-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Duplicate headers received when using temporary bypass #29
Comments
Please, can you make a try with a browser plug-in like LiveHTTPHeaders (firefox) |
One possibility is that the extra CRLF ("\r\n") after the location header in the 302 redirect is what is causing the problem. In RFC 2616 according to the last paragraph is section 4.1 it's states that HTTP/1.1 clients should not follow any requests that have an extra CRLF. |
Can you make a short test with http://numsys.eu/TMP/e2guardian.zip |
Just tried it. Having the same issues. |
\r\n ? |
Ok I found something, please make a try with http://numsys.eu/TMP/e2guardian.tar.gz |
Works with seven - firefox 30 and IE10 - |
Tested and works in Firefox 31.0 for OS X, Safari 8.0 for OS X, Chrome 36 on Windows, IE11 on windows. Does not work on Chrome for OS X. Might be a bug in Chrome... |
OK great, yes it should be |
Fixed in 3.0.4 |
Using IP auth with a temporary bypass link. Works in safari on OS X, But nowhere else.
Custom block page: https://github.com/visd/e2guardian-install/blob/master/template.html
Wireshark capture: http://cl.ly/1o203j411z18 (Now with response)
The text was updated successfully, but these errors were encountered: