Advertisement
Guest User

Untitled

a guest
Jan 25th, 2017
156
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.08 KB | None | 0 0
  1. ============================================================================
  2. This is SPF/DKIM/DMARC/RBL report generated by a test tool provided
  3. by AdminSystem Software Limited.
  4.  
  5. Any problem, please contact support@emailarchitect.net
  6. ============================================================================
  7. Report-Id: a511e572
  8. Sender: dule@example.com
  9. Source-IP: 11.22.33.44
  10. ============================================================================
  11. Original email header:
  12.  
  13. x-sender: dule@example.com
  14. x-receiver: test-a511e572@appmaildev.com
  15. Received: from host1.example.biz ([11.22.33.44]) by appmaildev.com with Microsoft SMTPSVC(8.5.9600.16384);
  16. Wed, 25 Jan 2017 07:25:09 +0000
  17. Received: from host1.example.biz (localhost [127.0.0.1])
  18. by host1.example.biz (Postfix) with SMTP id DB0A3164364
  19. for <test-a511e572@appmaildev.com>; Wed, 25 Jan 2017 08:25:08 +0100 (CET)
  20. DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=example.com;
  21. s=2016; t=1485329108;
  22. bh=GNttbsw+WDQCAJvuUenSuOnhZUFMDY0bOkhR87y32XA=;
  23. h=From:Subject:To:Date:From;
  24. b=dhJTUjBelfWvNPO4/gCWExHc87vC3uucapPxhKosJ/Ka/rgv42bSqARNIAmmROPID
  25. z7o2txBEt6aSRz+C/v+MnaXIzbFzlkOCUavahehOaGo7jkoIle1N11Yxyn6qe4+uh8
  26. wykUbHN9/sD4IORxP1sguFAdo9ONlbB6naW7tQoVDDfIhOS6UY5rFw7WmmGJIzitgv
  27. LJ4a/QrEDDDQX/H+kDessPbULFfLVUlhZQyscbHkb+S/B7s2D93S9vY9CSzrzG/uVj
  28. jvAYY+4LLhnPpaJBwjtQK2Itygj+gNQ3tvEmP1RwyNjSum0XDSQcQjEWtXs/ZC7Ker
  29. 6rQnOaNhmvSaQ==
  30. From: "dule" <dule@example.com>
  31. Subject: d
  32. To: test-a511e572@appmaildev.com
  33. Message-Id: <1485329108.10136@example.com>
  34. X-Mailer: Usermin 1.690
  35. Date: Wed, 25 Jan 2017 08:25:08 +0100 (CET)
  36. MIME-Version: 1.0
  37. Content-Type: multipart/mixed; boundary="bound1485329108"
  38. Return-Path: dule@example.com
  39. X-OriginalArrivalTime: 25 Jan 2017 07:25:09.0615 (UTC) FILETIME=[28C68FF0:01D276DC]
  40.  
  41. ============================================================================
  42. SPF: Pass
  43. ============================================================================
  44.  
  45. SPF-Record: v=spf1 mx a ip4:11.22.33.44 a:host1.example.biz ?all
  46. Sender-IP:11.22.33.44
  47. Sender-Domain:example.com
  48.  
  49. Query TEXT record from DNS server for: example.com
  50. [TXT]: v=spf1 mx a ip4:11.22.33.44 a:host1.example.biz ?all
  51. Parsing SPF record: v=spf1 mx a ip4:11.22.33.44 a:host1.example.biz ?all
  52.  
  53. Mechanisms: v=spf1
  54.  
  55. Mechanisms: mx
  56. Testing mechanism mx
  57. Query MX record from DNS server for: example.com
  58. [MX]: mail.example.com
  59. Testing mechanism A:mail.example.com/128
  60. Query A record from DNS server for: mail.example.com
  61. [A]: 11.22.33.44
  62. Testing CIDR: source=11.22.33.44; 11.22.33.44/128
  63. mx hit, Qualifier: +
  64.  
  65. ============================================================================
  66. DKIM: fail
  67. ============================================================================
  68.  
  69. DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=example.com;
  70. s=2016; t=1485329108;
  71. bh=GNttbsw+WDQCAJvuUenSuOnhZUFMDY0bOkhR87y32XA=;
  72. h=From:Subject:To:Date:From;
  73. b=dhJTUjBelfWvNPO4/gCWExHc87vC3uucapPxhKosJ/Ka/rgv42bSqARNIAmmROPID
  74. z7o2txBEt6aSRz+C/v+MnaXIzbFzlkOCUavahehOaGo7jkoIle1N11Yxyn6qe4+uh8
  75. wykUbHN9/sD4IORxP1sguFAdo9ONlbB6naW7tQoVDDfIhOS6UY5rFw7WmmGJIzitgv
  76. LJ4a/QrEDDDQX/H+kDessPbULFfLVUlhZQyscbHkb+S/B7s2D93S9vY9CSzrzG/uVj
  77. jvAYY+4LLhnPpaJBwjtQK2Itygj+gNQ3tvEmP1RwyNjSum0XDSQcQjEWtXs/ZC7Ker
  78. 6rQnOaNhmvSaQ==
  79. Signed-by: dule@example.com
  80. Expected-Body-Hash: GNttbsw+WDQCAJvuUenSuOnhZUFMDY0bOkhR87y32XA=
  81. Public-Key: v=DKIM1; k=rsa; t=s; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm9jrAe+o1L/g0pQefC4AdVPmN2gS2ODghLhfzir0xKTBLl3U+2X33DCStxvHdaLJZYVlKu9PDwr5yXvX4izX5ZnM/gEIm2p3ij0ykQu7Phz6GUvBoozLGPM2876dEVuMZ/aZgqoC4BU8dXGIlif4mqyo6pM76gPwbcj9e98nY+NKJAdKpJV5fMO94wXZ/DjNjI4Sr6bWxrBOZZyh5Am9T/lbOgjjU26ejiroSw//MdXDNGBBp44llHSWEWuUfxamDHaR83UGqhV2gWLpJyrbJtp3Ic8nwuWc0Ko1fR7wbg+HW5OdF9WMf0Id2qTbKQlOSAzbz82Qh5Nj2RCBdBJ1hwIDAQAB;
  82.  
  83. DKIM-Result: fail (bad signature)
  84.  
  85. # This is a basic configuration that can easily be adapted to suit a standard
  86. # installation. For more advanced options, see opendkim.conf(5) and/or
  87. # /usr/share/doc/opendkim/examples/opendkim.conf.sample.
  88.  
  89. # Log to syslog
  90. Syslog yes
  91. # Required to use local socket with MTAs that access the socket as a non-
  92. # privileged user (e.g. Postfix)
  93. UMask 002
  94.  
  95. # Sign for example.com with key in /etc/mail/dkim.key using
  96. # selector '2007' (e.g. 2007._domainkey.example.com)
  97. Domain /etc/dkim-domains.txt
  98. KeyFile /etc/dkim.key
  99. Selector 2016
  100.  
  101. # Commonly-used options; the commented-out versions show the defaults.
  102. #Canonicalization simple
  103. #Mode sv
  104. #SubDomains no
  105. #ADSPAction continue
  106.  
  107. # Always oversign From (sign using actual From and a null From to prevent
  108. # malicious signatures header fields (From and/or others) between the signer
  109. # and the verifier. From is oversigned by default in the Debian pacakge
  110. # because it is often the identity key used by reputation systems and thus
  111. # somewhat security sensitive.
  112. OversignHeaders From
  113.  
  114. # List domains to use for RFC 6541 DKIM Authorized Third-Party Signatures
  115. # (ATPS) (experimental)
  116.  
  117. #ATPSDomains example.com
  118. #SigningTable refile:/etc/dkim-signingtable
  119. #KeyTable /etc/dkim-keytable
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement