IMAP SASL SASL AUTH NTLM SASL AUTH PLAIN SASL DOWNGRADE # # Server-side AUTH NTLM PLAIN REPLY "AUTHENTICATE NTLM" + REPLY TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= + Rubbish REPLY * A002 NO AUTH exchange cancelled by client REPLY "AUTHENTICATE PLAIN" + REPLY dXNlcgB1c2VyAHNlY3JldA== A003 OK AUTHENTICATE completed From: me@somewhere To: fake@nowhere body -- yours sincerely # # Client-side imap NTLM !SSPI IMAP NTLM authentication with SASL downgrade # we force our own host name, in order to make the test machine independent CURL_GETHOSTNAME=curlhost # we try to use the LD_PRELOAD hack, if not a debug build LD_PRELOAD=%PWD/libtest/.libs/libhostname.so 'imap://%HOSTIP:%IMAPPORT/834/;UID=1' -u user:secret chkhostname curlhost # # Verify data after the test has been "shot" A001 CAPABILITY A002 AUTHENTICATE NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= * A003 AUTHENTICATE PLAIN dXNlcgB1c2VyAHNlY3JldA== A004 SELECT 834 A005 FETCH 1 BODY[] A006 LOGOUT