Yes, I can try using the latest and greatest: 4.76 ... to see if its
fixed.
... but the site will be used by customers, and of course we dont
control what version of netscape the customers use, let alone tell them
what brand of browser to use.
Is this bug / problem documented somewhere? Searching netscape.com, I
cant find any reference to this kind of problem.
Here's some proof:
* The packet dump below is a TCP session between my dial-up host and a
webserver ( x'd out as it is not mine )
* Ignore missing frames below ( such as 1 - 40, 42 - 43 ) as those
frames were from a different TCP session
* Frame 41, 44, 45 are the 3-message TCP handshake
* SSL handshaking is supposed to start immediately after frame 45.
Instead, what you can see in the actual data
of frame 46 is the HTTP POST operation that should have been sent
aftert ehe SSL handshake.
* Granted that the actual data ( or what should have been the SSL client
hello ) started with
some garbage data with 0x81 0xd1, causing the SSL handshaking to fail,
normal SSL client hello
from my host and browser usually has the following bytes set starting
with 0x0034: 0c16 0x03 0x00 0x00 0x53 0x01 ... )
* Whats more scary is frame 48, where payment ( bogus ) details were
being sent in the clear!!!!
* As a result of the above, frame 49 is the FIN packet telling us the
close the connection, FIN is ACKd,
and RSTs are sent.
* and on netscape, you get the "Document contained no data. Please
contact the administrator".
Thanks,
John Salvo
Here's the packet dump:
==============================================================================================
Frame 41 (60 on wire, 60 captured)
Arrival Time: Nov 14, 2000 00:20:24.1312
Time delta from previous packet: 0.027270 seconds
Frame Number: 41
Packet Length: 60 bytes
Capture Length: 60 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 60
Identification: 0x0942
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc57d (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431100, Ack: 0
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431100
Header length: 40 bytes
Flags: 0x0002 (SYN)
..0. .... = Urgent: Not set
...0 .... = Acknowledgment: Not set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..1. = Syn: Set
.... ...0 = Fin: Not set
Window size: 32648
Checksum: 0xd55b
Options: (20 bytes)
Maximum segment size: 1484 bytes
SACK permitted
Time stamp: tsval 256207, tsecr 0
NOP
Window scale: 0 bytes
Frame 44 (60 on wire, 60 captured)
Arrival Time: Nov 14, 2000 00:20:24.8971
Time delta from previous packet: 0.039997 seconds
Frame Number: 44
Packet Length: 60 bytes
Capture Length: 60 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..00 = Currently Unused: 0
Total Length: 60
Identification: 0xd8b9
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 237
Protocol: TCP (0x06)
Header checksum: 0x4915 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156624, Ack: 1027431101
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156624
Acknowledgement number: 1027431101
Header length: 40 bytes
Flags: 0x0012 (SYN, ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..1. = Syn: Set
.... ...0 = Fin: Not set
Window size: 10136
Checksum: 0xdffd
Options: (20 bytes)
NOP
NOP
Time stamp: tsval 5674412, tsecr 256207
NOP
Window scale: 0 bytes
Maximum segment size: 1460 bytes
Frame 45 (52 on wire, 52 captured)
Arrival Time: Nov 14, 2000 00:20:24.8971
Time delta from previous packet: 0.000062 seconds
Frame Number: 45
Packet Length: 52 bytes
Capture Length: 52 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 52
Identification: 0x0943
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc584 (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431101, Ack: 1229156625
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431101
Acknowledgement number: 1229156625
Header length: 32 bytes
Flags: 0x0010 (ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32648
Checksum: 0xb384
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256284, tsecr 5674412
Frame 46 (519 on wire, 519 captured)
Arrival Time: Nov 14, 2000 00:20:24.8974
Time delta from previous packet: 0.000240 seconds
Frame Number: 46
Packet Length: 519 bytes
Capture Length: 519 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 519
Identification: 0x0944
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc3b0 (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431101, Ack: 1229156625
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431101
Acknowledgement number: 1229156625
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 1... = Push: Set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32648
Checksum: 0xbbf2
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256284, tsecr 5674412
Data (467 bytes)
0 81d1 504f 5354 20xx xxxx xxxx xxxx xxxx ..POST xxxxxxxxx
10 xxxx xxxx xxxx xxxx xxxx 2048 5454 502f xxxxxxxxxx HTTP/
20 312e 300d 0a52 6566 6572 6572 3a20 6874 1.0..Referer: ht
30 7470 733a 2f2f xxxx xxxx xxxx xxxx xxxx tps://xxxxxxxxxx
40 xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxxxxxxxxxxxxxx
50 xxxx xxxx xxxx xxxx xx0d 0a43 6f6e 6e65 xxxxxxxxx..Conne
60 6374 696f 6e3a 204b 6565 702d 416c 6976 ction: Keep-Aliv
70 650d 0a55 7365 722d 4167 656e 743a 204d e..User-Agent: M
80 6f7a 696c 6c61 2f34 2e36 3120 5b65 6e5d ozilla/4.61 [en]
90 2028 5831 313b 2049 3b20 4c69 6e75 7820 (X11; I; Linux
a0 322e 322e 3136 2069 3638 3629 0d0a 486f 2.2.16 i686)..Ho
b0 7374 3a20 xxxx xxxx xxxx xxxx xxxx xxxx st: xxxxxxxxxxxx
c0 xxxx xxxx 0d0a 4163 6365 7074 3a20 696d xxxx..Accept: im
d0 6167 652f 6769 662c 2069 6d61 6765 2f78 age/gif, image/x
e0 2d78 6269 746d 6170 2c20 696d 6167 652f -xbitmap, image/
f0 6a70 6567 2c20 696d 6167 652f 706a 7065 jpeg, image/pjpe
100 672c 2069 6d61 6765 2f70 6e67 2c20 2a2f g, image/png, */
110 2a0d 0a41 6363 6570 742d 456e 636f 6469 *..Accept-Encodi
120 6e67 3a20 677a 6970 0d0a 4163 6365 7074 ng: gzip..Accept
130 2d4c 616e 6775 6167 653a 2065 6e0d 0a41 -Language: en..A
140 6363 6570 742d 4368 6172 7365 743a 2069 ccept-Charset: i
150 736f 2d38 3835 392d 312c 2a2c 7574 662d so-8859-1,*,utf-
160 380d 0a43 6f6f 6b69 653a 20xx xxxx xxxx 8..Cookie: xxxxx
170 xxxx xxxx xxxx xxxx xxxx 3d4f 6731 7058 xxxxxxxxxx=Og1pX
180 675a 467a 7374 5243 5752 4748 7578 4c4b gZFzstRCWRGHuxLK
190 6930 3071 6d6f 766f 616d 4439 5531 556d i00qmovoamD9U1Um
1a0 4247 4c74 7745 6859 5568 4250 5765 5a3b BGLtwEhYUhBPWeZ;
1b0 2073 7375 6964 3d4f 454a 6933 4d30 306f ssuid=OEJi3M00o
1c0 5751 3030 3032 5165 7678 6763 7435 3170 WQ0002Qevxgct51p
1d0 650d 0a e..
Frame 47 (40 on wire, 40 captured)
Arrival Time: Nov 14, 2000 00:20:25.7571
Time delta from previous packet: 1.859704 seconds
Frame Number: 47
Packet Length: 40 bytes
Capture Length: 40 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..00 = Currently Unused: 0
Total Length: 40
Identification: 0xd8ba
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 237
Protocol: TCP (0x06)
Header checksum: 0x4928 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156625, Ack: 1027431568
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156625
Acknowledgement number: 1027431568
Header length: 20 bytes
Flags: 0x0010 (ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 10220
Checksum: 0xc187
Frame 48 (345 on wire, 345 captured)
Arrival Time: Nov 14, 2000 00:20:25.7572
Time delta from previous packet: 0.000112 seconds
Frame Number: 48
Packet Length: 345 bytes
Capture Length: 345 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 345
Identification: 0x0945
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc45d (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431568, Ack: 1229156625
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431568
Acknowledgement number: 1229156625
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 1... = Push: Set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32648
Checksum: 0x6e8c
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256370, tsecr 5674412
Data (293 bytes)
0 8046 436f 6e74 656e 742d 7479 7065 3a20 .FContent-type:
10 6170 706c 6963 6174 696f 6e2f 782d 7777 application/x-ww
20 772d 666f 726d 2d75 726c 656e 636f 6465 w-form-urlencode
30 640d 0a43 6f6e 7465 6e74 2d6c 656e 6774 d..Content-lengt
40 683a 2032 3131 0d0a 8001 0d80 010a 80d5 h: 211..........
50 6469 7370 6174 6368 746f 3d25 3246 7072 dispatchto=%2Fpr
60 6f63 6573 7350 6179 6d65 6e74 2673 6573 ocessPayment&ses
70 7369 6f6e 6578 6973 743d 7472 7565 2661 sionexist=true&a
80 6363 6f75 6e74 4e75 6d62 6572 3d31 3233 ccountNumber=123
90 3435 3637 3426 696e 766f 6963 654e 756d 45674&invoiceNum
a0 6265 723d 2663 7265 6469 7443 6172 6450 ber=&creditCardP
b0 6172 7434 3d31 3131 3126 6372 6564 6974 art4=1111&credit
c0 4361 7264 5061 7274 383d 3131 3131 2663 CardPart8=1111&c
d0 7265 6469 7443 6172 6450 6172 7431 323d reditCardPart12=
e0 3131 3131 2663 7265 6469 7443 6172 6450 1111&creditCardP
f0 6172 7431 363d 3131 3131 2665 7870 6972 art16=1111&expir
100 794d 6f6e 7468 3d30 3126 6578 7069 7279 yMonth=01&expiry
110 5965 6172 3d30 3126 616d 6f75 6e74 3d31 Year=01&amount=1
120 2e30 300d 0a .00..
Frame 49 (40 on wire, 40 captured)
Arrival Time: Nov 14, 2000 00:20:25.7670
Time delta from previous packet: 0.009874 seconds
Frame Number: 49
Packet Length: 40 bytes
Capture Length: 40 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..00 = Currently Unused: 0
Total Length: 40
Identification: 0xd8bb
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 237
Protocol: TCP (0x06)
Header checksum: 0x4927 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156625, Ack: 1027431568
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156625
Acknowledgement number: 1027431568
Header length: 20 bytes
Flags: 0x0011 (FIN, ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...1 = Fin: Set
Window size: 10220
Checksum: 0xc186
Frame 50 (52 on wire, 52 captured)
Arrival Time: Nov 14, 2000 00:20:25.7671
Time delta from previous packet: 0.000051 seconds
Frame Number: 50
Packet Length: 52 bytes
Capture Length: 52 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 52
Identification: 0x0946
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc581 (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431861, Ack: 1229156626
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431861
Acknowledgement number: 1229156626
Header length: 32 bytes
Flags: 0x0010 (ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32647
Checksum: 0xb035
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256371, tsecr 5674412
Frame 51 (52 on wire, 52 captured)
Arrival Time: Nov 14, 2000 00:20:25.7675
Time delta from previous packet: 0.000369 seconds
Frame Number: 51
Packet Length: 52 bytes
Capture Length: 52 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 52
Identification: 0x0947
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (0x06)
Header checksum: 0xc580 (correct)
Source: 203.173.131.176 (203.173.131.176)
Destination: x.x.x.x (x.x.x.x)
Transmission Control Protocol, Src Port: 1175 (1175), Dst Port: 443
(443), Seq: 1027431861, Ack: 1229156626
Source port: 1175 (1175)
Destination port: 443 (443)
Sequence number: 1027431861
Acknowledgement number: 1229156626
Header length: 32 bytes
Flags: 0x0011 (FIN, ACK)
..0. .... = Urgent: Not set
...1 .... = Acknowledgment: Set
.... 0... = Push: Not set
.... .0.. = Reset: Not set
.... ..0. = Syn: Not set
.... ...1 = Fin: Set
Window size: 32648
Checksum: 0xb033
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256371, tsecr 5674412
Frame 52 (40 on wire, 40 captured)
Arrival Time: Nov 14, 2000 00:20:26.6570
Time delta from previous packet: 1.889585 seconds
Frame Number: 52
Packet Length: 40 bytes
Capture Length: 40 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..00 = Currently Unused: 0
Total Length: 40
Identification: 0xd8bc
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 237
Protocol: TCP (0x06)
Header checksum: 0x4926 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156626, Ack: 0
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156626
Header length: 20 bytes
Flags: 0x0004 (RST)
..0. .... = Urgent: Not set
...0 .... = Acknowledgment: Not set
.... 0... = Push: Not set
.... .1.. = Reset: Set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 10220
Checksum: 0x5b60
Frame 53 (52 on wire, 52 captured)
Arrival Time: Nov 14, 2000 00:20:26.6670
Time delta from previous packet: 0.010000 seconds
Frame Number: 53
Packet Length: 52 bytes
Capture Length: 52 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 52
Identification: 0x0946
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 39
Protocol: TCP (0x06)
Header checksum: 0xde81 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156626, Ack: 1229156626
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156626
Header length: 32 bytes
Flags: 0x0004 (RST)
..0. .... = Urgent: Not set
...0 .... = Acknowledgment: Not set
.... 0... = Push: Not set
.... .1.. = Reset: Set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32647
Checksum: 0x90de
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256371, tsecr 5674412
Frame 54 (52 on wire, 52 captured)
Arrival Time: Nov 14, 2000 00:20:26.6771
Time delta from previous packet: 0.010002 seconds
Frame Number: 54
Packet Length: 52 bytes
Capture Length: 52 bytes
Raw packet data
No link information available
Internet Protocol
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x10 (DSCP 0x04: Unknown DSCP)
0001 00.. = Differentiated Services Codepoint: Unknown (0x04)
.... ..00 = Currently Unused: 0
Total Length: 52
Identification: 0x0947
Flags: 0x04
.1.. = Don't fragment: Set
..0. = More fragments: Not set
Fragment offset: 0
Time to live: 39
Protocol: TCP (0x06)
Header checksum: 0xde80 (correct)
Source: x.x.x.x (x.x.x.x)
Destination: 203.173.131.176 (203.173.131.176)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 1175
(1175), Seq: 1229156626, Ack: 1229156626
Source port: 443 (443)
Destination port: 1175 (1175)
Sequence number: 1229156626
Header length: 32 bytes
Flags: 0x0004 (RST)
..0. .... = Urgent: Not set
...0 .... = Acknowledgment: Not set
.... 0... = Push: Not set
.... .1.. = Reset: Set
.... ..0. = Syn: Not set
.... ...0 = Fin: Not set
Window size: 32648
Checksum: 0x90dd
Options: (12 bytes)
NOP
NOP
Time stamp: tsval 256371, tsecr 5674412
Sent via Deja.com http://www.deja.com/
Before you buy.