p**f 发帖数: 3549 | 1 一般发email,接收者都可以通过查看邮件源文件得到发送者的IP。
但我发现,如果email是从iPhone/iPad发出来的,好像没有发送者的IP信息。
请问,这是什么原理,请问有什么办法隐藏发送者的IP么?
比如下面这封邮件的IP显示是:98.139.213.164,是Yahoo的IP,而非发送者电脑IP。
Received: from nm14-vm0.bullet.mail.bf1.yahoo.com (nm14-vm0.bullet.mail.bf1.
yahoo.com [98.139.213.164])
(using TLSv1 with cipher RC4-SHA (128/128 bits))
(No client certificate requested)
by mtaiw-aan04.mx.aol.com (Internet Inbound) with ESMTPS id
for <[email protected]
/* */>;
From: [email protected]
/* */
Content-Type: multipart/alternative;
boundary=Apple-Mail----
X-Mailer: iPad Mail (12B466)
In-Reply-To: <[email protected]
/* */>
Message-Id: <[email protected]
/* */>
Date:
To: <[email protected]
/* */>
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (1.0)
x-aol-global-disposition: G
X-AOL-SCOLL-AUTHENTICATION: mtaiw-aan04.mx.aol.com ; domain : yahoo.com DKIM
: pass
X-AOL-SCOLL-DMARC: mtaiw-aan04.mx.aol.com ; domain : yahoo.com ; policy :
reject ; result : P
Authentication-Results: mx.aol.com;
spf=pass (aol.com: the domain yahoo.com reports 98.139.213.164 as a
permitted sender.) smtp.mailfrom=yahoo.com;
dkim=pass (aol.com: email passed verification from the domain yahoo.
com.) header.d=yahoo.com;
dmarc=pass (aol.com: the domain yahoo.com reports that Both SPF and
DKIM strictly align.) header.from=yahoo.com;
x-aol-sid: ---
X-AOL-IP: 98.139.213.164
X-AOL-SPF: domain : yahoo.com SPF : pass |
a9 发帖数: 21638 | 2 一般都这样吧?
bf1.
/* */>;
【在 p**f 的大作中提到】 : 一般发email,接收者都可以通过查看邮件源文件得到发送者的IP。 : 但我发现,如果email是从iPhone/iPad发出来的,好像没有发送者的IP信息。 : 请问,这是什么原理,请问有什么办法隐藏发送者的IP么? : 比如下面这封邮件的IP显示是:98.139.213.164,是Yahoo的IP,而非发送者电脑IP。 : Received: from nm14-vm0.bullet.mail.bf1.yahoo.com (nm14-vm0.bullet.mail.bf1. : yahoo.com [98.139.213.164]) : (using TLSv1 with cipher RC4-SHA (128/128 bits)) : (No client certificate requested) : by mtaiw-aan04.mx.aol.com (Internet Inbound) with ESMTPS id : for <[email protected]
|
p**f 发帖数: 3549 | 3 当然不是,下面这封邮件源文件就显示了发送者IP:98.248.209.*是个comcast家庭用
户的IP,而不是Yahoo/Mail/Gmail等邮件商的IP。
我想问的是,同是email,为什么不同客户端发出来的源文件为什么不一样?
Return-Path: <[email protected]
/* */> Received: from core-mjb002a.r1000.mail.aol.com (
core-mjb002.r1000.mail.aol.com [172.29.103.69]) by mtaomg-aae02.mx.aol.
com (OMAG/Core Interface) with ESMTP id AD8-- for <[email protected]
/* */>;
To: [email protected]
/* */ Subject: @@@@@@ X-MB-Message-Source: WebUI X-MB-Message-Type
/* */> Content-Type: multipart/mixed;
boundary="--------MB_8D163CE9BC709F6_1070_B5375_webmail-d262.sysops.aol.
com" X-Mailer: AOL Webmail STANDARD Received: from 98.248.209.* by webmail-
d262.sysops.aol.com (205.188.16.101) with HTTP (WebMailUI); Message-Id: <
[email protected]
/* */>
X-Originating-IP: [98.248.209.*] |
g*******t 发帖数: 7704 | |
d*b 发帖数: 21830 | 5 web interface发的只有server ip, pop3/imap发的有本机的ip.
bf1.
/* */>;
【在 p**f 的大作中提到】 : 一般发email,接收者都可以通过查看邮件源文件得到发送者的IP。 : 但我发现,如果email是从iPhone/iPad发出来的,好像没有发送者的IP信息。 : 请问,这是什么原理,请问有什么办法隐藏发送者的IP么? : 比如下面这封邮件的IP显示是:98.139.213.164,是Yahoo的IP,而非发送者电脑IP。 : Received: from nm14-vm0.bullet.mail.bf1.yahoo.com (nm14-vm0.bullet.mail.bf1. : yahoo.com [98.139.213.164]) : (using TLSv1 with cipher RC4-SHA (128/128 bits)) : (No client certificate requested) : by mtaiw-aan04.mx.aol.com (Internet Inbound) with ESMTPS id : for <[email protected]
|