1<testcase> 2# Server-side 3<reply> 4# the first request has NTLM type-1 included, and then the 1001 is returned 5<data1001> 6HTTP/1.1 200 beng swsclose swsbounce 7Server: Microsoft-IIS/6.0 8Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 9Content-Type: text/html; charset=iso-8859-1 10 11</data1001> 12 13# the second request should be auth-less and then this is returned. 14<data> 15HTTP/1.1 200 moo swsclose 16Server: Microsoft-IIS/6.0 17Content-Type: text/html; charset=iso-8859-1 18Content-Length: 16 19 20content for you 21</data> 22 23<datacheck> 24HTTP/1.1 200 beng swsclose swsbounce 25Server: Microsoft-IIS/6.0 26Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth 27Content-Type: text/html; charset=iso-8859-1 28 29HTTP/1.1 200 moo swsclose 30Server: Microsoft-IIS/6.0 31Content-Type: text/html; charset=iso-8859-1 32Content-Length: 16 33 34content for you 35</datacheck> 36 37</reply> 38 39# Client-side 40<client> 41<features> 42NTLM 43</features> 44<server> 45http 46</server> 47 <name> 48HTTP POST --ntlm to server not requiring any auth at all 49 </name> 50 <command> 51http://%HOSTIP:%HTTPPORT/176 -u auser:apasswd --ntlm -d "junkelijunk" 52</command> 53</client> 54 55# Verify data after the test has been "shot" 56<verify> 57<strip> 58^User-Agent:.* 59</strip> 60<protocol nonewline="yes"> 61POST /176 HTTP/1.1 62Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA= 63User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6 64Host: %HOSTIP:%HTTPPORT 65Accept: */* 66Content-Length: 0 67Content-Type: application/x-www-form-urlencoded 68 69POST /176 HTTP/1.1 70User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6 71Host: %HOSTIP:%HTTPPORT 72Accept: */* 73Content-Length: 11 74Content-Type: application/x-www-form-urlencoded 75 76junkelijunk 77</protocol> 78</verify> 79</testcase> 80