On 6/23/05, jean-frederic clere <[EMAIL PROTECTED]> wrote: > William A. Rowe, Jr. wrote: > > ++1 To Joe's comments. > > > > Jeff's fix is technically right, but scares the nibbles out > > of me. If, for example, an exploit is able to inject the > > T-E on top of the legit C-L, I really suspect we should not > > trust the origin server at all.
One important situation to fear is a buggy server or proxy+server that we may not be able to talk to at all if we are extremely strict. [As you implied w.r.t. Apache 1.3] The smuggling fear is really if we allow keepalive on this connection to the origin server again. We could be confused by making the wrong choice from {CL, TE} and misunderstand the next response. We can set backend->close and origin->keepalive to prevent that. If we don't allow keepalive, then it is down to whether or not this single request can be parsed correctly if our choice of {CL, TE} makes sense. > > For origin servers (as opposed to clients) make this choice > > between ignore C-L, or fail, configurable? try very hard to make a reasonable choice with no configuration :) (speaking to the choir, of course) > > > > My observation is that there are far more varied clients in > > the world than servers, each with unique faults. But the > > RFC 2616 is clear... > > > > Messages MUST NOT include both a Content-Length header field and a > > non-identity transfer-coding. If the message does include a non- > > identity transfer-coding, the Content-Length MUST be ignored. > > > > When a Content-Length is given in a message where a message-body is > > allowed, its field value MUST exactly match the number of OCTETs in > > the message-body. HTTP/1.1 user agents MUST notify the user when an > > invalid length is received and detected. > > > > ...and server authors can be expected to be less buggy than clients. > > "Permissive in what we accept, strict in what we send" implies some > > strictness in what we trust to pass on to the client. We're removing the protocol breakage in what we pass on to the client. At this point, we either send a valid response or it is if the server dropped the connection before sending the full response. (I hear what you're screaming. I think the minimal-intervention path should be preferred if we can justify it.) > > So +.5 to Jeff's patch, and let's discuss if the proxy response should > > then be trusted at all with T-E and C-L, in httpd-2.x where we support > > keepalives. > > Once the patch applied we lose the information that the request was > "incorrect". > That means we won't be able to choose in proxy between sending C-L (and > dechunk) > and T-E. I don't follow here. How does the backend choice of {TE, CL} affect what we send the client?