000653Eh
    Data Address: A318E000h Length: 00001100h
    MOD_JK.NLM Apache 2.0 plugin for Tomcat
    Version 1.02.23 April 25, 2008
    Code Address: A315B000h Length: 00025B33h
    Data Address: A3181000h Length: 0000CDD0h
    LIBGCC_S.NLM gcc runtime and intrinsics support
    Version 3.04.03 April 29, 2005
    Code Address: A13B5000h Length: 00004ABCh
    Data Address: A1086000h Length: 00000A74h
    AUTHLDAP.NLM Apache 2.0.63 LDAP Authentication Module
    Version 2.00.63 April 25, 2008
    Code Address: 9D909000h Length: 00001BB9h
    Data Address: 9EC05000h Length: 000019D0h
    UTILLDAP.NLM Apache 2.0.63 LDAP Authentication Module
    Version 2.00.63 April 25, 2008
    Code Address: A12A0000h Length: 000034A9h
    Data Address: A12A4000h Length: 00002598h
    TSAFS.NLM SMS - File System Agent for NetWare 6.X
    Version 6.53.03 October 16, 2008
    Code Address: A1467000h Length: 0005F9A2h
    Data Address: A14C7000h Length: 0000D7B0h
    SMDR.NLM SMS - Storage Data Requestor
    Version 6.58.01 October 16, 2008
    Code Address: A101B000h Length: 00047EF8h
    Data Address: A1364000h Length: 0000D8E0h
    SMSUT.NLM SMS - Utility Library for NetWare 6.X
    Version 1.01.03 June 26, 2008
    Code Address: A12CB000h Length: 00010201h
    Data Address: A12DC000h Length: 00001DF0h
    LLDAPX.NLM NetWare Extension APIs for LDAP SDK (LibC version)
    Version 3.05.01 October 26, 2010
    Code Address: A1297000h Length: 0000754Ch
    Data Address: A129F000h Length: 00000F70h
    LLDAPSSL.NLM NetWare SSL Library for LDAP SDK (LibC version)
    Version 3.05.01 October 26, 2010
    Code Address: A109B000h Length: 0009CD03h
    Data Address: A1138000h Length: 0002FFD0h
    APACHE2.NLM Apache Web Server 2.0.63
    Version 2.00.63 April 25, 2008
    Code Address: A0EBF000h Length: 00039D29h
    Data Address: A0EF9000h Length: 00011A9Ch
    APRLIB.NLM Apache Portability Runtime Library 0.9.17
    Version 0.09.17 April 25, 2008
    Code Address: A0E4E000h Length: 0002E688h
    Data Address: A0E7D000h Length: 00008088h
    SASL.NLM Simple Authentication and Security Layer 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: A0CA6000h Length: 00000C7Ch
    Data Address: A0CA7000h Length: 00000160h
    LBURP.NLM LDAP Bulkload Update/Replication Protocol service extension for Novell eDirectory 8.8.
    Version 20504.02 May 24, 2010
    Code Address: A0CA3000h Length: 0000111Ch
    Data Address: A0CA5000h Length: 00000444h
    LDAPXS.NLM (Clib version)
    Version 3.05.01 October 26, 2010
    Code Address: A0C9B000h Length: 000047F3h
    Data Address: A0CA0000h Length: 000008FCh
    NMASLDAP.NLM NMAS LDAP Extensions 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: A07EC000h Length: 00004E5Ch
    Data Address: A0C6D000h Length: 000007D0h
    SEG.NLM NetWare Memory Analyzer
    Version 2.00.25 April 27, 2009
    Code Address: A0C03000h Length: 00032CB4h
    Data Address: A0C36000h Length: 0001C656h
    AFREECON.NLM AdRem Free Remote Console (NCPE)
    Version 6.00 February 28, 2006
    Code Address: A0801000h Length: 00005A8Dh
    Data Address: A0807000h Length: 00002490h
    RCONAG6.NLM RConsole Agent for Netware
    Version 6.11 November 20, 2007
    Code Address: A0425000h Length: 00006C5Bh
    Data Address: 9EEC0000h Length: 00003304h
    SAS.NLM Secure Authentication Services
    Version 1.75 March 13, 2004
    Code Address: A0864000h Length: 00056640h
    Data Address: A0B8B000h Length: 0001E890h
    NLDAP.NLM LDAP Agent for Novell eDirectory 8.8 SP5
    Version 20506.05 December 30, 2010
    Code Address: A091C000h Length: 0008F8BBh
    Data Address: A09AC000h Length: 00052D20h
    PMPORTAL.NLM NetWare License Information Portal
    Version 2.16 November 21, 2003
    Code Address: 9FD18000h Length: 000071C9h
    Data Address: 9FD20000h Length: 00004360h
    NDSIMON.NLM NDS iMonitor 8.8.5 SP5
    Version 20506.01 December 24, 2010
    Code Address: A02D0000h Length: 00113D69h
    Data Address: 9FC46000h Length: 00091E24h
    LANGMANI.NLM Novell Cross-Platform Language Manager
    Version 20504.01 May 24, 2010
    Code Address: 9F92A000h Length: 000040F2h
    Data Address: 9EC71000h Length: 00001084h
    XI18N.NLM Novell Cross-Platform Internationalization Package
    Version 10310.53 August 2, 2005
    Code Address: A0ABE000h Length: 0001CA12h
    Data Address: 9F753000h Length: 00007EC8h
    PORTAL.NLM Novell Remote Manager NLM
    Version 4.03 September 22, 2008
    Code Address: A0540000h Length: 0010147Ch
    Data Address: 9FBDC000h Length: 00069EA4h
    NWIDK.NLM CDWare Volume Module
    Version 3.01.01 September 19, 2003
    Code Address: 9EF30000h Length: 00004640h
    Data Address: 9EFF9000h Length: 00000730h
    BTCPCOM.NLM BTCPCOM.NLM v7.90.000, Build 253
    Version 7.90 July 9, 2003
    Code Address: 9ED88000h Length: 00004450h
    Data Address: 9EF96000h Length: 00000CECh
    HTTPSTK.NLM Novell Small Http Interface
    Version 4.03 September 4, 2008
    Code Address: 9FFB3000h Length: 000317C6h
    Data Address: 9FFE5000h Length: 00019C10h
    WSPSSL.NLM NetWare Winsock Service 1.0 NLM for SSL
    Version 6.26 December 4, 2007
    Code Address: 9FEEF000h Length: 00008AFFh
    Data Address: 9FEF8000h Length: 0001095Fh
    NILE.NLM Novell N/Ties NLM ("") Release Build with symbols
    Version 7.00.01 August 20, 2007
    Code Address: 9EDC3000h Length: 00090A31h
    Data Address: 9FE99000h Length: 00030C70h
    PKI.NLM Novell Certificate Server
    Version 3.33 April 16, 2009
    Code Address: 9F79D000h Length: 0017C9E5h
    Data Address: 9ECAA000h Length: 00092270h
    PKIAPI.NLM Public Key Infrastructure Services
    Version 2.23.10 November 20, 2004
    Code Address: 9FE61000h Length: 00037721h
    Data Address: 9ECA3000h Length: 00006A14h
    NWUTIL.NLM Novell Utility Library NLM (_NW65[SP7]{""})
    Version 3.00.02 August 20, 2007
    Code Address: 9FE13000h Length: 0000EE40h
    Data Address: 9FE22000h Length: 00023BD4h
    NWBSRVCM.NLM NWBSRVCM.NLM v7.90.000, Build 230
    Version 7.90 March 20, 2001
    Code Address: 9EBB4000h Length: 00006776h
    Data Address: 9FDCA000h Length: 00000AD0h
    VOLSMS.NLM NSS Distributed Volume Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9FD48000h Length: 00018771h
    Data Address: 9D8FD000h Length: 00001780h
    VLRPC.NLM DFS Volume Location Database (VLDB) RPC interface (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EBA4000h Length: 00003383h
    Data Address: 9FD45000h Length: 000002FDh
    VMRPC.NLM DFS Volume Manager RPC interface (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EB83000h Length: 00003703h
    Data Address: 9FD43000h Length: 000002FDh
    JSTCP.NLM Jetstream TCP Transport Layer (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EDBD000h Length: 000050F0h
    Data Address: 9FB0F000h Length: 000001E0h
    JSMSG.NLM Jetstream Message Layer (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EDB6000h Length: 00006E80h
    Data Address: 9FAF2000h Length: 00000220h
    DFSLIB.NLM DFS Common Library (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9F680000h Length: 000005C3h
    Data Address: 9F681000h Length: 00000080h
    NLSTRAP.NLM NetWare License Server Trap
    Version 5.02 February 19, 2004
    Code Address: 9E448000h Length: 0000298Ah
    Data Address: 9F1F9000h Length: 00000695h
    ZIP.NLM Java zip (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F667000h Length: 0000ADCCh
    Data Address: 9D972000h Length: 00001C90h
    JVMLIB.NLM Java jvmlib (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F62C000h Length: 00017134h
    Data Address: 9F644000h Length: 00008670h
    VERIFY.NLM Java verify (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F5D5000h Length: 000087B4h
    Data Address: 9D4B1000h Length: 00001BC0h
    JVM.NLM Java Hotspot 1.4.2_18 Interpreter
    Version 1.43 October 16, 2008
    Code Address: 9F230000h Length: 00222FFFh
    Data Address: 9F064000h Length: 00065A60h
    LIBPERL.NLM Perl 5.8.4 - Script Interpreter and Library
    Version 5.00.05 September 13, 2005
    Code Address: 9F0EE000h Length: 000B3D60h
    Data Address: 9F1A2000h Length: 0001ADE0h
    IPMGMT.NLM TCPIP - NetWare IP Address Management
    Version 1.03.01 May 29, 2007
    Code Address: 9EA5B000h Length: 000307CDh
    Data Address: 9EA8C000h Length: 0000D778h
    JSOCK6X.NLM NetWare 6.x Support For Java Sockets (JDK 1.4.2)
    Version 1.43 October 16, 2008
    Code Address: 9EA47000h Length: 0000FDB1h
    Data Address: 9EA57000h Length: 00002C44h
    JAVA.NLM java.nlm (based on 1.4.2_18) Build 08101613
    Version 1.43 October 16, 2008
    Code Address: 9E99D000h Length: 000385DEh
    Data Address: 9E9D6000h Length: 0003DD40h
    JSOCK.NLM Support For Java Sockets (loader)
    Version 1.43 October 16, 2008
    Code Address: 9E97C000h Length: 00000086h
    Data Address: 9E97D000h Length: 00000064h
    CRLSM.NLM Challenge Response LSM v2.8.1.0
    Version 2.08.01 October 28, 2008
    Code Address: 9E926000h Length: 00021E46h
    Data Address: 9E948000h Length: 00009456h
    LCMCIFS2.NLM Windows Native File Access Login Methods (Build 83 SP)
    Version 2.00.09 July 25, 2005
    Code Address: 9E862000h Length: 0000E011h
    Data Address: 9E871000h Length: 000016B0h
    LSMCIFS2.NLM Windows Native File Access Login Methods (Build 94 SP)
    Version 2.00.07 July 25, 2005
    Code Address: 9E834000h Length: 0000F051h
    Data Address: 9E844000h Length: 000017B0h
    LSMAFP3.NLM Macintosh Native File Access Login Methods (Build 106 SP)
    Version 2.00.11 January 3, 2005
    Code Address: 9E80D000h Length: 0000F24Eh
    Data Address: 9E81D000h Length: 000013C0h
    NMASGPXY.NLM NMAS Generic Proxy 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 9E7EA000h Length: 0000159Ch
    Data Address: 9E7EC000h Length: 000000E0h
    VMWTOOL.NLM VMware Tools
    Version 1.01 May 24, 2010
    Code Address: 9E795000h Length: 0001F9A0h
    Data Address: 9E7B5000h Length: 00019A20h
    PWDLCM.NLM Novell Simple Password Proxy LCM 2.8.2.1 20090422
    Version 28210904.22 April 22, 2009
    Code Address: 9E764000h Length: 0000E228h
    Data Address: 9E773000h Length: 000014B0h
    PWDLSM.NLM Novell Simple Password LSM 2.8.2.1 20090422
    Version 28210904.22 April 22, 2009
    Code Address: 9E720000h Length: 00010538h
    Data Address: 9E731000h Length: 00001A60h
    ACPISBD.NLM System Bus Driver for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 9DA39000h Length: 00002BBAh
    Data Address: 9E6F4000h Length: 000004E1h
    NCM.NLM Novell Configuration Manager
    Version 1.15.01 October 20, 2004
    Code Address: 9E6ED000h Length: 000054CCh
    Data Address: 9E6F3000h Length: 00000FB0h
    LSMCIFS.NLM NMAS Login Server Module for CIFS - MS Windows File System for NetWare
    Version 1.20 March 5, 2003
    Code Address: 9E6A0000h Length: 0000EB2Ah
    Data Address: 9E6AF000h Length: 00001610h
    SLPTCP.NLM SERVICE LOCATION TCP/UDP INTERFACE (RFC2165/RFC2608)
    Version 2.13 November 15, 2005
    Code Address: 9DA32000h Length: 0000386Ah
    Data Address: 9E60F000h Length: 0000108Ch
    NSPDNS.NLM NetWare Winsock 2.0 NSPDNS.NLM Name Service Providers
    Version 6.20.03 September 8, 2003
    Code Address: 9DA36000h Length: 00002527h
    Data Address: 9E604000h Length: 000004E4h
    WSPIP.NLM NetWare Winsock Service 1.0 NLM for TCP and UDP
    Version 6.24 December 4, 2007
    Code Address: 9E4B3000h Length: 000124C4h
    Data Address: 9DA2F000h Length: 0000287Ch
    NCPIP.NLM NetWare NCP Services over IP
    Version 6.02.01 September 30, 2008
    Code Address: 9E41C000h Length: 000168E9h
    Data Address: 9DA23000h Length: 00003540h
    BSDSOCK.NLM Novell BSDSOCK Module (Domestic)
    Version 6.92.02 December 23, 2009
    Code Address: 9E38A000h Length: 00012099h
    Data Address: 9E39D000h Length: 0000C0E0h
    TCPIP.NLM Novell TCP/IP/IPSec Module (Domestic) NICI Enabled
    Version 6.92.02 September 30, 2009
    Code Address: 9D9A3000h Length: 00078AB4h
    Data Address: 9D468000h Length: 000405F0h
    TCP.NLM Novell TCP/IP Stack - Transport module (Domestic)
    Version 6.92.05 December 23, 2009
    Code Address: 9DB5A000h Length: 00025862h
    Data Address: 9DB80000h Length: 00082F60h
    NETLIB.NLM Novell TCPIP NETLIB Module
    Version 6.50.22 February 12, 2003
    Code Address: 9DA7C000h Length: 00005AACh
    Data Address: 9DA82000h Length: 000D0710h
    CSLIND.NLM TCPIP CSL INDEPENDENCE MODULE 7Dec99 7Dec99
    Version 4.21 December 7, 1999
    Code Address: 9D97D000h Length: 000003CCh
    Data Address: 9D97E000h Length: 000024E0h
    E1000.LAN Intel(R) PRO/1000 PCI/PCI-X Network Connections Driver
    Version 8.24 December 22, 2005
    Code Address: 9D84B000h Length: 00016B5Dh
    Data Address: 006A7000h Length: 00009973h
    ETHERTSM.NLM Novell Ethernet Topology Specific Module
    Version 3.90 March 20, 2006
    Code Address: 9D847000h Length: 000024CEh
    Data Address: 9D84A000h Length: 000002BCh
    MSM.NLM Novell Multi-Processor Media Support Module
    Version 4.12 August 22, 2007
    Code Address: 9D831000h Length: 0000E5B3h
    Data Address: 9D840000h Length: 00003DFCh
    LSAPI.NLM NLS LSAPI Library
    Version 5.02 January 7, 2003
    Code Address: 9D817000h Length: 0000A51Bh
    Data Address: 9D822000h Length: 00001B00h
    NLSAPI.NLM NLSAPI
    Version 5.02 August 7, 2003
    Code Address: 9D7EB000h Length: 000124DBh
    Data Address: 9D740000h Length: 000022A4h
    NLSLSP.NLM NLS - License Service Provider
    Version 5.02 May 25, 2005
    Code Address: 9D74E000h Length: 0006DF03h
    Data Address: 9D7BC000h Length: 000205DCh
    CSL.NLM NetWare Call Support Layer For NetWare
    Version 2.06.02 January 13, 2000
    Code Address: 9D71A000h Length: 0000CB32h
    Data Address: 90203000h Length: 000028F4h
    BTRIEVE.NLM BTRIEVE.NLM v7.90.000
    Version 7.90 March 21, 2001
    Code Address: 8FEF1000h Length: 000013BFh
    Data Address: 8FEF3000h Length: 00000980h
    NWMKDE.NLM NWMKDE.NLM v7.94.251.000
    Version 7.94 December 11, 2001
    Code Address: 8FCB5000h Length: 00053D55h
    Data Address: 9D127000h Length: 0000F784h
    NWENC103.NLM NWENC103.NLM v7.90.000 (Text Encoding Conversion Library)
    Version 7.90 February 24, 2001
    Code Address: 8FEA0000h Length: 0004D0F5h
    Data Address: 9CF76000h Length: 001B0208h
    NWAIF103.NLM nwaif103.nlm v7.94, Build 251 ()
    Version 7.94 November 30, 2001
    Code Address: 9CF5C000h Length: 00010E51h
    Data Address: 8FC86000h Length: 00006828h
    PSVCS.NLM Portability Services
    Version 251.00 November 30, 2001
    Code Address: 9CF25000h Length: 0001270Fh
    Data Address: 9CF38000h Length: 00009464h
    NWUCMGR.NLM NWUCMGR.NLM v1.5 Build 230
    Version 1.05 March 14, 2001
    Code Address: 9CEF5000h Length: 0000D920h
    Data Address: 8FC49000h Length: 000078D4h
    SPMDCLNT.NLM Novell SPM Client for DClient 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 9CE6F000h Length: 000145E8h
    Data Address: 8F9DB000h Length: 00001370h
    NPKIAPI.NLM Public Key Infrastructure Services
    Version 3.33 April 16, 2009
    Code Address: 9CE17000h Length: 00038627h
    Data Address: 9CE50000h Length: 0001E73Fh
    LDAPSDK.NLM LDAP SDK Library (Clib version)
    Version 3.05.02 October 26, 2010
    Code Address: 9CDF5000h Length: 00021500h
    Data Address: 8F4FE000h Length: 000065ADh
    SNMP.NLM Netware 4.x/5.x/6.x SNMP Service
    Version 4.18 July 25, 2006
    Code Address: 9CDB2000h Length: 00013E90h
    Data Address: 8F432000h Length: 00003220h
    TLI.NLM NetWare Transport Level Interface Library
    Version 4.30.02 December 19, 2000
    Code Address: 8F423000h Length: 00003859h
    Data Address: 8F427000h Length: 00000164h
    Global Code Address: 8F428000h Length: 00001000h
    Global Data Address: 8F429000h Length: 00002000h
    DHOST.NLM Novell DHost Portability Interface 1.0.0 SMP
    Version 10010.97 September 18, 2006
    Code Address: 8F224000h Length: 00006621h
    Data Address: 8F0CD000h Length: 0000234Ch
    CONLOG.NLM System Console Logger
    Version 3.01.02 August 8, 2006
    Code Address: 8EF13000h Length: 0000243Ch
    Data Address: 8EF16000h Length: 00001CE0h
    NPKIT.NLM Public Key Infrastructure Services
    Version 3.33 April 16, 2009
    Code Address: 9028C000h Length: 0002E5BEh
    Data Address: 902BB000h Length: 000166ABh
    LLDAPSDK.NLM LDAP SDK Library (LibC version)
    Version 3.05.02 October 26, 2010
    Code Address: 90269000h Length: 00022600h
    Data Address: 8EF0A000h Length: 000065C0h
    NSPNDS.NLM NetWare Winsock 2.0 NSPNDS.NLM Name Service Provider
    Version 6.20 November 12, 2001
    Code Address: 896E7000h Length: 00006547h
    Data Address: 88206000h Length: 00000518h
    DS.NLM Novell eDirectory Version 8.8 SP5 SMP
    Version 20506.07 March 18, 2011
    Code Address: 8FF37000h Length: 002CBA43h
    Data Address: 8F338000h Length: 0008D794h
    ROLLCALL.NLM RollCall NLM (101, API 1.0)
    Version 5.00 July 27, 1998
    Code Address: 80133000h Length: 0000055Dh
    Data Address: 88258000h Length: 000002D4h
    NTLS.NLM NTLS 2.0.5.0 based on OpenSSL 0.9.7m
    Version 20510.01 March 11, 2009
    Code Address: 8F44B000h Length: 000A72C6h
    Data Address: 8FEFD000h Length: 0003915Fh
    DSLOG.NLM DS Log for Novell eDirectory 8.8.0
    Version 20219.15 May 12, 2009
    Code Address: 8EEFC000h Length: 00003CCFh
    Data Address: 8966E000h Length: 0000B06Ch
    SPMNWCC.NLM Novell SPM Client for NWCC 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 8FA66000h Length: 00011688h
    Data Address: 8FA78000h Length: 00001340h
    NMAS.NLM Novell Modular Authentication Service 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 8F1C9000h Length: 0005AB78h
    Data Address: 8FA54000h Length: 0000D5A0h
    GAMS.NLM Graded Authentication Management Service
    Version 2.00.01 September 2, 2008
    Code Address: 8FA44000h Length: 0000DFC7h
    Data Address: 8FA52000h Length: 00001348h
    NDSAUDIT.NLM Directory Services Audit
    Version 2.09 May 22, 2003
    Code Address: 8FA33000h Length: 00010844h
    Data Address: 8EEF6000h Length: 00002ED0h
    SAL.NLM Novell System Abstraction Layer Version 8.8.0
    Version 20504.01 May 24, 2010
    Code Address: 8F9FC000h Length: 000086E6h
    Data Address: 8FA05000h Length: 00001554h
    NICISDI.NLM Security Domain Infrastructure
    Version 27610.01.01 March 30, 2009
    Code Address: 8F9BD000h Length: 0000ADA2h
    Data Address: 006A5000h Length: 00001320h
    SASDFM.NLM SAS Data Flow Manager
    Version 27610.01.01 March 30, 2009
    Code Address: 8F9A0000h Length: 000040AEh
    Data Address: 32D56000h Length: 00000980h
    CALNLM32.NLM NetWare NWCalls Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F971000h Length: 0001CEB9h
    Data Address: 8F25F000h Length: 00000510h
    POLIMGR.NLM NetWare License Policy Manager
    Version 6.27 November 3, 2005
    Code Address: 8F918000h Length: 00013F5Ch
    Data Address: 8F92C000h Length: 00008E90h
    TIMESYNC.NLM NetWare Time Synchronization Services
    Version 6.61.01 October 14, 2005
    Code Address: 8F8EF000h Length: 0000E13Ch
    Data Address: 8F835000h Length: 00004240h
    CLXNLM32.NLM NetWare NWCLX Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F833000h Length: 000011F3h
    Data Address: 8F245000h Length: 000001B0h
    DSAPI.NLM NetWare NWNet Runtime Library
    Version 6.00.04 January 27, 2006
    Code Address: 8F243000h Length: 00000043h
    Data Address: 8F244000h Length: 00000024h
    DSEVENT.NLM NetWare DSEvent Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F241000h Length: 00000633h
    Data Address: 8F242000h Length: 00000034h
    NETNLM32.NLM NetWare NWNet Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F8B9000h Length: 00035B77h
    Data Address: 8F82A000h Length: 00004DA5h
    NCPNLM32.NLM NetWare NWNCP Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F899000h Length: 0001F473h
    Data Address: 00000000h Length: 00000000h
    CLNNLM32.NLM NetWare NWClient Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F824000h Length: 00001CC2h
    Data Address: 8F240000h Length: 00000150h
    CLIB.NLM (Legacy) Standard C Runtime Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F85B000h Length: 0001898Eh
    Data Address: 8EEA4000h Length: 00002FB0h
    NIT.NLM NetWare Interface Tools Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F83E000h Length: 0001C694h
    Data Address: 8F23E000h Length: 00000690h
    NLMLIB.NLM Novell NLM Runtime Library
    Version 5.90.15 March 10, 2008
    Code Address: 8F7F5000h Length: 000263EDh
    Data Address: 8EE9D000h Length: 000038C0h
    STREAMS.NLM NetWare STREAMS PTF
    Version 6.00.06 May 4, 2005
    Code Address: 8F7DA000h Length: 0001206Dh
    Data Address: 8F7ED000h Length: 000010A0h
    Global Code Address: 8F23D000h Length: 00001000h
    REQUESTR.NLM Novell NCP Requestor for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F7A0000h Length: 00020DE3h
    Data Address: 8F7C1000h Length: 000010D0h
    THREADS.NLM Novell Threads Package for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F775000h Length: 00018CF8h
    Data Address: 8F78E000h Length: 000116A0h
    LIB0.NLM Novell Ring 0 Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F506000h Length: 000250EAh
    Data Address: 8F52C000h Length: 00228070h
    MASV.NLM Mandatory Access Control Service
    Version 2.00.01 September 2, 2008
    Code Address: 8F1B6000h Length: 00012386h
    Data Address: 8EE91000h Length: 000023A0h
    NSPSLP.NLM NetWare Winsock 2.0 NSPSLP.NLM Name Service Provider
    Version 6.20.04 December 6, 2007
    Code Address: 8F119000h Length: 00005ED3h
    Data Address: 8F11F000h Length: 00000B30h
    PMLODR.NLM PMLodr for NW65
    Version 1.26 October 7, 2005
    Code Address: 8F123000h Length: 0000E63Ah
    Data Address: 8F132000h Length: 00001658h
    SLP.NLM SERVICE LOCATION PROTOCOL (RFC2165/RFC2608)
    Version 2.13 November 15, 2005
    Code Address: 8F0EC000h Length: 0001A658h
    Data Address: 8F107000h Length: 00005384h
    CCS.NLM Controlled Cryptography Services from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8F081000h Length: 00019EE4h
    Data Address: 006A2000h Length: 00002F90h
    DSLOADER.NLM Novell eDirectory Version 8.8.5 Loader SMP
    Version 20506.07 March 18, 2011
    Code Address: 8F002000h Length: 0000CB1Ch
    Data Address: 8F00F000h Length: 00001720h
    XENGUSC.NLM NICI U.S./Worldwide XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFEE000h Length: 00000058h
    Data Address: 00000000h Length: 00000000h
    XNGAUSC.NLM NICI U.S./Worldwide XMGR Assistant XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFBB000h Length: 000153E4h
    Data Address: 00098000h Length: 00004864h
    XENGEXP.NLM NICI Import Restricted XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8961D000h Length: 00050DD4h
    Data Address: 0068D000h Length: 00014C3Ch
    XENGNUL.NLM NICI NULL XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFAE000h Length: 00001DC9h
    Data Address: 32EC4000h Length: 00000860h
    XMGR.NLM NICI XMGR from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EE2D000h Length: 00025F01h
    Data Address: 00682000h Length: 0000AA10h
    XSUP.NLM NICI XSUP from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EDB8000h Length: 00006EF2h
    Data Address: 0065E000h Length: 00023170h
    XIM.XLM Novell NICI Signed Loader
    Version 27510.02.01 August 25, 2008
    Code Address: 8ED56000h Length: 0002C680h
    Data Address: 00656000h Length: 00007CE4h
    WS2_32.NLM NetWare Winsock 2.0 NLM
    Version 6.24.01 February 14, 2008
    Code Address: 8E5C0000h Length: 00037F28h
    Data Address: 8E5F8000h Length: 00011B84h
    NCP.NLM NetWare Core Protocol (NCP) Engine
    Version 5.61.01 September 30, 2008
    Code Address: 8E577000h Length: 00026DEFh
    Data Address: 8E59E000h Length: 00018B24h
    QUEUE.NLM NetWare Queue Services NLM
    Version 5.60 May 24, 2001
    Code Address: 8E56E000h Length: 00006D8Dh
    Data Address: 8E575000h Length: 00000473h
    VDISK.NLM NetWare Virtual Disk
    Version 1.00 November 30, 2004
    Code Address: 8E52A000h Length: 00001FEEh
    Data Address: 8E52D000h Length: 00001160h
    NWTERMIO.NLM NetWare Terminal Emulation
    Version 1.00 September 11, 2006
    Code Address: 89DB8000h Length: 00007570h
    Data Address: 89DC0000h Length: 00004560h
    MALHLP.NLM NSS Configure help messages (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89547000h Length: 000000BAh
    Data Address: 89548000h Length: 0000002Ah
    CDDVD.NSS NSS Loadable Storage System (LSS) for CD/UDF (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89DC9000h Length: 00014B00h
    Data Address: 89972000h Length: 00001050h
    NSSIDK.NSS NSS Pool Configuration Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 8943D000h Length: 000039C5h
    Data Address: 89544000h Length: 00000090h
    PARTAPI.NLM Partition APIs for NetWare 6.1
    Version 2.00 April 17, 2002
    Code Address: 89543000h Length: 00000007h
    Data Address: 00000000h Length: 00000000h
    VOLMN.NSS NSS Distributed Volume Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89D99000h Length: 0000A6A3h
    Data Address: 8953C000h Length: 000005B0h
    NWSA.NSS NSS NetWare Semantic Agent (NWSA) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 898B3000h Length: 0004ADEEh
    Data Address: 89CE6000h Length: 000A1390h
    ZLSS.NSS NSS Journaled Storage System (ZLSS) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89C0C000h Length: 000CD166h
    Data Address: 89CDA000h Length: 0000BE30h
    MAL.NSS NSS Media Access Layer (MAL) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89439000h Length: 00003196h
    Data Address: 89531000h Length: 00000170h
    MANAGE.NSS NSS Management Functions (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89914000h Length: 0004F275h
    Data Address: 8952F000h Length: 00000C20h
    COMN.NSS NSS Common Support Layer (COMN) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 899F5000h Length: 000EF408h
    Data Address: 89AE5000h Length: 00015E50h
    NSS.NLM NSS (Novell Storage Services) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 8978E000h Length: 00030420h
    Data Address: 8949D000h Length: 00091830h
    SYSLOG.NLM NetWare Logfile Daemon
    Version 6.05.03 October 22, 2007
    Code Address: 89417000h Length: 0000616Ah
    Data Address: 89727000h Length: 00026140h
    LIBNSS.NLM Generic Library used by NSS (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89428000h Length: 0000464Ch
    Data Address: 8949C000h Length: 000003D0h
    NSSWIN.NLM NSS ASCI Window API Library (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89423000h Length: 000047DCh
    Data Address: 8949A000h Length: 000000FCh
    LOCNLM32.NLM NetWare NWLocale Runtime Library
    Version 6.00.04 November 29, 2005
    Code Address: 89412000h Length: 000044BBh
    Data Address: 89499000h Length: 00000B30h
    UNICODE.NLM NetWare Unicode Runtime Library (UniLib-based) [optimized]
    Version 7.00 October 26, 2004
    Code Address: 89619000h Length: 000016F5h
    Data Address: 89466000h Length: 00000504h
    FILESYS.NLM NetWare File System NLM
    Version 5.14 April 16, 2008
    Code Address: 89567000h Length: 0008E4E7h
    Data Address: 895F6000h Length: 00012C90h
    LFS.NLM NetWare Logical File System NLM
    Version 5.12 September 21, 2005
    Code Address: 89481000h Length: 000098A2h
    Data Address: 8948B000h Length: 000084BCh
    CONNMGR.NLM NetWare Connection Manager NLM
    Version 5.60.01 September 7, 2006
    Code Address: 89443000h Length: 0001172Bh
    Data Address: 89402000h Length: 00003CE8h
    ACPIPWR.NLM ACPI Power Management Driver for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 89421000h Length: 00000C9Ah
    Data Address: 89422000h Length: 00000904h
    ACPICMGR.NLM ACPI Component Manager for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 89400000h Length: 00000A6Fh
    Data Address: 89401000h Length: 000002F4h
    LSIMPTNW.HAM LSI Corporation Common Architecture NWPA-HAM SAS/Fibre/SCSI Driver.
    Version 5.03.01 January 23, 2008
    Code Address: 89396000h Length: 00033686h
    Data Address: 00A40000h Length: 0000787Eh
    SCSIHD.CDM Novell NetWare SCSI Fixed Disk Custom Device Module
    Version 3.03.10 May 30, 2008
    Code Address: 89380000h Length: 00005523h
    Data Address: 00A4B000h Length: 000017C0h
    ACPIDRV.PSM ACPI Platform Support Module for ACPI compliant systems
    Version 1.05.19 January 16, 2007
    Code Address: 89339000h Length: 0000AD1Eh
    Data Address: 00A4D000h Length: 0000C694h
    ACPICA.NLM ACPI Component Architecture for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 892BD000h Length: 0002BA90h
    Data Address: 892E9000h Length: 00011C74h
    ACPIASL.NLM ACPI Architecture Services Layer for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 88DE1000h Length: 00000F9Bh
    Data Address: 88DE2000h Length: 0000019Ch
    CIOS.NLM Consolidated IO System
    Version 1.60 February 12, 2008
    Code Address: 89230000h Length: 00042C15h
    Data Address: 31961000h Length: 00008B4Ah
    LSL.NLM Novell NetWare Link Support Layer
    Version 4.86 February 2, 2006
    Code Address: 88DE4000h Length: 0000A7A7h
    Data Address: 88DEF000h Length: 00009EC8h
    NWPALOAD.NLM NetWare 5 NWPA Load Utility
    Version 3.00 July 10, 2000
    Code Address: 88D08000h Length: 00000007h
    Data Address: 00000000h Length: 00000000h
    NWPA.NLM NetWare 6.5 NetWare Peripheral Architecture NLM
    Version 3.21.02 October 29, 2008
    Code Address: 88CE5000h Length: 00016C82h
    Data Address: 8823A000h Length: 00002A5Ch
    MM.NLM ENG TEST - NetWare 6.5 Media Manager
    Version 3.22.08 April 24, 2009
    Code Address: 88D1A000h Length: 0004C524h
    Data Address: 88C90000h Length: 0000B84Ch
    SGUID.NLM NetWare GUID Services
    Version 6.01 September 27, 2002
    Code Address: 88C8E000h Length: 00000E04h
    Data Address: 88C8F000h Length: 0000018Ah
    NBI.NLM NetWare Bus Interface
    Version 3.01.01 July 13, 2007
    Code Address: 88C80000h Length: 0000D72Dh
    Data Address: 88233000h Length: 00003D8Dh
    NEB.NLM Novell Event Bus
    Version 5.60 September 27, 2004
    Code Address: 88CA6000h Length: 00005843h
    Data Address: 88316000h Length: 0000097Ch
    DIAG500.NLM Diagnostic/coredump utility for NetWare 6.x
    Version 3.04.03 October 31, 2007
    Code Address: 88C06000h Length: 00007FC0h
    Data Address: 88C0F000h Length: 0001DF84h
    CPUCHECK.NLM NetWare Processor Checking Utility
    Version 5.60.01 December 6, 2007
    Code Address: 88344000h Length: 00001B5Ch
    Data Address: 88CAE000h Length: 00004B3Ch
    NWKCFG.NLM NetWare Kernel Config NLM
    Version 2.16 June 24, 2005
    Code Address: 88228000h Length: 00003F4Fh
    Data Address: 8822C000h Length: 00003CA4h
    CDBE.NLM NetWare Configuration DB Engine
    Version 6.01 September 21, 2006
    Code Address: 88995000h Length: 000116E6h
    Data Address: 889A7000h Length: 000161FAh
    FATFS.NLM FAT Filesystem Module for NetWare
    Version 1.24 August 27, 2007
    Code Address: 8844F000h Length: 00020526h
    Data Address: 88470000h Length: 0002B32Fh
    LIBC.NLM Standard C Runtime Library for NLMs [optimized, 7]
    Version 9.00.05 October 3, 2008
    Code Address: 8834B000h Length: 000D0CD6h
    Data Address: 80140000h Length: 000415E0h
    PVER500.NLM NetWare 6.XX Version Library
    Version 3.00 February 1, 2007
    Code Address: 80135000h Length: 00000837h
    Data Address: 80136000h Length: 000003DCh
    SERVER.NLM NetWare Server Operating System
    Version 5.70.08 October 3, 2008
    Code Address: 00201020h Length: 0016A000h
    Data Address: 00401020h Length: 00216FE0h
    Memory at EAX
    Invalid dump address
    Memory at EBX
    Invalid dump address
    Memory at ECX
    Invalid dump address
    Memory at EDX
    00090009 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090019 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090029 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090039 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090049 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090059 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090069 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090079 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090089 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090099 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900A9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900B9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900C9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900D9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900E9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900F9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    Memory at ESI
    Invalid dump address
    Memory at EDI
    A00D19D8 A52305C0 A52305C0-00000000 00000000 %#.@ %#.@ .... ....
    A00D19E8 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D19F8 00000000 00000000-72687470 20646165 .... .... rhtp dae
    A00D1A08 6574756D 00000078-00000000 00000000 etum ...x .... ....
    A00D1A18 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A28 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A38 00000000 00000000-893CA160 A00D1B04 .... .... .<!` ...
    A00D1A48 A00D1984 0000008F-00000001 00000000 ... .... .... ....
    A00D1A58 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A68 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A78 00000000 34343434-1515071E 00000000 .... 4444 .... ....
    A00D1A88 A52305C0 00000000-000052E6 00000000 %#.@ .... ..Rf ....
    A00D1A98 00000000 A00D1A98-00000000 00000000 .... ... .... ....
    A00D1AA8 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1AB8 00000000 00000000-72687470 20646165 .... .... rhtp dae
    A00D1AC8 6574756D 00000078-00000000 00000000 etum ...x .... ....
    Memory at EBP
    FBF138DB 6E72654B 64206C65-63657465 20646574 nreK d le cete det
    FBF138EB 61206E61 6D657474-64657470 6E6F6320 a na mett detp noc
    FBF138FB 74786574 69777320-20686374 61206E69 txet iws hct a ni
    FBF1390B 504D206E 6146204B-57207473 002E4454 PM n aF K W ts ..DT
    FBF1391B 616E550A 20656C62-61206F74 636F6C6C anU. elb a ot coll
    FBF1392B 20657461 6F6D656D-66207972 6420726F eta omem f yr d ro
    FBF1393B 20617461 65657274-0A000A73 61766E49 ata eert ...s avnI
    FBF1394B 2064696C 6E616853-206E6F6E 6146202D dil nahS non aF -
    FBF1395B 54206F6E 0A656572-65520A00 70206461 T on .eer eR.. p da
    FBF1396B 20747361 20646E65-7220666F 20646165 tsa dne r fo dae
    FBF1397B 66667562 000A7265-7272450A 2520726F ffub ..re rrE. % ro
    FBF1398B 65722064 6E696461-6F732067 65637275 er d nida os g ecru
    FBF1399B 6C696620 43000A65-00344D4F 434F4C43 lif C..e .4MO COLC
    FBF139AB 4C00244B 2044414F-6F72705B 74636574 L.$K DAO orp[ tcet
    FBF139BB 5D6E6F69 61705B20-6C5D6874 6164616F ]noi ap[ l]ht adao
    FBF139CB 5F656C62 75646F6D-5B20656C 61726170 _elb udom [ el arap
    Memory at ESP
    8FD9DE9C FBF138DB A00D19E0-00000006 A00D19C0 {q8[ ..` .... ..@
    8FD9DEAC 002186BC 00000001-A00D19E0 A00D19D8 .!.< .... ..` ..X
    8FD9DEBC 00000006 A00D19C0-002064BC A00D19E4 .... ..@ . d< ..d
    8FD9DECC A00D1A40 8FD9DEF0-00000000 04B4E504 ..@ .Y^p .... .4e.
    8FD9DEDC 9D96379C 883E6AC9-A00D19C0 04B4E504 ..7. .>jI ..@ .4e.
    8FD9DEEC 00000006 8FD9DEFC-9EDD3AF1 9D96379C .... .Y^| .]:q ..7.
    8FD9DEFC 8FD9DF20 9EDE3ABF-00000009 00000009 .Y_ .^:? .... ....
    8FD9DF0C 9FE9C114 000000F6-9FEC9448 8FD9DF24 .iA. ...v .l.H .Y_$
    8FD9DF1C 04B4E504 8FD9DF48-9EDE3B44 00000009 .4e. .Y_H .^;D ....
    8FD9DF2C 00000009 9FE9C114-000000F6 00000000 .... .iA. ...v ....
    8FD9DF3C 9FEC9448 04B4E504-00000006 8FD9DF70 .l.H .4e. .... .Y_p
    8FD9DF4C 9EDE00AF 04B6E43C-FFFFFFFF 00000009 .^./ .6d< .... ....
    8FD9DF5C 9FE9C114 000000F6-9FEC9448 04B4E504 .iA. ...v .l.H .4e.
    8FD9DF6C 04B4E504 8FD9DF80-9EDE7A81 04B6E404 .4e. .Y_. .^z. .6d.
    8FD9DF7C 00000002 8FD9DF94-9EDE7A2A 046B3A84 .... .Y_. .^z* .k:.
    8FD9DF8C 9EDF8F2C 00000000-8FD9DFA8 9EDF3660 ._., .... .Y_( ._6`
    Stack Walk
    Current EIP: 0021AB7A SERVER.NLM|ProcessSchedulerAbendTriggers+82
    Stack Contents
    8FD9DEAC 002186BC SERVER.NLM|SchedSwitch+48
    8FD9DEB0 00000001
    8FD9DEC4 002064BC SERVER.NLM|kMutexLock+1AC
    8FD9DEE0 883E6AC9 LIBC.NLM|pthread_mutex_lock+A9
    8FD9DEF4 9EDD3AF1 NILE.NLM|SSL_library_init+26C
    8FD9DEF8 9D96379C A00D19C0 4E8B2056 20500124 8B244811 @.. V .N$.P .H$.
    8FD9DEFC 8FD9DF20 8FD9DF48 9EDE3B44 00000009 00000009 H_Y.D;^.........
    8FD9DF00 9EDE3ABF NILE.NLM|CRYPTO_lock+8F
    8FD9DF04 00000009
    8FD9DF08 00000009
    8FD9DF0C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF10 000000F6
    8FD9DF24 9EDE3B44 NILE.NLM|CRYPTO_add_lock+5A
    8FD9DF28 00000009
    8FD9DF2C 00000009
    8FD9DF30 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF34 000000F6
    8FD9DF4C 9EDE00AF NILE.NLM|RSA_free+2E
    8FD9DF50 04B6E43C 00000001 00000006 00000000 00000000 ................
    8FD9DF54 FFFFFFFF
    8FD9DF58 00000009
    8FD9DF5C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF60 000000F6
    8FD9DF74 9EDE7A81 NILE.NLM|EVP_PKEY_free+97
    8FD9DF78 04B6E404 00000000 00000000 9FEAF3AC 00000008 ........,sj.....
    8FD9DF7C 00000002
    8FD9DF84 9EDE7A2A NILE.NLM|EVP_PKEY_free+40
    8FD9DF88 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
    8FD9DF8C 9EDF8F2C C90CC483 55C3C9C3 5653E589 8310EC83 .D.ICICU.eSV.l..
    8FD9DF98 9EDF3660 NILE.NLM|PKCS7_DIGEST_free+35
    8FD9DF9C 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
    8FD9DFA0 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFAC 9EDF8E7A NILE.NLM|ASN1_item_ex_free+2A6
    8FD9DFB0 00000003
    8FD9DFB4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9DFB8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFF0 9EDF8F2C NILE.NLM|ASN1_template_free+8A
    8FD9DFF4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9DFF8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFFC 00000000
    8FD9E014 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
    8FD9E018 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9E01C 9FE9B6C4 00000000 00000000 00000018 9FE9B627 ............'6i.
    8FD9E020 0000000A
    8FD9E054 9EDF8F2C NILE.NLM|ASN1_template_free+8A
    8FD9E058 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E05C 9FE9B720 00000001 00000010 9FE9B64C 0000000A ........L6i.....
    8FD9E060 00000000
    8FD9E078 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
    8FD9E07C 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E080 9FE9B768 00000000 00000000 00000000 9FE9B754 ............T7i.
    8FD9E084 0000000A
    8FD9E0B8 9EDF8BCD NILE.NLM|ASN1_item_free+11
    8FD9E0BC 8FD9E0D0 04622844 9FE9B7AC 8FD9E0F0 9EDD8B5E D(b.,7i.p`Y.^.].
    8FD9E0C0 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
    8FD9E0C4 00000000
    8FD9E0CC 9EDD7D2F NILE.NLM|X509_free+10
    8FD9E0D0 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E0D4 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
    8FD9E0D8 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
    8FD9E0DC 9EDD8B5E NILE.NLM|ssl_cert_free+8E
    8FD9E0E0 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E0E4 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
    8FD9E0F4 9EDD09AF NILE.NLM|SSL_CTX_free+D1
    8FD9E0F8 046F6964 046F6984 00000000 00000000 00000000 .io.............
    8FD9E0FC 55325B84 00000020 00908E64 9EDC3710 00000000 ...d....7\.....
    8FD9E108 9EDC4825 NILE.NLM|SSLDeRegister+A5
    8FD9E10C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
    8FD9E118 9FEF5542 WSPSSL.NLM|WSPSSL_deleteSktProc+1D2
    8FD9E11C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
    8FD9E134 9FEEFE5A WSPSSL.NLM|SSLMapSessnReleaseWTD+EE
    8FD9E138 9EBBE8A0 00000000 8E7792A0 00000080 0000000A .... .w.........
    8FD9E154 9FEEFD8D WSPSSL.NLM|SSLMapSessnReleaseWTD+21
    8FD9E158 8E7792A0 9FEF83CC 9FEF8430 00000001 00000000 L.o.0.o.........
    8FD9E164 00361298 SERVER.NLM|kDoFastWorkToDo+28
    8FD9E168 9FD2D020 00000000 9FEEFD6C 9FD74C00 00000000 ....l}n..LW.....
    8FD9E184 0022476C SERVER.NLM|kWorkToDoCheckAllRunFast+A4
    8FD9E19C 00224EE8 SERVER.NLM|MpkSystemWork+68
    8FD9E1A8 002181C4 SERVER.NLM|SchedThreadYield+340
    8FD9E1BC 003615F1 SERVER.NLM|TimerInterruptHandlerBackEnd+9A
    8FD9E260 00000000
    EIP invalid.
    Novell Open Enterprise Server, NetWare 6.5
    PVER: 6.50.08
    Server N05 halted Wednesday, November 23, 2011 10:35:58.629 am
    Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
    Registers:
    CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
    EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
    ESI = 00000006 EDI = 9FE40018 EBP = FBF138DB ESP = A4930264
    EIP = 002231BA FLAGS = 00000002
    002231BA 83C404 ADD ESP, 00000004
    EIP in SERVER.NLM at code start +00019B5Ah
    The violation occurred while processing the following instruction:
    002231BA 83C404 ADD ESP, 00000004
    002231BD 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
    , 00000000
    002231C4 7482 JZ 00223148
    002231C6 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
    002231CD 0F84D5000000 JZ 002232A8
    002231D3 85DB TEST EBX, EBX
    002231D5 0F84BA000000 JZ 00223295
    002231DB 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
    002231E1 53 PUSH EBX
    002231E2 E8AF38EFFF CALL LOADER.NLM|Abend
    Running process: Apache_Worker 66 Process
    Thread Owned by NLM: APACHE2.NLM
    Stack pointer: A4931E20
    OS Stack limit: A4922FC0
    CPU 0 (Thread A4921600) is in a NO SLEEP state
    Scheduling priority: 67371008
    Wait state: 5050010 Blocked on a Mutex
    Stack: --FBF138DB ?
    --9FE40020 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --9FE40000 ?
    00220CFC (SERVER.NLM|SchedSwitch+48)
    --00000001 (LOADER.NLM|KernelAddressSpace+1)
    --9FE40020 ?
    --9FE40018 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --9FE40000 ?
    0020EAFC (SERVER.NLM|kMutexLock+1AC)
    --9FE40024 ?
    --9FE40080 ?
    --A49302B8 ?
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04719004 ?
    --9D9A589C ?
    883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
    --9FE40000 ?
    --04719004 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A49302C4 ?
    9F92FAF1 (NILE.NLM|SSL_library_init+26C)
    --9D9A589C ?
    --A49302E8 ?
    9F93FABF (NILE.NLM|CRYPTO_lock+8F)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --A49302EC ?
    --04719004 ?
    --A4930310 ?
    9F93FB44 (NILE.NLM|CRYPTO_add_lock+5A)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --04719004 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A4930338 ?
    9F93C0AF (NILE.NLM|RSA_free+2E)
    --046F21BC ?
    --FFFFFFFF ?
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --04719004 ?
    --04719004 ?
    --A4930348 ?
    9F943A81 (NILE.NLM|EVP_PKEY_free+97)
    --046F2184 ?
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --A493035C ?
    9F943A2A (NILE.NLM|EVP_PKEY_free+40)
    --04790FC4 ?
    9F954F2C (NILE.NLM|ASN1_template_free+8A)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --A4930370 ?
    9F94F660 (NILE.NLM|PKCS7_DIGEST_free+35)
    --04790FC4 ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --047571A4 ?
    --A49303B4 ?
    9F954E7A (NILE.NLM|ASN1_item_ex_free+2A6)
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --046C809C ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --9FD8FB40 ?
    -A0082C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
    -A0082C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
    --9FD8FB40 ?
    --A49303B0 ?
    -A0082C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
    9F94F641 (NILE.NLM|PKCS7_DIGEST_free+16)
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --04772F24 ?
    --047571A4 ?
    --04719004 ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --A49303D8 ?
    9F954F2C (NILE.NLM|ASN1_template_free+8A)
    --046C809C ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04748004 ?
    --00000005 (LOADER.NLM|KernelAddressSpace+5)
    --046C809C ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --A4930418 ?
    9F954E55 (NILE.NLM|ASN1_item_ex

    Maybe Hamish Speirs can explain it - it was his post in another thread that gave me the idea and commands to try (see http://forums.novell.com/forums/nove...r-10038-a.html).
    We had a confluence of changes at the beginning of the semester (Sept) that no doubt helped contribute to the problem and yet also mask the real cause to a certain extent.
    1. The Thawte cert expired and was replaced with a new cert - Thawte does not support doing renewals on NetWare. This happened around the start of Sept.
    2. School semester begins. Thousands of students return.
    3. We use Pcounter for pay-for-print and it uses httpstk to provide a webpage for students to authorize print jobs.
    4. Printing activity in general goes way up.
    5. All printers are Secure.
    6. Apache, iPrint and httpstk all use the same Thawte certificate
    7. The print server was also hosting the netstorage service which also uses the Thawte cert (via apache).
    8. The print server was recently (August) virtualized (via p2v using the excellent Portlock Storage Manager)
    Eventually I built a new NetWare vm to host print services and got a new cert so at least the netstorage and print services were no longer running together. I suspected at that point that the likely source of the abends was NetStorage since Nile and SSL were almost always involved in the abends.
    After the separation the issues continued - so it wasn't netstorage's fault. Desparate searching of the 'net lead to H.'s post. The rest is history!
    It has now been 9 days up uptime without a single nile/ssl related abend ( I had one abend in pcounter but services survived).
    Ron
    "Seasoned Greasings and Happy New Rear!"

  • 6.1 SP 2 certificate authenticator fails with Apache plugin and SSL

    Hi,
    Does anybody have a certificate authenticator working in WebLogic 6.1
    SP 2, in combination with the Apache HTTP Server plugin and SSL?
    We implemented a certificate authenticator that works correctly in
    WebLogic 6.1 SP 2 when we configure SSL with "Client Certificate
    Required", and access it directly from a browser (the browser hits the
    SSL port of the WebLogic server, like 7002).
    This certificate authenticator also works correctly with a proxy web
    server. We set up a Stronghold server (web server based on Apache) on
    Linux with the Apache HTTP Server plugin from BEA, configured the
    plugin to use SSL, and configured our WebLogic 6.1 SP 1 server without
    "Client Certificate Required". The certificate authenticator gets the
    end user's certificate correctly.
    This same architecture with the proxy web server does not work when we
    upgrade the WebLogic Server to SP 2. WebLogic Server logs the
    "incorrect or missing client cert" error, our certificate
    authenticator is never called, and the browser gets a 401 Unauthorized
    error.
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). So it appears to us that the plugin encodes the
    certificate in the request header in such a way that a SP 1 server can
    extract it, but an SP 2 server cannot. We were wondering whether
    there might be changes to the plugin to stay in step with the SP 2
    server that never got ported to Linux, or whether an updated Linux
    plugin never got included in the installer packages.
    So: has anybody gotten a system like
    Apache/Stronghold + WebLogic Plugin <-- SSL --> WebLogic 6.1 SP 2 +
    Cert Auth
    to work?
    Thanks in advance for any help,
    Jim Doyle
    [email protected]

    A correction, I think:
    Now that I rolled back a system to 6.1 SP 1, it looks like 6.1 SP 1
    does include a different mod_wl_ssl.so from that in SP 2. I believe I
    was comparing the wrong file. In fact, trying to compare versions of
    the mod_wl_ssl.so makes things rather confusing:
    A mod_wl_ssl.so from a straight weblogic610sp2_generic.zip install has
    a cksum of "1853014778 1132467".
    A mod_wl_ssl.so from a weblogic610sp1_generic.zip install with a
    subsequent SP 2 upgrade install has a cksum of "1350917183 1147927".
    A mod_wl_ssl.so from a plain 6.1 install with subsequent SP 1 and SP 2
    upgrade installs, followed by an SP 2 uninstall and another SP 1
    upgrade install, has a cksum of "1471948065 1136501".
    I think I may be looking at three different plugin versions here: 6.1,
    6.1 SP 1, and 6.1 SP 2, assuming the upgrade installs don't actually
    change mod_wl_ssl.so. I'm not sure whether there's an easier way to
    verify what version of the plugin you have.
    In any case, we did try each plugin version, and none of them works
    against a 6.1 SP 2 WebLogic server.
    Jim
    [email protected] (Jim Doyle) wrote in message news:<[email protected]>...
    [snip]
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). [snip]

  • Apache proxy and SSL

    Hi,
    I've been trying to set up the Apache proxy plug-in on Linux to handle SSL.
    However, there seems to be no documentation on this and among the many
    threads about this dilema, no one seems to have a solution. Can BEA post
    any documentation on this subject to clarify things?
    In case anyone has found a solution or is able to help, I was able to
    successfully proxy JSP requests to Weblogic using the mod_wl.so. However,
    when I swapped this for mod_wl_ssl.so, Apache never reached the Weblogic
    again. It seemed to look into its own root directory to locate and JSP file
    (of course, it's not going to find it there) and reported a 404 back.
    Here's a snippet of the Apache httpd.conf file, hopefully you can see
    something fishy.
    ############################Begin .conf
    LoadModule weblogic_module modules/mod_wl_ssl.so
    <Location /weblogic>
    SetHandler weblogic-handler
    # Of course, we tried toggling this value too, but no luck
    # PathTrim /weblogic
    </Location>
    <Files *.jsp>
    SetHandler weblogic-handler
    </Files>
    <IfModule mod_weblogic.c>
    WebLogicCluster [IP1]:7001,[IP2]:7001
    </IfModule>
    ##############################End of .conf
    Any help is greatly appreciated.
    Thanks,
    -Vu

    ok, we recompiled Apache, and now it works fine.
    "Vu Nguyen" <[email protected]> wrote in message
    news:3a2ea2bc$[email protected]..
    Hi,
    I've been trying to set up the Apache proxy plug-in on Linux to handleSSL.
    However, there seems to be no documentation on this and among the many
    threads about this dilema, no one seems to have a solution. Can BEA post
    any documentation on this subject to clarify things?
    In case anyone has found a solution or is able to help, I was able to
    successfully proxy JSP requests to Weblogic using the mod_wl.so. However,
    when I swapped this for mod_wl_ssl.so, Apache never reached the Weblogic
    again. It seemed to look into its own root directory to locate and JSPfile
    (of course, it's not going to find it there) and reported a 404 back.
    Here's a snippet of the Apache httpd.conf file, hopefully you can see
    something fishy.
    ############################Begin .conf
    LoadModule weblogic_module modules/mod_wl_ssl.so
    <Location /weblogic>
    SetHandler weblogic-handler
    # Of course, we tried toggling this value too, but no luck
    # PathTrim /weblogic
    </Location>
    <Files *.jsp>
    SetHandler weblogic-handler
    </Files>
    <IfModule mod_weblogic.c>
    WebLogicCluster [IP1]:7001,[IP2]:7001
    </IfModule>
    ##############################End of .conf
    Any help is greatly appreciated.
    Thanks,
    -Vu

  • Apache-Mod_jk-Tomcat and SSL certificate

    Hi all.
    I have Apache 2.0.55 working with Tomcat 5.5 via mod_jk connector.
    I have generated a self-signed cerificate for Apache using openssl, and I use it to encrypt both URLs served by Apache and URLs served by Tomcat through mod_jk.
    When a "https URL" is forwarded to Tomcat, an exception is thrown by the webapp, unless the certificate has not been set as "trusted" on Tomcat side.
    So, it seems like I have to do the following:
    1) generate a a self-signed cerificate for Apache using openssl.
    2) import this certificate in a keystore
    3) set the keystore as trusted (System.setProperty("javax.net.ssl.trustStore", PATH_TO_KEYSTORE));
    I'm wondering if there's a better way to accomplish that, not forcing me to do all this steps and, above all, allowing me to "break" the link between the apache cert and the tomcat keystore.
    Any help will be very appreciated!

    usually u generate a keystore for client, and mention that in ur SSL connector of tomcat
    in apache, we need to configure things in ssl.conf

  • Apache and ssl

    Hi gurus,
    I know this is not the rite place to post this issue.But i gues someone has faced this problem.
    I want to configure ssl on Apache
    if there are any good documents or steps please let me know..
    I already have a certificate,genetrated by CA
    So i just need to configure http.conf file and ssl.conf..
    I have configured Appche and OAS10g,my url opens with default apache port now just want this configuration for https,want configure basically 443 port
    please help
    Thanks in Advance
    Fabian

    Hi Fabs,
    Bhai Try this one...
    Unsecuring the AS Control Application
    To unsecure the AS Control, follow these steps:
    1.     Stop the AS Control $ emctl stop iasconsole
    2.     Update AS Control's standalone OC4J container to support unsecure port in $ORACLE_HOME/sysman/j2ee/config/emd-web-site.xml
    Change the following line:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="true">
    Into:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="false">
    3.     In the same file (emd-web-site.xml), you also need to modify the ssl-config section at the bottom of the file
    Change the following line:
    <ssl-config needs-client-auth="true" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    Into:
    <ssl-config needs-client-auth="false" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    4.     Update AS Control Local Management Agent to support the unsecure HTTP protocol.
    The EMD_URL property in $ORACLE_HOME/sysman/config/emd.properties needs to get switched back to the HTTP (non-secure) protocol.
    Change:
    EMD_URL=https://<hostname>:<port>/emd/main
    Into:
    EMD_URL=http://<hostname>:<port>/emd/main
    5.     Update the standAloneConsoleURL property of oracle_ias target.
    Edit the file $ORACLE_HOME/sysman/emd/targets.xml to change the StandaloneConsoleURL property of oracle_ias target to switch back to the HTTP (non-secure) protocol.
    Change the following lines:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="https://<hostname>:<port>/emd/console"/>
    Into:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="http://<hostname>:<port>/emd/console"/>
    6.     Start the AS Control Application: $ emctl start iasconsole
    thanks,
    Santosh.

  • Apache reverse proxy and SSL termination

    Hi Guru's
        Can anyone tell me, how to do SSL termination at apache reverse proxy. I am using apache reverse proxy for accesing portal from internet. Apache is configured for SSL and portal is NON SSL.
    I am using header variable login module in portal. i wanted to terminate SSL at apache reverse proxy and then all traffic after that should be clear text.
    should i maitain any property. is there any documentation for it.
    Please help me
    Tom

    The majority of the work here is around configuring your Web Dispatcher and Apache Reverse proxy. The work on the portal is straight forward enabling of SSL.
    You can follow http://help.sap.com/saphelp_nw2004s/helpdata/en/f1/2de3be0382df45a398d3f9fb86a36a/frameset.htm for setting this up.
    what level I need to configure SSL and how do I proceed in both scenarios?
    Your question itself says where you need SSL. SSL is required where ever you need HTTPS communication.
    how do I proceed in both scenarios?
    From a portal perspective, the configuration should remain the same.
    Do I have to install SSL at portal, web dispatcher or at Apache level?
    SSL needs to be configured at all the 3 levels if you are looking at end to end SSL implementation.
    See the following for possible SSL implementation options:
    http://help.sap.com/saphelp_nw04/helpdata/en/d8/a922d7f45f11d5996e00508b5d5211/frameset.htm
    https://cw.sdn.sap.com/cw/docs/DOC-115509
    Will SSL termination work for scenario 2?
    Yes this should work - see http://help.sap.com/saphelp_nw2004s/helpdata/en/36/fd39eacf4cde4a8fe32d7f29b3db16/frameset.htm
    However in case of SSL Termination, the request to your portal from the web dispatcher will be sent as HTTP.
    I would recommend you to take a step by step (backward approach).
    First, enable SSL on your portal and make sure it works - going directly to the server.
    Then, you can introduce the Web Dispatcher - and test if every thing works going through the web dispatcher.
    Finally - you can test the end to end flow - with your Reverse proxy involved.
    - Shanti

  • Securing file download with standard web security and ssl

    Hi,
    I want to put some files for download in my webapp. At the same time, I want to protect these files using standard servlet security and ssl. So I added <security-constraint> in my web.xml and configured tomcat to allow SSL connection. Now I got the files protected as I expected. When I try to access the file directly from browser, tomcat shows me the login page. However, after correct login, I.E. pops up an error saying something like "Internet Explorer cannot download XXX from XXX. The file could not be written to the cache.". The log file showed the following exception:
    javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1154)
         at com.sun.net.ssl.internal.ssl.AppInputStream.available(AppInputStream.java:40)
         at org.apache.tomcat.util.net.TcpConnection.shutdownInput(TcpConnection.java:90)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:752)
         at org.apache.tomcat.util.net.PoolTcpEndpoint.processSocket(PoolTcpEndpoint.java:526)
         at org.apache.tomcat.util.net.LeaderFollowerWorkerThread.runIt(LeaderFollowerWorkerThread.java:80)
         at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:684)
         at java.lang.Thread.run(Thread.java:595)
    Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:166)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1476)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1443)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1407)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:64)
         at org.apache.coyote.http11.InternalOutputBuffer.realWriteBytes(InternalOutputBuffer.java:747)
         at org.apache.tomcat.util.buf.ByteChunk.flushBuffer(ByteChunk.java:403)
         at org.apache.coyote.http11.InternalOutputBuffer.endRequest(InternalOutputBuffer.java:400)
         at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:961)
         at org.apache.coyote.Response.action(Response.java:182)
         at org.apache.coyote.Response.finish(Response.java:304)
         at org.apache.catalina.connector.OutputBuffer.close(OutputBuffer.java:281)
         at org.apache.catalina.connector.Response.finishResponse(Response.java:473)
         at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:151)
         at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:825)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:738)
         ... 4 more
    Caused by: java.net.SocketException: Connection reset by peer: socket write error
         at java.net.SocketOutputStream.socketWrite0(Native Method)
         at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:92)
         at java.net.SocketOutputStream.write(SocketOutputStream.java:136)
         at com.sun.net.ssl.internal.ssl.OutputRecord.writeBuffer(OutputRecord.java:283)
         at com.sun.net.ssl.internal.ssl.OutputRecord.write(OutputRecord.java:272)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:663)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:59)
         ... 15 more
    I've tried separating concerns, for example protect files but not require SSL, and enable SSL but do not protect files. Both works respectively but not together. I also tried using a download4j's DownloadServlet. Still doesn't work.
    Have any of you encouter the same situation? If so, could you enlight me what I did wrong? It maybe just a simple SSL configuration or something. Thanks in advance!
    Jack

    My environment setup is:
    JDK 1.5.01
    Tomcat 5.5.7
    For downloading files, I just use plain old <a href> method. I simply right-click the link and choose "save target as...".
    Thanks,
    Jack

  • Need some help with Apache vhost. Access a server on network.

    Not sure if this can be done. But here is my case:
    Me and my colleague is writing some database applications for out employer. And this server runs Apache, PHP and MySQL.
    We want to be able to access different vhosts using just the post after the server local IP-address. (I.e., 10.0.2.242:8080).
    Because we want to use the same server for different projects, but we need some way to split this. And so far, a port name is the best.
    Another way would be to use the DNS server, and redirect any request for example.com to that particular server. but since we have started to use OpenDNS, that can't be done.
    My question is, can't this be achived? If I type 10.0.2.242:8080, i can be directed to /srv/http/test_vhost, where /srv/http is the server root.
    Any reply is much apprecited. Since I could find an answear on Google.
    Birger

    MindTooth wrote:I run Windows at work. But I think I know to set a hosts different.
    IIRC, C:\Windows\System32\drivers\etc\hosts
    MindTooth wrote:(OpenDNS sucks because? Better then the DNS server located inhouse. It is slooooow. OpenDNS is faster.)
    It can screw you up because it *always* returns an IP address, which isn't so bad for web browsing, but when you're trying to do (or diagnose!) other things it can really screw with you.
    MindTooth wrote:I have tryed it. But when I added :8080 behind the IP, it would not direct to the correct folder.
    Have you uncommented this line in httpd.conf?
    #Include conf/extra/httpd-vhosts.conf

  • Apache XML-RPC & SSL

    I have a client desktop program that should connect to the server via xml-rpc and SSL. I use SecureXmlRpcClient and get the exception while execute method call:
    Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/commons/codec/DecoderException
         at org.apache.xmlrpc.XmlRpc.createTypeFactory(XmlRpc.java:238)
         at org.apache.xmlrpc.XmlRpc.<init>(XmlRpc.java:193)
         at org.apache.xmlrpc.XmlRpcClientResponseProcessor.<init>(XmlRpcClientResponseProcessor.java:48)
         at org.apache.xmlrpc.XmlRpcClientWorker.<init>(XmlRpcClientWorker.java:43)
         at org.apache.xmlrpc.XmlRpcClient.getWorker(XmlRpcClient.java:347)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:190)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:184)
         at org.apache.xmlrpc.XmlRpcClient.execute(XmlRpcClient.java:177)
         at ClientOTK.main(ClientOTK.java:48)
    What does it mean and what should I do ?

    Hi JZ,
    Did you get the answer for your problem? I am using the jars xml-rpc 2.0.1 and common-codec 1.2. I could run the http transaction successfully. But having problem with SSL. I kept getting SocketException :
    java.net.SocketException: Unexpected end of file from server
         at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:818)
         at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:711)
         at sun.net.www.http.HttpClient.parseHTTPHeader(HttpClient.java:816)
         at sun.net.www.http.HttpClient.parseHTTP(HttpClient.java:711)
         at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:635)
         at org.apache.xmlrpc.DefaultXmlRpcTransport.sendXmlRpc(DefaultXmlRpcTransport.java:87)
         at org.apache.xmlrpc.XmlRpcClientWorker.execute(XmlRpcClientWorker.java:72)
    I appreciate the comments to resolve this exception.
    thanks jassi

  • Reverse Proxy Configuration - Apache as an SSL reverse-proxy

    Hi,
    We have EP 6.0 SP 14 installed with SSL configured.
    We are in need to open the application to internet.
    For the same we have set up a reverse proxy server (Apache as SSL
    Reverse Proxy).
    Our requirement is to open the application to the internet with
    web address https://abc.domain.com.
    The issue is we are able to access the application from internet only when
    https://abc.domain.com/irj/potal is typed.
    (ie.) Mapping is working fine for
    https://abc.domain.com/irj/portal to
    our EP Portal address https://abc2.domain.com:50001/irj/portal
    And not working for mapping https://abc.domain.com to our EP Portal
    address https://abc2.domain.com:50001/irj/portal
    We have been working on to resolve this issue for days together but have been really unsuccessful
    Kindly help us in resolving the same asap.
    Note : The references we used are:
    1. SAP's document:
    "Apache Reverse Proxy Configuration for J2ee 6.20 and 6.40 Web Applications"
    2. Weblogs:
    The Reverse Proxy Series -- Part 1: Introduction
    The Reverse Proxy Series -- Part 3: Apache as a reverse-proxy
    The Reverse Proxy Series -- Part 3.1: Apache as an SSL reverse-proxy
    Regards,
    venkat.

    Thanks much for the feedback. We're using the default settings on the HTTP rule we have set up for the portal on the ISA server. We'll be looking into the details of what the default rule settings are, however we did find a note in the Microsoft Knowledge base detailing with the ISA server screening high bits in URL strings for Outlook Web Access (OWA). This generates a similar error message. Here is the link to the detailed note on the Microsoft web site:
    http://support.microsoft.com/?scid=kb;en-us;837865
    Also,we are going to be applying the SP1 upgrade to the ISA server (released in March) to see if this might be some type of issue that may have been identified and corrected by the service pack. We'll see what happens with that.
    One area where we can recreate the problem at will is when we set up the system landscape configuration. We can navigate to a system configuration object, however when we attempt to right click to edit the object we get the error. There are other circumstances where we get errors but that is one that occurs for sure. Anyone have any idea as to what might be special about that type of transaction??
    Thanks again.
    Rich

  • OC4J and SSL

    Hi all,
    I am trying to configure SSL and OC4J (without using Apache!) and am looking for instructions on how to do this. Note that I also don't need the keys to be signed with a certificate either.
    Please let me know what I have to do to accomplish this.
    thanks.
    -Jason

    Hi,
    I have followed these instructions, but could you look at
    SSL config on Standalone OC4J
    my problem is described in this thread.
    Thanks in advance,
    Rémy

  • Applet and SSL

    Hi guys,
    I need to download an applet (and then use it!) from an Apache Web Server + SSL (mod_ssl).
    This is my "quest":
    If I configure in mod_ssl.conf
    # SSLVerifyClient require
    # SSLVerifyDepth 1
    I can load my applet and I can use it with SSL without(!) problem.
    But if I configure in mod_ssl.conf
    SSLVerifyClient require
    SSLVerifyDepth 1
    my browser can't load the applet and launch this exception
    java.net.SocketException: Software caused connection abort: JVM_recv in socket input stream read
    at java.net.SocketInputStream.socketRead0(Native Method)
    at java.net.SocketInputStream.read(Unknown Source)
    at com.sun.net.ssl.internal.ssl.InputRecord.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.InputRecord.read(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.HandshakeOutStream.flush(DashoA6275)
    at com.sun.net.ssl.internal.ssl.Handshaker.sendChangeCipherSpec(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.g(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(DashoA6275)
    at com.sun.net.ssl.internal.ssl.Handshaker.process_record(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275)
    at com.sun.net.ssl.internal.ssl.AppOutputStream.write(DashoA6275)
    at java.io.OutputStream.write(Unknown Source)
    Where's my error?
    Is it necessary sign the applet?
    Thanks

    Is your browser IE6 ?
    I've got the same ...
    If you have the answer please e-mail me.
    [email protected]
    thanks

  • Apex Listener/Apache Tomact and filenames with spaces

    I've installed the Apex Listener with Apache Tomcat, and all seems to work fine. Except when I try to do a CSV file data upload via the utilities screen in apex. If the filename/directory path contains spaces, then Apex reports "File Must Be Specified" error - yet if I do this same operation via EPG instead of Tomcat, it works. Are there any restrictions in Tomcat to using spaces??

    Look at this thread. Re: File upload problem
    regards.

  • Sql server service wont start after disabling TLS 1.0 and SSL 3.0 on windows

    We have been hardening our servers for some time now and recently we disabled SSL 3.0 because of the poodle attack. When I did this on one of our test servers SQL Server failed to start up after the restart.
    I have been able to reproduce this on Windows Server 2012 and Windows 7 by disabling TLS 1.0 and SSL 3.0 through the registry. I am using SQL Server 2012 on the server machine. On my windows 7 machine sql server 2012 and sql server 2005 will not start with
    those disabled.
    These are the event log errors I get: 
    Application Logs: 
    (28/10/2014 8:38:54 AM) SQL Server could not spawn FRunCM thread. Check the SQL Server error log and the Windows event logs for information about possible related problems. 
    (28/10/2014 8:38:54 AM) Could not start the network library because of an internal error in the network library. To determine the cause, review the errors immediately preceding this one in the error log. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x1. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x80. 
    System Logs: 
    (28/10/2014 8:38:54 AM) The SQL Server (MSSQLSERVER) service terminated with service-specific error %%-2146893007. 
    (28/10/2014 8:38:54 AM) A fatal error occurred while creating an SSL server credential. The internal error state is 10013. 
    Done anyone know have we can keep SSL 3.0 and TLS 1.0 disabled and get SQLServer server to start?

    Hi Don,
    I already have TLS 1.0 Disabled to prevent the BEAST exploit. So the values I have for:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Server
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Client
    Both have enabled set to ("Enabled"=dword:00000000).
    If change both of these back to ("Enabled"=dword:00000001)
    to enable TLS 1.0, and restart then SQLServer is able to start again. But we are now vulnerable to the BEAST attack once again.
    If I keep server enabled and disable the client or vice versa and restart. Then SQLServer starts but I
    am unable to connect to it. When I check the Event logs I get the same errors as my original past.
    With your last post, do you mean to backup SCHANNEL and delete it so it gets recreated? If that is the case it will probably work because if I re enable SSL 3.0 or TLS 1.0 from here it fix's the issue,  but I then I won't have the exploits patched and
    we need this for some of our customers.
    This is my SCHANNEL Export:
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]
    "Enabled"=dword:00000000

Maybe you are looking for

  • User exit for block changes in PO if movement 101 occured

    Hi, Does anyone knows if there is a user-exit to block changes in the items of a PO, if there was a GR (mov 101) for that item (and considering that didn't was a mov 102 for the same item)? Thanks, Pedro Mariano

  • Select from from T1,T2

    Hi, Can anybody help me how to explain this select on those 2 tables, I'm stuck with line #3, marked with "xxx", is it just for JOIN, no columns select but T2 brought into Select for further predicate evaluation? This is piece of one example, where w

  • Interactive Reporting start-up javascript

    When I have set up some javascript to run when a document opens (On Startup), how can I subsequently edit the code without the script running when I open the document?

  • Massive entry into S_TCODE

    Hi experts, I have ti insert about 1500 transactions in S_TCODE object. I want to know if there is a transaction to enter into a role so many transactions, from txt file using the upload. Best regards S.

  • DSN Connection with Go Daddy Account

    Can anyone help me with creating a DSN in Dreamweaver for a Go Daddy Account? The DSN is already created on Go Daddy, which is named access_DataSource.dsn and is located in a folder called _dsn. I also have an Access DB named DataSource.mdb located i