Eintrag Bug-Forum: Dies ist eine vorgefertigte Schablone, die bei der Formulierung eines Bugreports unterstützen soll. Bitte die folgenden Angaben möglichst vollständig ausfüllen.
- Welche Version von pd-admin wird eingesetzt?
3.31
- Welche Version der Standard-Serverumgebung wird eingesetzt?
0064
- Wie sind die problematischen Dienste konfiguriert?
ka
- Welche Logfile-Einträge (zB. Webserver- oder Mail-Logfile) gibt es?
s.u.
Ich habe heute leider feststellen müssen das der webserver nicht gegen email pingpong geschützt ist.
ZitatAlles anzeigen<tibor@axa-financial.com>:
208.17.215.181 does not like recipient.
Remote host said: 550 <tibor@axa-financial.com>: Recipient address rejected: User
unknown in relay recipient table
Giving up on 208.17.215.181.
--- Below this line is the original bounce.
Return-Path: <>
Received: (qmail 12178 invoked for bounce); 12 Jul 2006 16:38:44 -0000
Date: 12 Jul 2006 16:38:44 -0000
From: MAILER-DAEMON@*********.de
To: tibor@axa-financial.com
Subject: failure notice
Hi. This is the qmail-send program at webserver1.crowfire.de.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.
<sales@*********.de>:
Sorry, no mailbox here by that name. (#5.1.1)
--- Below this line is a copy of the message.
Return-Path: <tibor@axa-financial.com>
Received: (qmail 12175 invoked from network); 12 Jul 2006 16:38:44 -0000
Received: by simscan 1.1.0 ppid: 12159, pid: 12168, t: 2.6984s
scanners:none
X-Spam-Flag: YES
X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on
webserver1.crowfire.de
X-Spam-Level: ********
X-Spam-Status: Yes, score=8.1 required=5.0 tests=AWL,BAYES_99,
FORGED_RCVD_HELO,FUZZY_VLIUM,HTML_50_60,HTML_MESSAGE,
RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,
URIBL_SBL autolearn=no version=3.1.3
X-Spam-Report:
* 0.1 FORGED_RCVD_HELO Received: contains a forged HELO
* 0.2 FUZZY_VLIUM BODY: Attempt to obfuscate words in spam
* 0.1 HTML_50_60 BODY: Message is 50% to 60% HTML
* 0.0 HTML_MESSAGE BODY: HTML included in message
* 3.5 BAYES_99 BODY: Bayesian spam probability is 99 to 100%
* [score: 0.9904]
* 1.5 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
* above 50%
* [cf: 100]
* 0.5 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/)
* 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
* [cf: 100]
* 1.6 URIBL_SBL Contains an URL listed in the SBL blocklist
* [URIs: hutefadaze.com]
* -0.0 AWL AWL: From: address is in the auto white-list
Received: from unknown (HELO axa-financial.com) (87.7.167.207)
by webserver1.********.de with SMTP; 12 Jul 2006 16:38:41 -0000
Message-ID: <000001c6a5d2$11c02c80$0227a8c0@icz91>
Reply-To: "Tibor Sorg" <tibor@axa-financial.com>
From: "Tibor Sorg" <tibor@axa-financial.com>
To: sales@*********.de
Subject: oyged VIAGeRA
Date: Wed, 12 Jul 2006 09:41:48 -0700
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_0001_01C6A597.65615480"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
This is a multi-part message in MIME format.
um dem ganzen dann erstmal einhalt zu gebieten hab ich schlicht und ergreifend erstmal die mailbox angelegt damit der schrott aufhört....
aber wirklich toll ist das nicht, kann man da was gegen machen?
danke schonmal für eure hilfe