[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Getting "Access Denied" through proxy from an external Windows web page

Posted on 2004-09-02
2
Medium Priority
?
141 Views
Last Modified: 2010-04-22
I am a newbie to Linux who was asked to setup a proxy server. I seem to have everything in working order except for a external webpage that requires authentication. I can access the login credential page without the proxy being setup. If I input an incorrect user/password on this page I receive the same error page as I do when using the proxy. I have looked through previous questions and someone did have this problem and was refered to an NTLM authentication article (http://www.squid-cache.org/Doc/FAQ/FAQ.html) that I do not see as having any relation to this issue. As I am very new to Linux and proxys I would appreciate a fairly dumbed up answer :)

Thanks
0
Comment
Question by:Himlad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Accepted Solution

by:
paranoidcookie earned 2000 total points
ID: 12020539
Basically because you are going though a proxy it causes a problem with kerberos (or at least the ntlm login) trust so when authenticating against a site that uses trust it fails. The alternative is to either go via ssl logon or use plaintext password. Not really much help I know but the only way I got around it wa to disable the proxy when logging into these sites.
0
 

Author Comment

by:Himlad
ID: 12030774
Thanks for the comments. Since I am unable to make changes to the webserver we are trying to access and the clients using the proxy are locked down and unable to turn off access to the proxy is there a 3rd party solution to this. This can't be a new issue?
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question