Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 58253 invoked from network); 14 Apr 2007 20:35:11 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 14 Apr 2007 20:35:11 -0000 Received: (qmail 1903 invoked by uid 500); 14 Apr 2007 20:35:06 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 1888 invoked by uid 500); 14 Apr 2007 20:35:05 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 1877 invoked by uid 99); 14 Apr 2007 20:35:05 -0000 Received: from herse.apache.org (HELO herse.apache.org) (140.211.11.133) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 14 Apr 2007 13:35:05 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: local policy) Received: from [194.109.24.25] (HELO smtp-vbr5.xs4all.nl) (194.109.24.25) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 14 Apr 2007 13:34:58 -0700 Received: from webmail.xs4all.nl (dovemail5.xs4all.nl [194.109.26.7]) by smtp-vbr5.xs4all.nl (8.13.8/8.13.8) with ESMTP id l3EKYa27032625 for ; Sat, 14 Apr 2007 22:34:36 +0200 (CEST) (envelope-from sanguis@xs4all.nl) Received: from 82.92.184.195 (SquirrelMail authenticated user sanguis) by webmail.xs4all.nl with HTTP; Sat, 14 Apr 2007 22:34:36 +0200 (CEST) Message-ID: <7075.82.92.184.195.1176582876.squirrel@webmail.xs4all.nl> In-Reply-To: References: Date: Sat, 14 Apr 2007 22:34:36 +0200 (CEST) From: "Joost de Heer" To: users@httpd.apache.org Reply-To: sanguis@xs4all.nl User-Agent: SquirrelMail/1.4.8 MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Virus-Scanned: by XS4ALL Virus Scanner X-Virus-Checked: Checked by ClamAV on apache.org Subject: Re: [users@httpd] CGI question > I used wget. It is a little hard to capture with firefox because the > redirect gets followed before you have a chance to examine where you > are. And it can't be done manually (via telnet) because you are using > ssl. HTTPS manual testing can be done with: openssl s_client -connect server:port and then the regular HTTP commands. Joost --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org