Closed Bug 134103 Opened 22 years ago Closed 19 years ago

nsHttpChannel doesn't permit implementing non-interactive nsHttpAuthenticators

Categories

(Core :: Networking: HTTP, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
Future

People

(Reporter: sopwith, Assigned: darin.moz)

References

Details

Some authentication methods, such as Kerberos, do not require any user
interaction in order to respond to an authentication challenge. It should
therefore be possible for an authentication method to review the challenge and
available user/pass information prior to any user interaction.

To support a complete suite of authentication methods, mozilla should probably
adopt a model more like PAM, where components supporting various authentication
methods are handed the existing auth information and are then able as needed to
ask the application to retrieve particular auth information. It might make sense
to push the user interface down into the individual authenticator implementations.

Example use cases:
  basic auth (need a username/password, can be cached)
  digest auth (need a username/password, can't be cached due to sequence numbers)
  Kerberos (don't need any information besides the challenge, except
occasionally an external program should be run to renew an expired ticket)
  s/key (multi-step - need a username, then provide challenge number and token
to user, then need one-time-password)
  biometric (prompt user to provide a sample, external input determines when
dialog is done)
post 1.0 for sure, but shouldn't be too much work...

some things would have to change, since nsHttpChannel currently assumes auth is
username:password based.  it stores the last username:password to determine how
to handle a 401.  that should be trivial to modify.

-> mozilla 1.1alpha
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Target Milestone: --- → mozilla1.1alpha
Would it be possible with this to make basic auth not wait for a 401 but 
insstead simply just tack on the headers if prompted to? Is this proper 
behavior? I've seen several xmlrpc clients (java,..etc) which do this and I'm 
unclear whether this is the correct behavior or not, if not, does the fact that 
its' common make it a reasonable feature to implement

\
don: basic auth credentials are automatically forwarded when available and when
within the same authentication domain as determined per RFC 2617.  this bug is
about authenticators that don't require username:password to get the job done --
something we never considered when writing the HTTP authentication code.
Target Milestone: mozilla1.1alpha → ---
mass futuring of untargeted bugs
Target Milestone: --- → Future
Depends on: 189170
http://www.viewline.net/ 
Mozilla doesn't acknowledge login information request by the ASP and this
generate a 401.2 error instead of 401.1
-> i submit a new bug 189170. mark it as DUPEME. mark it as blocking bug 12578
and bug 57529 and this sorry for the spam
Blocks: 61681
No longer depends on: 189170
This was fixed a long time ago with negotiateauth.
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.