Hi, It seems Tom is rigth. I try it with outlook and seems to work like a charm.
Thank you, Lucas Wednesday, August 11, 2004, 12:27:32 AM, you wrote: L> Hola Tom, L> What does it means ?. Is the client (thebat) implementing the protocol incorrectly ? L> Thanks, L> Lucas L> Tuesday, August 10, 2004, 7:20:18 PM, you wrote: TC>> On Aug 10, 2004, at 1:19 AM, <[EMAIL PROTECTED]> wrote: >>> 004-08-08 19:40:39.658546500 94306 > 250 AUTH LOGIN PLAIN >>> 004-08-08 19:40:39.899217500 94306 < AUTH PLAIN >>> 004-08-08 19:40:39.899534500 94306 > 334 >>> 004-08-08 19:40:40.140874500 94306 < >>> AGx1Y2FzQHZhbGRlb24ubmV0AE1hcmdhcml0YTI0 >>> 004-08-08 19:40:40.141250500 94306 > 501 malformed auth input (#5.5.4) TC>> It might actually be bad input. If you decode that string, you'll see TC>> that it's <NULL>username<NULL>password. I just tried it myself, using TC>> username<NULL>username<NULL>password and it worked. TC>> Although it only worked with I sent the request as a single line ("AUTH TC>> PLAIN <code>") -- sending in response to 334 failed. TC>> -- TC>> Tom Collins - [EMAIL PROTECTED] TC>> QmailAdmin: http://qmailadmin.sf.net/ Vpopmail: http://vpopmail.sf.net/ TC>> Info on the Sniffter hand-held Network Tester: http://sniffter.com/ --