Humm, followup from meself.. line 228 in fakeauth_auth.h /* Sanity checks. XXX values arbitrarialy chosen */ if (l <= 0 || o <= 0 || l >= 32 || o >= 256) { fprintf(stderr, "ntlmGetString: insane: l:%d o:%d\n", l, o); return (NULL); Is there some check for buffer overflow there that is set to 32? When I tried to change SSWAP 64 the fakeauth_auth.c they got authed by fakeauth.. Any ideas why this is 32, or why these clients sets 32 and 34? -- Regards Falk