[openssl-dev] *****SPAM***** Delivery reports about your e-mail

The Post Office postmaster at openssl.org
Thu Jan 8 06:25:50 UTC 2015


Spam detection software, running on the system "mta",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
@@CONTACT_ADDRESS@@ for details.

Content preview:  The original message was received at Thu, 8 Jan 2015 14:25:50
   +0800 from openssl.org [39.60.32.41] ----- The following addresses had permanent
   fatal errors ----- <openssl-dev at openssl.org> ----- Transcript of session
  follows ----- while talking to openssl.org.: >>> MAIL From:"The Post Office"
   <postmaster at openssl.org> <<< 501 "The Post Office" <postmaster at openssl.org>...
   Refused [...] 

Content analysis details:   (20.4 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                            See
                            http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                             for more information.
                            [URIs: openssl.org]
 3.5 BAYES_99               BODY: Bayes spam probability is 99 to 100%
                            [score: 0.9979]
 1.5 BASE64_LENGTH_79_INF   BODY: No description available.
 2.7 BASE64_LENGTH_78_79    BODY: No description available.
 0.0 RCVD_IN_SORBS_DUL      RBL: SORBS: sent directly from dynamic IP address
                            [59.40.26.199 listed in dnsbl.sorbs.net]
 1.3 RCVD_IN_RP_RNBL        RBL: Relay in RNBL,
                            https://senderscore.org/blacklistlookup/
                            [59.40.26.199 listed in bl.score.senderscore.com]
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS
 0.5 MISSING_MID            Missing Message-Id: header
 2.2 AXB_XMAILER_MIMEOLE_OL_024C2 No description available.
 1.9 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
 2.5 DOS_OE_TO_MX           Delivered direct to MX with OE headers
 3.5 TO_NO_BRKTS_MSFT       To: misformatted and supposed Microsoft tool

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.

-------------- next part --------------
An embedded message was scrubbed...
From: "The Post Office" <postmaster at openssl.org>
Subject: Delivery reports about your e-mail
Date: Thu, 8 Jan 2015 14:25:50 +0800
Size: 31447
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20150108/b6708d3c/attachment-0001.mht>


More information about the openssl-dev mailing list