https://issues.apache.org/bugzilla/show_bug.cgi?id=44592
Roy T. Fielding <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution| |WONTFIX --- Comment #21 from Roy T. Fielding <[email protected]> 2009-04-03 19:17:38 PST --- This doesn't seem to be a problem that Apache can fix. Services generally expect a client to either make a fairly regular set of requests over time (justifying a keepalive) or to make big requests every once in a while (no keepalive). I suggest a workaround: if you can't speed up the client so that it doesn't delay for so long while constructing the request, then send an OPTIONS request in a regular interval before the huge POST so that the connection is primed and alive. Alternatively, just use a long keepalive timeout since it will only apply to SSL sessions that have already successfully negotiated, and thus should not be as much of a denial of service issue as it would for a normal public-facing website. -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
