https://bz.apache.org/bugzilla/show_bug.cgi?id=65844
Bug ID: 65844
Summary: Expect: 100-continue changed behavior in ecebcc0
Product: Apache httpd-2
Version: 2.4.49
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Core
Assignee: [email protected]
Reporter: [email protected]
Target Milestone: ---
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c
seem to had changed behavior for 'Expect: 100-continue'. For
https://github.com/pgajdos/apache-rex/tree/master/mod_ssl-proxy-auth
I get with 2.4.48+ecebcc0:
[1] with Expect: 100-continue
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
< Connection: close
* Closing connection 0
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Connection #1 to host frontend.su.se left intact
[2] without Expect: 100-continue
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* Connection #0 to host frontend.su.se left intact
* Re-using existing connection! (#0) with host frontend.su.se
* Connection #0 to host frontend.su.se left intact
For 2.4.48 I get in [1] the same behavior (reusing connection) as in
[2] here. Is that intended? If I got it correctly, some site have a
problem with not maintaining keepalive connection after 401.
Details
=======
requests are made by
echo "[1] with Expect: 100-continue"
curl -v -s -H 'Expect: 100-continue' --cacert $AREX_RUN_DIR/ca/my.crt --resolve
"frontend.su.se:$AREX_PORT1:127.0.0.1" https://frontend.su.se:$AREX_PORT1/ \
--next --cacert $AREX_RUN_DIR/ca/my.crt --resolve
"frontend.su.se:$AREX_PORT1:127.0.0.1" -u john:StrongPassword
https://frontend.su.se:$AREX_PORT1/ \
2>&1 | grep -i connection
echo "[2] without Expect: 100-continue"
curl -v -s --cacert $AREX_RUN_DIR/ca/my.crt --resolve
"frontend.su.se:$AREX_PORT1:127.0.0.1" https://frontend.su.se:$AREX_PORT1/ \
--next --cacert $AREX_RUN_DIR/ca/my.crt --resolve
"frontend.su.se:$AREX_PORT1:127.0.0.1" -u john:StrongPassword
https://frontend.su.se:$AREX_PORT1/ \
2>&1 | grep -i connection
configured virtualhosts
<VirtualHost *:60081>
ServerName frontend.su.se
ErrorLog "/tmp/apache-rex/mod_ssl-proxy-auth/error_log-frontend"
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
RequestHeader unset Expect early
SSLEngine on
SSLProxyEngine on
SSLCertificateFile
/tmp/apache-rex/mod_ssl-proxy-auth/frontend.su.se/my.crt
SSLCertificateKeyFile
/tmp/apache-rex/mod_ssl-proxy-auth/frontend.su.se/private.key
SSLProtocol all
<IfVersion >= 2.3.0>
SSLCipherSuite DEFAULT
</IfVersion>
<IfVersion < 2.3.0>
SSLCipherSuite ALL
</IfVersion>
SSLHonorCipherOrder on
CustomLog /tmp/apache-rex/mod_ssl-proxy-auth/server_log-frontend
ssl_combined
SSLProxyCheckPeerName off
ProxyPass / "https://127.0.0.1:60082/"
</Virtualhost>
Listen 60082
<VirtualHost *:60082>
ServerName backend.su.se
ErrorLog "/tmp/apache-rex/mod_ssl-proxy-auth/error_log-backend"
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
SSLEngine on
SSLCertificateFile /tmp/apache-rex/mod_ssl-proxy-auth/backend.su.se/my.crt
SSLCertificateKeyFile
/tmp/apache-rex/mod_ssl-proxy-auth/backend.su.se/private.key
SSLProtocol all
<IfVersion >= 2.3.0>
SSLCipherSuite DEFAULT
</IfVersion>
<IfVersion < 2.3.0>
SSLCipherSuite ALL
</IfVersion>
SSLHonorCipherOrder on
CustomLog /tmp/apache-rex/mod_ssl-proxy-auth/server_log-backend
ssl_combined
<Directory /tmp/apache-rex/mod_ssl-proxy-auth/htdocs>
AuthType Basic
AuthBasicProvider file
AuthName "Restricted Area"
AuthUserFile /tmp/apache-rex/mod_ssl-proxy-auth/htpasswd
Require valid-user
</Directory>
</Virtualhost>
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]