Nov 19 13:32:39 p34 postfix/policy-spf[15114]: : SPF SoftFail (Mechanism '~all' matched): Envelope-from: [EMAIL PROTECTED] Nov 19 13:32:39 p34 postfix/policy-spf[15114]: handler sender_policy_framework: is decisive. Nov 19 13:32:39 p34 postfix/policy-spf[15114]: : Policy action=PREPEND Received-SPF: softfail (hsbc.co.uk: Sender is not authorized by default to use '[EMAIL PROTECTED]' in 'mfrom' identity, however domain is not currently prepared for false failures (mechanism '~all' matched)) receiver=p34.internal.lan; identity=mfrom; envelope-from="[EMAIL PROTECTED]"; helo=158550.arbollogico.net; client-ip=67.192.171.186
Was curious if there were any daemons out there that currently did this, or if
I should just modify the main spf checking script that openspf.org provides?
- policy daemon to greylist on SPF failure... Justin Piszcz
- Re: policy daemon to greylist on SP... Scott Kitterman
- Re: policy daemon to greylist on SP... Benny Pedersen
- Re[2]: policy daemon to greylist on... Алексей Доморадов
- Re: Re[2]: policy daemon to gre... Benny Pedersen