Bug ID 451319: HTTP CONNECT request with 4xx response with body results in RST

Last Modified: Dec 15, 2020

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
11.4.1, 11.5.0, 11.5.1, 11.5.1 HF1, 11.5.1 HF10, 11.5.1 HF11, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.10

Fixed In:
11.6.0, 11.5.2, 11.4.1 HF6

Opened: Mar 05, 2014
Severity: 3-Major
Related AskF5 Article:
K15971

Symptoms

HTTP CONNECT request with 4xx response with body results in RST

Impact

Connection reset when server responds. The system posts errors similar to the following: -- err tmm3[19210]: 011f0007:3: http_process_state_prepend - Invalid action EV_INGRESS_DATA during ST_HTTP_PREPEND_HEADERS (Server side: vip=/Common/http-vip profile=http pool=/Common/nc-pool server_ip=10.20.142.1) -- err tmm3[19210]: 01230140:3: RST sent from 10.10.147.80:80 to 10.10.132.1:56111, [0x18f7e62:9888] {peer} HTTP Unexpected server data past end of response. -- err tmm3[19210]: 01230140:3: RST sent from 10.20.147.1:56111 to 10.20.142.1:8080, [0x18f7e62:9888] HTTP Unexpected server data past end of response

Conditions

This occurs when using Content-Length header when the server responds with 4xx response with body for CONNECT request.

Workaround

Create a iRule to disable HTTP filter when CONNECT method is detected: when HTTP_REQUEST { if { [HTTP::method] eq "CONNECT" } { HTTP::disable } }

Fix Information

The system now honors Content-Length header when server responds with 4xx response with body for CONNECT request.

Behavior Change