Janine, Okay, so the problem you are seeing must be somewhere else, because when I visit test.tcl with a firefox browser, I get redirected to test2.tcl and I have a cookie set and it sends the cookie back to the server, which is read by test2.tcl.
The type of cookie is a session cookie, which will expire in 1200 sec. The only thing that looks weird to me is that I would think that OACS should send a similar cookie which also expires in 1200 sec so that a user who is grabbing a page ever 20 minutes stays logged in. Right now it looks like that doesn't happen. Maybe the redirect is to a different domain that isn't covered by the cookie? Or the cookie is set in https as secure, but the user is redirected to http? But I don't see the issue from what you have presented so far. I will say that this reminds me of <http://www.washingtonpost.com/>, which for whatever reason doesn't accept cookies from my konqurer browser. Does exactly what you describe here. So you might at the very least test in another browser from a separate code base than whatever you use, which you probably have already done. tom jackson On Saturday 18 February 2006 00:08, Janine Sisk wrote: > Tom, > > The problem is that when ad_returnredirect is using ns_respond > instead of ns_returnredirect, cookies don't work. When you try to > log in, you just keep getting sent back to the login page. And if > you try to put something in your cart, you get the message about > cookies being disabled. Since the change doesn't affect the cookie's > being set in the first place, my assumption is that it's not making > it intact through the redirect. -- AOLserver - http://www.aolserver.com/ To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.