This mailing list should already be whitelist’ed - what’s going on? -M
On 8/31/15, 11:22 PM, "request.allow.sp...@qualcomm.com on behalf of request.allow.spoof" <request.allow.sp...@qualcomm.com> wrote: >PLEASE RESEND THE INFORMATION USING A PERSONAL EMAIL ADDRESS. >-------------------------------------------------------------------------------------- > >An email has been sent to you from outside of Qualcomm, but the “From” address >has been changed (i.e., spoofed) to make it look like it originated from >inside Qualcomm. Since this can indicate a phishing attack the email has been >quarantined to protect you. > >“Spoofing” can also occur when you use your Qualcomm email address on external >websites to send yourself, friends, and colleagues articles, directions, >reservations, etc. > >If you do not recognize the email or the email sender, there is no action >required by you. The quarantined email will be deleted. > >If the quarantined email is business related, simply reply to this email with >a justification for its release. > >To learn more about spoofing and why this email may have been labeled a >spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof. > > >Quarantine: https://quarantine.qualcomm.com >Remote Host: arrakis.dune.hu >Server IP: 78.24.191.176 >Envelope Sender: openwrt-devel-boun...@lists.openwrt.org >From: <miaoq...@qti.qualcomm.com> >To: <openwrt-devel@lists.openwrt.org> >Subject: [OpenWrt-Devel] [PATCH 1/4] ar71xx: uci-defaults: fix ap143 to >appropriate group > > _______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel