Closed Bug 34710 Opened 25 years ago Closed 13 years ago

RFE: Need to make an exclude-list for servers which do wrong things with http/1.1 downloadable

Categories

(Core :: Networking: HTTP, enhancement, P5)

enhancement

Tracking

()

RESOLVED WONTFIX
Future

People

(Reporter: ruslan, Unassigned)

References

Details

(Whiteboard: 4d)

Need to add some exclude-list for servers which do wrong things with http/1.1.
Status: NEW → ASSIGNED
Target Milestone: --- → M16
Moving to M17 which is now considered part of beta2.
Target Milestone: M16 → M17
Keywords: beta2
Whiteboard: have fix
Whiteboard: have fix → 2d
Done. We may want in the future to make such a list downloadable from the server. Downgrading the priority for now.
Keywords: beta2
Priority: P3 → P5
Summary: Need to add exclude-list for servers which do wrong things with http/1.1 → RFE: Need to make an exclude-list for servers which do wrong things with http/1.1 downloadable
Whiteboard: 2d → 4d
Could doing things wrong with HTTP 1.1 be autodetected somehow? That is, could Mozilla generate a list of servers that have done things wrong with HTTP 1.1 by itself for exclusion in the future?
Target Milestone: M17 → Future
pulling in ruslan's necko bugs ->darin
Assignee: ruslan → gagan
Status: ASSIGNED → NEW
Target Milestone: Future → M19
http bugs to "Networking::HTTP"
Assignee: gagan → darin
Component: Networking → Networking: HTTP
Depends on: 65092
No longer depends on: 65092
Blocks: 65092
Blocks: 61694
Target Milestone: --- → Future
auto-generating exclusion lists would be difficult, b/c error conditions can be difficult to detect.
removing dependency on bug 65092 - this bug does not inhibit mozilla's compliance with HTTP/1.1.
No longer blocks: 65092
1) Design the format for this list (xml?) - consider bad HTTP 1.1, pipelining, SSL, TLS, etc. for future ... 2) Add the code to download such a list 3) Add the preference options to: a) download the list ([now] / at startup [x]) b) specify a URI for the list [http://www.mozilla.org/incompatibleservers.xml] c) use the downloaded list [x] <- checkbox 4) Actually start work on the list in CVS ...
michael: that plan sounds a bit over-engineered to me. what's wrong w/ a hard-coded list of bad "Server:" identities as we currently have? besides, transparent proxies / virtual hosting proxies tend to break any kind of Server filtering.
Severity: normal → enhancement
Assignee: darin → nobody
QA Contact: tever → networking.http
Http/1.1 is common and the only exception is Pipelining. We have a fixed blacklist in the code. Is this still needed now ?
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.