Mailinglist Archive: opensuse-security (88 mails)

< Previous Next >
Re: [suse-security] ezmlm warning
  • From: "Arjen de Korte" <suse+security@xxxxxxxxxxxx>
  • Date: Mon, 3 Apr 2006 12:26:52 +0200 (CEST)
  • Message-id: <1051.>

> If it had been bounced, that would be a different thing. In that case,
> the mail would have been accepted, a new mail created and this new mail
> sent to the possibly forged sender.

Carlos was right in his observation, that's exactly what's happened here.
See the following lines from the bounce message:

Reporting-MTA: dns;
X-Postfix-Queue-ID: C86F4D4444
X-Postfix-Sender: rfc822;
Arrival-Date: Wed, 22 Mar 2006 03:55:38 +0000 (GMT)

Final-Recipient: rfc822; karsites@xxxxxxxxxxxxxxxxx
Action: failed
Status: 5.0.0
Diagnostic-Code: X-Postfix; host[] said: 550 5.7.1 Message
content rejected, UBE, id=32402-01-62 (in reply to end of DATA command)

Content-Description: Undelivered Message
Content-Type: message/rfc822

Received: from ( [])
by (Postfix) with ESMTP id C86F4D4444
for <karsites@xxxxxxxxxxxxxxxxx>; Wed, 22 Mar 2006 03:55:38 +0000
Received: from ( [])
by (Postfix) with ESMTP id 28319F4217
for <suse@xxxxxxxxxxxx>; Wed, 22 Mar 2006 03:55:38 +0000 (GMT)
Received: from ( [])
by (Postfix) with SMTP id C2559C0419
for <suse@xxxxxxxxxxxx>; Wed, 22 Mar 2006 03:55:39 +0000 (GMT)

These lines boil down to the following chain of MTA's: -> -> -> (which is the reporting MTA)

So the bounce message was generated by a different MTA than the SuSE
mailinglist server was talking to, which means that this is a case of
accept-then-bounce-later, which is bad for the reasons you already
mentioned. Unfortunately, this is done by the OP's ISP, so short of
complaining about this, there is probably little he can do about it.


< Previous Next >
Follow Ups