On 10/21/2015 10:01 AM, Andy Wang wrote:

I will do that today.

And thank you to Rudiger and yourself, and everyone else on the thread
for all the help.

I missed the trailing 0x0a in the different wireshark captures.  I was
trusting wireshark's http dissection rather than looking at the raw hex
data and it didn't show the trailing \n.

I gotta go back to the basics and lean less on wireshark's
"intelligence" :)

Oh, and the plugin developer actually identified where the \n was coming
from and has resolved it on the client end.

I do have one question.  Any idea why this only occurs on Windows servers?

Tested with the patch and looks good.
I tried to recreate it using ncat and sending an extra \n but I'm not having luck. I see the extra byte on my pcap. Still curious what other conditions create this but oh well, at this point it's in my rear-view-mirror.

Thanks again for all the help and the solution.
Andy

Reply via email to