Kevin wrote:
> 
> Is it your take then, that this problem only manifests itself in a
> poorly designed web application?  If so, I'll pass that along to the
> plone developers and maybe they need to modify some of their code.

That's not what that article, or a host of others, has to say about the
matter.  The issue is that the original expectations...

Client
POST /something HTTP/1.1
Host: myserver.com
Expect: 100-continue
{Client Headers}
      |
      V
    Server
    XXX ERROR RESULT
    100 CONTINUE
    {Server Headers}
      |
      V
{Client request body}
      |
      V
    Server
    XXX OK OR ERROR RESULT
    {Server Headers}
    {Server Response Body}

has been violated by any number of clients and servers in interesting
ways, leading to additional workarounds that again violate more combos
of clients and servers.  A vicious cycle.

> But if the failures I'm seeing have nothing to do with apache itself,
> then why is apache throwing the error?  Realize that I'm not familiar
> with the code in question.

Apache passes on whatever request body and respond it's supposed to pass
on between the client and the application.

It will respond TOO LARGE if your application decides to respond with that.
It will respond TOO LARGE if you have configured LimitRequestBody and the
size of the POST exceeds your limit.

http://httpd.apache.org/docs/2.2/mod/core.html#limitrequestbody

Want to know how to get 'out of' that bug?  Try configuring on an internal
only (firewalled) port to respond from your application without SSL at all.

Bill

Reply via email to