.\" (C) 2004 Paul Howarth .TH auth-relaytest 1 2004-01-06 .SH NAME auth-relaytest \- attempt to use authenticated SMTP to relay to a DSBL-compliant host .SH SYNOPSIS .BI "auth-relaytest [-tv] " "ntlm" " <" "ip address" "[:" "port" "]>" .br .BI "auth-relaytest [-tv] (" "cram-md5" "|" "login" ") <" "username" "> <" "password" "> <" "ip address" "[:" "port" "]>" .SH DESCRIPTION auth-relaytest attempts to connect to the specified .RI < "ip address" > on the specified .RI "" port "" (default is port 25) and tries to use the supplied authentication data to relay mail through the host. auth-relaytest uses the .IR sender_user ", " sender_domain ", " target_user ", " target_domain ", and " auth-message parameters from .BR dsbl.conf (5) by default. If the .I auth-message parameter is not present, the .I message parameter is used instead. In the first mode of operation shown, auth-relaytest attempts to authenticate using anonymous NTLM authentication. A well-known bug in certain Microsoft SMTP server implementations (described at http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relaying for any client that authenticates in this way. In the second form of operation, auth-relaytest attempts to authenticate using either the .IR cram-md5 " or " login variant of SMTP AUTH, using the supplied .IR username " and " password . .SH OPTIONS .TP .B \-t Test mode. Instead of using the .I target_domain parameter from .BR dsbl.conf (5), the .I test_target_domain parameter is used instead. This is useful for sending a test message to yourself, perhaps to check that the server is actually relaying the messages. .TP .B \-v Verbose mode. Details of the SMTP transaction are written to standard output. .SH AUTHORS Paul Howarth .br Ian Gulliver .SH SEE ALSO .BR dsbl.conf (5), .BR spamtrap (1), .BR relaytest (1)