Provided by: dsbltesters_0.9.5-4_amd64
auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host
auth-relaytest [-tv] ntlm <ip address[:port]> auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]>
auth-relaytest attempts to connect to the specified <ip address> on the specified port (default is port 25) and tries to use the supplied authentication data to relay mail through the host. auth-relaytest uses the sender_user, sender_domain, target_user, target_domain, and auth- message parameters from dsbl.conf(5) by default. If the auth-message parameter is not present, the message parameter is used instead. In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in certain Microsoft SMTP server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relaying for any client that authenticates in this way. In the second form of operation, auth-relaytest attempts to authenticate using either the cram-md5 or login variant of SMTP AUTH, using the supplied username and password.
-t Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the test_target_domain parameter is used instead. This is useful for sending a test message to yourself, perhaps to check that the server is actually relaying the messages. -v Verbose mode. Details of the SMTP transaction are written to standard output.
Paul Howarth <email@example.com> Ian Gulliver <firstname.lastname@example.org>
dsbl.conf(5), spamtrap(1), relaytest(1) 2004-01-06 auth-relaytest(1)