The reason why it kills the connection is to remove the need to
read+discard the rest of the header block.
In normal usage this limit should never be hit, if a client does hit
this then we assume they are trying something malicious so we drop the
On Tue, Nov 22, 2016 at 6:07 AM, Michael Grove <mike(a)stardog.com> wrote:
I found `UndertowOptions.MAX_HEADER_SIZE` which seemed to roughly
to this, but from what I could see in the HTTP listener, connections are
severed if they exceed the length rather than sending a 414.
Is there a different option I should be using?
undertow-dev mailing list