473,394 Members | 1,831 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,394 software developers and data experts.

How to set bounce address without 'spoofing'

I want to send email from mydomain.com but have them all bounce to
xyz.com. The problem is when I use the -f option with mail , I get my
emails all rejected by xyz.com, saying that 'Sender domain is
spoofed'. I looked at the headers and it appears adding -f sets the
'envelop-from' header which causes xyz.com to think it is spoofed. I
tried using 'Errors-To' header but that did not work and appears to
be deprecated anyways. I also tried using the -f and just relying on
the 'Reply-To', but that did not send bounced emails to 'Reply-To'
xyz.com address.

Apr 13 '07 #1
1 1853
I want to send email from mydomain.com but have them all bounce to
xyz.com. The problem is when I use the -f option with mail , I get my
emails all rejected by xyz.com, saying that 'Sender domain is
spoofed'. I looked at the headers and it appears adding -f sets the
'envelop-from' header which causes xyz.com to think it is spoofed. I
tried using 'Errors-To' header but that did not work and appears to
be deprecated anyways. I also tried using the -f and just relying on
the 'Reply-To', but that did not send bounced emails to 'Reply-To'
xyz.com address.
In http://www.faqs.org/rfcs/rfc2822.html , there is some info on
resent-headers. They are used to redirect a message after you have
received it yourself (like a message sent to "in**@example.com" and then
redirected to the person that can best answer it).

Best regards
Apr 13 '07 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
by: Don | last post by:
How can I get the client's IP address from within an HTML page using embedded JS? Thanks for your help, Don ----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==----...
0
by: Alan Kennedy | last post by:
Hi All, I'm writing an application that sends out emails, for workflow-item tracking purposes. I am using a VERP-style addressing mechanism, whereby I send each message from an uniquely...
1
by: Nils M. Lunde | last post by:
Hi! I'm trying to do the following: -Extract an Email from a mailbox using grepmail -Bounce this Email to a different address I thought that this would be an easy thing to do, but I still...
3
by: Matt | last post by:
I want to know how ASP prevents "Spoofing" to happen?? Someone told me in ASP.NET, the server validation can prevent "Spoofing" to happen. Please advise.
2
by: Arjen | last post by:
Hello, When I send an e-mail to this sample e-mail address sample@mail.com then there are three options. 1. The e-mail comes over; 2. The e-mail bounce, because the e-mail address doesn't...
9
by: chadlupkes | last post by:
I have this code from someone else, and I'm trying to make heads or tails of it because IE doesn't like it. Can anyone help? Or does anyone have a better idea? /* parse the email to check for...
12
by: satya0674 | last post by:
Hi Everyone, Is it possible to put TWO mac address for a NIC interface so that one address behave as a virtaul mac address.? As I can change the MAC address by arp spoofing/MAC...
18
by: Grant Edwards | last post by:
Could whoever is responsible for the gateway that is grabbing my postings off of Usenet and e-mailing them out please fix the headers in the mail messages so that I don't get the bounce messages?...
11
by: glenh | last post by:
I have a web app that is running a photo competition. Basically any user should be able to vote on a photo with a rating between 1 and 5. At the end of the competition the photo with the highest...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.