summaryrefslogtreecommitdiff
path: root/BUGS
blob: f4c4750ae890736adbcf372001e5be402329d0cc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37

Known problems/bugs in neon                                      -*- text -*-
---------------------------

* 2818 requires that a on rejection of the SSL server cert, a "bad certificate"
 message should be sent - this is not being done currently (and can probably
 only be done with OpenSSL by actually doing cert verification in the verify
 callback)

* ne_lock_discover does not handle multiple (shared) locks on
  a single resource.

* SSL session caching issues; only cache for clean shutdowns, and
 only cache on shutdown, since the SSL_SESSION may change during
 an ne_session.

* test failures in `socket' on some non-Linux platforms:

19. write_reset........... FAIL (write got 0 not reset)
20. read_reset............ FAIL (read got -3 not reset)

* server auth should not run on a CONNECT request; once a connection
  has been CONNECT tunneled, subsequent requests through the tunnel
  should not give proxy auth.

* what is passed as 'path' to req create hook: auth needs Request-URI;
  how does that interact with proxies?  also they will be passed NULL
  for a CONNECT request, or "*" possibly as well.

* expect100 support is broken.

* It would be nice to fail with a friendly error message if a client
cert is requested by the srever but one is not provided.  Currently,
returning -1 from the provide_client_cert function would allow that
(as it forces the SSL handshake to fail), but that would prevent
opportunistic use of client certificates, of the "SSLVerifyClient
optional" variety.