IMAP
SASL
SASL AUTH NTLM
SASL AUTH PLAIN
SASL DOWNGRADE
#
# Server-side
AUTH NTLM PLAIN
REPLY "AUTHENTICATE NTLM" +
REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= + Rubbish
REPLY * A002 NO AUTH exchange cancelled by client
REPLY "AUTHENTICATE PLAIN" +
REPLY dXNlcgB1c2VyAHNlY3JldA== A003 OK AUTHENTICATE completed
From: me@somewhere
To: fake@nowhere
body
--
yours sincerely
#
# Client-side
imap
NTLM
!SSPI
IMAP NTLM authentication with SASL downgrade
# we force our own host name, in order to make the test machine independent
CURL_GETHOSTNAME=curlhost
# we try to use the LD_PRELOAD hack, if not a debug build
LD_PRELOAD=%PWD/libtest/.libs/libhostname.so
'imap://%HOSTIP:%IMAPPORT/834/;UID=1' -u user:secret
chkhostname curlhost
#
# Verify data after the test has been "shot"
A001 CAPABILITY
A002 AUTHENTICATE NTLM
TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
*
A003 AUTHENTICATE PLAIN
dXNlcgB1c2VyAHNlY3JldA==
A004 SELECT 834
A005 FETCH 1 BODY[]
A006 LOGOUT