Certainly the language does not help me, I try to explain better.
I know the operation of SPF, I thought that this  module would make a
preventive control before sending  email to recipient.

The log of  server 10.10.10.115 ( smtp alternative with policyd for
domain.xx) :

2016/02 / 11-16: 58: 12-23209] [TRACKING] DEBUG: Request translated into
session data: $ VAR1 = {
          'Recipient' => '[email protected]',
          'SASLUsername' => 'goodclient',
          'QueueID' => '',
          'RecipientData' => '',
          'Instance' => '5a8f.56bcaf94.1672a.0',
          'EncryptionCipher' => '',
          'Size' => '1',
          'EncryptionKeySize' => '0',
          'Unixtimestamp' => 1455206292,
          'ProtocolTransport' => 'Postfix',
          'EncryptionProtocol' => '',
          'Helo' => '[192.168.1.205]',
          'ClientAddress' => 70.70.70.25 '',
          'ClientName' => 'hostxxxxxxxxt',
          'Sender' => '[email protected],
          'SASLSender' => '',
          '_ClientAddress' => Bless ({
                                       'Raw_ip' => 70 .70.70.25 ',
                                       'Ip' => 70 .70.70.25 ',
                                       'Ip_version' => 4,
                                       'Cidr' => 32
                                     }, 'Awitpt :: NETIP'),



Recipient address rejected: Failed SPF check; Please see
http://www.openspf.org/Why?s=mfrom;id=test%domain.xx.;ip=70.70.70.25;r=unknown
;

################################################## ##################


The 70.70.70.25 ip address is an address of a generic client (thunderbird
software), if  sending by 3g will change again etc etc.

Why does the filter control directly on client ip? Logically I can not
enter in the SPF record all IP addresses from which I connect during the
day .


Make this policy because the control is on outgoing?

Sorry for bad translation :D

2016-02-11 13:31 GMT+01:00 Christoph Langguth <[email protected]>:

> On 11/02/16 13:02, Roberto Lucarelli wrote:
>
>> Hello,
>> I did not understand your response, the filter is enabled but does not
>> work as I would like.
>>
>>
> I'm afraid that you will have to provide more information. As far as I
> understood:
>
> You have domain.xx, with mx 20.20.20.20. You have an SPF record for that
> domain. So far, so good.
>
> Essentially, that means: All mails [email protected] must be sent from the MX.
>
> Now, if *I* send an email pretending to be [email protected], I cannot use
> your MX server, and so I will not be able to pass the SPF test. That's
> good, and that is exactly what SPF is there for.
>
> But if *YOU* send an email as [email protected], you must ultimately do so
> via the MX. (Or some other MTA you control, as long as it's relayed through
> the MX, that doesn't matter).
>
> The point is: YOU will have credentials to authenticate yourself to the
> system, and as soon as you're authenticated, the server should *NOT* check
> SPF records.
>
> That is exactly what Andrea was talking about. Port 25 is "public
> delivery", and can do SPF checks.
>
> Port 465 (smtps) or 587 (submission) should be used for "authenticated
> sending", and should NOT do SPF checks (but possibly enforce quotas etc.)
>
> In policyd terminology: Only apply SPF checks to *inbound* mails, not to
> *outbound* ones.
>
>
> HTH
>
> Cheers
> Chris
>
>
>
>
>
>
>
> _______________________________________________
> Users mailing list
> [email protected]
> http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org
>
>
_______________________________________________
Users mailing list
[email protected]
http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org

Reply via email to