W3C home > Mailing lists > Public > ietf-http-wg@w3.org > October to December 1999

Proxy auth

From: Josh Cohen (Exchange) <joshco@exchange.microsoft.com>
Date: Wed, 17 Nov 1999 23:29:02 -0800
Message-ID: <BFF90FB6CF66D111BF4F0000F840DB850BCBBDA5@LASSIE>
To: http-wg@hplb.hpl.hp.com
Cc: "'Roy T. Fielding'" <fielding@kiwi.ICS.UCI.EDU>, "'lawrence@agranat.com'" <lawrence@agranat.com>
X-Mailing-List: <http-wg@cuckoo.hpl.hp.com> archive/latest/630
 Since we're talking about proxies....
Im curious to know what others think the right thing
according to the intent of the 1.1 spec to do is
in this situation:

If you have two chained proxy servers:

client -> proxy1 -> proxy2 -> origin server

If proxy 2 challenges for proxy-authentication (in its realm),
should the challenge go back to the client if proxy1 doesnt intend
to satisfy the challenge ?

My understanding was that the intent was that this situation was
to be covered.  By this I mean a client can auth to a proxy up the chain.
The spec is somewhat ambiguous, it says the proxy-auth headers are 
hop-by-hop, but then mentions that chained proxy-auth can work.
Received on Wednesday, 17 November 1999 23:33:03 UTC

This archive was generated by hypermail 2.4.0 : Thursday, 2 February 2023 18:43:06 UTC