DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=39162>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=39162


[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |ASSIGNED




------- Additional Comments From [EMAIL PROTECTED]  2006-03-31 19:22 -------
I presume the code dies when there's no content length to stop people sending 
infinite length uploads to 
the server (DOS attack).

However; could we not have a specialized InputStream in place for these 
occasions that keeps a count of 
the number of bytes that have come in and blows up when it passes the max?

------- Additional Comments From [EMAIL PROTECTED]  2006-04-01 02:53 -------
I agree that there should be API where people can say the max size of an 
upload they want. In PHP, for example, you define such value in PHP.INI. I 
wouldn't mind having to pay this small price in exchange for the extra feature.

Cell phones are so pervasive now, I think that the need to support this type 
of encoding is very real. Well, I definitely need it for now :-)

BTW, the O'Reilly lib has the same problem 
(com.oreilly.servlet.multipart.MultipartParser , at http://servlets.com/cos/ )


-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to