xenial (1) auth-relaytest.1.gz

Provided by: dsbltesters_0.9.5-4_amd64 bug

NAME

       auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host

SYNOPSIS

       auth-relaytest [-tv] ntlm <ip address[:port]>
       auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]>

DESCRIPTION

       auth-relaytest  attempts  to connect to the specified <ip address> on the specified port (default is port
       25) and tries to use the supplied authentication data to relay mail through the host.

       auth-relaytest  uses  the  sender_user,  sender_domain,  target_user,  target_domain,  and   auth-message
       parameters  from  dsbl.conf(5)  by  default.  If  the  auth-message parameter is not present, the message
       parameter is used instead.

       In the first mode of operation shown,  auth-relaytest  attempts  to  authenticate  using  anonymous  NTLM
       authentication.  A  well-known  bug  in  certain  Microsoft  SMTP  server  implementations  (described at
       http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relaying for any client  that
       authenticates in this way.

       In  the  second  form  of operation, auth-relaytest attempts to authenticate using either the cram-md5 or
       login variant of SMTP AUTH, using the supplied username and password.

OPTIONS

       -t     Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the  test_target_domain
              parameter is used instead. This is useful for sending a test message to yourself, perhaps to check
              that the server is actually relaying the messages.

       -v     Verbose mode. Details of the SMTP transaction are written to standard output.

AUTHORS

       Paul Howarth <paul@city-fan.org>
       Ian Gulliver <ian@penguinhosting.net>

SEE ALSO

       dsbl.conf(5), spamtrap(1), relaytest(1)

                                                   2004-01-06                                  auth-relaytest(1)