HTTPS HTTP POST client-body-filter HTTP/1.1 200 OK Content-Length: 21 Content-Type: text/html Received your input. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your input. HTTP/1.1 200 Connection established HTTP/1.1 200 OK Content-Length: 21 Content-Type: text/html Received your input. HTTP/1.1 200 OK Connection: close Content-Type: text/html X-Connection: swsclose Received your input. https Applying client-body-filter{blafasel-to-bumfidel} to client request on a reused connection that is too large to read at once (based on test 5) proxy --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -d "blafasel%repeat[5000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER GET /%TESTNUMBER HTTP/1.1 Host: %HOSTIP:%HTTPSPORT User-Agent: curl/%VERSION Accept: */* POST /%TESTNUMBER HTTP/1.1 Host: %HOSTIP:%HTTPSPORT User-Agent: curl/%VERSION Accept: */* Content-Length: 35008 Content-Type: application/x-www-form-urlencoded bumfidel%repeat[5000 x padding]%