Closed
Bug 180972
Opened 22 years ago
Closed 22 years ago
spamcop refused binary spam from mozilla but accepted it from netscape
Categories
(SeaMonkey :: General, defect)
Tracking
(Not tracked)
RESOLVED
WORKSFORME
People
(Reporter: schneidt, Assigned: asa)
References
()
Details
User-Agent: Mozilla/5.0 (X11; U; SunOS sun4u; en-US; rv:1.3a) Gecko/20021117 Build Identifier: Mozilla/5.0 (X11; U; SunOS sun4u; en-US; rv:1.3a) Gecko/20021117 I got a spam contining binary. I went to spamcop and dumped it in using mozilla. Spamcop objected: No data / Too much data You are most likely submitting a very large email. Please trim some of the unnecessary data (noting where this has been done) from this posting and try again. SpamCop will no longer accept email larger than 50.0K bytes. Other possibilities: You may have a firewall which prevents HTTP POST commands, you may have linked to the wrong URL or your browser does not handle binary submissions correctly (try a different browser) I pasted the exact same cut into netscape and it was fine. My report page (probably only accessable by me) is: http://spamcop.net/sc?id=z52407750z70ec4880c9307b36141dce971c1532a0z Of course it is probably accessible if the folks at spamcop help. Reproducible: Didn't try Steps to Reproduce: 1. Receive a spam 2. sign up for spamcop (http://spamcop.net/) 3. cut the spam and insert into spamcop Actual Results: Spamcop refused to accept the spam. Expected Results: Spamcop and mozilla should agree and work together so we can spend more time with mozilla bugs than reporting spam! I'm calling this a "Major feature broken" because the only known work around is to abandon Mozilla!
Comment 1•22 years ago
|
||
Well, for most bugs the only way not to see them is to use another browser. That does not mean that most bugs are 'major'!! Since your bug report is spamcop specific and most users probably don't even know it, I wouldn't call it a case of a broken major feature! However, to get to the facts: which netscape version did you use instead? Can you attach the data you wanted to send to spamcop in the first place?
Reporter | ||
Updated•22 years ago
|
Severity: major → normal
Reporter | ||
Comment 2•22 years ago
|
||
Andreas: | Well, for most bugs the only way not to see them is to use another browser. | That does not mean that most bugs are 'major'!! | Since your bug report is spamcop specific and most users probably don't even | know it, I wouldn't call it a case of a broken major feature! Oops, you are right. I switched it back to 'Normal'. | However, to get to the facts: which netscape version did you use instead? Netscape® Communicator 4.79 on Sun Solaris 8. | Can you attach the data you wanted to send to spamcop in the first place? Unfortunately I let it get deleted DUH ... and it turns out that spamcop DIDN'T keep it for me as I thought they would (or it is not obvious how to retrieve it). Further, another similar one went through ok. :-( So if it happens again for another one I'll capture it properly. Alternatively perhaps the folks at spamcop could obtain it.
Comment 3•22 years ago
|
||
I'm using spamcop all the time (even for bugmail), and I sometimes report using copy-paste from other accounts. But I haven't met this 50K limit yet (maybe because I'm a paying customer ?). I can see your report, but since a few months spamcop doesn't save the full text of the message anymore, because spam has increased dramatically this year, and they don't have enough space to store all of them. Anyway, is it possible that Netscape 4.79 was using posting a smaller number of bytes than Mozilla ? Maybe there's a small difference, because you copied the sample from your view-source window. Maybe Netscape 4.79 was posting the sample with LF-endings, while Mozilla does it with CR/LF ? Or something similar.
Comment 4•22 years ago
|
||
The check is done in this javascript-function (by spamcop, not mozilla) : function formval(maxlength) { var textval = document.forms[0].spam.value; var warning = "\n[truncated by SpamCop]\n"; if (textval.length > maxlength) { if (confirm("Message is larger than maximum size, " + maxlength + " bytes. \ Truncate?")) { document.forms[0].spam.value = textval.substr(0, (maxlength - warning.length) - 1) +warning; return true; } else { return false; } } else { return true; } } and called like this : <form method="post" action="/sc" name="submitspam" onsubmit="return formval(50000);" enctype="multipart/form-data" accept="text/plain" accept-charset="ISO-8859-1"> I don't see what's wrong with that. The length of the string can't exceed 50.000 bytes (and in 8859.1 encoding, so it's not a Unicode problem), but Spamcop.net does that on purpose. If the check didn't work in Netscape 4.79, then that is a bug in Netscape. Maybe you weren't using Javascript ? I've met the limit too, but only with spam that was really more than 50K long. Samller ones don't have that problem. I'm closing this now as WORKSFORME. Please reopen when you know that it doesn't work for spam smaller than 50K. The limit is imposed by Spamcop, not by Mozilla.
Status: UNCONFIRMED → RESOLVED
Closed: 22 years ago
Resolution: --- → WORKSFORME
Updated•20 years ago
|
Product: Browser → Seamonkey
You need to log in
before you can comment on or make changes to this bug.
Description
•