[Mono-bugs] [Bug 59688][Blo] Changed - Critical Bug causing large HTTP POSTs to fail in Internet Explorer

bugzilla-daemon@bugzilla.ximian.com bugzilla-daemon@bugzilla.ximian.com
Thu, 10 Jun 2004 06:45:43 -0400 (EDT)


Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by gonzalo@ximian.com.

http://bugzilla.ximian.com/show_bug.cgi?id=59688

--- shadow/59688	2004-06-10 04:31:39.000000000 -0400
+++ shadow/59688.tmp.15348	2004-06-10 06:45:43.000000000 -0400
@@ -289,6 +289,20 @@
 checking if there are any available bytes and if so, reading 2 (if 
 they are available) before closing the connection.  This fixes the 
 XSP problem and closes this bug report :-)
 
 
 
+
+------- Additional Comments From gonzalo@ximian.com  2004-06-10 06:45 -------
+Just for the record, RFC 2616 section 4.4 have a priority list for the
+content-length plus:
+
+"For compatibility with HTTP/1.0 applications, HTTP/1.1 requests
+containing a message-body MUST include a valid Content-Length header
+field unless the server is known to be HTTP/1.1 compliant."
+
+and
+
+"When a Content-Length is given in a message where a message-body is
+allowed, its field value MUST exactly match the number of OCTETs in
+the message-body."