On 2017-04-18 00:04:07 (+0200), Benny Pedersen <m...@junc.eu> wrote:
Philip Paeps skrev den 2017-04-17 19:49:
On 2017-04-17 19:33:36 (+0200), Geert Stappers <stapp...@debian.org> wrote:
teamfoo:
localcopy
j...@example.com
b...@domain.tld
john@some.where

Bob checks SPF on incoming messages.

Bob should not be checking SPF from your mailserver if he knows
there's a forward / expander there.

the forwarding host ip can be added to spf whitelist in mta stage where spf is being breaked, doing so will in case of spamassaasin check spf for the real sender ips that is the originating ip

Sure.  That's a possibility.

Checking SPF breaks email forwarding.

incorrect since enveloper domain changes on the forward host

Only if you take steps to change the envelope. In a normal/default setup, the envelope will not be changed.

The easiest way to do this, is for Bob to check a list of
forwarders in his ``smtpd_sender_restrictions`` if he's using Postfix.

its not postfix job of make envelope sender fixses

Correct.

since spf is not dkim, or even sid-milter that breaks spf by checking from: header with breaks spf, i think most users see sender-id as a spf fail there in, but its not spf

spf is maillists safe, so why say forwarding breaks spf ?

SPF is only "safe" for mailing lists if the mailing list takes ownership of the message and remails it with a new envelope. SPF is not "safe" when you're simply forwarding the message (i.e.: without changing the envelope).

If you check SPF, you need to whitelist every machine that forwards mail for you. Your backup MX for one. But also every other host that you know legitimately forwards mail for you.

DKIM is completely unrelated.

Philip

--
Philip Paeps
Senior Reality Engineer
Ministry of Information

Reply via email to