linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* BANNED contents from you (.exe,.exe-ms,pmlyg.bat)
@ 2022-05-10  2:27 Content-filter at server.jpvtrading.co.uk
  0 siblings, 0 replies; only message in thread
From: Content-filter at server.jpvtrading.co.uk @ 2022-05-10  2:27 UTC (permalink / raw)
  To: linux-arch

[-- Attachment #1: Type: text/plain, Size: 1873 bytes --]

BANNED CONTENTS ALERT

Our content checker found
    banned name: .exe,.exe-ms,pmlyg.bat

in email presumably from you <linux-arch@vger.kernel.org>
to the following recipient:
-> customs@cms-logistics.co.uk

Our internal reference code for your message is 31536-15/Z9FY344gbQdH

First upstream SMTP client IP address: [121.34.33.227]:14221 

Received trace: ESMTP://[121.34.33.227]:14221

Return-Path: <linux-arch@vger.kernel.org>
From: linux-arch@vger.kernel.org
Subject: Delivery reports about your e-mail

Delivery of the email was stopped!

The message has been blocked because it contains a component
(as a MIME part or nested within) with declared name
or MIME type or contents type violating our access policy.

To transfer contents that may be considered risky or unwanted
by site policies, or simply too large for mailing, please consider
publishing your content on the web, and only sending a URL of the
document to the recipient.

Depending on the recipient and sender site policies, with a little
effort it might still be possible to send any contents (including
viruses) using one of the following methods:

- encrypted using pgp, gpg or other encryption methods;

- wrapped in a password-protected or scrambled container or archive
  (e.g.: zip -e, arj -g, arc g, rar -p, or other methods)

Note that if the contents is not intended to be secret, the
encryption key or password may be included in the same message
for recipient's convenience.

We are sorry for inconvenience if the contents was not malicious.

The purpose of these restrictions is to avoid the most common
propagation methods used by viruses and other malware. These often
exploit automatic mechanisms and security holes in more popular
mail readers. By requiring an explicit and decisive action from a
recipient to decode mail, a danger of automatic malware propagation
is largely reduced.


[-- Attachment #2: Delivery error report --]
[-- Type: message/delivery-status, Size: 485 bytes --]

[-- Attachment #3: Message header section --]
[-- Type: text/rfc822-headers, Size: 862 bytes --]

Return-Path: <linux-arch@vger.kernel.org>
Received: from vger.kernel.org (unknown [121.34.33.227])
	by server.jpvtrading.co.uk (Postfix) with ESMTP id 137DC10EB129
	for <customs@cms-logistics.co.uk>; Tue, 10 May 2022 02:27:08 +0000 (UTC)
Authentication-Results: server.jpvtrading.co.uk;
	spf=temperror (sender IP is 121.34.33.227) smtp.mailfrom=linux-arch@vger.kernel.org smtp.helo=vger.kernel.org
Received-SPF: none (server.jpvtrading.co.uk: no valid SPF record)
From: linux-arch@vger.kernel.org
To: customs@cms-logistics.co.uk
Subject: Delivery reports about your e-mail
Date: Tue, 10 May 2022 10:27:03 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_0002_FD47E436.8E205FE6"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-05-10  2:33 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-05-10  2:27 BANNED contents from you (.exe,.exe-ms,pmlyg.bat) Content-filter at server.jpvtrading.co.uk

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).