On 11/02/16 17:20, Roberto Lucarelli wrote:
Certainly the language does not help me, I try to explain better. I know the operation of SPF, I thought that this module would make a preventive control before sending email to recipient.
No, that's not the purpose of SPF. The *recipient* would use SPF to validate that the mail that *your server* sent actually comes from an "allowed location".
That is why your users are connecting to the "allowed location", and authenticating to it, so that they can send mails which will pass the SPF. Of course, they themselves, at the moment of connecting to your MTA, cannot (usually) pass the SPF check.
Your validation of submitting users should (normally) be by username/password only -- regardless of the IP that is connecting to you.
User 1-> your MX 2-> recipient
(passwd) (SPF)
SPF works at "2->", it cannot work at "1->". That's why you do
authentication/authorization at "1->".
Try and enable SPF only for the "Default Inbound" policy.PS: If it helps, you can add the italian version of your message in addition(!) to the english one. It might make it easier to understand for people who understand italian.
Cheers Chris
The log of server 10.10.10.115 ( smtp alternative with policyd for
domain.xx) :
2016/02 / 11-16: 58: 12-23209] [TRACKING] DEBUG: Request translated into
session data: $ VAR1 = {
'Recipient' => '[email protected]',
'SASLUsername' => 'goodclient',
'QueueID' => '',
'RecipientData' => '',
'Instance' => '5a8f.56bcaf94.1672a.0',
'EncryptionCipher' => '',
'Size' => '1',
'EncryptionKeySize' => '0',
'Unixtimestamp' => 1455206292,
'ProtocolTransport' => 'Postfix',
'EncryptionProtocol' => '',
'Helo' => '[192.168.1.205]',
'ClientAddress' => 70.70.70.25 '',
'ClientName' => 'hostxxxxxxxxt',
'Sender' => '[email protected],
'SASLSender' => '',
'_ClientAddress' => Bless ({
'Raw_ip' => 70 .70.70.25 ',
'Ip' => 70 .70.70.25 ',
'Ip_version' => 4,
'Cidr' => 32
}, 'Awitpt :: NETIP'),
Recipient address rejected: Failed SPF check; Please see
http://www.openspf.org/Why?s=mfrom;id=test%domain.xx.;ip=70.70.70.25;r=unknown;
################################################## ##################
The 70.70.70.25 ip address is an address of a generic client
(thunderbird software), if sending by 3g will change again etc etc.
Why does the filter control directly on client ip? Logically I can not
enter in the SPF record all IP addresses from which I connect during the
day .
Make this policy because the control is on outgoing?
Sorry for bad translation :D
2016-02-11 13:31 GMT+01:00 Christoph Langguth <[email protected]
<mailto:[email protected]>>:
On 11/02/16 13:02, Roberto Lucarelli wrote:
Hello,
I did not understand your response, the filter is enabled but
does not
work as I would like.
I'm afraid that you will have to provide more information. As far as
I understood:
You have domain.xx, with mx 20.20.20.20. You have an SPF record for
that domain. So far, so good.
Essentially, that means: All mails [email protected] must be sent from
the MX.
Now, if *I* send an email pretending to be [email protected], I cannot
use your MX server, and so I will not be able to pass the SPF test.
That's good, and that is exactly what SPF is there for.
But if *YOU* send an email as [email protected], you must ultimately do
so via the MX. (Or some other MTA you control, as long as it's
relayed through the MX, that doesn't matter).
The point is: YOU will have credentials to authenticate yourself to
the system, and as soon as you're authenticated, the server should
*NOT* check SPF records.
That is exactly what Andrea was talking about. Port 25 is "public
delivery", and can do SPF checks.
Port 465 (smtps) or 587 (submission) should be used for
"authenticated sending", and should NOT do SPF checks (but possibly
enforce quotas etc.)
In policyd terminology: Only apply SPF checks to *inbound* mails,
not to *outbound* ones.
HTH
Cheers
Chris
_______________________________________________
Users mailing list
[email protected] <mailto:[email protected]>
http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org
_______________________________________________
Users mailing list
[email protected]
http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Users mailing list [email protected] http://lists.policyd.org/mailman/listinfo/users_lists.policyd.org
