also das komische ist ja, dass alle mails korrekt ankommen.
nur eben die chayns passwort reset mails nicht ...
Postfachname bzw. email-adresse = AD-Username, falls relevant
X-POP3RCPLIST: *@domain.de
Return-Path: <prvs=0787cfa8f2=absender01@firma.de>
Authentication-Results: kundenserver.de; dkim=none
Received: from mout.kundenserver.de ([217.72.192.75]) by mx.kundenserver.de
(mxeue003 [212.227.15.41]) with ESMTPS (Nemesis) id 1MIamr-1rhuZB3xMD-0084RL
for <admin@domain.de>; Tue, 27 Feb 2024 08:53:45 +0100
Received: from postfix.firma.de ([89.28.***.***]) by mx.kundenserver.de
(mxeue103 [217.72.192.67]) with ESMTPS (Nemesis) id 1MXFKC-1rP1CY0KsQ-00Q8He
for <meinemail@domain.de>; Tue, 27 Feb 2024 08:53:44 +0100
Received: from mail1.firma.local ([192.168.90.16]:18574 helo=postfix.firma.de)
by postfix.firma.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(Exim 4.96)
(envelope-from <absender01@firma.de>)
id 1resHI-0006n2-1k
for meinemail@domain.de;
Tue, 27 Feb 2024 08:53:28 +0100
Received: from mail1.firma.local (192.168.90.16) by mail1.firma.local
(192.168.90.16) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Tue, 27 Feb
2024 08:53:28 +0100
Received: from mail1.firma.local ([fe80::***:***:***:***]) by
mail1.firma.local ([fe80::***:***:***:***]) with mapi id
15.02.1118.040; Tue, 27 Feb 2024 08:53:28 +0100
From: Firma Mitarbeiter <absender01@firma.de>
To: =?iso-8859-1?Q?=27meine Mail=27?=
<meinemail@domain.de>
Subject: xxxx
Thread-Topic: xxxxxx
Thread-Index: AdppUgTo0s/UNicST0qmQ39pjDwDoA==
Date: Tue, 27 Feb 2024 07:53:28 +0000
Message-ID: <589139e81af24965b92a9b69a7d14c32@firma.de>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [192.168.90.20]
Content-Type: multipart/related;
boundary="_006_589139e81af24965b92a9b69a7d14c32firmade_";
type="multipart/alternative"
MIME-Version: 1.0
X-Sophos-OBS: success
X-SASI-Version: Antispam-Engine: 5.1.4, AntispamData: 2024.2.27.70919
X-SASI-RCODE: 200
X-SASI-SpamProbability: 13%
X-SASI-Hits: BODYTEXTH_SIZE_3000_MORE 0.000000, BODY_SIZE_10000_PLUS 0.000000,
BODY_SIZE_100K_PLUS 0.000000, BODY_SIZE_25K_PLUS 0.000000,
BODY_SIZE_50K_PLUS 0.000000, BODY_SIZE_75K_PLUS 0.000000,
FRAUD_HIGH_X3 0.000000, FRAUD_HIGH_X3_WEBMAIL 1.000000, HTML_90_100 0.100000,
IMG_ATTACHED_2P 0.000000, JPG_COMMON_HEADER_ORDER 0.000000,
JPG_PIXPERBYTE_MED 0.000000, JPG_SPAMMY_SEGMENT 0.000000,
JPG_SPAMMY_Y_RESOLUTION 0.000000, JPG_SPAM_ATTACHED 0.000000,
MULTIPLE_ATTACHMENTS 0.000000, NO_FUR_HEADER 0.000000, OUTBOUND 0.000000,
OUTBOUND_SOPHOS 0.000000, SENDER_NO_AUTH 0.000000, SUPERLONG_LINE 0.050000,
WEBMAIL_SOURCE 0.000000, WEBMAIL_XOIP 0.000000, WEBMAIL_X_IP_HDR 0.000000,
__ANY_URI 0.000000, __ATTACH_CTE_BASE64 0.000000,
__ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_TEXT_X4 0.000000,
__BULK_NEGATE 0.000000, __BUSINESS_SIGNATURE 0.000000,
__CID_8_DOT_8 0.000000, __COURIER_PHRASE 0.000000, __CP_MEDIA_BODY 0.000000,
__CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000,
__CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_ALT 0.000000,
__DATING_PHRASE 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000,
__DQ_NEG_IP 0.000000, __EXTORTION_PORN 0.000000,
__EXTRA_MPART_TYPE_1 0.000000, __EXTRA_MPART_TYPE_N1 0.000000,
__FRAUD_COMMON 0.000000, __FRAUD_REPLY 0.000000, __FRAUD_TRUST 0.000000,
__FRAUD_URGENCY 0.000000, __FUR_RDNS_SOPHOS 0.000000,
__HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000,
__HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000,
__HAS_MSGID 0.000000, __HAS_XOIP 0.000000, __HIGHBIT_ASCII_MIX 0.000000,
__HTML_BAD_END 0.000000, __HTML_ENTITIES_X4 0.000000,
__HTML_TAG_DIV 0.000000, __HTTPS_URI 0.000000, __IMG_ATTACHED 0.000000,
__IMG_SIZE_10K_50K 0.000000, __JPG_HEIGHT_100 0.000000,
__JPG_SPAMMY_SEGMENT_2 0.000000, __JPG_SPAMMY_Y_RESOLUTION_3 0.000000,
__JPG_WIDTH_100 0.000000, __MIME_ATTACHMENT_1_N 0.000000,
__MIME_ATTACHMENT_N_2 0.000000, __MIME_ATTACHMENT_N_3 0.000000,
__MIME_ATTACHMENT_N_4 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000,
__MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000,
__MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000,
__MSGID_32HEX 0.000000, __MULTIPLE_URI_TEXT 0.000000,
__OUTBOUND_SOPHOS_FUR 0.000000, __OUTBOUND_SOPHOS_FUR_IP 0.000000,
__OUTBOUND_SOPHOS_FUR_RDNS 0.000000, __PART_TYPE_HTML 0.000000,
__PHISH_PHRASE10_C 0.000000, __RCVD_FROM_HOMEUSER 0.000000,
__RUS_HASHBUSTER_1251 0.000000, __SANE_MSGID 0.000000,
__STOCK_PHRASE_7 0.000000, __STYLE_RATWARE_NEG 0.000000,
__STYLE_TAG 0.000000, __SUBJ_ALPHA_END 0.000000, __TAG_EXISTS_HTML 0.000000,
__TO_MALFORMED_2 0.000000, __TO_NAME 0.000000,
__TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000,
__URI_ENDS_IN_SLASH 0.000000, __URI_HAS_HYPHEN_USC 0.000000,
__URI_IN_BODY 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000,
__URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000
X-Spam-Flag: NO
UI-OutboundReport: notjunk:1;M01:P0:qNENHhY/IHg=;i0+IQsw5m8U/KJRskjXia5+bR9M
OQEOWZMmXbMla+j1ezArZeey9
Envelope-To: <admin@domain.de>
X-Spam-Flag: NO
UI-InboundReport: notjunk:1;M01:P0:wWVZg8qLt+Y=;OMm9IZ0fNGz9ilZgz5JL9ULgq+54
Display More
ps. ganz logisch ist das eh nicht ... wenn man auf sein Postfach zugreifen will, aber das Passwort nicht merh hat, kommt der Reset-Link is das entsprechende Postfach
