The patch you submitted has been applied to the trunk. Please download a snapshot of the trunk to try out the package now that your patch has been applied. Please report back any problems.
-----Original Message-----
From: Matthieu Jonglez [mailto:jonglem@users.sourceforge.net]
Sent: Fri 6/5/2009 2:14 PM
To: mdomsch@users.sourceforge.net
Cc: jonglem@users.sourceforge.net
Subject: Query around revision 938 of NTLMAPS
Message body follows:
Hi Matt,
I have been trying to use head revision of NTLMAPS to access
a Sharepoint 2007 application behind IIS 6.0 on Windows 2003
server and using Firefox the NTLM credentials are not passed
properly leading to the username / password popup appearing
cyclically.
Add an explicit flush
Thank you for your problem report and patch.
The patch you submitted has been applied to the trunk. Please download a snapshot of the trunk to try out the package now that your patch has been applied. Please report back any problems.
Tarball:
http://ntlmaps.svn.sourceforge.net/viewvc/ntlmaps/trunk.tar.gz?view=tar
Subversion tree:
https://sourceforge.net/svn/?group_id=69259
-----Original Message-----
From: Matthieu Jonglez [mailto:jonglem@users.sourceforge.net]
Sent: Fri 6/5/2009 2:14 PM
To: mdomsch@users.sourceforge.net
Cc: jonglem@users.sourceforge.net
Subject: Query around revision 938 of NTLMAPS
Message body follows:
Hi Matt,
I have been trying to use head revision of NTLMAPS to access
a Sharepoint 2007 application behind IIS 6.0 on Windows 2003
server and using Firefox the NTLM credentials are not passed
properly leading to the username / password popup appearing
cyclically.
The older version of NTLMAPS I was using wasn't displaying
that behaviour so I had a look at the revision history, and
the culprit seems to be the socket flush introduced at
revision 938 in reply to
https://sourceforge.net/tracker/index.php?func=detail&aid=1553472&group_id=69259&atid=523937
If I comment out line 304 of proxy_client.py in the latest
revision everything works fine against our Sharepoint
installation.
I thought I'd share this with you as you may want to revisit
/ test that patch.
Regards,
/ Matthieu