oe1skw

Untitled

Mar 24th, 2017
96
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.81 KB | None | 0 0
  1. This message is an automatic response from Port25's authentication verifier
  2. service at verifier.port25.com. The service allows email senders to perform
  3. a simple check of various sender authentication mechanisms. It is provided
  4. free of charge, in the hope that it is useful to the email community. While
  5. it is not officially supported, we welcome any feedback you may have at
  6.  
  7. Thank you for using the verifier,
  8.  
  9. The Port25 Solutions, Inc. team
  10.  
  11. ==========================================================
  12. Summary of Results
  13. ==========================================================
  14. SpamAssassin check: ham
  15.  
  16. ==========================================================
  17. Details:
  18. ==========================================================
  19.  
  20. HELO hostname:
  21. Source IP:
  22. mail-from:
  23.  
  24. ----------------------------------------------------------
  25. SpamAssassin check details:
  26. ----------------------------------------------------------
  27. SpamAssassin v3.4.0 (2014-02-07)
  28.  
  29. Result: ham (-1.8 points, 5.0 required)
  30.  
  31. pts rule name description
  32. ---- ---------------------- --------------------------------------------------
  33. -0.0 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain
  34. 0.0 SPF_FAIL SPF: sender does not match SPF record (fail)
  35. [SPF failed: Please see http://www.openspf.net/Why?s=mfrom;id=sylvia%40kladler.at;ip=134.255.226.90;r=verifier.port25.com]
  36. -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
  37. [score: 0.0000]
  38. 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
  39. 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
  40. 0.0 TVD_SPACE_RATIO No description available.
  41.  
  42. ==========================================================
  43. Explanation of the possible results (from RFC 5451)
  44. ==========================================================
  45.  
  46. SPF and Sender-ID Results
  47. =========================
  48.  
  49. "none"
  50. No policy records were published at the sender's DNS domain.
  51.  
  52. "neutral"
  53. The sender's ADMD has asserted that it cannot or does not
  54. want to assert whether or not the sending IP address is authorized
  55. to send mail using the sender's DNS domain.
  56.  
  57. "pass"
  58. The client is authorized by the sender's ADMD to inject or
  59. relay mail on behalf of the sender's DNS domain.
  60.  
  61. "policy"
  62. The client is authorized to inject or relay mail on behalf
  63. of the sender's DNS domain according to the authentication
  64. method's algorithm, but local policy dictates that the result is
  65. unacceptable.
  66.  
  67. "fail"
  68. This client is explicitly not authorized to inject or
  69. relay mail using the sender's DNS domain.
  70.  
  71. "softfail"
  72. The sender's ADMD believes the client was not authorized
  73. to inject or relay mail using the sender's DNS domain, but is
  74. unwilling to make a strong assertion to that effect.
  75.  
  76. "temperror"
  77. The message could not be verified due to some error that
  78. is likely transient in nature, such as a temporary inability to
  79. retrieve a policy record from DNS. A later attempt may produce a
  80. final result.
  81.  
  82. "permerror"
  83. The message could not be verified due to some error that
  84. is unrecoverable, such as a required header field being absent or
  85. a syntax error in a retrieved DNS TXT record. A later attempt is
  86. unlikely to produce a final result.
  87.  
  88.  
  89. DKIM and DomainKeys Results
  90. ===========================
  91.  
  92. "none"
  93. The message was not signed.
  94.  
  95. "pass"
  96. The message was signed, the signature or signatures were
  97. acceptable to the verifier, and the signature(s) passed
  98. verification tests.
  99.  
  100. "fail"
  101. The message was signed and the signature or signatures were
  102. acceptable to the verifier, but they failed the verification
  103. test(s).
  104.  
  105. "policy"
  106. The message was signed but the signature or signatures were
  107. not acceptable to the verifier.
  108.  
  109. "neutral"
  110. The message was signed but the signature or signatures
  111. contained syntax errors or were not otherwise able to be
  112. processed. This result SHOULD also be used for other
  113. failures not covered elsewhere in this list.
  114.  
  115. "temperror"
  116. The message could not be verified due to some error that
  117. is likely transient in nature, such as a temporary inability
  118. to retrieve a public key. A later attempt may produce a
  119. final result.
  120.  
  121. "permerror"
  122. The message could not be verified due to some error that
  123. is unrecoverable, such as a required header field being
  124. absent. A later attempt is unlikely to produce a final result.
  125.  
  126.  
  127. ==========================================================
  128. Original Email
  129. ==========================================================
Advertisement
Add Comment
Please, Sign In to add comment