Return-Path: Delivered-To: apmail-httpd-bugs-archive@www.apache.org Received: (qmail 8894 invoked from network); 5 Jan 2006 19:59:33 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 5 Jan 2006 19:59:33 -0000 Received: (qmail 93994 invoked by uid 500); 5 Jan 2006 19:59:32 -0000 Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 93714 invoked by uid 500); 5 Jan 2006 19:59:30 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: Reply-To: "Apache HTTPD Bugs Notification List" List-Id: Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 93700 invoked by uid 99); 5 Jan 2006 19:59:30 -0000 X-ASF-Spam-Status: No, hits=0.6 required=10.0 tests=NO_REAL_NAME X-Spam-Check-By: apache.org Received: from [192.87.106.226] (HELO ajax.apache.org) (192.87.106.226) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 05 Jan 2006 11:59:30 -0800 Received: by ajax.apache.org (Postfix, from userid 99) id 0E26FE0; Thu, 5 Jan 2006 20:59:08 +0100 (CET) From: bugzilla@apache.org To: bugs@httpd.apache.org Subject: DO NOT REPLY [Bug 38142] New: - mod_proxy crrupt data when forward a https PUT request. Message-ID: X-Bugzilla-Reason: AssignedTo Date: Thu, 5 Jan 2006 20:59:08 +0100 (CET) X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG� RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT . ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND� INSERTED IN THE BUG DATABASE. http://issues.apache.org/bugzilla/show_bug.cgi?id=38142 Summary: mod_proxy crrupt data when forward a https PUT request. Product: Apache httpd-2 Version: 2.0.55 Platform: Other OS/Version: other Status: NEW Severity: normal Priority: P2 Component: mod_proxy AssignedTo: bugs@httpd.apache.org ReportedBy: simon.xie@peregrine.com The bug is seen under Apache 2.0.55 + openssl 0.9.8a configuration. Apache 2.0.54 + openssl 0.9.7g configuration works fine. We have a web server consists two Apache instances. The frontend has https enabled and use mod_proxy to forward requests to backend Apache instance, particularlly, we use mod_dav in backend server and want to upload files to the web server. When we try to upload files, we found that mod_proxy forwards corrupted data to the backend Apache instance as long as the data trunk is greater than a certain size. In our case, it is ok to forward 4K but 50K is not. -- If disable SSL in the frontend, mod_proxy works fine. -- If the file does not go to backend(mod_proxy), (enable mod_dav in frontend instance), the file will not be corrupted. It seems that mod_proxy can not handle https request correctly. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org