On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote:
> When HEAD request is used with a proxy (or a server) that requires NTLM,
> authentication fails when server returns large (8kb+) body along with
> NTLMSSP_CHALLENGE response.
>
> Proposed fix is to check for ongoing NTLM
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote:
>> When HEAD request is used with a proxy (or a server) that requires NTLM,
>> authentication fails when server returns large (8kb+) body along with
>> NTLMSSP_CHALLENGE response.
>>
>> Proposed fix is to
body in this case.
>
> Alternatively the whole check for `HEAD` method in `reset()` can be dropped.
Alex Kasko has updated the pull request incrementally with one additional
commit since the last revision:
fix direct server and plain http proxy auth that became inadvertently broken
---
On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote:
> When HEAD request is used with a proxy (or a server) that requires NTLM,
> authentication fails when server returns large (8kb+) body along with
> NTLMSSP_CHALLENGE response.
>
> Proposed fix is to check for ongoing NTLM
When HEAD request is used with a proxy (or a server) that requires NTLM,
authentication fails when server returns large (8kb+) body along with
NTLMSSP_CHALLENGE response.
Proposed fix is to check for ongoing NTLM auth in `reset()` and consume the
response body in this case.
Alternatively the w