https://bz.apache.org/bugzilla/show_bug.cgi?id=55892
--- Comment #5 from Yann Ylavic <[email protected]> --- Comment on attachment 31119 --> https://bz.apache.org/bugzilla/attachment.cgi?id=31119 patch for proxy_util.c >--- modules/proxy/proxy_util.c.orig 2013-07-11 14:21:19.000000000 +0200 >+++ modules/proxy/proxy_util.c 2013-12-16 16:06:36.000000000 +0100 >@@ -2077,7 +2077,10 @@ > * short living pool. > */ > /* are we connecting directly, or via a proxy? */ >- if (!proxyname) { >+ /* handle HTTP/1.0 via SSL like direct connect */ >+ if (!proxyname || >+ (conn->is_ssl && >+ apr_table_get(r->subprocess_env, "force-proxy-request-1.0"))) { I think we should do this regardless of HTTP version, eg : + if (!proxyname || conn->is_ssl) { There is no point in forwarding a full URL to the target server (even in HTTP/1.1), it is not itself a forward proxy. If it were, why would this work with HTTP/1.1 over SSL only, and not with HTTP/1.0 or without SSL? > *url = apr_pstrcat(p, uri->path, uri->query ? "?" : "", > uri->query ? uri->query : "", > uri->fragment ? "#" : "", -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
