38. The spa authenticator

The spa authenticator provides client support for Microsoft’s Secure Password Authentication mechanism, which is also sometimes known as NTLM (NT LanMan). The code for client side of this authenticator was contributed by Marc Prud’hommeaux, and much of it is taken from the Samba project (http://www.samba.org). The code for the server side was subsequently contributed by Tom Kistner. The mechanism works as follows:

Encryption is used to protect the password in transit.

The spa authenticator has just one server option:

server_passwordUse: spaType: stringDefault: unset

This option is expanded, and the result must be the cleartext password for the authenticating user, whose name is at this point in $auth1. For compatibility with previous releases of Exim, the user name is also placed in $1. However, the use of this variable for this purpose is now deprecated, as it can lead to confusion in string expansions that also use numeric variables for other things. For example:

  driver = spa
  public_name = NTLM
  server_password = \

If the expansion is forced to fail, authentication fails. Any other expansion failure causes a temporary error code to be returned.

The spa authenticator has the following client options:

client_domainUse: spaType: stringDefault: unset

This option specifies an optional domain for the authentication.

client_passwordUse: spaType: stringDefault: unset

This option specifies the user’s password, and must be set.

client_usernameUse: spaType: stringDefault: unset

This option specifies the user name, and must be set. Here is an example of a configuration of this authenticator for use with the mail servers at msn.com:

  driver = spa
  public_name = MSN
  client_username = msn/msn_username
  client_password = msn_plaintext_password
  client_domain = DOMAIN_OR_UNSET