W3C home > Mailing lists > Public > ietf-http-wg-old@w3.org > January to April 1996

Re: Proxy authentication

From: Mez <zurko@osf.org>
Date: Sat, 20 Apr 1996 08:36:40 -0400
Message-Id: <199604201236.IAA11860@postman.osf.org>
To: "Roy T. Fielding" <fielding@avron.ICS.UCI.EDU>, Mary Ellen Zurko <zurko@osf.org>
Cc: http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
Thanks Roy. I'm glad that the DAA spec is wrong. If proxy authentication
information is not forced to be stripped, then I believe we can support
our architecture. I'm sorry I didn't respond to that mail when it went by.
We clearly disagree about the security needs of the second proxy. You state
there is no way that it needs to authenticate the UA. The scenario in my
last mail message to the WG indicates that it does. But as long as the 
protocol supports it, we can disagree.
        Mez

At 05:40 PM 4/19/96 -0700, Roy T. Fielding wrote:
>> Proxy authentication, if I read it right, does not work for architectures 
>> with more than one proxy between the browser and server, each with their
>> own security needs.
>
>That is not accurate and was addressed on the list a while back:
>
>   <http://www.ics.uci.edu/pub/ietf/http/hypermail/1996q1/0365.html>
>
>> Section 2.5 of the DAA spec says:
>> 
>> " the proxy versions, Proxy-
>>   Authenticate and Proxy-Authorization, apply only to the current
>>   connection and must not be passed upstream or downstream. "
>
>That part of the Digest spec is wrong.  The decision of whether or not
>that information is passed along is made by the Proxy.  Each proxy
>along the line may forward or interpret or rewrite the proxy-AA header fields.
>
>
> ...Roy T. Fielding
>    Department of Information & Computer Science    (fielding@ics.uci.edu)
>    University of California, Irvine, CA 92717-3425    fax:+1(714)824-4056
>    http://www.ics.uci.edu/~fielding/
>
>
>
Received on Saturday, 20 April 1996 05:39:25 EDT

This archive was generated by hypermail pre-2.1.9 : Wednesday, 24 September 2003 06:31:51 EDT