DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24352>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24352

NLTM Proxy and basic host authorization





------- Additional Comments From [EMAIL PROTECTED]  2003-12-09 04:13 -------
Hi Oleg,

Does the 2.0 patch work with NTLM authentication?  I haven't been able to try it but 
from scanning 
the code I think there may be a problem.  I'm looking at the following section in 
execute():

            while (forwardCount++ < MAX_FORWARDS) {
                cleanAuthHeaders();

                //write the request and read the response, will retry
                processRequest(state, conn);

                if (!isRetryNeeded(statusLine.getStatusCode(), state, conn)) {
                    // nope, no retry needed, exit loop.
                    break;
                }

            } //end of retry loop

It seems that the NTLM authorization headers are removed before they can be sent in 
processRequest().  They are added in isRetryNeeded() when challenged and then removed 
again by 
cleanAuthHeaders() before sent to the server in processRequest().  What do you think?

Mike

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to