Return-Path: Delivered-To: apmail-httpd-bugs-archive@www.apache.org Received: (qmail 82357 invoked from network); 25 Jun 2008 12:58:29 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 25 Jun 2008 12:58:29 -0000 Received: (qmail 27734 invoked by uid 500); 25 Jun 2008 12:58:30 -0000 Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 27455 invoked by uid 500); 25 Jun 2008 12:58:30 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: Reply-To: "Apache HTTPD Bugs Notification List" List-Id: Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 27434 invoked by uid 99); 25 Jun 2008 12:58:30 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 25 Jun 2008 05:58:30 -0700 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 25 Jun 2008 12:57:37 +0000 Received: by brutus.apache.org (Postfix, from userid 33) id 1AD0B234C14C; Wed, 25 Jun 2008 05:57:56 -0700 (PDT) From: bugzilla@apache.org To: bugs@httpd.apache.org Subject: DO NOT REPLY [Bug 44592] mod_proxy fails to send post request to backend server X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: newchanged X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Apache httpd-2 X-Bugzilla-Component: mod_proxy X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: apache.org@bachfreund.nl X-Bugzilla-Status: NEEDINFO X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: bugs@httpd.apache.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: In-Reply-To: Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Message-Id: <20080625125757.1AD0B234C14C@brutus.apache.org> Date: Wed, 25 Jun 2008 05:57:56 -0700 (PDT) X-Virus-Checked: Checked by ClamAV on apache.org https://issues.apache.org/bugzilla/show_bug.cgi?id=44592 --- Comment #16 from Spil 2008-06-25 05:57:55 PST --- Still analyzing the captures. And not understanding what I see. Seems that the POST header is in one SSL session, the POST body is in the next SSL session. Example : Framenumber, Time, S(erver), C(lient):port 3045 C:1530->S POST /sap()/........ 3046 C:1530->S continuation of 3045 upto end of headers + 0D0A0D0A 3047 C:1530->S [FIN,ACK] 3050 C:1531->S [SYN] 3052 S->C:1530 [ACK] 3054 S->C:1531 [SYN,ACK] 3061 C:1531->S Client Hello 3062 S->C:1531 Server Hello 3063 C:1531->S Client Key Exchange 3064 S->C:1531 Change Cipher Spec, Finished 3065 C:1531->S POST body 3066 C:1531->S continuation of POST Problem in the Wireshark (Win32 1.0.0) version is that the Decrypted SSL shows the complete POST (header and body) so we inadvertedly assumed the POST was complete. The payload of the header is 1460+61 bytes, the payload of the body 1948 bytes. Wireshark shows the complete POST whichever TCP stream I select, indicating that Wireshark is able to figure out that this is in fact one http request. Is this an error with the client or is it an error with the server? -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org