|
Release Notes HP-UX Web Server Suite
TABLE OF CONTENTS
Overview
What's New
- HP-UX Apache-based Web Server
- HP-UX Tomcat-based Servlet Engine
- HP-UX Webmin-based Admin
- HP-UX XML Web Server Tools
Documentation
Miscellaneous
Legal Notices
Notes: Please refer to /opt/hpws/LICENSES/ to view HP's license, terms,
and warranty for all components.
OVERVIEW
The HP-UX Web Server Suite is a free product that can be downloaded for the
HP-UX platform. It includes key software products necessary to deploy, manage,
and implement mission critical web servers. The suite is comprised of:
HP-UX Apache-based Web Server
HP-UX Tomcat-based Servlet Engine
HP-UX Webmin-based Admin
HP-UX XML Web Server Tools
These components are based on software developed by the Apache Software
Foundation (http://www.apache.org) and Webmin (http://www.webmin.com/).
- HP-UX Apache-based Web Server combines numerous popular modules from
other Open Source projects and provides HP value-added features for
the HP-UX platform
* Scripting capabilities: PHP, mod_perl, CGI
* Content management: WebDAV, FrontPage Server Extensions
* Security: authentication through an LDAP server, Chrooted environment,
SSL and TLS support, Webproxy
- HP-UX Webmin-based Admin is a Configuration and Administration GUI with
extensive enhancements for the HP-UX Apache-based Web Server.
- HP-UX Tomcat-based Servlet Engine provides customers Java-based extensions
for dynamic content generation via Servlets and JavaServer Pages (JSPs).
- HP-UX XML Web Server Tools is a collection of a Java-based XML tools used
for XML parsing, stylesheet and XSL processing, web-publishing and image
translating from the open source projects: Xerces, Xalan, Cocoon, FOP and
Batik.
HP enhances the software in the areas of performance, encryption, reliability,
customization and administration. HP ensures the suite of products work
together with the HP-UX 11.x operating environment. Additionally Oracle, BEA,
Siebel and other application vendors have developed application plug-ins for the
HP-UX Web Server Suite. The different components of the HP-UX Web Server Suite
have demonstrated leadership in the following areas: Reliability, Availability,
Serviceability, Internet and Web Application Services, Scalability, Directory
and Security Services. The HP-UX Web Server Suite is supported at no additional
charge for customers with HP-UX support agreements.
The HP-UX Web Server Suite runs on a wide array of HP hardware to match your
workload and cost effectiveness requirements. The suite runs with HP-UX 11.0
and HP-UX 11i on the PA-RISC family of 64-bit RP hardware servers. It also
operates with HP-UX 11i on the Intel Itanium 64-bit family of hardware servers.
The same HP-UX Web Server Suite runs on both low-end and high-end HP-UX servers
to provide you with consistent administration and high returns on your IT
investment.
For the latest information on the HP-UX Web Server Suite, see
http://www.hp.com/go/webserver/
WHAT'S NEW
Depending on what you've chosen to install, the following new features may
be available for you. Their respective Release Notes and Admin Guides will
provide detail about their features.
HP-UX Apache-based Web Server
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- Apache upgraded to 2.0.59
This version also fixes the following security vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863
- PHP upgraded to 5.2.2 to fix security vulnerabilities
More details at http://www.php.net/ChangeLog-5.php#5.2.2
Also this version fixes the following security vulnerabilities:
- Fixed an integer overflow inside chunk_split() (CVE-2007-2872)
- Fixed possible infinite loop in imagecreatefrompng (CVE-2007-2756)
- Fixed ext/filter Email Validation Vulnerability (CVE-2007-1900)
- Improved fix for CVE-2007-1887 to work with non-bundled sqlite2 lib
- Added mysql_set_charset() to allow runtime altering of connection encoding.
- mod_jk upgraded to version 1.2.23, the following security flaws were addressed
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860
- Tomcat upgraded to version 5.5.23 to address the following security vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358
Bug Fixes
Apache:
- Problem where httpd consumes 100% CPU and stops responding with dbm Cache enabled is fixed
- Fixed incorrect path to librt library which was causing PHP binary to crash
- A http request with OPTIONS method including cgi path does not extecute the cgi script now
- Fixed httpd crashes with SIGBUS/SIGSEGV errors when using mod_ssl with client certificates
- mod_cgid looping in the accept() call returning ECONNABORT has been fixed
- apachectl script of the webproxy instance is not overwritten during an upgrade
- Fixed unresolved symbol issues while loading mod_auth_kerb module on 11.11
Tomcat:
- Upgraded commons-pool package to version 1.3 to fix memory leak
- Tomcat now displays full path of the requested resource in the 404 Not Found error page
Webmin:
- Webmin "Update Webmin" button should be grayed out or have warning!
Enhancements
- Added two new directives CGIScriptTimeoutEnabled and CGIScriptTimeout in mod_cgid
For more information on configuring these new directives refer to,
Apache Admin Guide
- A new directive - ScriptMultipleDaemons has been added to cgid which can be configured to
create multiple cgi daemons to process cgi requests. This improves the performance of mod_cgid.
For more information on configuring this directives refer to,
Apache Admin Guide
- Added a new directive SSLMaxIOBuffer to configure the size of the SSL IO Buffer in mod_ssl
NOTE: MOD_JK2 is officially unsupported by OpenSource
More details are available at: http://tomcat.apache.org/connectors-doc/news/20041100.html
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- The following security vulnerabilities have been fixed in this release.
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940">CVE-2006-2940
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937">CVE-2006-2937
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738">CVE-2006-3738
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343">CVE-2006-4343
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339">CVE-2006-4339
<a href="">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969">CVE-2005-2969
- PHP upgraded to 5.2.0
- PHP extension, oci8 upgraded to 1.2.2
- Added support for 64bit MySQL extension
- Added a new PHP extension, SOAP.
- OpenSSL upgraded to 0.9.8d
- mod_perl supports perl 5.8.8
- mod_jk upgraded to 1.2.19
- Bug Fixes
- CGI process does not get terminated on graceful restart.
- httpd's size does not get larger on a graceful restart.
- Large POST message handled by cgid daemon.
- Apachectl of webproxy not corrupted on an upgrade.
- mod_perl returns 404 not found if a page is not found instead of 200 OK.
- cgid restarts on killing it in Chroot environment.
- php has IPV6 enabled.
- Apache on using ldap does not cause a Segmentation fault.
- pwck does not throw errors for users of Apache.
- Reverse proxy does not cause high CPU utilization.
- Included fix for Apache bug #12355.
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- Apache upgraded to 2.0.58
The following security vulnerabilities have been fixed in this release.
mod_rewrite: Fix an off-by-one security problem in the ldap scheme
handling. For some RewriteRules this could lead to a pointer being
written out of bounds. Reported by Mark Dowd of McAfee Avert Labs.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2006-3747</a>
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost
with access control and a custom error 400 error page, allows remote
attackers to cause a denial of service (application crash) via a
non-SSL request to an SSL port, which triggers a NULL pointer dereference.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2005-3357</a>
Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache
httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows
remote attackers to inject arbitrary web script or HTML via the Referer
when using image maps.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2005-3352</a>
- mod_perl supports perl 5.8.7
- mod_jk upgraded to 1.2.15
- mod_jk2 upgraded to 2.0.5
- PHP extension, oci8 upgraded to 1.1
- Bug Fixes
Added a new Apache module, mod_auth_kerb.
Added a new PHP extension, openssl.
Added OCSP support for mod_ssl.
auth_ldap is no longer shipped with HP-UX Web Server Suite.
mod_perl fixed to display the entire process name on inclusion of
<Perl> directive in the configuration file.
mod_perl fixed to return "404 OK" when a file is not found.
Openldap fixed to prevent core dump on loading and unloading of
ldap.sl, a PHP extension.
mod_jk2 now recognises ipv6 addresses.
The PHP extension pgsql.sl now links to the latest version of
libpq.
Running multiple instances of Apache has been documented.
libtool fixed to not refer to /CLO/BUILD_ENV.
SSL admin guide updated with the updatecrl option.
mod_ssl doesn't conflict with RSA's sslc library.
The correct version of Openssl binary is now displayed on the command prompt.
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- The following security vulnerabilities have been fixed in this release.
The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5,
when register_globals is enabled, allows remote attackers to modify
the GLOBALS array and bypass security protections of PHP applications via
a multipart/form-data POST request with a "GLOBALS" fileupload field.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h
and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING
option, disables a verification step that is required for preventing
protocol version rollback attacks, which allows remote attackers to force
a client and server to use a weaker protocol than needed via a man-in-the-middle
attack.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
- Bug Fixes
Apache is fixed to solve the problem of Content-Length header not being present
in HEAD response when used as a front-end server
mod_perl fixed to honor Perl's $| "OUTPUT_AUTOFLUSH" for STDOUT
Apache is fixed to stop without errors in Chrooted environment
mod_proxy is fixed to solve the problem of data loss with httpd-2.0.55
reverse proxy method=post.
This release of HP-UX Apache-based Web Server is primarily a security and
bug fix release.
- Apache upgraded to 2.0.55
The following security vulnerabilities have been fixed in this release.
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions
(PCRE) before 6.2, as used in multiple products such as Python, allows
attackers to execute arbitrary code via quantifier values in regular
expressions, which leads to a heap-based buffer overflow.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491
Off-by-one error in the mod_ssl Certificate Revocation List (CRL)
verification callback in Apache, when configured to use a CRL, allows
remote attackers to cause a denial of service (child process crash) via
a CRL that causes a buffer overflow of one null byte.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268
The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers
to cause a denial of service (memory consumption) via an HTTP header with
a large Range field.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728
Apache 2.0.45 and 1.3.29, when acting as an HTTP proxy, allows remote
attackers to poison the web cache, bypass web application firewall protection,
and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked"
header and a Content-Length header, which causes Apache to incorrectly handle
and forward the body of the request in a way that causes the receiving server
to process it as a separate HTTP request, aka "HTTP Request Smuggling."
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088
- Bug Fixes
Added support for Nested mutexes.
To enable C++ modules, the following 3 lines must be added to the httpd.conf
file, if not present.
For 11iv2 IA 64-bit platforms, the directives to load the standard C++ libraries
are:
LoadFile /usr/lib/hpux64/libunwind.so
LoadFile /usr/lib/hpux64/libCsup.so
LoadFile /usr/lib/hpux64/libstd_v2.so
For 11iv2 IA 32-bit platforms, the directives to load the standard C++ libraries
are:
LoadFile /usr/lib/hpux32/libunwind.so
LoadFile /usr/lib/hpux32/libCsup.so
LoadFile /usr/lib/hpux32/libstd_v2.so
For all other flavors, the directives to load the classic C++ libraries are
provided.
LoadFile /usr/lib/libCsup.sl
LoadFile /usr/lib/libstream.sl
LoadFile /usr/lib/libstd.sl
NOTE: To use the LoadFile directive, the following patches are required.
For 11iv1:
PHSS_30968 - ld(1) and linker tools cumulative patch
PHSS_32573 - s700_800 11.11 HP aC++ -AA runtime libraries (aCC A.03.61)
For 11.00:
PHSS_30969 s700_800 11.00 ld(1) and linker tools cumulative patch
PHSS_32574 s700_800 11.X HP aC++ -AA runtime libraries (aCC A.03.61)
For 11iv2: No patches are required
Please note that the LoadFile directive must precede the LoadModule
directive for C++ modules.
- Apache upgraded to 2.0.54.02
This release of HP-UX Apache-based Web Server is a bug fix release.
mod_ssl in Apache webserver 2.0.54.00 and earlier, when using
"SSLVerifyClient optional" in the global virtual host configuration,
does not properly enforce "SSLVerifyClient require" in a per-location
context, which allows remote attackers to bypass intended access
restrictions.
The MySQL extension for PHP is provided as an external library on
HP-UX 11i and HP-UX 11iv2 32 bit versions.
Previous releases contained the following security fixes, bug fixes and
enhancements:
- Apache upgraded to 2.0.54
This release of HP-UX Apache-based Web Server is a bug fix release.
- Apache upgraded to 2.0.54
- mod_jk upgraded to 1.2.10
- OpenSSL upgraded to 0.9.7g
- mod_perl supports perl 5.8.3
- PHP upgraded to 5.0.4
- Apache upgraded to 2.0.53
Apache webserver 2.0.52 and earlier allows remote attackers to cause a
denial of service (CPU consumption) via an HTTP GET request with a MIME
header containing multiple lines with a large number of space characters.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942
Added longuname support.
- Added perl 5.8.2 support for mod_perl.
- Apache upgraded to 2.0.52
The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and
earlier allow remote attackers to cause a denial of service (child process
crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test
Tool.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786
Buffer overflow in Apache 2.0.50 and earlier allows local users to gain
apache privileges via a .htaccess file that causes the overflow during
expansion of environment variables.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747
The char_buffer_read function in the mod_ssl module for Apache 2.x, when
using reverse proxying to an SSL server, allows remote attackers to cause
a denial of service (segmentation fault).
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751
mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a
denial of service (CPU consumption) by aborting an SSL connection in a way
that causes an Apache child process to enter an infinite loop.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to
cause a denial of service (child process crash) via a certain sequence of
LOCK requests for a location that allows WebDAV authoring access.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809
Vulnerability in Apache 2.0.51 prevents the merging of the Satisfy
directive, which could allow attackers to obtain access to restricted
resources contrary to the specified authentication configuration.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811
- mod_perl upgraded to 1.99_16
- Apache upgraded to 2.0.50
A remotely triggered memory leak in http header parsing can allow a denial
of service attack due to excessive memory consumption. [CAN-2004-0493]
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493
Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a (trusted)
client certificate subject DN which exceeds 6K in length. [CAN-2004-0488]
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488
- PHP upgraded to 4.3.8
The memory_limit functionality, under certain conditions such as when
register_globals is enabled, allows remote attackers to execute arbitrary
code by triggering a memory_limit abort during execution of the
zend_hash_init function and overwriting a HashTable destructor pointer
before the initialization of key data structures is complete. [CAN-2004-0594]
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594
The strip_tags function, does not filter null (\0) characters within tag
names when restricting input to allowed tags, which allows dangerous tags
to be processed by web browsers such as Internet Explorer and Safari, which
ignore null characters and facilitate the exploitation of cross-site
scripting (XSS) vulnerabilities. [CAN-2004-0595]
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595
- Apache(mod_ssl): Extended support for 'RequestHeader' directive
When the Proxy feature is used, the RequestHeader directive can
be used to send any environment variables/values to the backend server.
- Apache(mod_ssl): Support for updating CRL without re-starting the web server
A new option 'updatecrl' was added to apachectl. This new option will
allow to update the Certificate Revocation List without taking down
the web server.
- Bug fixes:
mod_ssl: Fix a SEGV that occurs when small cache size is specified.
mod_cgi: Fix a hang problem with scripts that used timeouts (ex. ping)
- Apache upgraded to 2.0.49:
Apache does not filter terminal escape sequences from error logs, which
could make it easier for attackers to insert those sequences into terminal
emulators.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">
CAN-2003-0020</a>
Starvation issue on listening sockets occurs when a short-lived connection
on a rarely-accessed listening socket will cause a child to hold the accept
mutex and block out new connections.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">
CAN-2004-0174</a>
Memory leak in mod_ssl allows a remote denial of service attack against a
SSL-enabled server by sending plain HTTP requests to the SSL port.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113">
CAN-2004-0113</a>
Mod_ssl is not sending the "Close Notify" alert message before closing the
socket
SSL variables are not detected correctly in RewriteCond
- OpenSSL upgraded to 0.9.7.d
The do_change_cipher_spec function in OpenSSL allows remote attackers to cause
a denial of service via a crafted SSL/TLS handshake that triggers a null
dereference.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079">
CAN-2004-0079</a>
The SSL/TLS handshaking, when using Kerberos ciphersuites, does not properly
check the length of Kerberos tickets during a handshake, which allows
remote attackers to cause a denial of service via a crafted SSL/TLS handshake
that causes an out-of-bounds read.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112">
CAN-2004-0112</a>
PKCS7-S/MIME encryption fails with memory fault core dump
- C++ plug-in modules
C++ plug-in modules on IPF should now be built with the Standard C++
runtime libraries. This is a change from previous versions which used
Classic C++ runtime libraries. Plug-ins for PA should continue to use
the Classic C++ runtime libraries. From more information see,
Apache Admin Guide
HP-UX Tomcat-based Servlet Engine
HP-UX Tomcat-based Servlet Engine 5.5.23:
This release of HP-UX Tomcat-based Servlet Engine A.5.5.20.00 contains
Tomcat 5.5.20.00 which implements Servlet 2.4 and JSP 2.0 specifications.
This release contains Tomcat version 5.5.20.00. Apart from being an
implementation of new specifications of Servlet and JSP, it includes several
new features, enhancements, performance optimizations, and bug fixes over the
previous releases (Tomcat 4.1.x).
Bug Fixes
- Fixed the tomcat shutdown.sh script to check for the user stopping tomcat.
Previous releases contained the following security fixes, bug fixes and
enhancements:
- Tomcat version upgrade to 4.1.29.06
- Commons-DBCP upgraded to 1.2.1
- Now onwards mod_jk and related configuration files are shipped with HP-UX
Apache-based Web Server.
- Fix to the Tomcat Admin application that had affected numerous Tomcat
administrative tasks.
- Tomcat has IPv6 support when used with Java 1.4 JDK.
For more information, see Tomcat Admin Guide.
HP-UX Webmin-based Admin
HP-UX Webmin-based Admin A.1.070.10:
This release of HP-UX Webmin-based Admin is a bug fix release that
addresses the following defects:
- Webmin has been fixed to display the correct page after configuring
a theme.
This release of HP-UX Webmin-based Admin is a security/bug fix release that
addresses the following vulnerablilties:
- corruption of the SSL virtual server configuration (JAGaf41910).
This release also includes enhancements/bug fixes from A.1.070.01
- Disabled read access to module configuration for normal users.
- DOS attack(Locking out other users) when logging in using space in
username.
- Support for 32-bit Apache (if installed)
- Backup, version management(RCS) and retrieval of Apache configuration
files.
- Direct access to
launching HP-UX Tomcat-based Servlet Engine
invoking Tomcat's Management and Admin tools
- Consolidated log display page which now provides a single portal for
viewing all log files.
- Support for easy management of log rotation
- Intuitive server status and info configuration and viewing
- Enhanced certificate management including addition of PEM pass phrases
to keys and deploying a key/certificate pair to a Virtual Server.
- Support for Virtual Host additions and management
- Enhanced look and feel (new icons, intuitive forms, Javascript event handlers)
- Improved parsing of Apache configuration files to accurately handle
directives within Virtual Hosts, Directory, and other containers.
- Various bug fixes
HP-UX XML Web Server Tools
HP-UX XML Web Server Tools A.2.02:
This release is primarily a version upgrade release:
- Xerces-J v. 2.8.0
- Xalan-J v. 2.5.1
- Cocoon v. 2.0.4
- FOP v. 0.20.5
- Batik v. 1.5
DOCUMENTATION
The Release Notes, Admin Guides, User Guides and Migration Guides
included in this bundle can be found in /opt/hpws/hp_docs/
Depending on which components are installed, these documents can also be
accessd from the following servers if they were started with the default
configurations:
HP-UX Apache-based Web Server http://yourserver.com/
HP-UX Tomcat-based Servlet Engine http://yourserver.com:8081/
HP-UX Webmin-based Admin http://yourserver.com:10000/
***************************************************************************
LEGAL NOTICES
The information in this document is subject to change without notice.
WARRANTY DISCLAIMER
HEWLETT-PACKARD MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
INFORMATION, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard
shall not be liable for errors contained herein or for direct, indirect,
special, incidental or consequential damages in connection with the
furnishing, performance or use of this material.
RESTRICTED RIGHTS LEGEND
Use, duplication or disclosure by the U.S. Government is subject to
restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in
Technical Data and Computer Software clause at DFARS 252.227-7013 for DOD
agencies. Rights for non-DOD U.S. Government Department and Agencies are
as set forth in FAR 52.227-19 (c)(1,2).
COPYRIGHT NOTICES
Copyright 2002-2007 Hewlett-Packard Development Company, L.P.
This document contains information which is protected by copyright.
All Rights Reserved. Reproduction, adaptation, or translation without
prior written permission is prohibited, except as allowed under the
copyright laws.
TRADEMARK NOTICES
UNIX is a registered trademark in the United States and other countries,
licensed exclusively through X/Open Company Limited.
Intel(R) Itanium(TM) Processor Family is a trademark of Intel Corporation
in the U.S. and other countries is used under license.
Java and all Java-based trademarks and logos are trademarks or
registered trademarks of Sun Microsystems, Inc. in the U.S. and
other countries.
Netscape is a U.S. trademark of Netscape Communications Corporation.
Oracle is a registered U.S. trademark of Oracle Corporation, Redwood City,
California.
ACKNOWLEDGEMENTS
This product includes software developed by the Apache Software Foundation.
This documentation is based on information from the Apache Software Foundation
(http://www.apache.org).
This product includes software developed by the OpenLDAP Project
(http://www.openldap.org).
This product includes software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org).
This product includes cryptographic software written by Eric Young
([email protected]).
This product includes PHP, freely available from (http://www.php.net).
|