Greg Ames has been working on a patch to speed up request
      processing when a handler is configured for a specific Location.
      Currently in such configurations, the directory tree mapping to
      the location is still traversed after a handler has been
      determined, which is unnecessary when the handler of the request
      is already known to be "virtual" (rather than based in the
      filesystem).  The performance overhead of this unnecessary directory tree walk
      can be significant; discussion of how to eliminate it in continues as the
      developers try to determine how this "virtual-ness" should be
      decided: whether manually by configuration option, or
      automatically by logic in the module itself.
      
      The default hard limit on the number of httpd child processes
      in 2.0's prefork MPM stood at the already unreasonably high
      value of 20,000 until recently in the 2.1 tree.  Colm
      MacCarthaigh requested an increase to 100,000 after hitting the
      old limit using the newly released Linux 2.6 kernel on the
      production servers at the HEAnet mirror sites in Ireland.
      Colm notes that allowing this number of connections to a single
      machine requires listening on more than one IP address due to
      the limit on (16-bit) TCP port numbers.
    
A minor issue has
been found which affects the third-party Apache-SSL module.  If a
server using Apache-SSL was configured with
SSLVerifyClient set to 1 or 3 (client
certificates optional) and SSLFakeBasicAuth,
then Apache-SSL versions 1.3.28+1.52 and prior would permit a client
to use real basic authentication to forge a client certificate.
The Common Vulnerabilities and Exposures project
has assigned the name 
CAN-2004-0009
 to this issue.
 Updates are
available from apache-ssl.org.
This issue also affected versions of mod_ssl
prior to 2.8.0 (released 30th January 2001).
      
Two new reports have been sent to the bugtraq mailing list claiming
to discover Apache security issues: in fact, both simply reveal
configuration errors which lead to security problems.
The first issue details a
configuration where the root directory has access control is set to
Deny from all along with AllowOverride
FileInfo; a request to a location not covered by looser access
control restrictions will hence generate a "403 Forbidden" response.
The reporter claims that because a local user can configure a custom
403 ErrorDocument response in a
.htaccess file, they can circumvent the access control
restrictions imposed on the root directory.  In fact,
ErrorDocument is only permitted in the
.htaccess when AllowOverride FileInfo is
used: therein lies the configuration error.
The second report concerns the use of Apache with the Resin
application server: access control to WEB-INF directories containing JSP
source code must be protected using Directory containers
rather than Location as the latter can be bypassed by
URIs which use non-canonical filenames.  This report details use of
the ".." filename suffix which is ignored in a Windows
filesystem.
These reports emphasise the need for server administrators to
carefully review the documentation for Apache (for instance, the Security
tips section) and also ensure that the configuration is adapted
correctly for the set of modules in use.
    
      Over the last couple of a weeks a large number of
      publications have been circulating details of a new server
      survey by software company Port80.  These include eWeek with
      their story "Survey
      Says: IIS Top Choice Among Most Popular Web Sites".  Instead
      of including all web servers on the Internet like surveys from
      Netcraft and SecuritySpace, Port80 instead focus on a selected
      subset, in this case from the top 1000 Nielsen NetRatings.
      Apache comes in a close second place with just under 40% of the
      market share in this survey.  This is a great improvement, as a
      couple of years ago a similar subset survey from BizNix found only 23%
      of the Global 500 were running Apache.  Meanwhile Smutcraft find a whopping
      88% of porn sites are kept up by Apache.  It must be due to those
      patches everyone keeps mailing us about.
      
      In this section we highlight some of the articles on the web
that are of interest to Apache users.
    
Newsforge provide
a transcript of the recent IRC session with Apache developer and
ASF board member Ken Coar.
Adam Pedersen squeezes every last drop of performance out of his
Apache servers in "Introducing
LAMP Tuning Techniques".  He looks at common configuration tuning,
managing Apache RAM usage, and how PHP and MySQL all have an effect on
performance.
Scott Robinson attempts to unravel mod_ssl
configuration in his short article "Web
Technologies: Use mod_ssl to configure Apache keys and certificates".
    
      This issue marks the eighth anniversary of Apache Week. 
      Issue one
      was published on 9th February 1996, although it was
      only available on the Web until we started an email
      subscription option with issue 6.
    
    
      When issue one was published, Apache version 1.0.0 had been
      out for just over a month. The current stable version was
      1.0.2. 
      According to Netcraft, 
      Apache became the most widely used server in the April 1996
      survey, reported in issue 9.
      Today Apache-based servers are on use on over 60% of the
      world's Internet sites.
    
    
      The Apache 1.2 beta cycle started in
      December 1996 with 1.2b1 and continued until Apache 1.2
      was released in June 1997 (issue
      68). The 1.3 beta cycle started in October 1997
      (issue 87)
      and continued until Apache 1.3.0 was released in June
      1998 (issue 118)
      Whilst 1.3.0 was highly stable on Unix systems, it
      was much less developed on Windows.
    
    
      In August 1998 the Netcraft Server Survey showed for the
      first time that Apache was in use on more than half the
      world's internet servers, and Ralf Engelschall released the
      first version of the popular mod_ssl module. In
      October the first official Apache conference, ApacheCon 98,
      was held in San Fransisco and was a huge success drawing
      nearly 500 registrations (issue 134)
      Three more Apache conferences have been
      held since then, with the most recent 
      in Santa Clara
      giving attendees a unique opportunity to talk to the people 
      behind the software.
    
    
      Towards the end of 1998, Apache was recognised by Microsoft
      as a real and credible threat to their business in their
      leaked memos (issue 137).
      A few years later this was proven when the Garner Group
      suggested all IIS users switch to something more secure, like Apache.
    
    
      In July 1999 (issue 165)
      the Apache Software Foundation was formed with the
      aim to provide a legal framework for Apache and related
      open-source projects such as the Jakarta and XML projects.
    
    
      The httpd team worked on Apache 2.0 for a long
      time, with initial plans reported in February 1998 
      (issue 102).
      In September 1999 (issue 173)
      we published an Apache 2.0 preview and stated that a
      beta version should be available in late 1999 or early 2000,
      although it was to take until April of 2001 before the first
      beta was released, and April of 2002 before general availability.
    
    
      Even after the release of Apache 2.0, Apache 1.3 continued to
      receive updates for security issues as well as bug fixes and minor feature additions.
    
    
 Apache Week is a weekly publication, but over the last couple of years
 we've missed out a number of issues. We've done this when there is
 little or no news as feedback from readers has shown that this is
 preferable to us sending out tiny issues with no useful content. 
      Apache Week will continue to bring you the latest news about
      the Apache web server and its development, as it happens.