On Sat, Jan 30, 1999 at 12:13:12PM +0100, Ralf S. Engelschall wrote:
>
>In article <[EMAIL PROTECTED]> you wrote:
>
>> I want to be able to automatically log into a website and interact with the 
>> logged in, secure website.  Unfortunately, it is 'protected' with one of those
>> automatic login/password 'authorization' type boxes. How do you get around
>> them? 
>
>You can't get around them, of course. All you can do is, when you're using a
>batch-client, to automatically send the basic auth ingredients with the
>requests. When you're using Netscape or Explorer you have to type in the
>password at the first request (those browsers don't store it over GUI
>sessions).

Netscape allows one to enter a URL that looks like the following:

https://user:[EMAIL PROTECTED]/htaccessdirectory

where user:password is the 'automatic sending of the basic auth ingredients'
you talk about. This bypasses the user/password box, and automatically logs in.
So how do you do this in straight OpenSSL, and Net::SSLeay? (This is the FAQ I
was talking about -  giving a code example for this.) 
>
>> And how do you get around the timeouts (ie: when someone has been logged
>> in to a site for 5 mins, the site logs you out).
>
>"Logged out?" A website doesn't you log out like a shell. What exactly do you
>mean?

Some servers have a mechanism that forces you to go through the login process
again if you have been idle for so much time, like a half an hour. I'm not sure
what constitutes 'activity' on that website to postpone this error message - I 
guess I'm asking about common ways to make an automated process convince the 
server that in fact interaction *is* going on so that this does not occur. 
Probably another FAQ.

>> Also, I don't want to have to get a certificate every single time I log in to 
>> a secure site... does openssl cache them for you? 
>
>When your browser connects to the secured website it either gets the server
>certificate within the full handshake or can resume a previously session
>(where no certificate is transferred). But usually because the certificate is
>transferred and verified doesn't mean you've to worry about this. The only
>time it can be annoying is when the client cannot verify the server cert (it
>lacks information about the CA) the verification dialog pops up. But that's
>then another problem...

I guess this is another FAQ that could be answered - how to deal with 
verification. A general overview would be nice as well: as far as I can see it, 
there are three possible uses for OpenSSL - on the server side, on the client 
side, and for generating certificates. A summary of each of these roles and 
in both generic and specific terms on how they work would help immensely to 
those who want to use OpenSSL.

Thanks much,

Ed
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to