Hello Rob,

Thanks for answering. The router in question is a 3C:
Software Version        1.04-168
Hardware Version        02.01
3C Number               3CR860-95

And it looks like you're right on the 'overly aggressive attack pattern
check', it's a model specific issue. For reference:
http://www.dslreports.com/forum/remark,14974812

I'll try to trim the parameters here.

Regards,
Diego

Rob Heittman wrote:
> Anything you can share about the router model that is doing the
> blacklisting (and its firmware version)?  It sounds like an overly
> aggressive attack pattern check on the router's part -- never seen
> anything like this before and people abort their uploads to our Restlet
> powered servers all the time.  If I am fortunate enough to have the
> appropriate hardware/firmware around I would be happy to snoop some
> packets and check it out, but otherwise I think this is probably going
> to be really, really tough to reproduce.
> 
> On Sat, Nov 22, 2008 at 2:59 AM, Diego Ballve
> <[EMAIL PROTECTED]
> <mailto:[EMAIL PROTECTED]>> wrote:
> 
>     The behavior can be consistently reproduced with our setup and access to
>     remote server is temporarily blocked to entire office subnet. The client
>     application makes a GET and then a POST w/ a big file, so that I have
>     time to pull the plug, and that's it.

Reply via email to