DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24352>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=24352 NLTM Proxy and basic host authorization ------- Additional Comments From [EMAIL PROTECTED] 2003-12-09 04:13 ------- Hi Oleg, Does the 2.0 patch work with NTLM authentication? I haven't been able to try it but from scanning the code I think there may be a problem. I'm looking at the following section in execute(): while (forwardCount++ < MAX_FORWARDS) { cleanAuthHeaders(); //write the request and read the response, will retry processRequest(state, conn); if (!isRetryNeeded(statusLine.getStatusCode(), state, conn)) { // nope, no retry needed, exit loop. break; } } //end of retry loop It seems that the NTLM authorization headers are removed before they can be sent in processRequest(). They are added in isRetryNeeded() when challenged and then removed again by cleanAuthHeaders() before sent to the server in processRequest(). What do you think? Mike --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]