Re: Tomcat http header size too large!

2024-07-15 Thread Mark Thomas

On 14/07/2024 00:28, Pradeep wrote:

Hi,

I need some tips to solve below issue.
I am getting 431 http error in API (code running in tomcat) when header
size crosses 8KB. Tomcat server doesn't process request if header size is
more than 8KB.
I tried adding below properties to increase the header size in Springboot
application.yaml:

server:
   tomcat:
   max-http-header-size: 16KB

Above solution didn't work, please advice if any other way can achieve
increasing header size.


You might be better off seeking help from the Spring community. That 
looks like the right property to set to me but there may well be some 
detail I am missing.


Another thing to check is how big your headers are. Are you sure 16KB is 
enough?


Mark

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Tomcat http header size too large!

2024-07-15 Thread Konstantin Kolinko
пн, 15 июл. 2024 г. в 11:24, Mark Thomas :
>
> On 14/07/2024 00:28, Pradeep wrote:
> > Hi,
> >
> > I need some tips to solve below issue.
> > I am getting 431 http error in API (code running in tomcat) when header
> > size crosses 8KB. Tomcat server doesn't process request if header size is
> > more than 8KB.
> > I tried adding below properties to increase the header size in Springboot
> > application.yaml:
> >
> > server:
> >tomcat:
> >max-http-header-size: 16KB
> >
> > Above solution didn't work, please advice if any other way can achieve
> > increasing header size.
>
> You might be better off seeking help from the Spring community.

+1

> That
> looks like the right property to set to me but there may well be some
> detail I am missing.

1. Versions of everything =?
2. What documentation did you read?

3. Quick googling finds this article (from a well-known author, but it
is not official documentation):
https://www.baeldung.com/spring-boot-max-http-header-size

On that page there is a discussion about change in the property names
in Spring Boot 3,
and the names are different: with no "tomcat" part in them.

(BTW, If you run Tomcat directly, without SpringBoot,
its configuration expects a value as integer (bytes) and cannot handle
a "KB" suffix

The relevant settings in Tomcat itself are documented at
https://tomcat.apache.org/tomcat-9.0-doc/config/http.html#Standard_Implementation

Replace "9.0" in the URL with your version.)

>
> Another thing to check is how big your headers are. Are you sure 16KB is
> enough?

+1

Best regards,
Konstantin Kolinko

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



CVE-2019-0232 & CVE-2020-1938

2024-07-15 Thread Jurevich, Aidan
Hi,
My organization has a few devices that have the file tomcat-juli-8.5.57.jar 
installed on them via the program Altair and are showing up as vulnerable to 
CVE-2019-0232 and CVE-2020-1938, which according to your documentation seems to 
be fixed for this version of the file. This seems to be an issue with Microsoft 
Defender being unable to read the version of the file. I was just making sure 
for our records that this issue has been solved as well as checking to see if 
you had any recommendations about how we can get this file to stop popping up 
as vulnerable.

Aidan Jurevich | IT Intern
Thornton Tomasetti | 120 Broadway, New York, NY 10271
Mobile +1.303.981.7876
ajurev...@thorntontomasetti.com | 
www.ThrontonTomasetti.com




RE: Reg: tomcat CPU spikes

2024-07-15 Thread Jalaj Asher
Thank you Christoper for the insight.

Yeah I was wondering the same as this has been in place since a few years now 
atleast 4 years since cachingAllowed had some changes in tomcat 8 which was 
resulting in it caching all static content as well as jsps and jars and our 
though process was if we have static content being cached on the client end and 
jsps in the work folder each time on access we don’t need the cache.

Is there a way to cache just the jars and not every thing else in memory ?

Regards

Jalaj P Asher

-Original Message-
From: Christopher Schultz 
Sent: Friday, July 12, 2024 4:02 PM
To: users@tomcat.apache.org
Subject: Re: Reg: tomcat CPU spikes

Attention! - This email has originated from an External Source outside of 
eClinicalWorks. Always use caution when opening attachments, clicking links, or 
when responding to this email. If you feel this is a phishing scam, please use 
the Phish Alert Report button in Outlook.


Jalaj,

On 7/12/24 10:19, Jalaj Asher wrote:
> Thank you Chuck and John for the responses.
>
> Just a few points from the things you highlighted and wanted me to
> check 1. unpackwar is set to true. I checked and was informed that we need
>that to be true for a specific war file.
> 2. cachingAllowed=false. We keep it as false across the board.

Well... that'll do it. In order to locate resources, Tomcat needs to sift 
through all of those JAR files every time. Scanning ZIP files is expensive.

You might want to reconsider this particular setting in your environment.

> Also the reason I shared 2 different stacks is to highlight that the
> problem does not occur post restart or with any specific part of the
> application like the parser going in a loop but it kicks of at random
> times impacting multiple tomcats. But all having the same stack
> waiting on archiveresourceset and java.util.zip.
My only question would be "why is this only now coming to your attention? 
Things should have been behaving this way .. for a long time.

> I am working on getting both types of stacks to share here as well.
>
> Had a question we just have one war file if unpack war is triggered
> why should it impact loading jars from the entire webapp lib ?

Because WEB-INF/lib is full of JAR files that need to be scanned every tie you 
try to load ... anything. Since you have disabled caching, it has to re-check 
every file for every resource-load request.

-chris

> -Original Message-
> From: Chuck Caldarale 
> Sent: Wednesday, July 10, 2024 6:19 PM
> To: Tomcat Users List 
> Subject: Re: Reg: tomcat CPU spikes
>
> Attention! - This email has originated from an External Source outside of 
> eClinicalWorks. Always use caution when opening attachments, clicking links, 
> or when responding to this email. If you feel this is a phishing scam, please 
> use the Phish Alert Report button in Outlook.
>
>
>> On Jul 10, 2024, at 17:02, Jalaj Asher 
>>  wrote:
>>
>> Sharing another stack to see if this can give any more insights.this thread 
>> is the tomcat main thread was loading about 65MB of data.
>>
>> "main" #1 prio=5 os_prio=0
>>java.lang.Thread.State: RUNNABLE
>>   at java.util.zip.ZipFile.getEntry(Native Method)
>>   at java.util.zip.ZipFile.getEntry(ZipFile.java:328)
>>   - locked <0xa1b04418> (a java.util.jar.JarFile)
>>   at java.util.jar.JarFile.getEntry(JarFile.java:253)
>>   at java.util.jar.JarFile.getJarEntry(JarFile.java:236)
>>   at 
>> org.apache.catalina.webresources.AbstractSingleArchiveResourceSet.getArchiveEntry(AbstractSingleArchiveResourceSet.java:97)
>>   at 
>> org.apache.catalina.webresources.AbstractArchiveResourceSet.getResource(AbstractArchiveResourceSet.java:249)
>>   at 
>> org.apache.catalina.webresources.StandardRoot.getResourceInternal(StandardRoot.java:272)
>>   at 
>> org.apache.catalina.webresources.StandardRoot.getResource(StandardRoot.java:213)
>>   at 
>> org.apache.catalina.webresources.StandardRoot.getClassLoaderResource(StandardRoot.java:220)
>>   at 
>> org.apache.catalina.loader.WebappClassLoaderBase.findClassInternal(WebappClassLoaderBase.java:2348)
>>   at 
>> org.apache.catalina.loader.WebappClassLoaderBase.findClass(WebappClassLoaderBase.java:875)
>>   at 
>> org.apache.catalina.loader.WebappClassLoaderBase.loadClass(WebappClassLoaderBase.java:1376)
>>   - locked <0xf24fc728> (a java.lang.Object)
>>   at 
>> org.apache.catalina.loader.WebappClassLoaderBase.loadClass(WebappClassLoaderBase.java:1220)
>>   at java.lang.Class.forName0(Native Method)
>>   at java.lang.Class.forName(Class.java:348)
>>   at 
>> com.sun.beans.finder.ClassFinder.findClass(ClassFinder.java:67)
>>   at 
>> com.sun.beans.finder.ClassFinder.findClass(ClassFinder.java:110)
>>   at 
>> com.sun.beans.finder.InstanceF

Re: Reg: tomcat CPU spikes

2024-07-15 Thread Christopher Schultz

Jalaj,

On 7/15/24 15:03, Jalaj Asher wrote:

Yeah I was wondering the same as this has been in place since a few
years now atleast 4 years since cachingAllowed had some changes in
tomcat 8 which was resulting in it caching all static content as well
as jsps and jars and our though process was if we have static content
being cached on the client end and jsps in the work folder each time
on access we don’t need the cache.

Does the cache actively hurt you?


Is there a way to cache just the jars and not every thing else in memory ?


I think the short answer is "no there is not a way to do this" but I may 
be wrong.


The long answer might be "maybe, but you will have to play games with 
 and  and maybe some other things to get it 
working.


I would save yourself some complexity and simply enable caching.

-chris


-Original Message-
From: Christopher Schultz 
Sent: Friday, July 12, 2024 4:02 PM
To: users@tomcat.apache.org
Subject: Re: Reg: tomcat CPU spikes

Attention! - This email has originated from an External Source outside of 
eClinicalWorks. Always use caution when opening attachments, clicking links, or 
when responding to this email. If you feel this is a phishing scam, please use 
the Phish Alert Report button in Outlook.


Jalaj,

On 7/12/24 10:19, Jalaj Asher wrote:

Thank you Chuck and John for the responses.

Just a few points from the things you highlighted and wanted me to
check 1. unpackwar is set to true. I checked and was informed that we need
that to be true for a specific war file.
2. cachingAllowed=false. We keep it as false across the board.


Well... that'll do it. In order to locate resources, Tomcat needs to sift 
through all of those JAR files every time. Scanning ZIP files is expensive.

You might want to reconsider this particular setting in your environment.


Also the reason I shared 2 different stacks is to highlight that the
problem does not occur post restart or with any specific part of the
application like the parser going in a loop but it kicks of at random
times impacting multiple tomcats. But all having the same stack
waiting on archiveresourceset and java.util.zip.

My only question would be "why is this only now coming to your attention? 
Things should have been behaving this way .. for a long time.


I am working on getting both types of stacks to share here as well.

Had a question we just have one war file if unpack war is triggered
why should it impact loading jars from the entire webapp lib ?


Because WEB-INF/lib is full of JAR files that need to be scanned every tie you 
try to load ... anything. Since you have disabled caching, it has to re-check 
every file for every resource-load request.

-chris


-Original Message-
From: Chuck Caldarale 
Sent: Wednesday, July 10, 2024 6:19 PM
To: Tomcat Users List 
Subject: Re: Reg: tomcat CPU spikes

Attention! - This email has originated from an External Source outside of 
eClinicalWorks. Always use caution when opening attachments, clicking links, or 
when responding to this email. If you feel this is a phishing scam, please use 
the Phish Alert Report button in Outlook.



On Jul 10, 2024, at 17:02, Jalaj Asher  
wrote:

Sharing another stack to see if this can give any more insights.this thread is 
the tomcat main thread was loading about 65MB of data.

"main" #1 prio=5 os_prio=0
java.lang.Thread.State: RUNNABLE
   at java.util.zip.ZipFile.getEntry(Native Method)
   at java.util.zip.ZipFile.getEntry(ZipFile.java:328)
   - locked <0xa1b04418> (a java.util.jar.JarFile)
   at java.util.jar.JarFile.getEntry(JarFile.java:253)
   at java.util.jar.JarFile.getJarEntry(JarFile.java:236)
   at 
org.apache.catalina.webresources.AbstractSingleArchiveResourceSet.getArchiveEntry(AbstractSingleArchiveResourceSet.java:97)
   at 
org.apache.catalina.webresources.AbstractArchiveResourceSet.getResource(AbstractArchiveResourceSet.java:249)
   at 
org.apache.catalina.webresources.StandardRoot.getResourceInternal(StandardRoot.java:272)
   at 
org.apache.catalina.webresources.StandardRoot.getResource(StandardRoot.java:213)
   at 
org.apache.catalina.webresources.StandardRoot.getClassLoaderResource(StandardRoot.java:220)
   at 
org.apache.catalina.loader.WebappClassLoaderBase.findClassInternal(WebappClassLoaderBase.java:2348)
   at 
org.apache.catalina.loader.WebappClassLoaderBase.findClass(WebappClassLoaderBase.java:875)
   at 
org.apache.catalina.loader.WebappClassLoaderBase.loadClass(WebappClassLoaderBase.java:1376)
   - locked <0xf24fc728> (a java.lang.Object)
   at 
org.apache.catalina.loader.WebappClassLoaderBase.loadClass(WebappClassLoaderBase.java:1220)
   at java.lang.Class.forName0(Native Method)
   at java.lang.Class.forName(Class.java:348)
   at 
com.sun.beans.finder.ClassFin

Re: CVE-2019-0232 & CVE-2020-1938

2024-07-15 Thread Christopher Schultz

Aiden,

On 7/15/24 13:24, Jurevich, Aidan wrote:

My organization has a few devices that have the file
tomcat-juli-8.5.57.jar installed on them via the program Altair and
are showing up as vulnerable to CVE-2019-0232 and CVE-2020-1938,
which according to your documentation seems to be fixed for this
version of the file.
If you are not enabling the CGI servlet (which is disabled by default), 
then you are not vulnerable to CVE-2019-0232.


If you are not using AJP to proxy traffic between a reverse proxy (e.g. 
IIS, Apache httpd, nginx, etc.) and Tomcat, then you are not vulnerable 
to CVE-2020-1938.


I'm interested to know why Altair is installing that specific version of 
that file into your environment, and, honestly, why ANY version of that 
file into your environment. If Tomcat is not being used, then 
tomcat-juli-x.y.z.jar should be completely useless. If Tomcat *is* being 
used, then /all of Tomcat should be upgraded/ beyond 8.5.57 as there are 
known published security vulnerabilities that have been fixed in later 
versions.


The JULI package seems to have been removed in Tomcat 8.5.4[1][2] and 
I'm curious as to why that file has that particular version number.



This seems to be an issue with Microsoft Defender being unable to
read the version of the file. I was just making sure for our records
that this issue has been solved as well as checking to see if you had
any recommendations about how we can get this file to stop popping up
as vulnerable.
I would be curious to find out why this file is there *at all*. It seems 
to have no business being anywhere.


But if it really is some kind of misnamed Tomcat logging library from 
the distant past, it cannot make you vulnerable to either CVE referenced 
above.


Hope that helps,
-chris

[1] https://bz.apache.org/bugzilla/show_bug.cgi?id=58588
[2] 
https://tomcat.apache.org/tomcat-8.5-doc/changelog.html#Tomcat_8.5.4_(markt)


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: CVE-2019-0232 & CVE-2020-1938

2024-07-15 Thread Christopher Schultz

Aiden,

On 7/15/24 16:36, Christopher Schultz wrote:

Aiden,

On 7/15/24 13:24, Jurevich, Aidan wrote:

My organization has a few devices that have the file
tomcat-juli-8.5.57.jar installed on them via the program Altair and
are showing up as vulnerable to CVE-2019-0232 and CVE-2020-1938,
which according to your documentation seems to be fixed for this
version of the file.
If you are not enabling the CGI servlet (which is disabled by default), 
then you are not vulnerable to CVE-2019-0232.


If you are not using AJP to proxy traffic between a reverse proxy (e.g. 
IIS, Apache httpd, nginx, etc.) and Tomcat, then you are not vulnerable 
to CVE-2020-1938.


I'm interested to know why Altair is installing that specific version of 
that file into your environment, and, honestly, why ANY version of that 
file into your environment. If Tomcat is not being used, then 
tomcat-juli-x.y.z.jar should be completely useless. If Tomcat *is* being 
used, then /all of Tomcat should be upgraded/ beyond 8.5.57 as there are 
known published security vulnerabilities that have been fixed in later 
versions.


The JULI package seems to have been removed in Tomcat 8.5.4[1][2] and 
I'm curious as to why that file has that particular version number.



This seems to be an issue with Microsoft Defender being unable to
read the version of the file. I was just making sure for our records
that this issue has been solved as well as checking to see if you had
any recommendations about how we can get this file to stop popping up
as vulnerable.


Oh, to directly answer your question I would say:

1. Ask Altair what's up with that file

and

2. Ask Altair how to suppress the warning

Sorry, I know that's not what you wanted to hear. If you were running a 
stock Tomcat build, I'd say "just upgrade and you will be fine" but 
apparently you are running another vendor's product who may or may not 
be using Tomcat and "just upgrade" may not be something that is either 
possible or easy. If Altair directed you to us, you should go back to 
them and say "I pay *you* to support your own software, so support it" 
and hold them responsible for this kind of thing.


-chris

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: [OT] CVE-2019-0232 & CVE-2020-1938

2024-07-15 Thread Christopher Schultz

All,

On 7/15/24 13:24, Jurevich, Aidan wrote:

Hi,
My organization has a few devices that have the file tomcat-juli-8.5.57.jar 
installed on them via the program Altair and are showing up as vulnerable to 
CVE-2019-0232 and CVE-2020-1938, which according to your documentation seems to 
be fixed for this version of the file. This seems to be an issue with Microsoft 
Defender being unable to read the version of the file. I was just making sure 
for our records that this issue has been solved as well as checking to see if 
you had any recommendations about how we can get this file to stop popping up 
as vulnerable.


Altair seems to have reproduced Tomcat's documentation with very little 
editing and absolutely no credit to the project on this page:

https://help.altair.com/2023/panopticon/realtimeinstall/onlinehelp/156_ConfiguringApacheTomcatLogs1.htm

:/

-chris

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Issue with JDK 11 and tomcat-embed-core 9.0.91

2024-07-15 Thread Greg Eschbacher
Hi all,

I'm hoping you all can help me:  Our JDK 11 application uses tomcat-embed-core, 
and we're upgrading from 9.0.88 to 9.0.91 and we can no longer compile.

After some investigation, I believe the issue is that the tomcat-embed-core jar 
file no longer contains a module-info.class file.   When I unzip the jar for 
9.0.88 and 9.0.90, those jars contain module-info.class right in the root.  
However, 9.0.91 does not.

The symptom when compiling is this message:  module not found: 
org.apache.tomcat.embed.core   requires org.apache.tomcat.embed.core;

You can see this by comparing:  
https://repo1.maven.org/maven2/org/apache/tomcat/embed/tomcat-embed-core/9.0.91/tomcat-embed-core-9.0.91.jar
  to 
https://repo1.maven.org/maven2/org/apache/tomcat/embed/tomcat-embed-core/9.0.90/tomcat-embed-core-9.0.90.jar

I spot-checked a few more (9.0.84, and 9.0.88) and they all had 
module-info.class in the zip.


Is this change an intentional design change, or perhaps just a mistake?

Thanks in advance!
Greg


RE: Reg: tomcat CPU spikes

2024-07-15 Thread Jalaj Asher
Christopher,
We ran into 2 issues
1. We needed to allocate significant amount of -XMX  for heap space, if we 
allowed caching, since increasing memory by a few hundred MB as well was not 
enough.
2. Also with the setting being  enabled, it generated logs stating "could not 
add a resource  as there wasn’t enough space". Which was very 
quickly filling up our disk space as well as increasing disk IO causing latency 
concerns.

Regards

Jalaj


-Original Message-
From: Christopher Schultz 
Sent: Monday, July 15, 2024 4:19 PM
To: users@tomcat.apache.org
Subject: Re: Reg: tomcat CPU spikes

Attention! - This email has originated from an External Source outside of 
eClinicalWorks. Always use caution when opening attachments, clicking links, or 
when responding to this email. If you feel this is a phishing scam, please use 
the Phish Alert Report button in Outlook.


Jalaj,

On 7/15/24 15:03, Jalaj Asher wrote:
> Yeah I was wondering the same as this has been in place since a few
> years now atleast 4 years since cachingAllowed had some changes in
> tomcat 8 which was resulting in it caching all static content as well
> as jsps and jars and our though process was if we have static content
> being cached on the client end and jsps in the work folder each time
> on access we don’t need the cache.
Does the cache actively hurt you?

> Is there a way to cache just the jars and not every thing else in memory ?

I think the short answer is "no there is not a way to do this" but I may be 
wrong.

The long answer might be "maybe, but you will have to play games with 
 and  and maybe some other things to get it 
working.

I would save yourself some complexity and simply enable caching.

-chris

> -Original Message-
> From: Christopher Schultz 
> Sent: Friday, July 12, 2024 4:02 PM
> To: users@tomcat.apache.org
> Subject: Re: Reg: tomcat CPU spikes
>
> Attention! - This email has originated from an External Source outside of 
> eClinicalWorks. Always use caution when opening attachments, clicking links, 
> or when responding to this email. If you feel this is a phishing scam, please 
> use the Phish Alert Report button in Outlook.
>
>
> Jalaj,
>
> On 7/12/24 10:19, Jalaj Asher wrote:
>> Thank you Chuck and John for the responses.
>>
>> Just a few points from the things you highlighted and wanted me to
>> check 1. unpackwar is set to true. I checked and was informed that we need
>> that to be true for a specific war file.
>> 2. cachingAllowed=false. We keep it as false across the board.
>
> Well... that'll do it. In order to locate resources, Tomcat needs to sift 
> through all of those JAR files every time. Scanning ZIP files is expensive.
>
> You might want to reconsider this particular setting in your environment.
>
>> Also the reason I shared 2 different stacks is to highlight that the
>> problem does not occur post restart or with any specific part of the
>> application like the parser going in a loop but it kicks of at random
>> times impacting multiple tomcats. But all having the same stack
>> waiting on archiveresourceset and java.util.zip.
> My only question would be "why is this only now coming to your attention? 
> Things should have been behaving this way .. for a long time.
>
>> I am working on getting both types of stacks to share here as well.
>>
>> Had a question we just have one war file if unpack war is triggered
>> why should it impact loading jars from the entire webapp lib ?
>
> Because WEB-INF/lib is full of JAR files that need to be scanned every tie 
> you try to load ... anything. Since you have disabled caching, it has to 
> re-check every file for every resource-load request.
>
> -chris
>
>> -Original Message-
>> From: Chuck Caldarale 
>> Sent: Wednesday, July 10, 2024 6:19 PM
>> To: Tomcat Users List 
>> Subject: Re: Reg: tomcat CPU spikes
>>
>> Attention! - This email has originated from an External Source outside of 
>> eClinicalWorks. Always use caution when opening attachments, clicking links, 
>> or when responding to this email. If you feel this is a phishing scam, 
>> please use the Phish Alert Report button in Outlook.
>>
>>
>>> On Jul 10, 2024, at 17:02, Jalaj Asher 
>>>  wrote:
>>>
>>> Sharing another stack to see if this can give any more insights.this thread 
>>> is the tomcat main thread was loading about 65MB of data.
>>>
>>> "main" #1 prio=5 os_prio=0
>>> java.lang.Thread.State: RUNNABLE
>>>at java.util.zip.ZipFile.getEntry(Native Method)
>>>at java.util.zip.ZipFile.getEntry(ZipFile.java:328)
>>>- locked <0xa1b04418> (a java.util.jar.JarFile)
>>>at java.util.jar.JarFile.getEntry(JarFile.java:253)
>>>at java.util.jar.JarFile.getJarEntry(JarFile.java:236)
>>>at 
>>> org.apache.catalina.webresources.AbstractSingleArchiveResourceSet.getArchiveEntry(AbstractSingleArchiveResourceSet.java:97)
>>>at 
>>> org.apache.catalina.webresources.Abs

Re: CVE-2019-0232 & CVE-2020-1938

2024-07-15 Thread Chuck Caldarale


> On Jul 15, 2024, at 12:24, Jurevich, Aidan 
>  wrote:
> 
> My organization has a few devices that have the file tomcat-juli-8.5.57.jar 
> installed on them via the program Altair and are showing up as vulnerable to 
> CVE-2019-0232 and CVE-2020-1938, which according to your documentation seems 
> to be fixed for this version of the file. This seems to be an issue with 
> Microsoft Defender being unable to read the version of the file. I was just 
> making sure for our records that this issue has been solved as well as 
> checking to see if you had any recommendations about how we can get this file 
> to stop popping up as vulnerable.


Something Chris didn’t mention: Tomcat 8.5.x reached end-of-life on 31 March 
2024, so any 3rd-party still using it internally is completely on their own and 
fully responsible for all support thereof.

You really should insist that Altair upgrade their product immediately.

  - Chuck


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org