W3C home > Mailing lists > Public > ietf-http-wg-old@w3.org > September to December 1999

Proxy auth

From: Josh Cohen (Exchange) <joshco@Exchange.Microsoft.com>
Date: Wed, 17 Nov 1999 23:29:02 -0800
Message-ID: <BFF90FB6CF66D111BF4F0000F840DB850BCBBDA5@LASSIE>
To: http-wg@hplb.hpl.hp.com
Cc: "'Roy T. Fielding'" <fielding@kiwi.ICS.UCI.EDU>, "'lawrence@agranat.com'" <lawrence@agranat.com>
Hey,
  
 Since we're talking about proxies....
Im curious to know what others think the right thing
according to the intent of the 1.1 spec to do is
in this situation:

If you have two chained proxy servers:

client -> proxy1 -> proxy2 -> origin server

If proxy 2 challenges for proxy-authentication (in its realm),
should the challenge go back to the client if proxy1 doesnt intend
to satisfy the challenge ?

My understanding was that the intent was that this situation was
to be covered.  By this I mean a client can auth to a proxy up the chain.
The spec is somewhat ambiguous, it says the proxy-auth headers are 
hop-by-hop, but then mentions that chained proxy-auth can work.
Received on Thursday, 18 November 1999 07:30:29 EST

This archive was generated by hypermail pre-2.1.9 : Wednesday, 24 September 2003 06:33:34 EDT