Hi Lately I've been getting a lot of these..
/var/spool/mail/quarantine/badh-x9ylzx+MCHZB --- Return-Path: <[email protected]> Delivered-To: bad-header-quarantine X-Envelope-From: <[email protected]> X-Envelope-To: <[email protected]> X-Envelope-To-Blocked: X-Quarantine-ID: <x9ylzx+MCHZB> X-Amavis-Alert: BAD HEADER SECTION Improper folded header field made up entirely of whitespace (char 09 hex): Subject: ...IMOgIHVuIGLD?=\n\t=?UTF-8?B?qWLDqSBzaW5nZSAh?=\n\t X-Spam-Flag: NO Does anyone know which/what client causes this, and how? What is the potential exploitable value of this? I.e. if I set amavis to ignore this, what risk do I run (even highly theoretical). Thanks. Simon
