X-Spam-Report:
* -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at
http://www.dnswl.org/, low
* trust
* [208.99.185.53 listed in list.dnswl.org]
* -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover
relay
* domain
* -0.0 SPF_PASS SPF: sender matches SPF record
* 0.0 HTML_MESSAGE BODY: HTML included in message
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature
from author's
* domain
* -0.0 DKIM_VERIFIED DKIM_VERIFIED
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK
signature
* 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not
necessarily
* valid
* 0.6 FORGED_OUTLOOK_TAGS Outlook can't send HTML in this format
* 1.7 AXB_XMAILER_MIMEOLE_OL_4379D AXB_XMAILER_MIMEOLE_OL_4379D
* 2.8 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS
Outlook
* 3.1 DOS_OE_TO_MX Delivered direct to MX with OE headersThis mail seems HAM to me, but Outlook traces seem to be invalid. I do not want to publish this at least in unmangled format, so I though some dev might be interest to analyze it. If so, I can send off-list the mail for an analysis. The sample is posted from Groups.ITtoolbox.com and the recipient apparenly has subscribed to it, as I see lots of mail from that source to him. The recipient is my Boss, and the servers in received headers are our company servers, so I do not publish this to everyone. Any volunteers? -- You recoil from the crude; you tend naturally toward the exquisite.
signature.asc
Description: OpenPGP digital signature
