For inbound customers including Email Gateway, Email Forwarding and Spam Filtering the headers we inject are:
Header Key | Header Description and Example Value |
X-HalonDuo-ID | Unique Message ID 20fsdf1859-210c-11ea-9b56-5b3414d4d306 |
X-HalonDuo-CID | Customer ID of the account owning the inbound domain <numerical, natural number> |
X-HalonDuo-SID | Service ID of inbound domain <numerical, natural number> |
X-HalonDuo-Scores | JSON-encoded list of spam scores assigned to the message {"rpd":"unknown", "sa":0, "sa_scores":{"FREEMAIL_FROM":0.001, "HTML_MESSAGE":0.001}} |
Envelope-Sender | Identifies the SMTP "MAIL FROM" provided by the sending server [email protected] |
Received | We prepend a Received header with information identifying the server which processed the message, as required by RFC-5321. Received: from mail-yb1-f173.google.com (mail-yb1-f173.google.com [209.85.219.173]) by inbound4.eu.mailhop.org (Halon) with ESMTPS; Tue, 17 Dec 2019 |
Received-SPF | Result of our SPF check. none | hardfail | softfail | pass |
Authentication-Results | Extended SPF / DKIM / DMARC check results <our server hostname>; spf=softfail smtp.mailfrom=example.com; dkim=pass header.d=example.com header.s=selector header.a=rsa-sha256 header.b=<hash>; dmarc=none header.from=example.com; |
ARC-Seal ARC-Message-Signature ARC-Authentication-Results | Authenticated Received Chain (ARC) headers, as described in RFC-8617. |
Outbound email have the headers:
X-Mail-Handler: DuoCircle Outbound SMTP
X-Originating-IP: xxx.xxx.xxx.xxx
X-Report-Abuse-To: [email protected] (see https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information for abuse reporting information)
X-MHO-User: xxxxxxx