1 <testcase> 2 <info> 3 <keywords> 4 SMTP 5 SASL 6 SASL AUTH NTLM 7 SASL AUTH PLAIN 8 SASL DOWNGRADE 9 RFC4954 10 </keywords> 11 </info> 12 13 # 14 # Server-side 15 <reply> 16 <servercmd> 17 AUTH NTLM PLAIN 18 REPLY "AUTH NTLM" 334 NTLM supported 19 REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 334 Rubbish 20 REPLY * 501 AUTH exchange cancelled by client 21 REPLY "AUTH PLAIN" 334 PLAIN supported 22 REPLY dXNlcgB1c2VyAHNlY3JldA== 235 Authenticated 23 </servercmd> 24 </reply> 25 26 # 27 # Client-side 28 <client> 29 <server> 30 smtp 31 </server> 32 <features> 33 NTLM 34 !SSPI 35 </features> 36 <name> 37 SMTP NTLM authentication with SASL downgrade 38 </name> 39 <stdin> 40 mail body 41 </stdin> 42 <setenv> 43 # we force our own host name, in order to make the test machine independent 44 CURL_GETHOSTNAME=curlhost 45 # we try to use the LD_PRELOAD hack, if not a debug build 46 LD_PRELOAD=%PWD/libtest/.libs/libhostname.so 47 </setenv> 48 <command> 49 smtp://%HOSTIP:%SMTPPORT/936 --mail-rcpt recipient (a] example.com --mail-from sender (a] example.com -u user:secret -T - 50 </command> 51 <precheck> 52 chkhostname curlhost 53 </precheck> 54 </client> 55 56 # 57 # Verify data after the test has been "shot" 58 <verify> 59 <protocol> 60 EHLO 936 61 AUTH NTLM 62 TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 63 * 64 AUTH PLAIN 65 dXNlcgB1c2VyAHNlY3JldA== 66 MAIL FROM:<sender (a] example.com> 67 RCPT TO:<recipient (a] example.com> 68 DATA 69 QUIT 70 </protocol> 71 <upload> 72 mail body 73 . 74 </upload> 75 </verify> 76 </testcase> 77