The SMTP authentication file

To achieve a SMTP authentication before sending mails, it is necessary to create a file with the authentication following structure:

The first few lines of the authentication describe features of the SMTP connection.

The first line contains the name of the SMTP server used by the Internet service provider to which you are connected. That would be the information of the 6th line of the configuration file if SMTP authentication was not required.

By default, the SMTP connection uses port 25. If it is necessary to use another port, it is shown in the following line under form:

          port port_number

A blank line it is necessary to indicate that the first part of authentication file is complete.

The text lines that follow contain different messages sent to the SMTP server to perform authentication.
It is a simplified athentification why it is assumed that SMTP server ask the same questions, and therefore wait always the same answers.

Messages dialogue authentication are transmitted using BASE64 encoding. To simplify the seizure of response to send, it's possible to ask Libremail to make the conversion. To this end, line to be converted will begin with the string of 4 characters "b64 " followed by the message to be sent in clear.


The provider Tele2 uses in France the SMTP server with whom we can talk through the port 587.
Each user of the service provider must create an account whose name has the form: cxu-XXX-XXX (with a digit or a letter ta replace each X).
The "auth login" is one of the commands recognized by the Tele2 SMTP.

Suppose a user has the cxu-1a2-b3c account and he has chosen as a password supersecret (super secrecy). His SMTP authentication file can be:

It may be preferable not to let certain information in clear in the authentication file. For this, the tool convb64 lets you convert a line of text in base64 if we tape b64 at the beginning of the line, or from the base64 if the tape directly on the string to be converted.
By transforming the last 2 lines of the file authentication, would yield the following results:

< Previous               Summary               Next >