On Mon, May 1, 2017, at 22:07, Carl Byington wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On Sat, 2017-04-29 at 00:01 -0700, Mark Milhollan wrote:
> > But some have an X-Forefront-Antispam-Report header with SFV:SPM which
> > has been said is their indicator of a message they con
>
> From: Rok Potočnik
> To: mailop@mailop.org
> Subject: [mailop] DMARC analysis
> Message-ID: <7a7c7076-7a1c-385d-f418-64810e941...@t-2.com>
> Content-Type: text/plain; charset=utf-8; format=flowed
>
> So, I'd like to deploy DMARC as an ISP/ESP by default to the customers,
> but I can't seem to
> From: Brandon Long
> To whitelist abuse@domain, you would need to:
> This won't disable our blatant spam blocking a smtp-time, however. And
> there is no way to disable the antivirus blocking either (I see some folks
> who complain about that as well).
I think that by default addresses abuse
For the most part I agree. Maybe there should be a mechanism to ensure that
dangerous content is flagged in such a way that it is 'disarmed' (or very
explicitly flagged) but available for research. Not all abuse@ departments
require, or are equiped, to work with viruses.
Yours,
David
2017-05-04
Hi,
I've developed a solution that connects to a configurable IMAP mailbox
and analyzes the messages, all packaged up in a neat webinterface with a
poller process being run on the server.
Here is a short visual demo:
http://stuff.no-panic.at/videos/trillian-astra.mov (sorry only .mov
format at
Hi,
Microsoft's SNDS system has no data for our IP addresses for the last 3
days, however one of our IP addresses appears to be getting rate limited:
451 4.7.500 Server busy. Please try again later from [XX.XXX.X.XX].
(AS77713180) [XXX.eop-XX01.prod.protection.outlook.com]: retry
timeout