I'm afraid we'll have to make sure that NTLM authenticated connections are either not re-used at all, or only by someone with the appropriate credentials. And especially in the proxy scenario, re-use would really improve performance.
I would agree. We want to be sure that connections are not reused inappropriately. Assuming we want to reuse them, then NTLM credentials will have to somehow become part of the connection's state. Mike --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
