BANNED contents from you (application/octet-stream,.exe,.exe-ms,TEXT.SCR)

From: Content-filter at natalya.videolan.org
Date: Wed Jun 16 2021 - 01:04:50 EST


BANNED CONTENTS ALERT

Our content checker found
banned name: application/octet-stream,.exe,.exe-ms,TEXT.SCR

in email presumably from you <linux-kernel@xxxxxxxxxxxxxxx>
to the following recipient:
-> pdherbemont@xxxxxxxxxxxx

Our internal reference code for your message is 28719-09/bi4CtDs_ldbK

First upstream SMTP client IP address: [103.117.36.105]
According to a 'Received:' trace, the message apparently originated at:
[103.117.36.105], vger.kernel.org unknown [103.117.36.105]

Return-Path: <linux-kernel@xxxxxxxxxxxxxxx>
From: linux-kernel@xxxxxxxxxxxxxxx
Subject: Returned mail: Data format error

Delivery of the email was stopped!

The message has been blocked because it contains a component
(as a MIME part or nested within) with declared name
or MIME type or contents type violating our access policy.

To transfer contents that may be considered risky or unwanted
by site policies, or simply too large for mailing, please consider
publishing your content on the web, and only sending an URL of the
document to the recipient.

Depending on the recipient and sender site policies, with a little
effort it might still be possible to send any contents (including
viruses) using one of the following methods:

- encrypted using pgp, gpg or other encryption methods;

- wrapped in a password-protected or scrambled container or archive
(e.g.: zip -e, arj -g, arc g, rar -p, or other methods)

Note that if the contents is not intended to be secret, the
encryption key or password may be included in the same message
for recipient's convenience.

We are sorry for inconvenience if the contents was not malicious.

The purpose of these restrictions is to cut the most common propagation
methods used by viruses and other malware. These often exploit automatic
mechanisms and security holes in more popular mail readers (Microsoft
mail readers and browsers are a common target). By requiring an explicit
and decisive action from the recipient to decode mail, the danger of
automatic malware propagation is largely reduced.

Reporting-MTA: dns; natalya.videolan.org
Received-From-MTA: dns; natalya.videolan.org ([127.0.0.1])
Arrival-Date: Wed, 16 Jun 2021 05:04:45 +0000 (UTC)

Original-Recipient: rfc822;pdherbemont@videolan.org
Final-Recipient: rfc822;pdherbemont@videolan.org
Action: failed
Status: 5.7.0
Diagnostic-Code: smtp; 554-5.7.0 Bounce, id=28719-09 - BANNED:
554 5.7.0 application/octet-stream,.exe,.exe-ms,TEXT.SCR
Last-Attempt-Date: Wed, 16 Jun 2021 05:04:45 +0000 (UTC)
Final-Log-ID: 28719-09/bi4CtDs_ldbK
Return-Path: <linux-kernel@xxxxxxxxxxxxxxx>
Received: from vger.kernel.org (unknown [103.117.36.105])
by natalya.videolan.org (Postfix) with ESMTP id 66856411760
for <pdherbemont@xxxxxxxxxxxx>; Wed, 16 Jun 2021 05:04:44 +0000 (UTC)
From: linux-kernel@xxxxxxxxxxxxxxx
To: pdherbemont@xxxxxxxxxxxx
Subject: Returned mail: Data format error
Date: Sun, 1 Jan 2006 00:35:03 +0530
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_NextPart_000_0012_BB5FEEAB.C8A3104D"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000