> -----Original Message-----
> From: AOLserver Discussion
> [mailto:[EMAIL PROTECTED] Behalf
> Of Andrew Piskorski
> Sent: Tuesday, September 30, 2003 2:43 PM

> What's the best or handiest packet sniffing tool to use for this?  Ones
I've heard of are tcpdump and ethereal.

I use ethereal in general, but I'd be surprised if there aren't easier to
use proxies or listeners for HTTP

SamSpade is quite a useful tool for diagnizing HTTP stuff.
http://www.samspade.org/ssw/


> So I the URL with a bogus username/password embedded in
> it, and ethereal shows:
>
> 1. Mozilla sends a GET with no authentication stuff.
> 2. Server replies with 401 Unauthorized.
> 3. Mozzilla sends "Authorization: Basic" credentials.
> 4. Server replies.
>
> Is that in fact the way it normally works, the browser does not send any
credentials at all until asked by the server?

This is the correct behaviour.
>From then on the auth credentials are sent with every subsequent request to
that server.

> Does anyone have a pointer to convenient code for doing the client
(browser) side of that communication from Tcl or AOLserver?  (I think
libcurl supports it, but I have not tried that yet.)


the http package in tcllib will probably do this for you, if not maybe
tclvfs will.


--
AOLserver - http://www.aolserver.com/

To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the
body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of 
your email blank.

Reply via email to