HTTPS
HTTP POST
client-body-filter
HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html
Received your input.
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
X-Connection: swsclose
Received your input.
HTTP/1.1 200 Connection established
HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html
Received your input.
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
X-Connection: swsclose
Received your input.
https
Applying client-body-filter{blafasel-to-bumfidel} to client request on a reused connection that is too large to read at once (based on test 5)
proxy
--insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -d "blafasel%repeat[5000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
GET /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*
POST /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*
Content-Length: 35008
Content-Type: application/x-www-form-urlencoded
bumfidel%repeat[5000 x padding]%