> -----Original Message----- > From: AOLserver Discussion > [mailto:[EMAIL PROTECTED] Behalf > Of Andrew Piskorski > Sent: Tuesday, September 30, 2003 2:43 PM
> What's the best or handiest packet sniffing tool to use for this? Ones I've heard of are tcpdump and ethereal. I use ethereal in general, but I'd be surprised if there aren't easier to use proxies or listeners for HTTP SamSpade is quite a useful tool for diagnizing HTTP stuff. http://www.samspade.org/ssw/ > So I the URL with a bogus username/password embedded in > it, and ethereal shows: > > 1. Mozilla sends a GET with no authentication stuff. > 2. Server replies with 401 Unauthorized. > 3. Mozzilla sends "Authorization: Basic" credentials. > 4. Server replies. > > Is that in fact the way it normally works, the browser does not send any credentials at all until asked by the server? This is the correct behaviour. >From then on the auth credentials are sent with every subsequent request to that server. > Does anyone have a pointer to convenient code for doing the client (browser) side of that communication from Tcl or AOLserver? (I think libcurl supports it, but I have not tried that yet.) the http package in tcllib will probably do this for you, if not maybe tclvfs will. -- AOLserver - http://www.aolserver.com/ To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.
