DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8677>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8677

mod_proxy ALWAYS nukes Content-Length

[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Severity|Normal                      |Enhancement
             Status|RESOLVED                    |REOPENED
         Resolution|INVALID                     |
            Summary|mod_proxy ALWAYS nukes      |mod_proxy ALWAYS nukes
                   |Content-Length and Transfer-|Content-Length
                   |Encoding if body sent       |



------- Additional Comments From [EMAIL PROTECTED]  2002-05-05 19:47 -------
I think I'll reopen this, at least until someone can convince me that this is 
really how things "should be".   It certainly seems like it is "allowed",
and it shouldn't actually break any clients, but it does not seem at all 
optimal.  For HTTP/1.0 clients it verges on very bad behvior.

I'll also downgrade to "Enhancement" and remove the encoding reference.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to