我已经向一位同事发送了一封电子邮件,其中包含以下html代码(嵌入式图标)粘贴在Thunderbird中:
<link rel="shortcut icon" href="data:image/vnd.microsoft.icon;base64,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"/>
然后他的Outlook停止接收错误0x800CCC0F(服务器连接问题)的电子邮件,它没有收到“毒药”电子邮件。所以我虽然是邮件服务器的问题。
但我的问题是,为什么“简单”的文本会破坏电子邮件服务器?
这是发送消息的主要部分:
Content-Type: multipart/alternative;
boundary="------------040701090409010309050003"
This is a multi-part message in MIME format.
--------------040701090409010309050003
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: quoted-printable
<link rel=3D"shortcut icon"=20
href=3D"data:image/vnd.microsoft.icon;base64,AAABAAEAEBAAAAEAIABoBAAAFgAA=
ACgAAAAQAAAAIAAAAAEAIAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAB+s8sQfrPL/H6zyxAAAAAAfrPL/H6zy/wAAAAAfrPL/H6zyKh+s=
8v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH6zy/wAAAAAAAAAAH6zy/x+s8k8AAAAAA=
AAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH6zyxB+s8v8frPLEAAAAAB+s8v=
8frPL/AAAAAB+s8v8frPIqH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
B+s8v8frPL/H6zy/x+s8v8AAAAAH6zy/wAAAAAAAAAAH6zy/wAAAAAfrPL/H6zy/x+s8v8frP=
L/AAAAAAAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8AAAAAAAAAAB+s8v8AAAAAH6zy/wA=
AAAAAAAAAAAAAAAAAAAAAAAAAH6zy/wAAAAAfrPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAfrPL/=
AAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAH6zy/x+s8=
v8frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAAAAAAAAAAAAAAAAAfrPL/AAAAAAAAAAAAAAAAAA=
AAAB+s8v8AAAAAAAAAAB+s8v8AAAAAH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAH6zy/x+s8v8=
frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8frPL/H6zy/x+s8v8AAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA//8AAP//AADiVwAA9u8AAOJXAAD//wAA//8AAIWh=
AAC1rwAApa8AALwvAAC9rwAAhaEAAP//AAD//wAA//8AAA=3D=3D"/>
--------------040701090409010309050003
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body>
<link rel="shortcut icon"
href=<a class="moz-txt-link-rfc2396E" href="data:image/vnd.microsoft.icon;base64,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
AAAAAAAAAAAAAAAAAAAAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAH6zy/x+s8v8frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAAAAAAAAAAAAAAAAAfrPL/AAAAAAAAAAAAAAAAAAAAAB+s8v8AAAAAAAAAAB+s8v8AAAAAH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAH6zy/x+s8v8frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8frPL/H6zy/x+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA//8AAP//AADiVwAA9u8AAOJXAAD//wAA//8AAIWhAAC1rwAApa8AALwvAAC9rwAAhaEAAP//AAD//wAA//8AAA==">"data:image/vnd.microsoft.icon;base64,AAABAAEAEBAAAAEAIABoBAAAFgAAACgAAAAQAAAAIAAAAAEAIAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB+s8sQfrPL/H6zyxAAAAAAfrPL/H6zy/wAAAAAfrPL/H6zyKh+s8v8AAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAH6zy/wAAAAAAAAAAH6zy/x+s8k8AAAAAAAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH6zyxB+s8v8frPLEAAAAAB+s8v8frPL/AAAAAB+s8v8frPIqH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB+s8v8frPL/H6zy/x+s8v8AAAAAH6zy/wAAAAAAAAAAH6zy/wAAAAAfrPL/H6zy/x+s8v8frPL/AAAAAAAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8AAAAAAAAAAB+s8v8AAAAAH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAH6zy/wAAAAAfrPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAB+s8v8AAAAAAAAAAAAAAAAAAAAAH6zy/x+s8v8frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAAAAAAAAAAAAAAAAAfrPL/AAAAAAAAAAAAAAAAAAAAAB+s8v8AAAAAAAAAAB+s8v8AAAAAH6zy/wAAAAAAAAAAAAAAAAAAAAAAAAAAH6zy/x+s8v8frPL/H6zy/wAAAAAfrPL/AAAAAAAAAAAfrPL/AAAAAB+s8v8frPL/H6zy/x+s8v8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA//8AAP//AADiVwAA9u8AAOJXAAD//wAA//8AAIWhAAC1rwAApa8AALwvAAC9rwAAhaEAAP//AAD//wAA//8AAA=="</a>/><br>
</body>
</html>
--------------040701090409010309050003--
它不是“简单文本”,而是被解码为文本以外的东西。我不会试图看看Base64代码实际上做了什么。
—
Ramhound 2016年
但为什么电子邮件服务器会尝试解释正文的文本?如果客户端这样做我不会感到惊讶(因为它应该用来解释html)。
—
PhoneixS 2016年
请投票的人解释为什么我可以学习或改进这个问题。@Ramhound,这是一个简单的图标,字母“GHC iex”为橙色。
—
PhoneixS 2016年
电子邮件服务器可能正在尝试扫描内容。对方是否要求删除电子邮件?
—
Ramhound 2016年
我们通过简单的Web邮件版本删除了电子邮件而没有打开它(Web客户端无法打开它)。
—
PhoneixS 2016年