Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Response headers added by proxy servers missing in CURLINFO_HEADER_SIZE #60

Closed
wants to merge 1 commit into from

Conversation

mj
Copy link
Contributor

@mj mj commented Mar 6, 2013

Often times proxy servers add their own headers (like HTTP/1.0 200 Connection established) to responses on their way back to the client. The size of these headers was not taken into account when calculating CURLINFO_HEADER_SIZE before the change from this pull request.

The problem can be reproduced quite easily using the test program from https://gist.github.com/mj/5102778. In our case the proxy server at proxy:8080 was the default Squid that ships with Debian stable.

responses. The size of these headers was not taken into account by
CURLINFO_HEADER_SIZE before this change.
@bagder
Copy link
Member

bagder commented Mar 7, 2013

@bagder
Copy link
Member

bagder commented Mar 23, 2013

Thanks, now merged in master!

@nimasdj
Copy link

nimasdj commented Aug 21, 2015

@bagder This is fixed as of which cURL version?

@bagder
Copy link
Member

bagder commented Aug 21, 2015

That fix was commit bc6037e which went into curl 7.30.0

fabpot added a commit to sensiolabs/security-checker that referenced this pull request Feb 28, 2018
… var (tgalopin)

This PR was merged into the 4.1 branch.

Discussion
----------

Add the possibility to force the used transport using an env var

There are some issues with the cURL crawler due to a bug in cURL on old systems (curl/curl#60). It would be nice to be able to force the usage of file_get_contents if needed.

Commits
-------

7cf6c8c Add the possibility to force the used transport using an env var
@lock lock bot locked as resolved and limited conversation to collaborators Jan 19, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants