Bug ID 1366765: Monitor SEND string parsing "\\r\\n"

Last Modified: Jun 15, 2024

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
14.1.0,,,,,, 14.1.2,,,,,,,,, 14.1.3,, 14.1.4,,,,,,, 14.1.5,,,,,, 15.1.0,,,,,, 15.1.1, 15.1.2,, 15.1.3,, 15.1.4,, 15.1.5,, 15.1.6,, 15.1.7, 15.1.8,,, 15.1.9,, 15.1.10,,,, 16.1.0, 16.1.1, 16.1.2,,, 16.1.3,,,,,, 16.1.4,,,, 17.0.0,,, 17.1.0,,,, 17.1.1,,,

Opened: Oct 05, 2023

Severity: 4-Minor


Double backslashes in monitor SEND string results in CR/LF being doubled.


Monitor logging showed that these are correctly converted to \x0d\x0a apart from the trailing "\\r\\n\\r\\n" and the monitor sends a sequence of "\x0d\x0a\x0d\x0a\x0d\x0a\x0d\x0a" which is not HTTP protocol compliant.


Following is an example of SEND string: Send "GET / HTTP/1.1\\r\\nHost: nt.gov.au \\r\\nConnection: Close \\r\\n\\r\\n"


Removed the extra back-slashes send "GET / HTTP/1.1\r\nHost: nt.gov.au \r\nConnection: Close \r\n" Now, the request is closed correctly \r\n\r\n Execute without \r\n at the end of the SEND string, following is an example: send "GET / HTTP/1.1\r\nHost: nt.gov.au \r\nConnection: Close" The above string works correctly.

Fix Information


Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips