Le 10/09/2023 à 20:12, Fred Morris via Postfix-users a écrit :
Other replies have identified what's probably happening: redirection to a specific mail relay or honeypot.

I have a couple of suggestions, which you should consider carefully (for legality and possible retaliation) before trying. I'd consider them ok where I am, but YMMV.

Also, consider any email you send compromised from now on. Even if you prevail on them to stop redirecting they've demonstrated the will as well as capacity to observe, modify and potentially forge traffic. (SSL won't help you unless you're using certs to authenticate the MTA at the other end.) Or, maybe they're simply compromised. :-/

On Sun, 10 Sep 2023, postfix--- via Postfix-users wrote:
Try a telnet connection to those host (gmail/mail-tester) on 25 and see who actually answers.

1) Send SYNs with varying TTLs to determine the number of hops to alleged
   recipient MTAs based on the minimum value which elicits a SYN/ACK. Are
   they all the same? Is it a low number?


This part can be done with  traceroute or mtr command in TCP mode


_______________________________________________
Postfix-users mailing list -- postfix-users@postfix.org
To unsubscribe send an email to postfix-users-le...@postfix.org

Reply via email to