--- Begin Message ---
Package: apache2
Version: 2.4.18-1
Severity: important
Dear Maintainer,
Process apache2 restart every minute. I'm not find answer in google. I'd tried disable mod_php5 and mod_ssl.
[Sat Jan 02 09:32:01.899749 2016] [mpm_prefork:notice] [pid 12361] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:32:12.240852 2016] [mpm_prefork:notice] [pid 12478] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:32:12.240954 2016] [core:notice] [pid 12478] AH00094: Command line: '/usr/sbin/apache2'
[Sat Jan 02 09:33:01.578899 2016] [mpm_prefork:notice] [pid 12478] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:33:11.733537 2016] [mpm_prefork:notice] [pid 12594] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:33:11.733636 2016] [core:notice] [pid 12594] AH00094: Command line: '/usr/sbin/apache2'
[Sat Jan 02 09:34:02.071793 2016] [mpm_prefork:notice] [pid 12594] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:34:12.347026 2016] [mpm_prefork:notice] [pid 12710] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:34:12.347129 2016] [core:notice] [pid 12710] AH00094: Command line: '/usr/sbin/apache2'
[Sat Jan 02 09:35:01.671616 2016] [mpm_prefork:notice] [pid 12710] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:35:12.335618 2016] [mpm_prefork:notice] [pid 12827] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:35:12.335719 2016] [core:notice] [pid 12827] AH00094: Command line: '/usr/sbin/apache2'
[Sat Jan 02 09:36:01.686150 2016] [mpm_prefork:notice] [pid 12827] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:36:11.896685 2016] [mpm_prefork:notice] [pid 12943] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:36:11.896832 2016] [core:notice] [pid 12943] AH00094: Command line: '/usr/sbin/apache2'
[Sat Jan 02 09:37:02.249278 2016] [mpm_prefork:notice] [pid 12943] AH00169: caught SIGTERM, shutting down
[Sat Jan 02 09:37:12.526635 2016] [mpm_prefork:notice] [pid 13060] AH00163: Apache/2.4.18 (Debian) OpenSSL/1.0.2e PHP/5.6.16-3 c
[Sat Jan 02 09:37:12.526740 2016] [core:notice] [pid 13060] AH00094: Command line: '/usr/sbin/apache2'
-- Package-specific info:
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.3.0-1-amd64 (SMP w/3 CPU cores)
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages apache2 depends on:
ii apache2-bin 2.4.18-1
ii apache2-data 2.4.18-1
ii apache2-utils 2.4.18-1
ii dpkg 1.18.4
ii lsb-base 9.20150917
ii mime-support 3.59
ii perl 5.22.1-3
ii procps 2:3.3.10-4+b1
Versions of packages apache2 recommends:
ii ssl-cert 1.0.37
Versions of packages apache2 suggests:
pn apache2-doc <none>
pn apache2-suexec-pristine | apache2-suexec-custom <none>
ii links [www-browser] 2.12-1+b1
ii w3m [www-browser] 0.5.3-26
Versions of packages apache2-bin depends on:
ii libapr1 1.5.2-3
ii libaprutil1 1.5.4-1+b1
ii libaprutil1-dbd-sqlite3 1.5.4-1+b1
ii libaprutil1-ldap 1.5.4-1+b1
ii libc6 2.21-6
ii libldap-2.4-2 2.4.42+dfsg-2+b1
ii liblua5.1-0 5.1.5-8
ii libnghttp2-14 1.6.0-1
ii libpcre3 2:8.38-1
ii libssl1.0.2 1.0.2e-1
ii libxml2 2.9.3+dfsg1-1
ii perl 5.22.1-3
ii zlib1g 1:1.2.8.dfsg-2+b1
Versions of packages apache2-bin suggests:
pn apache2-doc <none>
pn apache2-suexec-pristine | apache2-suexec-custom <none>
ii links [www-browser] 2.12-1+b1
ii w3m [www-browser] 0.5.3-26
Versions of packages apache2 is related to:
ii apache2 2.4.18-1
ii apache2-bin 2.4.18-1
-- Configuration Files:
/etc/apache2/mods-available/mpm_prefork.conf changed:
<IfModule mpm_prefork_module>
StartServers 5
MinSpareServers 5
MaxSpareServers 10
MaxRequestWorkers 800
MaxConnectionsPerChild 0
ServerLimit 800
</IfModule>
/etc/apache2/mods-available/ssl.conf changed:
<IfModule mod_ssl.c>
# Pseudo Random Number Generator (PRNG):
# Configure one or more sources to seed the PRNG of the SSL library.
# The seed data should be of good random quality.
# WARNING! On some platforms /dev/random blocks if not enough entropy
# is available. This means you then cannot use the /dev/random device
# because it would lead to very long connection times (as long as
# it requires to make more entropy available). But usually those
# platforms additionally provide a /dev/urandom device which doesn't
# block. So, if available, use this one instead. Read the mod_ssl User
# Manual for more details.
#
SSLRandomSeed startup builtin
SSLRandomSeed startup file:/dev/urandom 512
SSLRandomSeed connect builtin
SSLRandomSeed connect file:/dev/urandom 512
##
## SSL Global Context
##
## All SSL configuration in this context applies both to
## the main server and all SSL-enabled virtual hosts.
##
#
# Some MIME-types for downloading Certificates and CRLs
#
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
# Pass Phrase Dialog:
# Configure the pass phrase gathering process.
# The filtering dialog program (`builtin' is a internal
# terminal dialog) has to provide the pass phrase on stdout.
SSLPassPhraseDialog builtin
# Inter-Process Session Cache:
# Configure the SSL Session Cache: First the mechanism
# to use and second the expiring timeout (in seconds).
# (The mechanism dbm has known memory leaks and should not be used).
#SSLSessionCache dbm:${APACHE_RUN_DIR}/ssl_scache
SSLSessionCache shmcb:${APACHE_RUN_DIR}/ssl_scache(512000)
SSLSessionCacheTimeout 300
# Semaphore:
# Configure the path to the mutual exclusion semaphore the
# SSL engine uses internally for inter-process synchronization.
# (Disabled by default, the global Mutex directive consolidates by default
# this)
#Mutex file:${APACHE_LOCK_DIR}/ssl_mutex ssl-cache
# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate. See the
# ciphers(1) man page from the openssl package for list of all available
# options.
# Enable only secure ciphers:
#SSLCipherSuite HIGH:!aNULL
SSLCipherSuite "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 !EECDH+aRSA+RC4 EECDH EDH+aRSA !RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"
# SSL server cipher order preference:
# Use server priorities for cipher algorithm choice.
# Clients may prefer lower grade encryption. You should enable this
# option if you want to enforce stronger encryption, and can afford
# the CPU cost, and did not override SSLCipherSuite in a way that puts
# insecure ciphers first.
# Default: Off
SSLHonorCipherOrder on
# The protocols to enable.
# Available values: all, SSLv3, TLSv1, TLSv1.1, TLSv1.2
# SSL v2 is no longer supported
SSLProtocol all -SSLv3
# Allow insecure renegotiation with clients which do not yet support the
# secure renegotiation protocol. Default: Off
#SSLInsecureRenegotiation on
# Whether to forbid non-SNI clients to access name based virtual hosts.
# Default: Off
#SSLStrictSNIVHostCheck On
</IfModule>
-- no debconf information
--- End Message ---