[Mono-bugs] [Bug 59688][Blo] Changed - Critical Bug causing large HTTP POSTs to fail in Internet Explorer
bugzilla-daemon@bugzilla.ximian.com
bugzilla-daemon@bugzilla.ximian.com
Thu, 10 Jun 2004 06:45:43 -0400 (EDT)
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by gonzalo@ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=59688
--- shadow/59688 2004-06-10 04:31:39.000000000 -0400
+++ shadow/59688.tmp.15348 2004-06-10 06:45:43.000000000 -0400
@@ -289,6 +289,20 @@
checking if there are any available bytes and if so, reading 2 (if
they are available) before closing the connection. This fixes the
XSP problem and closes this bug report :-)
+
+------- Additional Comments From gonzalo@ximian.com 2004-06-10 06:45 -------
+Just for the record, RFC 2616 section 4.4 have a priority list for the
+content-length plus:
+
+"For compatibility with HTTP/1.0 applications, HTTP/1.1 requests
+containing a message-body MUST include a valid Content-Length header
+field unless the server is known to be HTTP/1.1 compliant."
+
+and
+
+"When a Content-Length is given in a message where a message-body is
+allowed, its field value MUST exactly match the number of OCTETs in
+the message-body."