On Tue, Sep 29, 2015 at 05:54:54PM +0200, Florian Weimer <[email protected]> wrote a message of 12 lines which said:
> It's difficult to cause immediate mail bounces without running an MX > host for the domain in question. Without immediate bounces, the > issue might not be recognized in time In this specific case, the rogue MX was *not* bouncing but stealing the email: % telnet mail.b-io.co 25 Trying 23.23.152.148... Connected to mail.b-io.co. Escape character is '^]'. EHLO toto.example.220 Inbound-MTA ESMTP Welcome com 250-Inbound-MTA Hello central.sources.org [88.189.152.187], Haraka is at your service. 250-PIPELINING 250-8BITMIME 250-SIZE 10000000 250 STARTTLS MAIL FROM:<[email protected]> 250 sender <[email protected]> OK RCPT TO:<[email protected]> 250 recipient <[email protected]> OK DATA 354 go ahead, make my day Subject: test Test.
