DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8677>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8677 mod_proxy ALWAYS nukes Content-Length [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|Normal |Enhancement Status|RESOLVED |REOPENED Resolution|INVALID | Summary|mod_proxy ALWAYS nukes |mod_proxy ALWAYS nukes |Content-Length and Transfer-|Content-Length |Encoding if body sent | ------- Additional Comments From [EMAIL PROTECTED] 2002-05-05 19:47 ------- I think I'll reopen this, at least until someone can convince me that this is really how things "should be". It certainly seems like it is "allowed", and it shouldn't actually break any clients, but it does not seem at all optimal. For HTTP/1.0 clients it verges on very bad behvior. I'll also downgrade to "Enhancement" and remove the encoding reference. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]