We are currently receiving lots of password phishing mails with envelope
sender and From: header
<a href="mailto: ... at charterinternet dot com"> ... at charterinternet dot com</a> and Reply-To:
<a href="mailto: ... at live dot com"> ... at live dot com</a>.
The connecting mail servers
do apparently *not* stop re-connecting after receiving REJECT (554)
errors, but keep coming back with the same sender-recipient pairs.
|self signed ssl certs||5|
|Re: Restrict mail where MAIL FROM == RCPT TO||0|
|Postfix User unknown in virtual mailbox table||3|
|postfix email signing.||0|
|Mac OS X 10.5.5 postfix security issue||4|
|whitelisting incoming /outgoing mail||8|
|Re: Why "may be forged"?||0|
|Content Filters - Body Matching||2|