]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Also disable cURL's use of HTTP/1.1 expect logic
authorDaniel Lenski <dlenski@gmail.com>
Wed, 6 May 2020 22:05:00 +0000 (15:05 -0700)
committerDaniel Lenski <dlenski@gmail.com>
Wed, 6 May 2020 22:05:00 +0000 (15:05 -0700)
This is only a useful optimization for large payloads, and seems to confuse some Cisco ASAs or middleboxes.

See https://gms.tf/when-curl-sends-100-continue.html#disabling-expect-logic

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
trojans/csd-post.sh

index 67730029d6be7e684d8af3aa917d120069f8f569..1da6687abdb3885e87e04a48c342f7143b7ea138 100755 (executable)
@@ -151,7 +151,7 @@ fi
 COOKIE_HEADER="Cookie: sdesktop=$TOKEN"
 CONTENT_HEADER="Content-Type: text/xml"
 URL="https://$CSD_HOSTNAME/+CSCOE+/sdesktop/scan.xml?reusebrowser=1"
-curl $PINNEDPUBKEY -H "$CONTENT_HEADER" -H "$COOKIE_HEADER" --data-binary @$RESPONSE "$URL" > $RESULT
+curl $PINNEDPUBKEY -H "$CONTENT_HEADER" -H "$COOKIE_HEADER" -H 'Expect: ' --data-binary @$RESPONSE "$URL" > $RESULT
 
 cat $RESULT || :