On 21.08.23 10:26, Laura Atkins via mailop wrote:

> This recommendation doesn’t make sense. For companies that actually 
> reject due to SPF, they’re most likely going to do it after MAIL FROM: 
> At this point in the transaction, they don’t know what the DMARC domain 
> is. They can look up DMARC for the domain in the MAIL FROM: but that may 
> or may not be connected to the actual domain in the 5322.from.
> 
> I mean, I think it’s a bad idea to reject for SPF failures, but for 
> folks who do I can’t imagine they want to see the full content of the 
> message before just throwing it away. That seems wasteful.
> 
> laura
> 


Exactly. Also, I don't think that all the scenario where a legitimate 
mails gets a SPF failure (due to forward/relay for instance) a DKIM will 
still be good. If they don't care about breaking SPF, I guess they don't 
care about breaking DKIM either. Avoiding to break SPF isn't rocket science.

We reject on SPF hard failure (-all) after RCPT TO, in order to still 
let our users welcome list repeat offenders. For this, the sender host 
(or ip) must have been provided. This works great with mailing-lists and 
forwards for instance.

By the way, hotmail.com still hasn't fixed the issue :-s


_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to