Good morning and thanks for the replies!

Unfortunately, as far as I am aware, our bank determines who we must
use as the PCI Auditor so our hands are tied with that one, but it
does seem like they're just covering their backs by choosing the
latest available version rather than actually determining a reason as
to why its needed.

However, thanks for looking into my problem... the first thing that
rang a bell was the mention that it could be to do with the JSPs. I
have checked for development mode settings and neither have it
enabled. The bell it rang though was that, for some slightly silly
reasons that I am planning on finally clearing up today to see if they
are the cause, we have, in certain pages of the site, roughly 1000
<c:set> tags of text for different languages set in request scope. I
know these should be implemented through properties files instead but
the excuses are for me to deal with not you guys!

Could this be link to the cause though? Could it somehow be that the
text variables are being held or referenced for longer than the
request scope period and so quickly eating up memory?

I also remembered some changes we made to the tomcat settings in
web.xml to fork the compilation of JSPs to a separate JVM and we had
set the 'modificationTestInterval' to 40 seconds. These may have had
an impact as well so I'll change these in the later versions of Tomcat
to see if they have any effect.

Thanks again,

Ian




On 22 July 2011 22:42, Pid <p...@pidster.com> wrote:
> On 22/07/2011 20:17, Mark Thomas wrote:
>> On 22/07/2011 17:26, Ian Marsh wrote:
>>> Hi,
>>>
>>> I am in charge of running a Apache-2, Tomcat-7, Ubuntu-10.04 set up
>>> for which we have to be PCI Compliant. We recently upgraded to
>>> Apache-2.2.17 and Tomcat-7.0.8 (from Apache-2.0.x and Tomcat 5.0.28)
>>> in order to comply with the requirements of the PCI Compliance checks
>>> and ironed out any issues to get us back to a satisfactory running
>>> state.
>>
>> Hmm. I think you need some better PCI auditors. If your app was running
>> on Tomcat 5.0.x and you trust the app (which seems reasonable given it
>> is doing something that requires PCI compliance) then an upgrade to
>> 7.0.12 should be sufficient if you using the HTTP BIO connector.
>
> Indeed.
>
> In my experience, I'd expect a QSA/PCI Auditor to be far, far more
> conservative than to promote Tomcat 7.0.x as a 'safe' version compared
> to 6.0.recent.
>
>
> p
>
>
>> Since Tomcat appears to behind httpd then there is a strong chance you
>> are using AJP (BIO or APR), in which case 7.0.2 should be sufficient.
>>
>> It appears your current auditors are blindly (and wrongly) assuming any
>> vulnerability in Tomcat will impact your installation. Expect a demand
>> to upgrade to 7.0.19 when they get around to reading the Tomcat security
>> pages again.
>>
>> <snip/>
>>
>>> It seems that the character arrays [C, java.lang.String and
>>> javax.servlet.jsp.tagext.TagAttributeInfo entries are considerably
>>> higher in Tomcat-7.0.10 than in Tomcat-7.0.8 and I am wondering if
>>> this could lead to an explanation for the difference.
>>
>> Maybe. What you really want to look at is the GC roots for those
>> objects. That will tell you what is holding on to the references. Based
>> on that data I'd start looking at the arrays of TagAttributeInfo but
>> that might be completely the wrong place to look.
>>
>> I've just triggered a heap dump on the ASF Jira instance (running
>> 7.0.19) to see what that looks like. I'll report back what I find (once
>> the 4GB heap has finished downloading - it may be some time).
>>
>>> Would anyone know of any changes between the two versions, possibly
>>> linked to those memory entries, that could lead to such behaviour?
>>
>> Nothing jumped out at me from the changelog.
>>
>>> Any help or suggestions is greatly appreciated! I'm sorry for a long
>>> post, but hopefully its got the information needed to help diagnosis.
>>
>> To be honest, there isn't enough info hear to diagnose the root cause
>> but there is enough to demonstrate that there is probably a problem and
>> maybe where to start looking. That might not seem like much but it is a
>> heck of a lot better than most of the reports we get here. Thanks for
>> providing such a useful problem report.
>>
>> Mark
>>
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to