This is the command auth-relaytest that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator
auth-relaytest - attempt to use authenticated SMTP to relay to a DSBL-compliant host
auth-relaytest [-tv] ntlm <ip address[:port]>
auth-relaytest [-tv] (cram-md5|login) <username> <password> <ip address[:port]>
auth-relaytest attempts to connect to the specified <ip address> on the specified port
(default is port 25) and tries to use the supplied authentication data to relay mail
through the host.
auth-relaytest uses the sender_user, sender_domain, target_user, target_domain, and auth-
message parameters from dsbl.conf(5) by default. If the auth-message parameter is not
present, the message parameter is used instead.
In the first mode of operation shown, auth-relaytest attempts to authenticate using
anonymous NTLM authentication. A well-known bug in certain Microsoft SMTP server
implementations (described at
http://www.microsoft.com/technet/security/bulletin/MS02-011.asp) will allow relaying for
any client that authenticates in this way.
In the second form of operation, auth-relaytest attempts to authenticate using either the
cram-md5 or login variant of SMTP AUTH, using the supplied username and password.
-t Test mode. Instead of using the target_domain parameter from dsbl.conf(5), the
test_target_domain parameter is used instead. This is useful for sending a test
message to yourself, perhaps to check that the server is actually relaying the
-v Verbose mode. Details of the SMTP transaction are written to standard output.
Paul Howarth <email@example.com>
Ian Gulliver <firstname.lastname@example.org>
Use auth-relaytest online using onworks.net services