eop-header

command module
v0.0.4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 7, 2020 License: MIT Imports: 8 Imported by: 0

README

eop-header

Little tool to decode Microsoft Exchange Online Protection header into a nice view

Please be nice to me, the project is work in progress :)

Installing

Binaries

You will find pre-compiled for the most common OS under https://github.com/jpbede/eop-header/releases

macOS

Simply use homebrew (https://brew.sh/)

To install eop-header use following command brew install jpbede/tap/eop-header

Where comes the info from

Those informations comes from Microsoft documentations and my experiences as deliverability engineer @ CleverReach.

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spam-message-headers?view=o365-worldwide

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/bulk-complaint-level-values?view=o365-worldwide

Example output

+-------+--------------------------------+--------------------------------+
| FIELD |             VALUE              |            MEANING             |
+-------+--------------------------------+--------------------------------+
| H     | mta.example.com                | HELO/EHLO string               |
+-------+--------------------------------+--------------------------------+
| CAT   | SPOOF (Mail classified as      | Category of protection policy  |
|       | spoofing)                      |                                |
+-------+--------------------------------+--------------------------------+
| LANG  | de                             | Language of message            |
+-------+--------------------------------+--------------------------------+
| SFV   | SPM (message was marked as     | Filtering result               |
|       | spam by spam filtering)        |                                |
+-------+--------------------------------+--------------------------------+
| SCL   | 5 (marked as spam)             | Spam confidence level. A       |
|       |                                | higher value indicates the     |
|       |                                | message is more likely to be   |
|       |                                | spam.                          |
+-------+--------------------------------+--------------------------------+
| IPV   | NLI (no ip reputation data     | IP reputation status           |
|       | found)                         |                                |
+-------+--------------------------------+--------------------------------+
| PTR   | mta.example.com                | PTR of connecting IP           |
+-------+--------------------------------+--------------------------------+
| CIP   | 10.0.0.1                       | Connecting IP                  |
+-------+--------------------------------+--------------------------------+
| CTRY  | DE                             | Source country as determined   |
|       |                                | by the connecting IP address   |
+-------+--------------------------------+--------------------------------+
| BCL   |                              0 | Bulk Confidence Level. A       |
|       |                                | higher BCL indicates a bulk    |
|       |                                | mail message is more likely to |
|       |                                | generate complaints            |
+-------+--------------------------------+--------------------------------+

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL