Hi All,
I’ve been having this problem for quite awhile now and haven’t been able to solve this problem.
Without giving too much boring detail, I have a XMPP web client trying to connect to the Openfire server. Everything works great on a HTTP connection. The problem is when the client is running on a HTTPS connection. When this happens, the Openfire server shows the following exception in the “Warn” logs:
java.io.IOException: FULL head
at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:274)
at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:202)
at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:378)
at org.mortbay.io.nio.SelectChannelEndPoint.run(SelectChannelEndPoint.java:368)
at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(ThreadPoolExecutor.java: 885)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:907)
at java.lang.Thread.run(Thread.java:619)…
From some research, it appears that Jetty is throwing this when the header is too big. The purposed solution is to call “connector.setHeaderBufferSize(int bytes)”.
Being an Openfire numbie, I’m not sure if anyone has seen this before or knows a solution. From searching on this forum, I didn’t see a thread about this topic.
If anybody had any suggestions, it would be greatly appreciated! Let me know if you would like more details of my setup.
Thanks.