Advertisement
oe1skw

Untitled

Mar 24th, 2017
87
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.81 KB | None | 0 0
  1. This message is an automatic response from Port25's authentication verifier
  2. service at verifier.port25.com. The service allows email senders to perform
  3. a simple check of various sender authentication mechanisms. It is provided
  4. free of charge, in the hope that it is useful to the email community. While
  5. it is not officially supported, we welcome any feedback you may have at
  6. <verifier-feedback@port25.com>.
  7.  
  8. Thank you for using the verifier,
  9.  
  10. The Port25 Solutions, Inc. team
  11.  
  12. ==========================================================
  13. Summary of Results
  14. ==========================================================
  15. SpamAssassin check: ham
  16.  
  17. ==========================================================
  18. Details:
  19. ==========================================================
  20.  
  21. HELO hostname:
  22. Source IP:
  23. mail-from:
  24.  
  25. ----------------------------------------------------------
  26. SpamAssassin check details:
  27. ----------------------------------------------------------
  28. SpamAssassin v3.4.0 (2014-02-07)
  29.  
  30. Result: ham (-1.8 points, 5.0 required)
  31.  
  32. pts rule name description
  33. ---- ---------------------- --------------------------------------------------
  34. -0.0 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain
  35. 0.0 SPF_FAIL SPF: sender does not match SPF record (fail)
  36. [SPF failed: Please see http://www.openspf.net/Why?s=mfrom;id=sylvia%40kladler.at;ip=134.255.226.90;r=verifier.port25.com]
  37. -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
  38. [score: 0.0000]
  39. 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
  40. 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
  41. 0.0 TVD_SPACE_RATIO No description available.
  42.  
  43. ==========================================================
  44. Explanation of the possible results (from RFC 5451)
  45. ==========================================================
  46.  
  47. SPF and Sender-ID Results
  48. =========================
  49.  
  50. "none"
  51. No policy records were published at the sender's DNS domain.
  52.  
  53. "neutral"
  54. The sender's ADMD has asserted that it cannot or does not
  55. want to assert whether or not the sending IP address is authorized
  56. to send mail using the sender's DNS domain.
  57.  
  58. "pass"
  59. The client is authorized by the sender's ADMD to inject or
  60. relay mail on behalf of the sender's DNS domain.
  61.  
  62. "policy"
  63. The client is authorized to inject or relay mail on behalf
  64. of the sender's DNS domain according to the authentication
  65. method's algorithm, but local policy dictates that the result is
  66. unacceptable.
  67.  
  68. "fail"
  69. This client is explicitly not authorized to inject or
  70. relay mail using the sender's DNS domain.
  71.  
  72. "softfail"
  73. The sender's ADMD believes the client was not authorized
  74. to inject or relay mail using the sender's DNS domain, but is
  75. unwilling to make a strong assertion to that effect.
  76.  
  77. "temperror"
  78. The message could not be verified due to some error that
  79. is likely transient in nature, such as a temporary inability to
  80. retrieve a policy record from DNS. A later attempt may produce a
  81. final result.
  82.  
  83. "permerror"
  84. The message could not be verified due to some error that
  85. is unrecoverable, such as a required header field being absent or
  86. a syntax error in a retrieved DNS TXT record. A later attempt is
  87. unlikely to produce a final result.
  88.  
  89.  
  90. DKIM and DomainKeys Results
  91. ===========================
  92.  
  93. "none"
  94. The message was not signed.
  95.  
  96. "pass"
  97. The message was signed, the signature or signatures were
  98. acceptable to the verifier, and the signature(s) passed
  99. verification tests.
  100.  
  101. "fail"
  102. The message was signed and the signature or signatures were
  103. acceptable to the verifier, but they failed the verification
  104. test(s).
  105.  
  106. "policy"
  107. The message was signed but the signature or signatures were
  108. not acceptable to the verifier.
  109.  
  110. "neutral"
  111. The message was signed but the signature or signatures
  112. contained syntax errors or were not otherwise able to be
  113. processed. This result SHOULD also be used for other
  114. failures not covered elsewhere in this list.
  115.  
  116. "temperror"
  117. The message could not be verified due to some error that
  118. is likely transient in nature, such as a temporary inability
  119. to retrieve a public key. A later attempt may produce a
  120. final result.
  121.  
  122. "permerror"
  123. The message could not be verified due to some error that
  124. is unrecoverable, such as a required header field being
  125. absent. A later attempt is unlikely to produce a final result.
  126.  
  127.  
  128. ==========================================================
  129. Original Email
  130. ==========================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement