Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 23 Nov 2001 19:32:02 -0800 (PST)
From:      Christoph Weber-Fahr <christoph.weber-fahr@arcor.de>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   bin/32238: /stand/sysinstall breaks when installing across Cacheflow HTTP proxies
Message-ID:  <200111240332.fAO3W2h24108@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         32238
>Category:       bin
>Synopsis:       /stand/sysinstall breaks when installing across Cacheflow HTTP proxies
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Nov 23 19:40:01 PST 2001
>Closed-Date:
>Last-Modified:
>Originator:     Christoph Weber-Fahr
>Release:        4.4-RELEASE
>Organization:
>Environment:
FreeBSD xxxxxxxx 4.4-RELEASE FreeBSD 4.4-RELEASE #1: Tue Nov 20 23:00
:49 CET 2001     wefa@xxxxxxxxx:/usr/src/sys/compile/XXXX  i386
>Description:
Apparently Cacheflow Webcaches burp (*) when getting a HEAD-request for a ftp:// url. Since sysinstall checks the install site by issuing HEAD requests when using a HTTP proxy, it refuses to install

(*) "burp" means closing the connection immediately without answer. Yes, I know that's completely against any rfc, but the machines are out there

>How-To-Repeat:
wefa@xxxxx 3:54 [~] telnet xx.xx.xx.xxx 8000
Trying xx.xx.xx.xx...
Connected to wwwproxy-ffm....
Escape character is '^]'.
HEAD ftp://ftp.de.freebsd.org/pub/ HTTP/1.0

Connection closed by foreign host.
wefa@xxxxx 3:55 [~]

(if you want to test this I can give you access to such 
a machine upon request)
>Fix:
Replace HEAD with GET. Tested that, works.

--- /usr/src/release/sysinstall/http.c.orig     Sat Nov 24 05:00:07 2001
+++ /usr/src/release/sysinstall/http.c  Sat Nov 24 05:21:18 2001
@@ -57,9 +57,9 @@
        return TRUE;
     }

     msgNotify("Checking access to\n %s", variable_get(VAR_HTTP_PATH));
-    sprintf(req,"HEAD %s/ HTTP/1.0\r\n\r\n", variable_get(VAR_HTTP_PATH));
+    sprintf(req,"GET %s/ HTTP/1.0\r\n\r\n", variable_get(VAR_HTTP_PATH));
     write(s,req,strlen(req));
 /*
  *  scan the headers of the response
  *  this is extremely quick'n dirty

>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200111240332.fAO3W2h24108>