HTTPS HTTP POST client-body-filter HTTP/1.1 200 OK Content-Length: 29 Content-Type: text/html Received your first request. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your second request. HTTP/1.1 200 Connection established HTTP/1.1 200 OK Content-Length: 29 Content-Type: text/html Received your first request. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your second request. https Attempt to apply client-body-filter{blafasel-to-bumfidel} to client request on reused connection that is too large to buffer. (based on test12) proxy # We mainly care about the second request which is too large for Privoxy to buffer it. --insecure https://%HOSTIP:%HTTPSPORT/first-request/%TESTNUMBER --next -d @log/post-data-%TESTNUMBER --insecure https://%HOSTIP:%HTTPSPORT/second-request/%TESTNUMBER blafasel%repeat[20000 x padding]% GET /first-request/%TESTNUMBER HTTP/1.1 Host: %HOSTIP:%HTTPSPORT User-Agent: curl/%VERSION Accept: */* POST /second-request/%TESTNUMBER HTTP/1.1 Host: %HOSTIP:%HTTPSPORT User-Agent: curl/%VERSION Accept: */* Content-Length: 140008 Content-Type: application/x-www-form-urlencoded blafasel%repeat[20000 x padding]%