On Tue, Sep 29, 2015 at 05:54:54PM +0200,
 Florian Weimer <[email protected]> wrote 
 a message of 12 lines which said:

> It's difficult to cause immediate mail bounces without running an MX
> host for the domain in question.  Without immediate bounces, the
> issue might not be recognized in time

In this specific case, the rogue MX was *not* bouncing but stealing
the email:

% telnet mail.b-io.co 25
Trying 23.23.152.148...
Connected to mail.b-io.co.
Escape character is '^]'.
EHLO toto.example.220 Inbound-MTA ESMTP Welcome
com
250-Inbound-MTA Hello central.sources.org [88.189.152.187], Haraka is at your 
service.
250-PIPELINING
250-8BITMIME
250-SIZE 10000000
250 STARTTLS
MAIL FROM:<[email protected]>
250 sender <[email protected]> OK
RCPT TO:<[email protected]>
250 recipient <[email protected]> OK
DATA
354 go ahead, make my day
Subject: test

Test.

Reply via email to