PayPal get your act together — 6 Comments

  1. perhaps you should be looking at this more and the dkim results which are valid so unless someone has hacked it’s safe

    spf=pass (spfCheck: domain of designates as permitted sender) client-ip=; envelope-from=bounce-hp2v20000015a17df6d6fae933d369f35e926197

    • I can see that on my server, but “normal” recipients don’t go looking at email headers and email sources. They click whatever link is in body of email. When links go to “phishy” looking sites

        • A mail server can reject or fail mail that fails DKIM or SPF but cannot safely reject or fail an email with no SPF or DKIM information. Network congestion or server temporary failure has to be taken into account. About 25% of genuine email received by this server has no SPF or DKIM, especially when via forum / blog notifications.

  2. More details from headers below:
    Hop Delay From By With Time (UTC) Blacklist
    1 * pc1udsmtn1n14 ECSTREAM 2/7/2017 1:31:06 AM [Not blacklisted]
    2 * esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.88) (envelope-from ) 2/7/2017 1:31:05 AM [Is on a blacklist]

    Header Name Header Value
    DKIM-Signature v=1; a=rsa-sha256; c=relaxed/relaxed;;
    MIME-Version 1.0
    Reply-To “”
    Subject View your recent transactions now.
    From “PayPal”

  3. Pingback:Any lawyers want to sue PayPal? ...

Leave a Reply

Your email address will not be published. Required fields are marked *