Philip Paeps skrev den 2017-04-17 19:49:
On 2017-04-17 19:33:36 (+0200), Geert Stappers <stapp...@debian.org> wrote:
teamfoo:
 localcopy
 j...@example.com
 b...@domain.tld
 john@some.where

Bob checks SPF on incoming messages.

Bob should not be checking SPF from your mailserver if he knows
there's a forward / expander there.

the forwarding host ip can be added to spf whitelist in mta stage where spf is being breaked, doing so will in case of spamassaasin check spf for the real sender ips that is the originating ip

Checking SPF breaks email
forwarding.

incorrect since enveloper domain changes on the forward host

The easiest way to do this, is for Bob to check a list of
forwarders in his ``smtpd_sender_restrictions`` if he's using Postfix.

its not postfix job of make envelope sender fixses, since spf is not dkim, or even sid-milter that breaks spf by checking from: header with breaks spf, i think most users see sender-id as a spf fail there in, but its not spf

spf is maillists safe, so why say forwarding breaks spf ?

Reply via email to