On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to check for ongoing NTLM auth in `reset
> When HEAD request is used with a proxy (or a server) that requires NTLM,
> authentication fails when server returns large (8kb+) body along with
> NTLMSSP_CHALLENGE response.
>
> Proposed fix is to check for ongoing NTLM auth in `reset()` and consume the
> response body in this case.
>
> Alt
On 8/23/21, Alex Kashchenko wrote:
> Hi,
>
> On 8/13/21, Michael McMahon wrote:
>> Hi,
>>
>> A question about this issue. Can you explain why the server/proxy is
>> sending a response body to a HEAD request?
>>
>> My reading of the RFCs suggests this is not allowed.
>
> Thanks for your comment an
Hi,
On 8/13/21, Michael McMahon wrote:
> Hi,
>
> A question about this issue. Can you explain why the server/proxy is
> sending a response body to a HEAD request?
>
> My reading of the RFCs suggests this is not allowed.
Thanks for your comment and sorry for the late reply. To put aside the
quest
Hi,
A question about this issue. Can you explain why the server/proxy is
sending a response body to a HEAD request?
My reading of the RFCs suggests this is not allowed.
Thanks,
Michael
On 12/07/2021 11:54, Alex Kasko wrote:
On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote:
When HEAD r
On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote:
> When HEAD request is used with a proxy (or a server) that requires NTLM,
> authentication fails when server returns large (8kb+) body along with
> NTLMSSP_CHALLENGE response.
>
> Proposed fix is to check for ongoing NTLM auth in `reset()` a
When HEAD request is used with a proxy (or a server) that requires NTLM,
authentication fails when server returns large (8kb+) body along with
NTLMSSP_CHALLENGE response.
Proposed fix is to check for ongoing NTLM auth in `reset()` and consume the
response body in this case.
Alternatively the w
12 matches
Mail list logo