Philip Paeps skrev den 2017-04-17 19:49:
On 2017-04-17 19:33:36 (+0200), Geert Stappers <stapp...@debian.org>
wrote:
teamfoo:
localcopy
j...@example.com
b...@domain.tld
john@some.where
Bob checks SPF on incoming messages.
Bob should not be checking SPF from your mailserver if he knows
there's a forward / expander there.
the forwarding host ip can be added to spf whitelist in mta stage where
spf is being breaked, doing so will in case of spamassaasin check spf
for the real sender ips that is the originating ip
Checking SPF breaks email
forwarding.
incorrect since enveloper domain changes on the forward host
The easiest way to do this, is for Bob to check a list of
forwarders in his ``smtpd_sender_restrictions`` if he's using Postfix.
its not postfix job of make envelope sender fixses, since spf is not
dkim, or even sid-milter that breaks spf by checking from: header with
breaks spf, i think most users see sender-id as a spf fail there in, but
its not spf
spf is maillists safe, so why say forwarding breaks spf ?