Spam detection software, running on the system "idefix.duss.local", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details.
Content preview: Hello Norman Quoting Norman Feske <norman.feske@...1...>:
Hello Pirmin, > > thanks for posting your idea to the list. > > I wonder,
have you considered to implement the random service as a > "Terminal" service that just produces a stream of random values? The > benefit would be that such a server can be combined with the existing > terminal infrastructure out of the box. For example, you could mount the > random server's session in the VFS (via a <terminal> node) without any > extra effort. [...]
Content analysis details: (7.1 points, 5.0 required)
pts rule name description ---- ---------------------- -------------------------------------------------- 0.2 CK_HELO_GENERIC Relay used name indicative of a Dynamic Pool or Generic rPTR 2.9 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split IP) 3.6 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL [92.106.180.179 listed in zen.spamhaus.org] 0.0 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address [92.106.180.179 listed in dnsbl.sorbs.net] 0.4 RDNS_DYNAMIC Delivered to internal network by host with dynamic-looking rDNS