> You can't, I thought you have your own instance of Bugzilla running.
> In your case the only thing I could think of is Wireshark with
> non-https communication, if it is possible with landfill. I don't
> think the problem is within Bugzilla itself, you could post Wireshark
> logs here so we can have a look.
>
I'm not sure I did this right but here is what wireshark got out of my request:
No. Time Source Destination Protocol Length Info
17 2.386098 192.168.0.19 50.116.97.188 HTTP 804 POST /evan/ajax_modify_bug.php HTTP/1.1 (application/x-www-form-urlencoded)
Frame 17: 804 bytes on wire (6432 bits), 804 bytes captured (6432 bits)
Ethernet II, Src: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3), Dst: Actionte_f2:be:ec (00:26:b8:f2:be:ec)
Destination: Actionte_f2:be:ec (00:26:b8:f2:be:ec)
Address: Actionte_f2:be:ec (00:26:b8:f2:be:ec)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3)
Address: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Internet Protocol Version 4, Src: 192.168.0.19 (192.168.0.19), Dst: 50.116.97.188 (50.116.97.188)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT (Not ECN-Capable Transport))
Total Length: 790
Identification: 0x1d4e (7502)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 128
Protocol: TCP (6)
Header checksum: 0x0000 [incorrect, should be 0x85a8 (maybe caused by "IP checksum offload"?)]
Source: 192.168.0.19 (192.168.0.19)
Destination: 50.116.97.188 (50.116.97.188)
Transmission Control Protocol, Src Port: 53149 (53149), Dst Port: http (80), Seq: 1, Ack: 1, Len: 750
Hypertext Transfer Protocol
POST /evan/ajax_modify_bug.php HTTP/1.1\r\n
[Expert Info (Chat/Sequence): POST /evan/ajax_modify_bug.php HTTP/1.1\r\n]
Request Method: POST
Request URI: /evan/ajax_modify_bug.php
Request Version: HTTP/1.1
Host:
www.eckop.com\r\n
Connection: keep-alive\r\n
Content-Length: 23\r\n
[Content length: 23]
Origin:
http://www.eckop.com\r\n
X-Requested-With: XMLHttpRequest\r\n
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5\r\n
Content-Type: application/x-www-form-urlencoded; charset=UTF-8\r\n
Accept: application/json, text/javascript, */*; q=0.01\r\n
Referer:
http://www.eckop.com/evan/Index.html\r\n
Accept-Encoding: gzip,deflate,sdch\r\n
Accept-Language: en-US,en;q=0.8\r\n
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n
Cookie: __utma=218965133.1161481950.1338909823.1339420263.1339614975.3; __utmz=218965133.1338909823.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)\r\n
\r\n
[Full request URI:
http://www.eckop.com/evan/ajax_modify_bug.php]
Line-based text data: application/x-www-form-urlencoded
bug_id=1294&priority=P3
And here is Bugzilla's response:
No. Time Source Destination Protocol Length Info
18 2.447294 50.116.97.188 192.168.0.19 TCP 60 http > 53149 [ACK] Seq=1 Ack=751 Win=16128 Len=0
Frame 18: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: Actionte_f2:be:ec (00:26:b8:f2:be:ec), Dst: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3)
Destination: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3)
Address: Giga-Byt_ee:62:a3 (50:e5:49:ee:62:a3)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Actionte_f2:be:ec (00:26:b8:f2:be:ec)
Address: Actionte_f2:be:ec (00:26:b8:f2:be:ec)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol Version 4, Src: 50.116.97.188 (50.116.97.188), Dst: 192.168.0.19 (192.168.0.19)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT (Not ECN-Capable Transport))
Total Length: 40
Identification: 0xd7bd (55229)
Flags: 0x02 (Don't Fragment)
Fragment offset: 0
Time to live: 56
Protocol: TCP (6)
Header checksum: 0x1627 [correct]
Source: 50.116.97.188 (50.116.97.188)
Destination: 192.168.0.19 (192.168.0.19)
Transmission Control Protocol, Src Port: http (80), Dst Port: 53149 (53149), Seq: 1, Ack: 751, Len: 0
Sorry about the mess, I hope this is what you were asking for