<testcase> <info> <keywords> SMTP SASL SASL AUTH NTLM SASL AUTH PLAIN SASL DOWNGRADE RFC4954 </keywords> </info> # # Server-side <reply> <servercmd> AUTH NTLM PLAIN REPLY "AUTH NTLM" 334 NTLM supported REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish REPLY * 501 AUTH exchange cancelled by client REPLY "AUTH PLAIN" 334 PLAIN supported REPLY AHVzZXIAc2VjcmV0 235 Authenticated </servercmd> </reply> # # Client-side <client> <server> smtp </server> <features> NTLM SSL !SSPI </features> <name> SMTP NTLM authentication with SASL downgrade </name> <stdin> mail body </stdin> <setenv> # we force our own host name, in order to make the test machine independent CURL_GETHOSTNAME=curlhost # we try to use the LD_PRELOAD hack, if not a debug build LD_PRELOAD=%PWD/libtest/.libs/libhostname.so </setenv> <command> smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient@example.com --mail-from sender@example.com -u user:secret -T - </command> <precheck> chkhostname curlhost </precheck> </client> # # Verify data after the test has been "shot" <verify> <protocol> EHLO 936 AUTH NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= * AUTH PLAIN AHVzZXIAc2VjcmV0 MAIL FROM:<sender@example.com> RCPT TO:<recipient@example.com> DATA QUIT </protocol> <upload> mail body . </upload> </verify> </testcase>