[Mono-bugs] [Bug 59688][Blo] Changed - Critical Bug causing large HTTP POSTs to fail in Internet Explorer
bugzilla-daemon@bugzilla.ximian.com
bugzilla-daemon@bugzilla.ximian.com
Wed, 9 Jun 2004 07:26:46 -0400 (EDT)
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by davidandrewtaylor@hotmail.com.
http://bugzilla.ximian.com/show_bug.cgi?id=59688
--- shadow/59688 2004-06-08 02:08:52.000000000 -0400
+++ shadow/59688.tmp.21346 2004-06-09 07:26:46.000000000 -0400
@@ -131,6 +131,37 @@
I am running Mono on Redhat 9 kernel 2.4.20-8. Please also note
that the raw TCPDUMP viewed in ethereal clearly shows the server
sending a TCP RST, which must be a clue. We might need some hard
core TCP hackers to diagnose this one? My earlier attachment was
only showing the HTTP part of the TCPdump (which does not show the
problem) - would it help if I uploaded a few raw tcpdumps?
+
+------- Additional Comments From davidandrewtaylor@hotmail.com 2004-06-09 07:26 -------
+I have spent the last 24+ hours working on isolating this bug. This
+bug occurs in every case I have tried including the following
+servers:
+* Redhat 7.3 (2.4.20-19.7), 9.0, and FC1
+* Suse 9.1
+And the following clients:
+* IE6 on Windows 2000, Windows XP SP1 and Windows Server 2003
+
+I have also tried multiple machines; multiple networks (both home
+and work); compiling from source and installing the RPMs; and having
+4-5 people at work reproduce exactly the same defect. In all cases
+my test case causes the error 70% + of the time with a TCP reset
+(RST) command being sent from the web server.
+
+This needs to be fixed before we ship MONO; or else we should limit
+XSP to localhost only (because I have only seen the bug in IE) and
+thus force people to use mod-mono and Apache where this error does
+not occur.
+
+Gonzalo - can you try a different Linux distro as possibly this
+defect is not occuring in your distro?
+
+I will also append a raw TCPDump. Please look at the very bottom to
+see the server sending the RSP command.
+
+
+
+
+