Thus said Kelly Dean on Fri, 09 Jan 2015 08:39:35 +0000:

> HTTPS  can't prevent  a  proxy from  dropping  packets, including  all
> packets after  a certain number of  bytes for the connection.  It also
> doesn't prevent bogus reset packets, though a properly-designed secure
> transport protocol (i.e. not SSL) could prevent them.

Right, I'm still  not sure how a dropped packet  would cause this unless
the SSL transport treated  the lost packet as the end  of the stream and
gave Fossil what it had (an incomplete response).

> Did you get the partially-cloned repository files that I posted?

I did. I  looked at the repository  and I could see  that the repository
had a  some of  the artifacts.  It had  the project  configuration which
means it  went 2 rounds  (confirmed by the  output), but it  didn't have
a  project-code,  which seems  only  possible  if  it didn't  receive  a
project-code in any push card in the response.

But  if it  didn't  get a  push  card,  it likely  also  didn't get  the
clone_seqno, and yet, it did complete the clone and rebuild, which means
there were no reported errors.

I suppose it's possible that it  went 2 round-trips, got the headers for
the third  round-trip, and then the  SSL transport returned no  data. If
the  second response  was truncated  before  getting the  push card  and
before getting  clone_seqno, the  third response  might cause  Fossil to
drop out of the clone loop. This explanation seems to fit the facts, but
reproducing it is a pain.

Let me see if I can cause what  I've just stated above to happen. :-) If
this  is the  case, then  checking the  response data  size against  the
Content-length header would indeed ameliorate the problem.

Thanks for your response.

Andy
-- 
TAI64 timestamp: 4000000054aff84e


_______________________________________________
fossil-users mailing list
[email protected]
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to