You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2008/01/24 00:54:00 UTC

DO NOT REPLY [Bug 44110] - mod_proxy and Session-Based-Authentication support? (RFC4559)

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG�
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=44110>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND�
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=44110





------- Additional Comments From jhaar@trimble.co.nz  2008-01-23 15:54 -------
Hi there again

I have been looking at the Squid code around this, and the term they use is
"connection pinning" - which I gather means it's the way they make the
proxy-to-NTLM-server TCP connection stay live whilst the browser-to-proxy could
be different TCP HTTP connections? I know NTLM authentication is supposed to be
only possible over a single TCP-connection - i.e. no HTTP/1.0-style connections.

This is all guess work by me - I hope I'm not digging a deeper hole ;-)


Jason

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org