Solved

Checking proxy authentication mechanism

Posted on 2010-09-24
5
658 Views
Last Modified: 2012-06-21
Hello

We have Windows XP SP3 clients. Their IE is configured to use an auto.pac file which will determine if a website is internal or external. The PAC is located at http:\\server1\auto.pac.

If the server is external, there are HTTP proxies that the request will get sent to, let's name it Proxy1.

If I ran Wireshark on an XP machine, is this the result I should expect to see when attempting to browse an external site (www.google.com)

1.  DNS resolution for server1
2. Contact server1's IP
3. After reading the auto.pac and realising Google is externally hosted, a request for DNS resolution of Proxy1
3. Contact Proxy1's IP
4. Proxy1 sends authentication request
5. User returns details
6. Contact Proxy1's IP again with an HTTP GET

Also, how can I work out what authentication mechanism the Proxy1 device is using? I have used Wireshark and can see this:

"Proxy authenticate: NTML .. Proxy Authenticate: BASIC realm="proxy".."

So is it using NTLM or Basic?

I would like to know what sort of authentication mechanism these proxies use.

0
Comment
Question by:neil4933
  • 3
  • 2
5 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 500 total points
ID: 33849520
It uses both.  If it does not get the appropriate user-id/password using NTML it will then prompt the user using basic.
0
 

Author Comment

by:neil4933
ID: 33860917
Hi

Thanks...

""Proxy authenticate: NTML .. Proxy Authenticate: BASIC realm="proxy".."

You're saying that the above means that either no username/password or an incorrect one was given by NTLM, so it's prompting for one in BASIC?
0
 
LVL 57

Expert Comment

by:giltjr
ID: 33861233
Yes.
0
 

Author Comment

by:neil4933
ID: 33861260
Surely if an incorrect username/password was given it should just deny access rather than asking for a new one in Basic?
0
 
LVL 57

Expert Comment

by:giltjr
ID: 33861998
No.  Typically with web servers you are given up to 3 chances to enter the correct name/password before you are denied.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question