May 8 10:01:35 mail postfix/smtpd: disconnect from ehlo=2 starttls=1 mail=1 rcpt=1 data=1 rset=1 quit=1 commands=8 May 8 10:01:34 mail clamd: SelfCheck: Database status OK. May 8 10:01:32 mail postfix/smtpd: NOQUEUE: filter: RCPT from : : Sender address triggers FILTER smtp-amavis::10024 from= to= proto=ESMTP helo= May 8 10:01:32 mail postfix/smtpd: NOQUEUE: filter: RCPT from : : Sender address triggers FILTER smtp-amavis::10026 from= to= proto=ESMTP helo= May 8 10:01:31 mail postfix/smtpd: Anonymous TLS connection established from : TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) May 8 10:01:30 mail postfix/smtpd: connect from May 8 10:01:29 mail postfix/postscreen: PASS NEW :36406 May 8 10:01:23 mail postfix/postscreen: CONNECT from :36406 to :25 Long time ago and also recently after patching. Hi, I have similar spam with the same sender and recipient address. X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=204.16.0.109 Received: from ( )īy (Postfix) with ESMTP id BC23D1800A8 ![]() Received: from ()īy localhost ( ) (amavisd-new, port 10024) Received: from localhost (localhost )īy (Postfix) with ESMTP id 808A8180B88 Does anyone have any idea why this may be happening? HAST I now have 3 affected users. Today update to version 8.8.11_GA: 3772.FOSS but this did not help. ![]() The peculiar thing about this spam is that the sender is my same account, and it is assumed that having the reject_sender_login_mismatch this should not happen. ![]() The version of my client is (e.g.Hello since a couple of days ago I am receiving a spam mail, that according to the account, I have already applied several security options which had been very effective and I had never had this problem. I'm using a control panel to manage my site (no, or provide the name and version of the control panel): I can login to a root shell on my machine (yes or no, or I don't know): ![]() The operating system my web server runs on is (include version): "detail": "Error creating new order :: Cannot issue for "relay": Domain name needs at least one dot", "type": "urn:ietf:params:acme:error:rejectedIdentifier", Key OK, Expires in 28 days active=0 updates=26/Jul/2022Įxisting cert check: relay Self signed certificate /CN=relay SurgeMail Version 7.4e-1, Built 23:02:47, Platform Linux_64 crt.sh | ), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. Note: you must provide your domain name to get help. Please fill out the fields below so we can help you better.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |