folgendes Szenario:
Kunde bekommt Mail von meiner Keyhelp-Email Domain mit einem Phishingversuch: keyhelp.domain.de
xtrd-dre@keyhelp.domain.de
Code: Select all
DATE , HOSTNAME.TLD policyd-spf[11683]: prepend Received-SPF: None (mailfrom) identity=mailfrom; client-ip=194.126.xxx.72; helo=smtp-out.xxx.ee; envelope-from=xtrd-dre@vm-relay1.xxx.ee; receiver=<UNKNOWN>
DATE , HOSTNAME.TLD opendkim[917]: CD6EF841B9F: can't parse From: header value ' "Gran Direon" <xtrd-dre>'
DATE , HOSTNAME.TLD postfix/qmgr[2040]: CD6EF841B9F: from=<xtrd-dre@vm-relay1.xxx.ee>, size=3753, nrcpt=1 (queue active)
DATE , HOSTNAME.TLD postfix/qmgr[2040]: B1115786C07: from=<xtrd-dre@vm-relay1.xxx.ee>, size=4589, nrcpt=1 (queue active)
DATE , HOSTNAME.TLD amavis[10070]: (10070-04) Passed CLEAN {RelayedInbound}, [194.126.xxx.72]:56173 [81.169.xxx.xx] <xtrd-dre@vm-relay1.xxx.ee> -> <kunde123@meine-tolle-domain.de>, Queue-ID: CD6EF841B9F,
Message-ID: <EF155C36B0XXXX7F9353079DD2103139F0@hrw92813.YYYYYYserver.net>, mail_id: l75yropapwQbs, Hits: 3.899, size: 3797, queued_as: B1115786C07, 798 ms
Edit: oder reicht im DNS-Editor ein einfaches -all anstatt ~all