I was so curious to find out if 3.1.1a works that I drove in to work (all of
5 minutes from where I live) to try it.

It works! You're my hero, Heath. :)

Software Update--check.

Here's the log:

Sep 18 13:58:48 : Authoxy has started successfully
Sep 18 13:59:01 : Ready to NTLM!
Sep 18 13:59:01 : Entering Step 1
Sep 18 13:59:01 : Found Connection: close. Hiding for NTLM Authentication
Sep 18 13:59:01 : Waiting for Step 2
Sep 18 13:59:01 : Entering Step 2
Sep 18 13:59:01 : Content Length of response: 2640
Sep 18 13:59:01 : Step 2 is complete
Sep 18 13:59:01 : Entering Step 3
Sep 18 13:59:01 : Created Type 1 string of 64 characters
Sep 18 13:59:01 : Pausing in Step 3
Sep 18 13:59:01 : Entering Step 4
Sep 18 13:59:01 : Content-Length: 0
Sep 18 13:59:01 : NTLM: Target length is 4
Sep 18 13:59:01 : NTLM: Target length 2 is 4
Sep 18 13:59:01 : NTLM: Target offset is 56
Sep 18 13:59:01 : NTLM Flag: Negotiate OEM
Sep 18 13:59:01 : NTLM Flag: Request Target
Sep 18 13:59:01 : NTLM Flag: Negotiate NTLM
Sep 18 13:59:01 : NTLM Flag: Target Type Domain
Sep 18 13:59:01 : NTLM Flag: Negotiate Target Info
Sep 18 13:59:01 : NTLM Flag: UNKNOWN5
Sep 18 13:59:01 : NTLM: Target is: MBBC
Sep 18 13:59:01 : NTLM: Target length is 98
Sep 18 13:59:01 : NTLM: Target length 2 is 98
Sep 18 13:59:01 : NTLM: Target offset is 60
Sep 18 13:59:01 : NTLM: TargetInfo is:
^B^^H^M^B^B^C^^A^^H^I^N^E^T^^D^^P^m^b^b^c^.^e^d^u^^C^^Z^i^n^e^t^.^m^b^b^c^.^
e^d^u^^E^^P^m^b^b^c^.^e^d^u^^^^^
Sep 18 13:59:01 : The nonce is:   •Côñ^_—.
Sep 18 13:59:01 : Finished Step 4
Sep 18 13:59:01 : Entering Step 5
Sep 18 13:59:01 : Got Type 3 msg of 176 characters.
Sep 18 13:59:01 : Finished NTLM!
Sep 18 13:59:02 : Server closed connection, killing session processes.
Sep 18 13:59:09 : Ready to NTLM!
Sep 18 13:59:09 : Entering Step 1
Sep 18 13:59:09 : Found Connection: close. Hiding for NTLM Authentication
Sep 18 13:59:09 : Content Length of request: 10482
Sep 18 13:59:09 : Waiting for Step 2
Sep 18 13:59:09 : Entering Step 2
Sep 18 13:59:09 : Content Length of response: 2640
Sep 18 13:59:09 : Step 2 is complete
Sep 18 13:59:09 : Entering Step 3
Sep 18 13:59:09 : Created Type 1 string of 64 characters
Sep 18 13:59:09 : Pausing in Step 3
Sep 18 13:59:09 : Entering Step 4
Sep 18 13:59:09 : Content-Length: 0
Sep 18 13:59:09 : NTLM: Target length is 4
Sep 18 13:59:09 : NTLM: Target length 2 is 4
Sep 18 13:59:09 : NTLM: Target offset is 56
Sep 18 13:59:09 : NTLM Flag: Negotiate OEM
Sep 18 13:59:09 : NTLM Flag: Request Target
Sep 18 13:59:09 : NTLM Flag: Negotiate NTLM
Sep 18 13:59:09 : NTLM Flag: Target Type Domain
Sep 18 13:59:09 : NTLM Flag: Negotiate Target Info
Sep 18 13:59:09 : NTLM Flag: UNKNOWN5
Sep 18 13:59:09 : NTLM: Target is: MBBC
Sep 18 13:59:09 : NTLM: Target length is 98
Sep 18 13:59:09 : NTLM: Target length 2 is 98
Sep 18 13:59:09 : NTLM: Target offset is 60
Sep 18 13:59:09 : NTLM: TargetInfo is:
^B^^H^M^B^B^C^^A^^H^I^N^E^T^^D^^P^m^b^b^c^.^e^d^u^^C^^Z^i^n^e^t^.^m^b^b^c^.^
e^d^u^^E^^P^m^b^b^c^.^e^d^u^^^^^
Sep 18 13:59:09 : The nonce is: Ø5^R7^Gf·Í.
Sep 18 13:59:09 : Finished Step 4
Sep 18 13:59:09 : Entering Step 5
Sep 18 13:59:09 : Got Type 3 msg of 176 characters.
Sep 18 13:59:09 : Finished NTLM!
Sep 18 13:59:14 : Client closed connection, killing session processes.

Mozilla with Authoxy settings--check.
iTunes music store--check.
Itunes radio--check.
Quicktime update--check.
Entourage check for updates--check.
Iphoto .mac slides--check (except I don't have a .mac account).
Safari--check.
Sherlock--check.
Windows Media Player--check.
Maxibidder...partly, probably it's their program, not Authoxy.
RealOne player--nope.
MSN Messenger--nope.
Skype (VOIP)--nope.

But that is WAY better than I have EVER had with my Mac connected to our MS
Network. WAY WAY better, I am most pleased. Some of those that don't seem to
be working might be that my settings are not quite right yet. Or they may be
trying to access ports that are blocked to us--I just thought I'd try
everything I could think of to see if the net access works via Authoxy.

I notice the number of daemons gets fairly large (right now it's 36, with
nothing going on net-wise). Should they go back to zero? (5 minutes after I
wrote that, it's still 36.)

--Steve


On 9/17/04 10:44 PM, "Heath Raftery" <[EMAIL PROTECTED]> wrote:

> Steven,
> 
> I completed those changes this morning, and my fairly superficial tests
> (again, I'm lacking a real Windows NTLM proxy for proper testing!) have
> passed. I am now interested to see how the changes go for you next
> week!
> 
> I'm hesistant to have multiple versions floating around, so I'll attach
> the modified version of Authoxy in a private email to you Steven. I've
> just marked the interface "Version 3.1.1a" with the 'a' indicating the
> modification. For those so inclined, I decided to commit the changes to
> the sourceforge repository, so you can have a look and even compile
> your own copy.
> 
> http://sourceforge.net/cvs/?group_id=107197
> 
> The modifications are to AuthoxyDaemon.h and NTLM.c bringing both of
> them up to revision 1.2.
> 
> What better way to get over a Saturday morning hang over ;)
> Heath
> 
> On 17/09/2004, at 9:24 PM, Steven Stratford wrote:
> 
>> Heath--
>> 
>> That sounds like a great plan. I must say I've learned way more about
>> NTLM
>> and TCP dumps than I ever wanted, although it's been interesting. Sure
>> would
>> be helpful if MS clearly documented their protocols instead of making
>> people
>> reverse-engineer and make educated guesses... Anyway, I look forward to
>> giving it a shot next week sometime (Monday at the earliest when I'm
>> in the
>> office). Thanks for all your help!
>> 
>> [I've written some software myself and I know how sometimes even the
>> smallest little thing has to be bought with a huge price of time and
>> effort,
>> sometimes on the part of several people, so I really appreciate what
>> you,
>> Bruce, and others are doing here to help track this down.]
>> 
>> --Steve

Reply via email to