https://issues.apache.org/bugzilla/show_bug.cgi?id=44818

Mark Thomas <ma...@apache.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |WONTFIX

--- Comment #6 from Mark Thomas <ma...@apache.org> ---
The only way to handle this would be to explicitly deny GET requests with a
content length header and close the connection with a 400 response.

If an application wants to do this, they can do so with a Filter.

There is no greater DoS risk with this than there is with a POST request that
fails to provide the complete request body.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to