Comments

PayPal get your act together — 6 Comments

  1. perhaps you should be looking at this more and the dkim results which are valid so unless someone has hacked mail.paypal.co.uk it’s safe

    spf=pass (spfCheck: domain of mail.paypal.co.uk designates 142.54.244.104 as permitted sender) client-ip=142.54.244.104; envelope-from=bounce-hp2v20000015a17df6d6fae933d369f35e926197

    • I can see that on my server, but “normal” recipients don’t go looking at email headers and email sources. They click whatever link is in body of email. When links go to “phishy” looking sites

        • A mail server can reject or fail mail that fails DKIM or SPF but cannot safely reject or fail an email with no SPF or DKIM information. Network congestion or server temporary failure has to be taken into account. About 25% of genuine email received by this server has no SPF or DKIM, especially when via forum / blog notifications.

  2. More details from headers below:
    Hop Delay From By With Time (UTC) Blacklist
    1 * 10.233.19.185 pc1udsmtn1n14 3.6.9.0 ECSTREAM 2/7/2017 1:31:06 AM [Not blacklisted]
    2 * mta108b.pmx1.epsl1.com 142.54.244.108 knight.knighthosting.co.uk esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.88) (envelope-from ) 2/7/2017 1:31:05 AM [Is on a blacklist]

    Header Name Header Value
    DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed; d=mail.paypal.co.uk;
    List-Unsubscribe
    Message-ID
    MIME-Version 1.0
    Reply-To “noreply@mail.paypal.co.uk”
    Subject View your recent transactions now.
    From “PayPal”

  3. Pingback: Any lawyers want to sue PayPal? ...

Leave a Reply

Your email address will not be published. Required fields are marked *