Actually, I think the following series of commands are more helpful.

First the normal UDP request (with a fall-back to TCP):

[EMAIL PROTECTED]:~$ host -t txt aol.com
;; Warning: Message parser reports malformed message packet.
;; Truncated, retrying in TCP mode.
aol.com descriptive text "spf2.0/pra ip4:152.163.225.0/24 ip4:205.188.139.0/24 
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 
ip4:64.12.136.0/23 ip4:64.12.138.0/24 ip4:64.12.143.99/32 ip4:64.12.143.100/32 
ip4:64.12.143.101/32 ptr:mx.aol.com ?all"
aol.com descriptive text "v=spf1 ip4:152.163.225.0/24 ip4:205.188.139.0/24 
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 
ip4:64.12.136.0/23 ip4:64.12.138.0/24 ip4:64.12.143.99/32 ip4:64.12.143.100/32 
ip4:64.12.143.101/32 ptr:mx.aol.com ?all"

Then a direct TCP-only request, which works fine:

[EMAIL PROTECTED]:~$ host -T -t txt aol.com
aol.com descriptive text "spf2.0/pra ip4:152.163.225.0/24 ip4:205.188.139.0/24 
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 
ip4:64.12.136.0/23 ip4:64.12.138.0/24 ip4:64.12.143.99/32 ip4:64.12.143.100/32 
ip4:64.12.143.101/32 ptr:mx.aol.com ?all"
aol.com descriptive text "v=spf1 ip4:152.163.225.0/24 ip4:205.188.139.0/24 
ip4:205.188.144.0/24 ip4:205.188.156.0/23 ip4:205.188.159.0/24 
ip4:64.12.136.0/23 ip4:64.12.138.0/24 ip4:64.12.143.99/32 ip4:64.12.143.100/32 
ip4:64.12.143.101/32 ptr:mx.aol.com ?all"

Then on the same machine, asking spf.py to test an AOL address (using
the client IP address and HELO name from the Postfix log files):

[EMAIL PROTECTED]:~$ python /usr/share/python-support/python-spf/spf.py 
64.12.138.200 [EMAIL PROTECTED] imr-m06.mx.aol.com
('temperror', 451, 'SPF Temporary Error: DNS Ran off end of data')

That's the same error I'm getting in the mail log. Then on the same
machine, asking spf.py just to get the AOL SPF records:

[EMAIL PROTECTED]:~$ python /usr/share/python-support/python-spf/spf.py aol.com
Traceback (most recent call last):
  File "/usr/share/python-support/python-spf/spf.py", line 1621, in <module>
    print q.dns_spf(sys.argv[1])
  File "/usr/share/python-support/python-spf/spf.py", line 1010, in dns_spf
    a = [t for t in self.dns_txt(domain) if RE_SPF.match(t)]
  File "/usr/share/python-support/python-spf/spf.py", line 1045, in dns_txt
    return [''.join(a) for a in self.dns(domainname, 'TXT')]
  File "/usr/share/python-support/python-spf/spf.py", line 1150, in dns
    for k, v in DNSLookup(name, qtype, self.strict):
  File "/usr/share/python-support/python-spf/spf.py", line 105, in DNSLookup
    raise TempError, 'DNS ' + str(x)
__main__.TempError: DNS Ran off end of data

I get the same thing running policyd-spf directly:

[EMAIL PROTECTED]:~$ policyd-spf
client_address=64.12.138.200
helo_name=imr-m06.mx.aol.com
[EMAIL PROTECTED]
[EMAIL PROTECTED]

action=defer_if_permit Received-SPF: Temperror (SPF Temporary Error: DNS
Ran off end of data) Mail From client-ip=64.12.138.200;
helo=imr-m06.mx.aol.com; [EMAIL PROTECTED];
[EMAIL PROTECTED];

Do you get the same results?

Thanks,
John


** Changed in: pyspf (Ubuntu)
       Status: Invalid => New

-- 
python-policyd-spf failing on AOL SPF records.
https://bugs.launchpad.net/bugs/205254
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to