12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576 |
- <testcase>
- <info>
- <keywords>
- SMTP
- SASL
- SASL AUTH NTLM
- SASL AUTH PLAIN
- SASL DOWNGRADE
- RFC4954
- </keywords>
- </info>
- #
- # Server-side
- <reply>
- <servercmd>
- AUTH NTLM PLAIN
- REPLY "AUTH NTLM" 334 NTLM supported
- REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish
- REPLY * 501 AUTH exchange cancelled by client
- REPLY "AUTH PLAIN" 334 PLAIN supported
- REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated
- </servercmd>
- </reply>
- #
- # Client-side
- <client>
- <server>
- smtp
- </server>
- <features>
- NTLM
- !SSPI
- </features>
- <name>
- SMTP NTLM authentication with SASL downgrade
- </name>
- <stdin>
- mail body
- </stdin>
- <setenv>
- # we force our own host name, in order to make the test machine independent
- CURL_GETHOSTNAME=curlhost
- # we try to use the LD_PRELOAD hack, if not a debug build
- LD_PRELOAD=%PWD/libtest/.libs/libhostname.so
- </setenv>
- <command>
- smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T -
- </command>
- <precheck>
- chkhostname curlhost
- </precheck>
- </client>
- #
- # Verify data after the test has been "shot"
- <verify>
- <protocol>
- EHLO 936
- AUTH NTLM
- TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
- *
- AUTH PLAIN
- dXNlcgB1c2VyAHNlY3JldA==
- MAIL FROM:<sender@example.com>
- RCPT TO:<recipient@example.com>
- DATA
- QUIT
- </protocol>
- <upload>
- mail body
- .
- </upload>
- </verify>
- </testcase>
|