Date: Tue, 16 Feb 2021 09:03:06 +1100 (EST) From: Dave Horsfall <dave@horsfall.org> To: FreeBSD Ports <freebsd-ports@freebsd.org> Subject: Re: MAIL ADMINISTRATIVE SERVICE CENTER Message-ID: <alpine.BSF.2.21.9999.2102160858460.70858@aneurin.horsfall.org> In-Reply-To: <b661851d-b8c2-038f-016a-71d3adb5a031@yuripv.dev> References: <20210215154817.0CF9D5F26AAB218C@freebsd.org> <alpine.BSF.2.21.9999.2102160805300.70858@aneurin.horsfall.org> <b661851d-b8c2-038f-016a-71d3adb5a031@yuripv.dev>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 16 Feb 2021, Yuri Pankov wrote: >> As this came from freebsd.org, were they trying to shout something or >> do they have a compromised server? > > It's obvious it did NOT come from freebsd.org once you check the headers: Really? Here are my headers: Return-Path: <owner-freebsd-ports@freebsd.org> Received: from mx2.freebsd.org (mx2.freebsd.org [96.47.72.81]) by aneurin.horsfall.org (8.15.2/8.15.2) with ESMTP id 11FFDtmL039444 for <dave@horsfall.org>; Tue, 16 Feb 2021 02:14:09 +1100 (EST) (envelope-from owner-freebsd-ports@freebsd.org) Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits)) (Client CN "mx1.freebsd.org", Issuer "R3" (verified OK)) by mx2.freebsd.org (Postfix) with ESMTPS id EE5DF95ED7; Mon, 15 Feb 2021 15:13:53 +0000 (UTC) (envelope-from owner-freebsd-ports@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4DfSL95Fdgz4gt0; Mon, 15 Feb 2021 15:13:53 +0000 (UTC) (envelope-from owner-freebsd-ports@freebsd.org) Sure looks like freebsd.org to me, hence my comment about a compromised server... -- Dave
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.21.9999.2102160858460.70858>