ID:               16198
 Updated by:       [EMAIL PROTECTED]
 Reported By:      [EMAIL PROTECTED]
 Status:           Feedback
 Bug Type:         Output Control
 Operating System: linux (rh 7.1/7.2)
 PHP Version:      4.1.2
 New Comment:

you have just discovered HTTP/1.1 chunked content encoding

please (re-)read RFC2616 , sec 3.6.1


Previous Comments:
------------------------------------------------------------------------

[2002-03-21 02:40:33] [EMAIL PROTECTED]

Can you please check if php-4.2.0rc1 (downloadable from
www.php.net/~derick) inhibits the same bahavior?

Derick

------------------------------------------------------------------------

[2002-03-20 23:29:36] [EMAIL PROTECTED]

ANY PHP SCRIPT WILL EXHIBIT THIS PROBLEM!

our server info is at http://www.ice.org/info.php

we saw this bug in 4.0.6, upgraded to 4.1.2 and it is still there. 
mysql support is built in.  looking at the www.zend.com problem it
appears your dev version of 4.1.3 also has this bug.

i noticed that www.php.net does not exhibit this problem.
php.net appears to be a 4.2.0 dev version from this http header:

Server: Apache/1.3.20 (Unix) DAV/0.9.18-dev PHP/4.2.0-dev
X-Powered-By: PHP/4.2.0-dev

sites that do exhibit this problem are www.php.com (3 bytes)..
www.zend.com exhibits this problem but with _4 bytes_ + crlf .. breaks
the 3 byte + crlf thought i had. and many many more servers on the
web.

when working on ice.org's website i noticed 5 bytes being appending the
the HTTP header, these bytes are constant per page but not between
them, at the end of the header you expect (in hex):

0D 0A 0D 0A

and right after you'd expect the content, this is incorrect in this
bug, you see three bytes and then another crlf pair:

OD OA OD OA 64 63 34 OD OA

it appears to always be 3 bytes and a crlf pair.

these extra bytes are bogus and to properly utilize the content type
they need to be removed.  it appears IE ignores these bytes, perhaps
the network parser just looks for a final OD OA and thus no one using
IE as a browser will complain about bogus content being served.

-brander lien
[EMAIL PROTECTED]

example network dump from www.zend.com / the bogus bytes would be
represented via 84d2.. right before the html content:

HTTP/1.1 2OK..Date: Thu, 21 Mar 2002 04:18:41 GMT..Server:
Apache/1.3.20 (Unix) PHP/4.1.3-dev mod_macro 32 /1.1.1 mod_ssl/2.8.4
OpenSSL/0.9.6..X-Powered-By: PHP/4.1.3-dev..Set-Cookie:
Zend_Session_DB=bd600c5ce909393058282a6b0936a3ad; expires=Thu,
21-Mar-2002 09:18:41 GMT; path=/..Expires: Thu, 19 Nov 1981 08:52:00
GMT..Cache-Control: no-store, no-cache, must-revalidate, post-check=0,
pre-check=0..Pragma: no-cache..Set-Cookie: Zend_In=deleted;
expires=Wed, 21-Mar-2001 04:18:40 GMT; path=74 /..Keep-Alive:
timeout=5, max=1000..Connection: Keep-Alive..Transfer-Encoding:
chunked..Content-Type: text/html....84d2..<!DOCTYPE HTML PUBLIC
"-//W3C//DTD HTML 4.0 Transitional//EN">

configure line:
 './configure' 'i386-redhat-linux' '--prefix=/usr' '--exec-prefix=/usr'
'--bindir=/usr/bin' '--sbindir=/usr/sbin' '--sysconfdir=/etc'
'--datadir=/usr/share' '--includedir=/usr/include' '--libdir=/usr/lib'
'--libexecdir=/usr/libexec' '--localstatedir=/var'
'--sharedstatedir=/usr/com' '--mandir=/usr/share/man'
'--infodir=/usr/share/info' '--prefix=/usr'
'--with-config-file-path=/etc' '--disable-debug' '--enable-pic'
'--disable-rpath' '--enable-inline-optimization'
'--with-apxs=/usr/sbin/apxs' '--with-bz2' '--with-exec-dir=/usr/bin'
'--with-gettext' '--with-jpeg-dir=/usr' '--with-mm' '--with-openssl'
'--with-png' '--with-regex=system' '--with-ttf' '--with-zlib'
'--with-layout=GNU' '--enable-bcmath' '--enable-debugger'
'--enable-ftp' '--enable-magic-quotes' '--enable-safe-mode'
'--enable-sockets' '--enable-sysvsem' '--enable-sysvshm'
'--enable-track-vars' '--enable-yp' '--enable-wddx' '--without-mysql'
'--without-unixODBC' '--without-oracle' '--without-oci8'
'--with-pspell' '--with-xml'

------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=16198&edit=1

Reply via email to