This is an archived snapshot of W3C's public bugzilla bug tracker, decommissioned in April 2019. Please see the home page for more details.
the link: http://www.w3.org/Bugs/Public/attachment.cgi?id=922 in the bug: http://www.w3.org/Bugs/Public/show_bug.cgi?id=11015 is not being served as SVG, though it has suffix .svg and validates at W3C
Hi Jonathan, (In reply to comment #0) > the link: > > http://www.w3.org/Bugs/Public/attachment.cgi?id=922 > > in the bug: > > http://www.w3.org/Bugs/Public/show_bug.cgi?id=11015 > > is not being served as SVG, though it has suffix .svg > and validates at W3C Not true. If you use an HTTP protocol analyzer (Wireshark et. al.) or an on-line tool such as HTTP Web-Sniffer [1] (basically, copy+paste the attachment link and press submit) you'll see that content type is there: Content-Type: image/svg+xml; name="ffbug.svg" What's happening is that "Content-disposition" HTTP header is there as well: Content-disposition: attachment; filename="ffbug.svg" This should cause the implementation to force a file download instead of presenting it. This is often used as an additional protection mechanism, in order to avoid virus and other sort of malicious attachments in highly reputable sites. Note that this is a configurable security feature of Bugzilla: for example, W3C and Apache (Batik et. al. bug tracker) are using it, while Mozilla (Firefox et. al.) is not. Cheers, Helder [1] http://web-sniffer.net/