DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=39243>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=39243





------- Additional Comments From [EMAIL PROTECTED]  2006-07-13 17:51 -------
While I do believe the previous unlimited approach could be a DoS. Nice catch. 
I have to believe the "one size limit fits all" approach will not work for all 
the existing applications in the world.   However, shouldn't we add a 
SSLMaxIOBuffer directive instead of hardcoding the value at build time?  This 
way any pre-built server or existing applications have a way to raise/lower 
this value as needed for any given virtual host or directory?


-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to