Earlier this week it was found that PHP 4.2.0 and 4.2.1 allow
remote attackers to cause a denial of service and possibly execute 
arbitrary code via an HTTP POST request with certain arguments 
in a multipart/form-data form, which generates an error condition that is 
not properly handled and causes improper memory to be freed.  Earlier
versions of PHP are not affected.  For more information
read the
full advisory.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has 
assigned the name CAN-2002-0717 to this issue.
There was discussion on the development list this week about what
configuration files "make install" should install if
installing over an existing Apache installation; the main issue
concerning whether the reference "-std.conf" files should be installed
alongside existing configuration files.
Preparations for an Apache 2.0.40 are underway, with the CVS tree
being tagged, and tarballs prepared for testing by developers.  As
usual, the live server at apache.org  is
already running the new code.
A frequently asked question on the mailing lists is why any Apache
server will process a request with a URI such as
http://www.yahoo.com/; often an administrator will notice
such requests in the access log with a "200" response code, and worry
that the server is being used as a proxy.  The answer is simply that
if the hostname used in the request URI does not match any of the
configured virtual hosts, the default vhost configuration is used to
serve the request; no proxying takes place regardless of the hostname
used, unless Apache is specifically configured as a proxy server.
Paul Weinstein took time out after giving his presentation on Apache
and SSL to report for Apache Week on the main news of the O'Reilly Open Source
Conference.   Interesting keynotes included the well-matched
pair Lawrence Lessing, a vigilant
defender of freedom of content, and Richard Stallman, a vigilant defender of
freedom of software.  Read the Apache Week
feature from the first day of the conference
Earlier this month a
a new beta of Red Hat Linux was announced.  What makes this release
interesting is that it includes by default 
Apache 2.0 along with a number of modules that
work with the 2.0 infrastructure.  Apache 1.3 is not included in the
release.  Netcraft found
this month that the adoption of Apache 2.0 is happening a lot slower than 
expected, fewer than 50,000 sites have switched.  
The inclusion of Apache 2.0 by default in a mainstream operating
system should help prove whether or not it is ready for primetime.
At the O'Reilly Open Source Conference this week 
Covalent announced
a new module, mod_asp.net for Apache 2.0 on Windows.
The module provides integration of ASP.NET applications into 
the Apache server framework.  The module is only available as part of
Covalent's Enterprise Ready Server which is based on Apache and is not
open source.
In this section we highlight some of the articles on the web that are of
interest to Apache users.
Pier Fumagalli who actively codes for the Apache Jakarta and 
HTTPD/APR projects reveals how the VNU news web site running on the 
Apache Web server and Tomcat has been designed to handle high loads 
in 
"Web Development in Heavy Traffic".
The tricks are to let another instance of Apache handles all the static 
traffic, cache articles in the servlet container itself, and execute each 
application in a different container in a different Java Virtual Machine.
UnixReview.com looks at 
two tools for benchmarking web sites 
and shows us how to use them. First 
Scout is 
run to gather a list of URLs into a file. Then 
Seige 
will use this file to bombard a web server with requests from 
concurrent simulated users to stress test it.
"Building XML Portals with Cocoon" 
explores the Cocoon portal and authentication frameworks, and 
provides a few examples on how to use them. You need to be familiar 
with the basic Cocoon concepts before reading this.
There is a new kid in town - a Java-based open-source Apache GUI 
named 
NetLoony. 
Read the 
user guide 
for yourself and decide whether it is as loony as it sounds.
"Apache and SSL" 
was presented by Paul Weinstein at the 2002 O'Reilly Open Source 
Conference recently. It introduces the basic concepts and configuration 
of Apache and SSL, and is also available to be downloaded as a 
PDF 
file.