On 30/12/2020 2:38 am, ludic...@gmail.com wrote:
@Nick
A check for a valid FQDN in From is in smtpd_sender_restrictions.
At the point where it got to bounce message, SPF was skipped. Would
OpenDMARC then still work?
The smtpd_sender_restrictions that you specify are applied to the
/envelope
permanent field of work, of course.
Greets,
Ludi
Von: owner-postfix-us...@postfix.org Im
Auftrag von John Schmerold
Gesendet: Montag, 28. Dezember 2020 03:29
An: Nick Tait ; postfix-users@postfix.org
Betreff: Re: Controlling MS Azure Cloud Spam
On 12/27/2020 3:15 PM, Nick Tait wrote:
On 12/27/2020 3:15 PM, Nick Tait wrote:
Hi Ludi.
One option might be to add OpenDMARC to your implementation? The
reason for mentioning this is because in addition to checking DMARC
policies, OpenDMARC also has an option to reject any message that
doesn't have the mandatory headers according
Hi Ludi.
One option might be to add OpenDMARC to your implementation? The reason
for mentioning this is because in addition to checking DMARC policies,
OpenDMARC also has an option to reject any message that doesn't have the
mandatory headers according to RFC 5322:
/RequiredHeaders (Boolean)
Hi,
I am seeing a wave of MS Azure Cloud Spam these days.
Many of these mails come with a header:
* Return-Path:
* Empty From Field
They than pass the greylisting filter (and all others it seems) with "Bounce
message. Skip."
Is there a way to influence this behaviou