welcome hpws docs hp-ux webservers home contact hp support
hp logo - invent  hp-ux web server suite

Release Notes HP-UX Web Server Suite

TABLE OF CONTENTS

Overview What's New - HP-UX Apache-based Web Server - HP-UX Tomcat-based Servlet Engine - HP-UX Webmin-based Admin - HP-UX XML Web Server Tools Documentation Miscellaneous Legal Notices Notes: Please refer to /opt/hpws/LICENSES/ to view HP's license, terms, and warranty for all components.

OVERVIEW

The HP-UX Web Server Suite is a free product that can be downloaded for the HP-UX platform. It includes key software products necessary to deploy, manage, and implement mission critical web servers. The suite is comprised of: HP-UX Apache-based Web Server HP-UX Tomcat-based Servlet Engine HP-UX Webmin-based Admin HP-UX XML Web Server Tools These components are based on software developed by the Apache Software Foundation (http://www.apache.org) and Webmin (http://www.webmin.com/). - HP-UX Apache-based Web Server combines numerous popular modules from other Open Source projects and provides HP value-added features for the HP-UX platform * Scripting capabilities: PHP, mod_perl, CGI * Content management: WebDAV, FrontPage Server Extensions * Security: authentication through an LDAP server, Chrooted environment, SSL and TLS support, Webproxy - HP-UX Webmin-based Admin is a Configuration and Administration GUI with extensive enhancements for the HP-UX Apache-based Web Server. - HP-UX Tomcat-based Servlet Engine provides customers Java-based extensions for dynamic content generation via Servlets and JavaServer Pages (JSPs). - HP-UX XML Web Server Tools is a collection of a Java-based XML tools used for XML parsing, stylesheet and XSL processing, web-publishing and image translating from the open source projects: Xerces, Xalan, Cocoon, FOP and Batik. HP enhances the software in the areas of performance, encryption, reliability, customization and administration. HP ensures the suite of products work together with the HP-UX 11.x operating environment. Additionally Oracle, BEA, Siebel and other application vendors have developed application plug-ins for the HP-UX Web Server Suite. The different components of the HP-UX Web Server Suite have demonstrated leadership in the following areas: Reliability, Availability, Serviceability, Internet and Web Application Services, Scalability, Directory and Security Services. The HP-UX Web Server Suite is supported at no additional charge for customers with HP-UX support agreements. The HP-UX Web Server Suite runs on a wide array of HP hardware to match your workload and cost effectiveness requirements. The suite runs with HP-UX 11.0 and HP-UX 11i on the PA-RISC family of 64-bit RP hardware servers. It also operates with HP-UX 11i on the Intel Itanium 64-bit family of hardware servers. The same HP-UX Web Server Suite runs on both low-end and high-end HP-UX servers to provide you with consistent administration and high returns on your IT investment. For the latest information on the HP-UX Web Server Suite, see http://www.hp.com/go/webserver/

WHAT'S NEW

Depending on what you've chosen to install, the following new features may be available for you. Their respective Release Notes and Admin Guides will provide detail about their features.

HP-UX Apache-based Web Server

This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.59 This version also fixes the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863 - PHP upgraded to 5.2.2 to fix security vulnerabilities More details at http://www.php.net/ChangeLog-5.php#5.2.2 Also this version fixes the following security vulnerabilities: - Fixed an integer overflow inside chunk_split() (CVE-2007-2872) - Fixed possible infinite loop in imagecreatefrompng (CVE-2007-2756) - Fixed ext/filter Email Validation Vulnerability (CVE-2007-1900) - Improved fix for CVE-2007-1887 to work with non-bundled sqlite2 lib - Added mysql_set_charset() to allow runtime altering of connection encoding. - mod_jk upgraded to version 1.2.23, the following security flaws were addressed http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860 - Tomcat upgraded to version 5.5.23 to address the following security vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358 Bug Fixes Apache: - Problem where httpd consumes 100% CPU and stops responding with dbm Cache enabled is fixed - Fixed incorrect path to librt library which was causing PHP binary to crash - A http request with OPTIONS method including cgi path does not extecute the cgi script now - Fixed httpd crashes with SIGBUS/SIGSEGV errors when using mod_ssl with client certificates - mod_cgid looping in the accept() call returning ECONNABORT has been fixed - apachectl script of the webproxy instance is not overwritten during an upgrade - Fixed unresolved symbol issues while loading mod_auth_kerb module on 11.11 Tomcat: - Upgraded commons-pool package to version 1.3 to fix memory leak - Tomcat now displays full path of the requested resource in the 404 Not Found error page Webmin: - Webmin "Update Webmin" button should be grayed out or have warning! Enhancements - Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid For more information on configuring these new directives refer to, Apache Admin Guide - A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid. For more information on configuring this directives refer to, Apache Admin Guide - Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl NOTE: MOD_JK2 is officially unsupported by OpenSource More details are available at: http://tomcat.apache.org/connectors-doc/news/20041100.html This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940 <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937 <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738 <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343 <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339 <a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969">CVE-2005-2969 - PHP upgraded to 5.2.0 - PHP extension, oci8 upgraded to 1.2.2 - Added support for 64bit MySQL extension - Added a new PHP extension, SOAP. - OpenSSL upgraded to 0.9.8d - mod_perl supports perl 5.8.8 - mod_jk upgraded to 1.2.19 - Bug Fixes - CGI process does not get terminated on graceful restart. - httpd's size does not get larger on a graceful restart. - Large POST message handled by cgid daemon. - Apachectl of webproxy not corrupted on an upgrade. - mod_perl returns 404 not found if a page is not found instead of 200 OK. - cgid restarts on killing it in Chroot environment. - php has IPV6 enabled. - Apache on using ldap does not cause a Segmentation fault. - pwck does not throw errors for users of Apache. - Reverse proxy does not cause high CPU utilization. - Included fix for Apache bug #12355. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - Apache upgraded to 2.0.58 The following security vulnerabilities have been fixed in this release. mod_rewrite: Fix an off-by-one security problem in the ldap scheme handling. For some RewriteRules this could lead to a pointer being written out of bounds. Reported by Mark Dowd of McAfee Avert Labs. More details are available at <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">http://cve.mitre.org/cgi-bin/c vename.cgi?name=CVE-2006-3747</a> mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. More details are available at <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">http://cve.mitre.org/cgi-bin/c vename.cgi?name=CVE-2005-3357</a> Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps. More details are available at <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">http://cve.mitre.org/cgi-bin/c vename.cgi?name=CVE-2005-3352</a> - mod_perl supports perl 5.8.7 - mod_jk upgraded to 1.2.15 - mod_jk2 upgraded to 2.0.5 - PHP extension, oci8 upgraded to 1.1 - Bug Fixes Added a new Apache module, mod_auth_kerb. Added a new PHP extension, openssl. Added OCSP support for mod_ssl. auth_ldap is no longer shipped with HP-UX Web Server Suite. mod_perl fixed to display the entire process name on inclusion of <Perl> directive in the configuration file. mod_perl fixed to return "404 OK" when a file is not found. Openldap fixed to prevent core dump on loading and unloading of ldap.sl, a PHP extension. mod_jk2 now recognises ipv6 addresses. The PHP extension pgsql.sl now links to the latest version of libpq. Running multiple instances of Apache has been documented. libtool fixed to not refer to /CLO/BUILD_ENV. SSL admin guide updated with the updatecrl option. mod_ssl doesn't conflict with RSA's sslc library. The correct version of Openssl binary is now displayed on the command prompt. This release of HP-UX Apache-based Server is primarily a security and bug fix release. - The following security vulnerabilities have been fixed in this release. The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390 The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969 - Bug Fixes Apache is fixed to solve the problem of Content-Length header not being present in HEAD response when used as a front-end server mod_perl fixed to honor Perl's $| "OUTPUT_AUTOFLUSH" for STDOUT Apache is fixed to stop without errors in Chrooted environment mod_proxy is fixed to solve the problem of data loss with httpd-2.0.55 reverse proxy method=post. This release of HP-UX Apache-based Web Server is primarily a security and bug fix release. - Apache upgraded to 2.0.55 The following security vulnerabilities have been fixed in this release. Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491 Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268 The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728 Apache 2.0.45 and 1.3.29, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088 - Bug Fixes Added support for Nested mutexes. To enable C++ modules, the following 3 lines must be added to the httpd.conf file, if not present. For 11iv2 IA 64-bit platforms, the directives to load the standard C++ libraries are: LoadFile /usr/lib/hpux64/libunwind.so LoadFile /usr/lib/hpux64/libCsup.so LoadFile /usr/lib/hpux64/libstd_v2.so For 11iv2 IA 32-bit platforms, the directives to load the standard C++ libraries are: LoadFile /usr/lib/hpux32/libunwind.so LoadFile /usr/lib/hpux32/libCsup.so LoadFile /usr/lib/hpux32/libstd_v2.so For all other flavors, the directives to load the classic C++ libraries are provided. LoadFile /usr/lib/libCsup.sl LoadFile /usr/lib/libstream.sl LoadFile /usr/lib/libstd.sl NOTE: To use the LoadFile directive, the following patches are required. For 11iv1: PHSS_30968 - ld(1) and linker tools cumulative patch PHSS_32573 - s700_800 11.11 HP aC++ -AA runtime libraries (aCC A.03.61) For 11.00: PHSS_30969 s700_800 11.00 ld(1) and linker tools cumulative patch PHSS_32574 s700_800 11.X HP aC++ -AA runtime libraries (aCC A.03.61) For 11iv2: No patches are required Please note that the LoadFile directive must precede the LoadModule directive for C++ modules. - Apache upgraded to 2.0.54.02 This release of HP-UX Apache-based Web Server is a bug fix release. mod_ssl in Apache webserver 2.0.54.00 and earlier, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. The MySQL extension for PHP is provided as an external library on HP-UX 11i and HP-UX 11iv2 32 bit versions. Previous releases contained the following security fixes, bug fixes and enhancements: - Apache upgraded to 2.0.54 This release of HP-UX Apache-based Web Server is a bug fix release. - Apache upgraded to 2.0.54 - mod_jk upgraded to 1.2.10 - OpenSSL upgraded to 0.9.7g - mod_perl supports perl 5.8.3 - PHP upgraded to 5.0.4 - Apache upgraded to 2.0.53 Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 Added longuname support. - Added perl 5.8.2 support for mod_perl. - Apache upgraded to 2.0.52 The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786 Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault). More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748 The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809 Vulnerability in Apache 2.0.51 prevents the merging of the Satisfy directive, which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration. More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 - mod_perl upgraded to 1.99_16 - Apache upgraded to 2.0.50 A remotely triggered memory leak in http header parsing can allow a denial of service attack due to excessive memory consumption. [CAN-2004-0493] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493 Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a (trusted) client certificate subject DN which exceeds 6K in length. [CAN-2004-0488] More details are available at http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 - PHP upgraded to 4.3.8 The memory_limit functionality, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete. [CAN-2004-0594] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594 The strip_tags function, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities. [CAN-2004-0595] More details are available at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595 - Apache(mod_ssl): Extended support for 'RequestHeader' directive When the Proxy feature is used, the RequestHeader directive can be used to send any environment variables/values to the backend server. - Apache(mod_ssl): Support for updating CRL without re-starting the web server A new option 'updatecrl' was added to apachectl. This new option will allow to update the Certificate Revocation List without taking down the web server. - Bug fixes: mod_ssl: Fix a SEGV that occurs when small cache size is specified. mod_cgi: Fix a hang problem with scripts that used timeouts (ex. ping) - Apache upgraded to 2.0.49: Apache does not filter terminal escape sequences from error logs, which could make it easier for attackers to insert those sequences into terminal emulators. More details are available at <a href=":">http://cve.mitre.org/">http://cve.mitre.org/: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020"> CAN-2003-0020</a> Starvation issue on listening sockets occurs when a short-lived connection on a rarely-accessed listening socket will cause a child to hold the accept mutex and block out new connections. More details are available at <a href=":">http://cve.mitre.org/">http://cve.mitre.org/: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174"> CAN-2004-0174</a> Memory leak in mod_ssl allows a remote denial of service attack against a SSL-enabled server by sending plain HTTP requests to the SSL port. More details are available at <a href=":">http://cve.mitre.org/">http://cve.mitre.org/: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113"> CAN-2004-0113</a> Mod_ssl is not sending the "Close Notify" alert message before closing the socket SSL variables are not detected correctly in RewriteCond - OpenSSL upgraded to 0.9.7.d The do_change_cipher_spec function in OpenSSL allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that triggers a null dereference. More details are available at <a href=":">http://cve.mitre.org/">http://cve.mitre.org/: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079"> CAN-2004-0079</a> The SSL/TLS handshaking, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service via a crafted SSL/TLS handshake that causes an out-of-bounds read. More details are available at <a href=":">http://cve.mitre.org/">http://cve.mitre.org/: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112"> CAN-2004-0112</a> PKCS7-S/MIME encryption fails with memory fault core dump - C++ plug-in modules C++ plug-in modules on IPF should now be built with the Standard C++ runtime libraries. This is a change from previous versions which used Classic C++ runtime libraries. Plug-ins for PA should continue to use the Classic C++ runtime libraries. From more information see, Apache Admin Guide

HP-UX Tomcat-based Servlet Engine

HP-UX Tomcat-based Servlet Engine 5.5.23: This release of HP-UX Tomcat-based Servlet Engine A.5.5.20.00 contains Tomcat 5.5.20.00 which implements Servlet 2.4 and JSP 2.0 specifications. This release contains Tomcat version 5.5.20.00. Apart from being an implementation of new specifications of Servlet and JSP, it includes several new features, enhancements, performance optimizations, and bug fixes over the previous releases (Tomcat 4.1.x). Bug Fixes - Fixed the tomcat shutdown.sh script to check for the user stopping tomcat. Previous releases contained the following security fixes, bug fixes and enhancements: - Tomcat version upgrade to 4.1.29.06 - Commons-DBCP upgraded to 1.2.1 - Now onwards mod_jk and related configuration files are shipped with HP-UX Apache-based Web Server. - Fix to the Tomcat Admin application that had affected numerous Tomcat administrative tasks. - Tomcat has IPv6 support when used with Java 1.4 JDK. For more information, see Tomcat Admin Guide.

HP-UX Webmin-based Admin

HP-UX Webmin-based Admin A.1.070.10: This release of HP-UX Webmin-based Admin is a bug fix release that addresses the following defects: - Webmin has been fixed to display the correct page after configuring a theme. This release of HP-UX Webmin-based Admin is a security/bug fix release that addresses the following vulnerablilties: - corruption of the SSL virtual server configuration (JAGaf41910). This release also includes enhancements/bug fixes from A.1.070.01 - Disabled read access to module configuration for normal users. - DOS attack(Locking out other users) when logging in using space in username. - Support for 32-bit Apache (if installed) - Backup, version management(RCS) and retrieval of Apache configuration files. - Direct access to launching HP-UX Tomcat-based Servlet Engine invoking Tomcat's Management and Admin tools - Consolidated log display page which now provides a single portal for viewing all log files. - Support for easy management of log rotation - Intuitive server status and info configuration and viewing - Enhanced certificate management including addition of PEM pass phrases to keys and deploying a key/certificate pair to a Virtual Server. - Support for Virtual Host additions and management - Enhanced look and feel (new icons, intuitive forms, Javascript event handlers) - Improved parsing of Apache configuration files to accurately handle directives within Virtual Hosts, Directory, and other containers. - Various bug fixes

HP-UX XML Web Server Tools

HP-UX XML Web Server Tools A.2.02: This release is primarily a version upgrade release: - Xerces-J v. 2.8.0 - Xalan-J v. 2.5.1 - Cocoon v. 2.0.4 - FOP v. 0.20.5 - Batik v. 1.5

DOCUMENTATION

The Release Notes, Admin Guides, User Guides and Migration Guides included in this bundle can be found in /opt/hpws/hp_docs/ Depending on which components are installed, these documents can also be accessd from the following servers if they were started with the default configurations: HP-UX Apache-based Web Server http://yourserver.com/ HP-UX Tomcat-based Servlet Engine http://yourserver.com:8081/ HP-UX Webmin-based Admin http://yourserver.com:10000/ ***************************************************************************