Advertisement
Guest User

Untitled

a guest
Jul 13th, 2017
600
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.31 KB | None | 0 0
  1. Return-Path: <auth-results@verifier.port25.com>
  2. Delivered-To: oleksandr@example.com
  3. Received: from verifier.port25.com (verifier.port25.com [38.95.177.125])
  4. (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
  5. (No client certificate requested)
  6. by vulcan.example.com (Postfix) with ESMTPS id 287A320BB2C
  7. for <oleksandr@example.com>; Thu, 13 Jul 2017 18:24:12 +0200 (CEST)
  8. DMARC-Filter: OpenDMARC Filter v1.3.2 vulcan.example.com 287A320BB2C
  9. Authentication-Results: vulcan.example.com; dmarc=none (p=none dis=none) header.from=verifier.port25.com
  10. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=verifier201208; d=port25.com;
  11. h=Date:From:To:Subject:Message-Id:In-Reply-To;
  12. i=auth-results@verifier.port25.com;
  13. bh=rI4K0y2EU2Bg3/MsM7ZBqohzgUlPVTaCZL1PpMNJrbI=;
  14. b=X4yjD1M9uVe36Wqni/zC6nlC+XOUJD4+fOVjxb/9KY8l8gsvgCDV3H7NKZmcwZXjMrgPXx+THWFt
  15. 3uGioQdxYf/6nbnSfhZott1QhOSwx0N4LNSf0rOTWSqr2Cn5Fa4Y6AVd/w2p4ouazukZmXhFAdr7
  16. 8taW2XqW+Q1x2ZYY5TGnHFFuCp+XdGFm31rbmVY5ojhubr5Zzw/HvYMFfTackgXeR3kQC71Ch+/W
  17. DEyIiNoCEOrOq9uPQS+Bz8Jg1Co2ccKnF22rQdaDfTCe1WDxiYp3pCvZBwOGtnZRIl3E4X/FuJ44
  18. dwCR+jV7On73aaAMBQhoKOefoyPQTHCj/LPkVQ==
  19. Received: from verifier.port25.com (127.0.0.1) by verifier.port25.com id hcufao2bkd0e for <oleksandr@example.com>; Thu, 13 Jul 2017 12:24:10 -0400 (envelope-from <auth-results@verifier.port25.com>)
  20. Date: Thu, 13 Jul 2017 12:24:10 -0400
  21. From: auth-results@verifier.port25.com
  22. To: oleksandr@example.com
  23. Subject: Authentication Report
  24. Message-Id: <1499963048-634214@verifier.port25.com>
  25. Precedence: junk (auto_reply)
  26. In-Reply-To: <1607288.e7jaYuyJD9@example.com>
  27. X-Rspamd-Queue-Id: 287A320BB2C
  28. X-Spamd-Result: default: False [-2.75 / 15.00]
  29. PREVIOUSLY_DELIVERED(0.00)[oleksandr@example.com]
  30. MID_RHS_MATCH_FROM(0.00)[]
  31. IP_SCORE(0.00)[ip: (-9.91), ipnet: 38.95.177.0/24(-7.93), asn: 174(-4.96), country: US(-0.97)]
  32. R_SPF_ALLOW(-0.20)[+a]
  33. RCVD_NO_TLS_LAST(0.00)[]
  34. RCPT_COUNT_ONE(0.00)[1]
  35. R_DKIM_ALLOW(-0.20)[port25.com]
  36. RCVD_COUNT_TWO(0.00)[2]
  37. FROM_NO_DN(0.00)[]
  38. ARC_NA(0.00)[]
  39. TO_DN_NONE(0.00)[]
  40. MIME_GOOD(-0.10)[text/plain]
  41. FROM_EQ_ENVFROM(0.00)[]
  42. REPLY(-2.00)[]
  43. TO_MATCH_ENVRCPT_ALL(0.00)[]
  44. DMARC_POLICY_ALLOW(-0.25)[port25.com,none]
  45. ASN(0.00)[asn:174, ipnet:38.95.177.0/24, country:US]
  46. X-Rspamd-Server: vulcan.example.com
  47.  
  48. This message is an automatic response from Port25's authentication verifier
  49. service at verifier.port25.com. The service allows email senders to perform
  50. a simple check of various sender authentication mechanisms. It is provided
  51. free of charge, in the hope that it is useful to the email community. While
  52. it is not officially supported, we welcome any feedback you may have at
  53. <verifier-feedback@port25.com>.
  54.  
  55. Thank you for using the verifier,
  56.  
  57. The Port25 Solutions, Inc. team
  58.  
  59. ==========================================================
  60. Summary of Results
  61. ==========================================================
  62. SPF check: pass
  63. DKIM check: fail
  64. SpamAssassin check: ham
  65.  
  66. ==========================================================
  67. Details:
  68. ==========================================================
  69.  
  70. HELO hostname: vulcan.example.com
  71. Source IP: 1.2.3.4
  72. mail-from: oleksandr@example.com
  73.  
  74. ----------------------------------------------------------
  75. SPF check details:
  76. ----------------------------------------------------------
  77. Result: pass
  78. ID(s) verified: smtp.mailfrom=oleksandr@example.com
  79.  
  80. DNS record(s):
  81. example.com. 3600 IN TXT "v=spf1 ip4:1.2.3.4 ip6:2001:a:b:c:d:e:f:0 mx -all"
  82. example.com. 3600 IN TXT "yandex-verification: 797fca4c7fe0b971"
  83.  
  84.  
  85. ----------------------------------------------------------
  86. DKIM check details:
  87. ----------------------------------------------------------
  88. Result: fail (signature doesn't verify)
  89. ID(s) verified:
  90.  
  91. Canonicalized Headers:
  92. from:Oleksandr'20'Natalenko'20'<oleksandr@example.com>'0D''0A'
  93. subject:bad'20'letter'0D''0A'
  94. date:Thu,'20'13'20'Jul'20'2017'20'18:24:06'20'+0200'0D''0A'
  95. message-id:<1607288.e7jaYuyJD9@example.com>'0D''0A'
  96. to:check-auth@verifier.port25.com'0D''0A'
  97. mime-version:1.0'0D''0A'
  98. content-type:text/plain;'20'charset="utf-8"'0D''0A'
  99. content-transfer-encoding:7Bit'0D''0A'
  100. dkim-signature:v=1;'20'a=rsa-sha256;'20'c=relaxed/relaxed;'20'd=example.com;'20's=dkim-20170712;'20't=1499963047;'20'h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding;'20'bh=Ss9bCWAg7WbklSeflA/G2W86zuVUtRcU0GiO0VrTDTw=;'20'b=
  101.  
  102. Canonicalized Body:
  103. letter'20'body'0D''0A'
  104.  
  105.  
  106. DNS record(s):
  107. dkim-20170712._domainkey.example.com. 3356 IN TXT "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDGNgqaYVVs35YySpI4n151IFQQpj0Cr/HysLWC5bpr0a+JRHbI4ilE3/anq3H6K7hRcOGeOC7hOxCCHdVXQY+h7KKRs9qQqv+UsWlWSGqCaufSVdEil5P3I98x6vqJvlxUMFlSmdFU6Jlt0q6BEQ2YtFRYBFnmaYjqNpRKBO2XdwIDAQAB"
  108.  
  109. Public key used for verification: dkim-20170712._domainkey.example.com (1024 bits)
  110.  
  111. NOTE: DKIM checking has been performed based on the latest DKIM specs
  112. (RFC 4871 or draft-ietf-dkim-base-10) and verification may fail for
  113. older versions. If you are using Port25's PowerMTA, you need to use
  114. version 3.2r11 or later to get a compatible version of DKIM.
  115.  
  116. ----------------------------------------------------------
  117. SpamAssassin check details:
  118. ----------------------------------------------------------
  119. SpamAssassin v3.4.1 (2015-04-28)
  120.  
  121. Result: ham (0.9 points, 5.0 required)
  122.  
  123. pts rule name description
  124. ---- ---------------------- --------------------------------------------------
  125. 0.0 NO_DNS_FOR_FROM DNS: Envelope sender has no MX or A DNS records
  126. 0.8 DKIM_ADSP_ALL No valid author signature, domain signs all mail
  127. -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay
  128. domain
  129. 0.0 T_SPF_TEMPERROR SPF: test of record failed (temperror)
  130. 0.0 T_SPF_HELO_TEMPERROR SPF: test of HELO record failed (temperror)
  131. -0.0 BAYES_20 BODY: Bayes spam probability is 5 to 20%
  132. [score: 0.0515]
  133. 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
  134. 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
  135.  
  136.  
  137.  
  138. ==========================================================
  139. Explanation of the possible results (from RFC 5451)
  140. ==========================================================
  141.  
  142. SPF and Sender-ID Results
  143. =========================
  144.  
  145. "none"
  146. No policy records were published at the sender's DNS domain.
  147.  
  148. "neutral"
  149. The sender's ADMD has asserted that it cannot or does not
  150. want to assert whether or not the sending IP address is authorized
  151. to send mail using the sender's DNS domain.
  152.  
  153. "pass"
  154. The client is authorized by the sender's ADMD to inject or
  155. relay mail on behalf of the sender's DNS domain.
  156.  
  157. "policy"
  158. The client is authorized to inject or relay mail on behalf
  159. of the sender's DNS domain according to the authentication
  160. method's algorithm, but local policy dictates that the result is
  161. unacceptable.
  162.  
  163. "fail"
  164. This client is explicitly not authorized to inject or
  165. relay mail using the sender's DNS domain.
  166.  
  167. "softfail"
  168. The sender's ADMD believes the client was not authorized
  169. to inject or relay mail using the sender's DNS domain, but is
  170. unwilling to make a strong assertion to that effect.
  171.  
  172. "temperror"
  173. The message could not be verified due to some error that
  174. is likely transient in nature, such as a temporary inability to
  175. retrieve a policy record from DNS. A later attempt may produce a
  176. final result.
  177.  
  178. "permerror"
  179. The message could not be verified due to some error that
  180. is unrecoverable, such as a required header field being absent or
  181. a syntax error in a retrieved DNS TXT record. A later attempt is
  182. unlikely to produce a final result.
  183.  
  184.  
  185. DKIM and DomainKeys Results
  186. ===========================
  187.  
  188. "none"
  189. The message was not signed.
  190.  
  191. "pass"
  192. The message was signed, the signature or signatures were
  193. acceptable to the verifier, and the signature(s) passed
  194. verification tests.
  195.  
  196. "fail"
  197. The message was signed and the signature or signatures were
  198. acceptable to the verifier, but they failed the verification
  199. test(s).
  200.  
  201. "policy"
  202. The message was signed but the signature or signatures were
  203. not acceptable to the verifier.
  204.  
  205. "neutral"
  206. The message was signed but the signature or signatures
  207. contained syntax errors or were not otherwise able to be
  208. processed. This result SHOULD also be used for other
  209. failures not covered elsewhere in this list.
  210.  
  211. "temperror"
  212. The message could not be verified due to some error that
  213. is likely transient in nature, such as a temporary inability
  214. to retrieve a public key. A later attempt may produce a
  215. final result.
  216.  
  217. "permerror"
  218. The message could not be verified due to some error that
  219. is unrecoverable, such as a required header field being
  220. absent. A later attempt is unlikely to produce a final result.
  221.  
  222.  
  223.  
  224. ==========================================================
  225. Original Email
  226. ==========================================================
  227.  
  228. Return-Path: <oleksandr@example.com>
  229. Received: from vulcan.example.com (1.2.3.4) by verifier.port25.com id hcufag2bkd06 for <check-auth@verifier.port25.com>; Thu, 13 Jul 2017 12:24:08 -0400 (envelope-from <oleksandr@example.com>)
  230. Authentication-Results: verifier.port25.com; spf=pass smtp.mailfrom=oleksandr@example.com;
  231. dkim=fail reason="signature doesn't verify"
  232. Received: from spock.localnet (unknown [IPv6:2001:a:b:c:d:e:f:0])
  233. (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
  234. (No client certificate requested)
  235. by vulcan.example.com (Postfix) with ESMTPSA id 8839B20BB27
  236. for <check-auth@verifier.port25.com>; Thu, 13 Jul 2017 18:24:07 +0200 (CEST)
  237. DMARC-Filter: OpenDMARC Filter v1.3.2 vulcan.example.com 8839B20BB27
  238. Authentication-Results: vulcan.example.com; dmarc=fail (p=none dis=none) header.from=example.com
  239. From: Oleksandr Natalenko <oleksandr@example.com>
  240. To: check-auth@verifier.port25.com
  241. Subject: bad letter
  242. Date: Thu, 13 Jul 2017 18:24:06 +0200
  243. Message-ID: <1607288.e7jaYuyJD9@example.com>
  244. MIME-Version: 1.0
  245. Content-Transfer-Encoding: 7Bit
  246. Content-Type: text/plain; charset="utf-8"
  247. ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=example.com;
  248. s=arc-20170712; t=1499963047;
  249. h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding;
  250. bh=Ss9bCWAg7WbklSeflA/G2W86zuVUtRcU0GiO0VrTDTw=;
  251. b=IwYx+IUVxn8o5PG4VCxBvSxeP7z0s5juznFM2Yw/lId2PqlAXXLHbD7cRYhjNbJchnIU3n
  252. ld/ltSrmwtr41shBbDkGI99nilimrH60f2D2GUPZxC2rsvvOUvekAU83kNaUIBLMLwIBwV
  253. 9dISq1gK3msz2ln8Klq8Y/NkHEB1rRY=
  254. ARC-Seal: i=1; s=arc-20170712; d=example.com; t=1499963047; a=rsa-sha256;
  255. cv=none;
  256. b=saKKzveUQe9fj3x4otNnw9Or3qJpcPGMAVXLIrJRKqZxjTAF50RFAWZS4BO3AnUgvQXLle8etujmbxjZHZW61ye17cW0GJ6etzDHRuOEOqlfMq+pqTUf6DIeqwOqPv9jk3JO7NhXH7lPuwzo2J9DntYifuXdhOsWh4r0nHqEgAw=
  257. ARC-Authentication-Results: i=1; auth=pass smtp.auth=oleksandr@example.com
  258. smtp.mailfrom=oleksandr@example.com
  259. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=example.com;
  260. s=dkim-20170712; t=1499963047;
  261. h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding;
  262. bh=Ss9bCWAg7WbklSeflA/G2W86zuVUtRcU0GiO0VrTDTw=;
  263. b=Z6k+gBsjmgtUa9Sec4W8pF3n7tVnbaHSIrIFTxVfYS0WmxuczrEL82LebZWGGBvD/b7OPR
  264. 5eqwOv3CtASyzhG30sSRpOBUo9nKfJN1/OUsOiiA2XwW0G12XNA1/RGhsUr+pT6sXu1TRY
  265. qMP1xHZe2H3OZAkrEi+T6HSxPhQPjSA=
  266.  
  267. letter body
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement