https://bz.apache.org/bugzilla/show_bug.cgi?id=65844
Bug ID: 65844 Summary: Expect: 100-continue changed behavior in ecebcc0 Product: Apache httpd-2 Version: 2.4.49 Hardware: PC OS: Linux Status: NEW Severity: normal Priority: P2 Component: Core Assignee: bugs@httpd.apache.org Reporter: pgaj...@suse.cz Target Milestone: --- https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c seem to had changed behavior for 'Expect: 100-continue'. For https://github.com/pgajdos/apache-rex/tree/master/mod_ssl-proxy-auth I get with 2.4.48+ecebcc0: [1] with Expect: 100-continue * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 < Connection: close * Closing connection 0 * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * Connection #1 to host frontend.su.se left intact [2] without Expect: 100-continue * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * Connection #0 to host frontend.su.se left intact * Re-using existing connection! (#0) with host frontend.su.se * Connection #0 to host frontend.su.se left intact For 2.4.48 I get in [1] the same behavior (reusing connection) as in [2] here. Is that intended? If I got it correctly, some site have a problem with not maintaining keepalive connection after 401. Details ======= requests are made by echo "[1] with Expect: 100-continue" curl -v -s -H 'Expect: 100-continue' --cacert $AREX_RUN_DIR/ca/my.crt --resolve "frontend.su.se:$AREX_PORT1:127.0.0.1" https://frontend.su.se:$AREX_PORT1/ \ --next --cacert $AREX_RUN_DIR/ca/my.crt --resolve "frontend.su.se:$AREX_PORT1:127.0.0.1" -u john:StrongPassword https://frontend.su.se:$AREX_PORT1/ \ 2>&1 | grep -i connection echo "[2] without Expect: 100-continue" curl -v -s --cacert $AREX_RUN_DIR/ca/my.crt --resolve "frontend.su.se:$AREX_PORT1:127.0.0.1" https://frontend.su.se:$AREX_PORT1/ \ --next --cacert $AREX_RUN_DIR/ca/my.crt --resolve "frontend.su.se:$AREX_PORT1:127.0.0.1" -u john:StrongPassword https://frontend.su.se:$AREX_PORT1/ \ 2>&1 | grep -i connection configured virtualhosts <VirtualHost *:60081> ServerName frontend.su.se ErrorLog "/tmp/apache-rex/mod_ssl-proxy-auth/error_log-frontend" AddType application/x-x509-ca-cert .crt AddType application/x-pkcs7-crl .crl RequestHeader unset Expect early SSLEngine on SSLProxyEngine on SSLCertificateFile /tmp/apache-rex/mod_ssl-proxy-auth/frontend.su.se/my.crt SSLCertificateKeyFile /tmp/apache-rex/mod_ssl-proxy-auth/frontend.su.se/private.key SSLProtocol all <IfVersion >= 2.3.0> SSLCipherSuite DEFAULT </IfVersion> <IfVersion < 2.3.0> SSLCipherSuite ALL </IfVersion> SSLHonorCipherOrder on CustomLog /tmp/apache-rex/mod_ssl-proxy-auth/server_log-frontend ssl_combined SSLProxyCheckPeerName off ProxyPass / "https://127.0.0.1:60082/" </Virtualhost> Listen 60082 <VirtualHost *:60082> ServerName backend.su.se ErrorLog "/tmp/apache-rex/mod_ssl-proxy-auth/error_log-backend" AddType application/x-x509-ca-cert .crt AddType application/x-pkcs7-crl .crl SSLEngine on SSLCertificateFile /tmp/apache-rex/mod_ssl-proxy-auth/backend.su.se/my.crt SSLCertificateKeyFile /tmp/apache-rex/mod_ssl-proxy-auth/backend.su.se/private.key SSLProtocol all <IfVersion >= 2.3.0> SSLCipherSuite DEFAULT </IfVersion> <IfVersion < 2.3.0> SSLCipherSuite ALL </IfVersion> SSLHonorCipherOrder on CustomLog /tmp/apache-rex/mod_ssl-proxy-auth/server_log-backend ssl_combined <Directory /tmp/apache-rex/mod_ssl-proxy-auth/htdocs> AuthType Basic AuthBasicProvider file AuthName "Restricted Area" AuthUserFile /tmp/apache-rex/mod_ssl-proxy-auth/htpasswd Require valid-user </Directory> </Virtualhost> -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org For additional commands, e-mail: bugs-h...@httpd.apache.org