summaryrefslogtreecommitdiff
path: root/libraries/python-ntlm/DOCUMENTATION
diff options
context:
space:
mode:
Diffstat (limited to 'libraries/python-ntlm/DOCUMENTATION')
-rw-r--r--libraries/python-ntlm/DOCUMENTATION56
1 files changed, 27 insertions, 29 deletions
diff --git a/libraries/python-ntlm/DOCUMENTATION b/libraries/python-ntlm/DOCUMENTATION
index 4d68dc29ca..06837e4d6f 100644
--- a/libraries/python-ntlm/DOCUMENTATION
+++ b/libraries/python-ntlm/DOCUMENTATION
@@ -66,37 +66,35 @@ opener = urllib2.build_opener(proxy_handler, auth_NTLM, auth_digest,
auth_basic)
urllib2.install_opener(opener)
-# retrieve the result
+# retrieve the result
response = urllib2.urlopen(url)
print(response.read())
```
## Limitations
- * A request using the `HTTPNtlmAuthHandler` has no HTTP status
- * handling, for example: redirects are not handled by the opener, you
- * must check and handle the response yourself.
-
- # Resources
-
- ## Inspired by
- * [http://sourceforge.net/projects/ntlmaps/ NTLM Authorization Proxy
- * Server]
- (Dmitri Rozmanov kindly allowed his code to be redistributed under
- the LGPL)
-
- The NTLM Authorization Proxy Server can be used to make applications
- that do not support NTLM proxies use them anyway: "Opens up IIS
- Proxy Servers using NTLM to non-Microsoft browsers, etc"
-
- In contrast the python-ntlm library is used to make it possible for
- python code to retrieve content from an NTLM protected server.
-
- ## References
- * [MS-NLMP]:
- * [http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-NLMP%5D.pdf
- * NT LAN Manager (NTLM) Authentication Protocol Specification]
- * [MS-NTHT]:
- * [http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-NTHT%5D.pdf
- * NTLM Over HTTP Protocol Specification]
- * [http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf
- * Optimized Attack for NTLM2 Session Response]
+* A request using the `HTTPNtlmAuthHandler` has no HTTP status handling, for
+ example: redirects are not handled by the opener, you must check and
+ handle the response yourself.
+
+# Resources
+
+## Inspired by
+* [http://sourceforge.net/projects/ntlmaps/ NTLM Authorization Proxy Server]
+(Dmitri Rozmanov kindly allowed his code to be redistributed under the LGPL)
+
+The NTLM Authorization Proxy Server can be used to make applications that do
+not support NTLM proxies use them anyway: "Opens up IIS Proxy Servers using
+NTLM to non-Microsoft browsers, etc"
+
+In contrast the python-ntlm library is used to make it possible for python
+code to retrieve content from an NTLM protected server.
+
+## References
+* [MS-NLMP]: NT LAN Manager (NTLM) Authentication Protocol Specification
+http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-NLMP%5D.pdf
+
+* [MS-NTHT]: NTLM Over HTTP Protocol Specification
+http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcf-a657e5900cd3/%5BMS-NTHT%5D.pdf
+
+* Optimized Attack for NTLM2 Session Response
+http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf