Hi ,

     I am working on NTLM (Windows NT Lan Manager )APS
(Authentication Proxy Server ) , to port to C language .

    I am using ethereal to monitor the packets sent between client and
server . NTLM is a MS proprietary protocol designed so that will allow
authentication only from MS browsers .

    This  proprietary was cracked and code was written in python by
Rozmanov .

The link to the source pool about NTLM is

http://www.innovation.ch/personal/ronald/ntlm.html

     Have any one worked extensively with NTLM APS python package
0.98 ?

NTLM APS have a 6 step process :- (C) - client (S)- server

    1: C  --> S   GET ...

    2: C <--  S   401 Unauthorized
                  WWW-Authenticate: NTLM

    3: C  --> S   GET ...
                  Authorization: NTLM <base64-encoded type-1-message>

    4: C <--  S   401 Unauthorized
                  WWW-Authenticate: NTLM <base64-encoded type-2-
message>

    5: C  --> S   GET ...
                  Authorization: NTLM <base64-encoded type-3-message>

    6: C <--  S   200 Ok


    After step 6 client must connect to server . But when i run NTLM
APS and watch the packets sent b/w client and server  in ethereal , i
see that client does not recieve 200 Ok at Step 6 , but receives 401
Unauthorized . After this i get a dialog box which requests me to
enter my user name and password  .

    I enter the credentials and then the server authorizes the
client .

    I am sorry that i cannot give more info on this . I can send the
saved page log from ethereal . That will give a very good idea .

    As per theory , it is only a 6 step process  . I am puzzled
regarding this .

thanks ,

dennis

-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to