https://bz.apache.org/bugzilla/show_bug.cgi?id=37355
Hendrik Harms <***@gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEEDINFO |NEW
--- Comment #16 from Hendrik Harms <***@gmail.com> ---
(In reply to William A. Rowe Jr. from comment #15)
Post by b***@apache.orgGlad we were able to get PR 55892 addressed now in 2.4 (and 2.2).
Thank you for this - I have already found it in 2.4.16 :-)
Post by b***@apache.orgAIUI the patch above (2015-01-10) addressed both https: CONNECT remoteing as
well as auth. I would expect some redundancy/collision there?
I don't see a redundancy or collision between CONNECT remote an proxy
authentication.
I've build this patch because I need a setup discribed in Bug 55892:
The backend of my apache reverse proxy is place behind a http forward proxy.
This forward proxy requires a proxy authentication (HTTP-407) and the backend
requires https. The clients sending requests to my reverse proxy should not
know anything about this setup especially the needed proxy authentication. This
should be covered by the reverse proxy.
As described somethere in the RFCs it should be possible to configure the proxy
authentication as a hop-to-hop header. So the ReverseProxy should be able to
authenticate itself to the forward proxy.
A forward proxy could be defined by the ProxyRemote config directive. So I
thought it was a good idea to enhance this config directive by an optional
Post by b***@apache.orgLooking at the changes, I'm uncertain of whether the group would entertain
any API changes to mod_proxy.h for feature enhancements such as changing the
args list for auth. Third party module authors need binary stability between
subversion releases, and that would include those writing any mod_proxy
framework participants.
Yes, unfortunately my patch will kill the compatibility of some third party
modules :-(
But I think best place to store and transfer this authentication info should be
very close to the other attributes defining the forward proxy (hostname, port,
... + auth), because they belong together.
Post by b***@apache.orgIf there was a way to store/pass this info without altering the API, it's
much more likely to be applied to 2.4.
If the API change is not possible in 2.4 we should flag it for 2.6 and think
about a workaround in 2.4
Post by b***@apache.orgI was prepared to refactor your
patch for trunk/2.4.16 changes to eliminate duplication of PR 55892
concerns, and commit to trunk, but I'm looking for your thoughts before
proceeding. Thank you for the submissions and for fighting the good fight
of getting these changes into httpd!
HTH - never give up ;-)
--
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-***@httpd.apache.org
For additional commands, e-mail: bugs-***@httpd.apache.org