Hi all,
I’ve set the server_header variable in my primary config, and I’ve got a catch in the
default reply route to modify headers where required. I’m masking this value for security
reasons, and filling it with my own value for vanity reasons :).
I’ve noticed that the OPTIONS packet that is send via the dispatcher module when probing
mode is on contains a User-Agent field which has the full version and OS type.
Unfortunately I don’t necessarily have trust of the end destination being dispatcher to,
nor the packet switchers in-between.
How can I catch this OPTIONS packet to manipulate the value? It doesn’t appear to go
through the REQUEST route or the ONSEND route.
Thanks!
________________________________
Andrew White - Director
uConnected
Email: andrew(a)uconnected.com.au
Web:
www.uConnected.com.au