On 2022-04-28 at 12:45 -0600, Geoff Mulligan via mailop wrote:
> I have a user on one of my servers that uses procmail to forward
> messages to their gmail account.
> 
> Every once in a while messages sent to them are "bounced" to the
> sender with the error fro gmail:
> 
> 550-5.7.26 This message does not have authentication information or
> fails to 550-5.7.26 pass
>     authentication checks. To best protect our users from spam, the
> 550-5.7.26
>     message has been blocked.
> 
> How can I diagnose this???

Seeing it here as well. Something has recently changed in gmail again,
just like last December.
I'm quite sure Robert L Mathews discovery of the line-wrapping issue
was caused by this as well.

(And yes, this is happening to legit messages, hand-typed for them, and
that when reviewed manually show no trace of spamminess at all)

If your senders use DKIM, those will generally pass. However, 

a) some senders do not implement DKIM, so their mails cannot benefit
from it when forwarded
b) some mails will have invalid DKIM signatures
(in which case you will have a hard time figuring out if that was
broken to begin with or if some uncommon feature on this mail moved
your MTA to "fix" it breaking the signature)


On 2022-04-28 at 12:02 -0700, Brandon Long noted:
> Are they using the suggestions on 
> https://support.google.com/mail/answer/175365 for procmail
> forwarding?
> 
> There's a double edge sword with SPF auth for forwarding.. if you re-
> write the envelope sender to the forwarding address and forward spam,
> the forwarding domain can accumulate poor reputation.  If you don't
> rewrite the envelope sender, then the messages will no longer be SPF
> authed, and that may cause spam detection issues.

Gmail guidelines explicitly ask not to rewrite the envelope sender


> There's no great solution to this problem. (...) ARC is the
> theoretical solution to this, where it can forward auth
> information, but how to handle the forwarded auth information is
> still a work in progress.

There is a really simple solution for these Gmail customers getting
their forwarded mail rejected. But it lies on Gmail side.

Gmail already knows that the account of bl...@gmail.com is linked to
the mailbox bl...@example.com, since bl...@gmail.com is configured to
allow sending as bl...@example.com. It should thus detect that the
email received from mta.example.com with a "To: bl...@example.com" is a
forward requested by the user, and not reject it at the gateway when it
fails SPF.

Or, in order to have a stronger command from the user and avoid
forward-guessing, at the cost of a new configuration setting, let the
user configure a list of IP addresses from which they are forwarding
mail to their account.
Then Gmail could clearly recognise what is actually happening: that the
connecting IP adddress belongs to a border MTA of this user, and then
walk Received: headers to fetch the actual IP address that delivered it to 
bl...@example.com, which is the one that should be taken into account
for a proper evaluation.


This is something that should be implemented by everyone. If you are
forwarding messages to somewhere else (and expecting to receive them!),
you should configure the *receiving* side to recognise it as such.
Sadly, no end-user provider seem to include this setting, so it ends up
being only an option for those running their own systems. ☹

Even on corporate systems, where they have a filtering mail server at
the border, and their postmasters should know better, it's not that
uncommon to find out it is misconfigured and the internal MTA is
treating every mail as failing SPF.

Regards


_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to