Solved

Unintentional Email Spoofing

Posted on 2009-07-01
2
181 Views
Last Modified: 2013-12-09
My company's email is processed by an Exchange server; however, our website uses the same email addresses also.  The problem is the following:

The server that is getting the email knows that it did not originate from mail.bioplexnutrition.com but from the GoDaddy servers.  It, therefore, assumes the address has been spoofed  and when you combine that with the content of the email (html format, etc.) the mail scores high enough to be marked as spam.

Is there a way to work around this problem?  We aren't spam as the clients have opted in and are requesting this information.

Thanks,
Kel
0
Comment
Question by:kellyputty
2 Comments
 
LVL 65

Accepted Solution

by:
Mestha earned 500 total points
ID: 24758975
This would only be a problem if you are using SPF records.
Spoofing is a major problem, so anything that looks like spoofing will cause problems.

If you are using spf records, then ensure that the GoDaddy servers are in the list of servers.

Simon.
0
 

Author Closing Comment

by:kellyputty
ID: 31598904
Thanks.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Form Processing in PHP 11 41
Angular2 app not loading Bootstrap properly 4 44
move expression web site to a new server 12 30
Button to go back 3 25
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
The viewer will learn how to count occurrences of each item in an array.
Learn how to set-up custom confirmation messages to users who complete your Wufoo form. Include inputs from fields in your form, webpage redirects, and more with Wufoo’s confirmation options.

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question