Bug ID 451319: HTTP CONNECT request with 4xx response with body results in RST

Last Modified: Oct 16, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.4.1, 11.5.0, 11.5.1

Fixed In:
11.6.0, 11.5.2, 11.4.1 HF6

Opened: Mar 05, 2014

Severity: 3-Major

Related Article: K15971

Symptoms

HTTP CONNECT request with 4xx response with body results in RST

Impact

Connection reset when server responds. The system posts errors similar to the following: -- err tmm3[19210]: 011f0007:3: http_process_state_prepend - Invalid action EV_INGRESS_DATA during ST_HTTP_PREPEND_HEADERS (Server side: vip=/Common/http-vip profile=http pool=/Common/nc-pool server_ip=10.20.142.1) -- err tmm3[19210]: 01230140:3: RST sent from 10.10.147.80:80 to 10.10.132.1:56111, [0x18f7e62:9888] {peer} HTTP Unexpected server data past end of response. -- err tmm3[19210]: 01230140:3: RST sent from 10.20.147.1:56111 to 10.20.142.1:8080, [0x18f7e62:9888] HTTP Unexpected server data past end of response

Conditions

This occurs when using Content-Length header when the server responds with 4xx response with body for CONNECT request.

Workaround

Create a iRule to disable HTTP filter when CONNECT method is detected: when HTTP_REQUEST { if { [HTTP::method] eq "CONNECT" } { HTTP::disable } }

Fix Information

The system now honors Content-Length header when server responds with 4xx response with body for CONNECT request.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips