On 29/04/11 01:38, Supratik Goswami wrote:
@Amos
Thanks for the information.
There is one confusion still in my mind. How reply_body_max_size is
able detect it ?
In the Squid documentation it says:
"This size is checked twice. First when we get the reply headers,
Note at this point the TCP connection is wide open, the request is
already sent, the reply has been created and has started arriving back.
Far to late to decide which IP to use when opening the TCP connection.
we check the content-length value. If the content length value exists
and is larger than the allowed size, the request is denied and the
user receives an error message that says "the request or reply
is too large." If there is no content-length, and the reply
size exceeds this limit, the client's connection is just closed
Note at this point all of the above has happened PLUS the reply headers
and large portion of the reply body have been received AND relayed on to
the client already.
Far too late to send anything else back to the client. The *only*
choice is to abort with a TCP RST (TCP closure implying an error has
happened).
and they will receive a partial reply."
So, I think if something similar to reply_body_max_size or any
workaround is present which uses reply_body_max_size directive
then the issue could be easily resolved.
If the proxy was psychic perhapse. A serial sequence of events being the
key problem.
Amos
--
Please be using
Current Stable Squid 2.7.STABLE9 or 3.1.12
Beta testers wanted for 3.2.0.7 and 3.1.12.1