Hi,
It seems Tom is rigth. I try it with outlook and seems to work
like a charm.
Thank you,
Lucas
Wednesday, August 11, 2004, 12:27:32 AM, you wrote:
L> Hola Tom,
L> What does it means ?. Is the client (thebat) implementing the protocol
incorrectly ?
L> Thanks,
L> Lucas
L> Tuesday, August 10, 2004, 7:20:18 PM, you wrote:
TC>> On Aug 10, 2004, at 1:19 AM, <[EMAIL PROTECTED]> wrote:
>>> 004-08-08 19:40:39.658546500 94306 > 250 AUTH LOGIN PLAIN
>>> 004-08-08 19:40:39.899217500 94306 < AUTH PLAIN
>>> 004-08-08 19:40:39.899534500 94306 > 334
>>> 004-08-08 19:40:40.140874500 94306 <
>>> AGx1Y2FzQHZhbGRlb24ubmV0AE1hcmdhcml0YTI0
>>> 004-08-08 19:40:40.141250500 94306 > 501 malformed auth input (#5.5.4)
TC>> It might actually be bad input. If you decode that string, you'll see
TC>> that it's <NULL>username<NULL>password. I just tried it myself, using
TC>> username<NULL>username<NULL>password and it worked.
TC>> Although it only worked with I sent the request as a single line ("AUTH
TC>> PLAIN <code>") -- sending in response to 334 failed.
TC>> --
TC>> Tom Collins - [EMAIL PROTECTED]
TC>> QmailAdmin: http://qmailadmin.sf.net/ Vpopmail: http://vpopmail.sf.net/
TC>> Info on the Sniffter hand-held Network Tester: http://sniffter.com/
--