Hi,
I am trying to test the SPF capablities of SA-3.0-rc2 (also using perl
5.6.0, postfix 1.1.11, amavisd-new-20030616-p10). I have 2 instances of
postfix sandwiching amavisd-new which calls SA). I am using telnet from
my optonline.net machine setting the MAIL FROM: to [EMAIL PROTECTED] to my test
server that is running the above software. (I am also putting in the
header "From: [EMAIL PROTECTED]" as well). I am not getting any SPF test hits in
the resulting mail during transmission or when I run the mail using
"spamassassin -D --lint <test.eml". (I am including the debug output,
test email, init.pre and local.cf).

The line of interest in the debug output is
debug: SPF: query for /XXX.XXX.XXX.XXX/optonline.net: result: none,
comment: SPF: domain of sender optonline.net does not designate mailers

I would think the fact that optonline.net isn't advertising mailers is too
important. Isn't that fact that aol.com does advertise it's servers via
SPF that thing that matters since that is the domain that I impersonating?

[EMAIL PROTECTED] dig -t txt aol.com

; <<>> DiG 8.3 <<>> -t aol.com
;; res options: init recurs defnam dnsrch
;; got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 4
;; QUERY SECTION:
;;      aol.com, type = TXT, class = IN

;; ANSWER SECTION:
aol.com.                5M IN TXT       "v=spf1 ip4:152.163.225.0/24
ip4:205.188.139.0/24 ip4:205.188.144.0/24 ip4:205.188.156.0/23
ip4:205.188.159.0/24 ip4:64.12.136.0/23 ip4:64.12.138.0/24 ptr:mx.aol.com
?all"

What is that I am not understanding?

TIA,
John
From [EMAIL PROTECTED]  Wed Sep  1 17:05:30 2004
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
Received: from localhost (localhost [127.0.0.1])
        by localhost (Postfix) with ESMTP id D8228ED40
        for <[EMAIL PROTECTED]>; Wed,  1 Sep 2004 17:05:29 -0400 (EDT)
Received: from server.domain.com ([127.0.0.1])
 by localhost (server.domain.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 23583-01 for <[EMAIL PROTECTED]>;
 Wed,  1 Sep 2004 17:05:28 -0400 (EDT)
Received: from aaa-nnnnnnnn.dyn.optonline.net (aaa-nnnnnnnn.dyn.optonline.net 
[XXX.XXX.XXX.XXX])
        by server.domain.com (Postfix) with SMTP id C7F97ECEE
        for <[EMAIL PROTECTED]>; Wed,  1 Sep 2004 17:04:51 -0400 (EDT)
To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
Subject:  XXXX
Message-Id: <[EMAIL PROTECTED]>
Date: Wed,  1 Sep 2004 17:04:51 -0400 (EDT)

XXXX

debug: SpamAssassin version 3.0.0-rc2
debug: Score set 0 chosen.
debug: running in taint mode? yes
debug: Running in taint mode, removing unsafe env vars, and resetting PATH
debug: PATH included '/usr/bin', keeping.
debug: PATH included '/usr/sbin', keeping.
debug: PATH included '/bin', keeping.
debug: PATH included '/sbin', keeping.
debug: Final PATH set to: /usr/bin:/usr/sbin:/bin:/sbin
debug: using "/etc/mail/spamassassin/init.pre" for site rules init.pre
debug: config: read file /etc/mail/spamassassin/init.pre
debug: using "/usr/share/spamassassin" for default rules dir
debug: config: read file /usr/share/spamassassin/10_misc.cf
debug: config: read file /usr/share/spamassassin/20_anti_ratware.cf
debug: config: read file /usr/share/spamassassin/20_body_tests.cf
debug: config: read file /usr/share/spamassassin/20_compensate.cf
debug: config: read file /usr/share/spamassassin/20_dnsbl_tests.cf
debug: config: read file /usr/share/spamassassin/20_drugs.cf
debug: config: read file /usr/share/spamassassin/20_fake_helo_tests.cf
debug: config: read file /usr/share/spamassassin/20_head_tests.cf
debug: config: read file /usr/share/spamassassin/20_html_tests.cf
debug: config: read file /usr/share/spamassassin/20_meta_tests.cf
debug: config: read file /usr/share/spamassassin/20_phrases.cf
debug: config: read file /usr/share/spamassassin/20_porn.cf
debug: config: read file /usr/share/spamassassin/20_ratware.cf
debug: config: read file /usr/share/spamassassin/20_uri_tests.cf
debug: config: read file /usr/share/spamassassin/23_bayes.cf
debug: config: read file /usr/share/spamassassin/25_body_tests_es.cf
debug: config: read file /usr/share/spamassassin/25_hashcash.cf
debug: config: read file /usr/share/spamassassin/25_spf.cf
debug: config: read file /usr/share/spamassassin/25_uribl.cf
debug: config: read file /usr/share/spamassassin/30_text_de.cf
debug: config: read file /usr/share/spamassassin/30_text_fr.cf
debug: config: read file /usr/share/spamassassin/30_text_nl.cf
debug: config: read file /usr/share/spamassassin/30_text_pl.cf
debug: config: read file /usr/share/spamassassin/50_scores.cf
debug: config: read file /usr/share/spamassassin/60_whitelist.cf
debug: using "/etc/mail/spamassassin" for site rules dir
debug: config: read file /etc/mail/spamassassin/local.cf
debug: using "/home/pete/.spamassassin" for user state dir
debug: using "/home/pete/.spamassassin/user_prefs" for user prefs file
debug: config: read file /home/pete/.spamassassin/user_prefs
debug: plugin: loading Mail::SpamAssassin::Plugin::URIDNSBL from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c)
debug: plugin: loading Mail::SpamAssassin::Plugin::Hashcash from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::Hashcash=HASH(0x8a1e3fc)
debug: plugin: loading Mail::SpamAssassin::Plugin::SPF from @INC
debug: plugin: registered Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0)
debug: plugin: Mail::SpamAssassin::Plugin::Hashcash=HASH(0x8a1e3fc) implements 
'parse_config'
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) implements 
'parse_config'
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) inhibited 
further callbacks
debug: Score set 1 chosen.
debug: received-header: parsed as [ ip=127.0.0.1 rdns=localhost helo=localhost 
by=localhost ident= envfrom= intl=0 id=D8228ED40 ]
debug: is Net::DNS::Resolver available? yes
debug: Net::DNS version: 0.48
debug: trying (3) comcast.net...
debug: looking up NS for 'comcast.net'
debug: NS lookup of comcast.net succeeded => Dns available (set dns_available 
to hardcode)
debug: is DNS available? 1
debug: IP is reserved, not looking up PTR: 127.0.0.1
debug: received-header: parsed as [ ip=127.0.0.1 rdns= helo=server.domain.com 
by=localhost ident= envfrom= intl=0 id=23583-01 ]
debug: received-header: parsed as [ ip=XXX.XXX.XXX.XXX 
rdns=aaa-nnnnnnnn.dyn.optonline.net helo=aaa-nnnnnnnn.dyn.optonline.net 
by=server.domain.com ident= envfrom= intl=0 id=C7F97ECEE ]
debug: looking up A records for 'localhost'
debug: A records for 'localhost': 127.0.0.1
debug: received-header: 'from' 127.0.0.1 has reserved IP
debug: received-header: 'from' 127.0.0.1 is near to first 'by'
debug: received-header: relay 127.0.0.1 trusted? yes internal? no
debug: received-header: 'from' 127.0.0.1 has reserved IP
debug: received-header: 'from' 127.0.0.1 is near to first 'by'
debug: received-header: relay 127.0.0.1 trusted? yes internal? no
debug: looking up A records for 'server.domain.com'
debug: A records for 'server.domain.com': YYY.YYY.YYY.YYY
debug: received-header: 'by' server.domain.com has public IP YYY.YYY.YYY.YYY
debug: received-header: relay XXX.XXX.XXX.XXX trusted? no internal? no
debug: metadata: X-Spam-Relays-Trusted: [ ip=127.0.0.1 rdns=localhost 
helo=localhost by=localhost ident= envfrom= intl=0 id=D8228ED40 ] [ 
ip=127.0.0.1 rdns= helo=server.domain.com by=localhost ident= envfrom= intl=0 
id=23583-01 ]
debug: metadata: X-Spam-Relays-Untrusted: [ ip=XXX.XXX.XXX.XXX 
rdns=aaa-nnnnnnnn.dyn.optonline.net helo=aaa-nnnnnnnn.dyn.optonline.net 
by=server.domain.com ident= envfrom= intl=0 id=C7F97ECEE ]
debug: ---- MIME PARSER START ----
debug: main message type: text/plain
debug: parsing normal part
debug: added part, type: text/plain
debug: ---- MIME PARSER END ----
debug: decoding: no encoding detected
debug: Message too short for language analysis
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) implements 
'parsed_metadata'
debug: URIDNSBL: domains to query: 
debug: is Net::DNS::Resolver available? yes
debug: Net::DNS version: 0.48
debug: all '*From' addrs: [EMAIL PROTECTED]
debug: Running tests for priority: 0
debug: running header regexp tests; score so far=0
debug: registering glue method for check_uridnsbl 
(Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c))
debug: registering glue method for check_for_spf_pass 
(Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0))
debug: SPF: relayed through one or more trusted relays, cannot use header-based 
Envelope-From, skipping
debug: forged-HELO: from=optonline.net helo=optonline.net by=domain.com
debug: all '*To' addrs: [EMAIL PROTECTED]
debug: registering glue method for check_hashcash_value 
(Mail::SpamAssassin::Plugin::Hashcash=HASH(0x8a1e3fc))
debug: registering glue method for check_for_spf_helo_fail 
(Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0))
debug: SPF: checking HELO (helo=aaa-nnnnnnnn.dyn.optonline.net, 
ip=XXX.XXX.XXX.XXX)
debug: SPF: trimmed HELO down to 'optonline.net'
debug: SPF: query for /XXX.XXX.XXX.XXX/optonline.net: result: none, comment: 
SPF: domain of sender optonline.net does not designate mailers
debug: registering glue method for check_for_spf_helo_pass 
(Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0))
debug: registering glue method for check_hashcash_double_spend 
(Mail::SpamAssassin::Plugin::Hashcash=HASH(0x8a1e3fc))
debug: registering glue method for check_for_spf_softfail 
(Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0))
debug: registering glue method for check_for_spf_helo_softfail 
(Mail::SpamAssassin::Plugin::SPF=HASH(0x89fa4a0))
debug: running body-text per-line regexp tests; score so far=4.39
debug: running uri tests; score so far=4.39
debug: Razor2 is not available
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) implements 
'check_tick'
debug: running raw-body-text per-line regexp tests; score so far=4.39
debug: running full-text regexp tests; score so far=4.39
debug: Razor2 is not available
debug: DCCifd is not available: no r/w dccifd socket found.
debug: Current PATH is: /usr/bin:/usr/sbin:/bin:/sbin
debug: dccproc was found at /usr/bin/dccproc, but isn't executable
debug: DCC is not available: no executable dccproc found.
debug: Pyzor is not available: pyzor not found
debug: Running tests for priority: 500
debug: RBL: success for 12 of 12 queries
debug: plugin: Mail::SpamAssassin::Plugin::URIDNSBL=HASH(0x844f84c) implements 
'check_post_dnsbl'
debug: running meta tests; score so far=7.932
debug: running header regexp tests; score so far=7.932
debug: running body-text per-line regexp tests; score so far=7.932
debug: running uri tests; score so far=7.932
debug: running raw-body-text per-line regexp tests; score so far=7.932
debug: running full-text regexp tests; score so far=7.932
debug: Running tests for priority: 1000
debug: running meta tests; score so far=7.932
debug: running header regexp tests; score so far=7.932
debug: using "/home/pete/.spamassassin" for user state dir
debug: lock: 32047 created 
/home/pete/.spamassassin/auto-whitelist.lock.server.domain.com.32047
debug: lock: 32047 trying to get lock on 
/home/pete/.spamassassin/auto-whitelist with 0 retries
debug: lock: 32047 link to /home/pete/.spamassassin/auto-whitelist.lock: link ok
debug: Tie-ing to DB file R/W in /home/pete/.spamassassin/auto-whitelist
debug: auto-whitelist (db-based): [EMAIL PROTECTED]|ip=68.193 scores 22/82.091
debug: AWL active, pre-score: 7.932, autolearn score: 7.932, mean: 
3.73140909090909, IP: XXX.XXX.XXX.XXX
debug: add_score: New count: 23, new totscore: 90.023
debug: DB addr list: untie-ing and unlocking.
debug: DB addr list: file locked, breaking lock.
debug: unlock: 32047 unlink /home/pete/.spamassassin/auto-whitelist.lock
debug: Post AWL score: 5.83170454545454
debug: running body-text per-line regexp tests; score so far=5.83170454545454
debug: running uri tests; score so far=5.83170454545454
debug: running raw-body-text per-line regexp tests; score so 
far=5.83170454545454
debug: running full-text regexp tests; score so far=5.83170454545454
debug: is spam? score=5.832 required=5
debug: 
tests=AWL,DNS_FROM_RFC_ABUSE,DNS_FROM_RFC_POST,HELO_DYNAMIC_OOL,MSGID_FROM_MTA_ID,NO_REAL_NAME,RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL
debug: 
subtests=__AOL_FROM,__HAS_MSGID,__HAS_SUBJECT,__MSGID_OK_DIGITS,__MSGID_OK_HOST,__RCVD_IN_NJABL,__RCVD_IN_SORBS,__RFC_IGNORANT_ENVFROM,__SANE_MSGID
From [EMAIL PROTECTED]  Wed Sep  1 17:05:30 2004
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
Received: from localhost (localhost [127.0.0.1])
        by localhost (Postfix) with ESMTP id D8228ED40
        for <[EMAIL PROTECTED]>; Wed,  1 Sep 2004 17:05:29 -0400 (EDT)
Received: from server.domain.com ([127.0.0.1])
 by localhost (server.domain.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 23583-01 for <[EMAIL PROTECTED]>;
 Wed,  1 Sep 2004 17:05:28 -0400 (EDT)
Received: from aaa-nnnnnnnn.dyn.optonline.net (aaa-nnnnnnnn.dyn.optonline.net 
[XXX.XXX.XXX.XXX])
        by server.domain.com (Postfix) with SMTP id C7F97ECEE
        for <[EMAIL PROTECTED]>; Wed,  1 Sep 2004 17:04:51 -0400 (EDT)
To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
Subject:  XXXX
Message-Id: <[EMAIL PROTECTED]>
Date: Wed,  1 Sep 2004 17:04:51 -0400 (EDT)
X-Spam-Flag: YES
X-Spam-Checker-Version: SpamAssassin 3.0.0-rc2 (2004-08-15) on 
        server.domain.com
X-Spam-Report: 
        *  0.2 NO_REAL_NAME From: does not include a real name
        *  2.5 HELO_DYNAMIC_OOL Relay HELO'd using suspicious hostname 
(OptOnline)
        *  1.7 MSGID_FROM_MTA_ID Message-Id for external message added locally
        *  0.4 DNS_FROM_RFC_ABUSE RBL: Envelope sender in abuse.rfc-ignorant.org
        *  1.4 DNS_FROM_RFC_POST RBL: Envelope sender in 
postmaster.rfc-ignorant.org
        *  0.1 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP 
address
        *      [XXX.XXX.XXX.XXX listed in dnsbl.sorbs.net]
        *  1.7 RCVD_IN_NJABL_DUL RBL: NJABL: dialup sender did non-local SMTP
        *      [XXX.XXX.XXX.XXX listed in combined.njabl.org]
        * -2.1 AWL AWL: From: address is in the auto white-list
X-Spam-Status: Yes, score=5.8 required=5.0 tests=AWL,DNS_FROM_RFC_ABUSE,
        DNS_FROM_RFC_POST,HELO_DYNAMIC_OOL,MSGID_FROM_MTA_ID,NO_REAL_NAME,
        RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL autolearn=disabled 
        version=3.0.0-rc2
X-Spam-Level: *****

XXXX

# This is the right place to customize your installation of SpamAssassin.
#
# See 'perldoc Mail::SpamAssassin::Conf' for details of what can be
# tweaked.
#
# This file will be loaded before *all other* configuration files, including
# the system configuration.  As such, it's a good place to set things that
# will affect how those files are parsed, like which plugins are loaded
# etc.
#
###########################################################################

# RelayCountry - add metadata for Bayes learning, marking the countries
# a message was relayed through
#
# loadplugin Mail::SpamAssassin::Plugin::RelayCountry

# URIDNSBL - look up URLs found in the message against several DNS
# blocklists.
#
loadplugin Mail::SpamAssassin::Plugin::URIDNSBL

# Hashcash - perform hashcash verification.
#
loadplugin Mail::SpamAssassin::Plugin::Hashcash

# SPF - perform SPF verification.
#
loadplugin Mail::SpamAssassin::Plugin::SPF
skip_rbl_checks 0
rbl_timeout 8
ok_languages en
ok_locales en
use_bayes 0
bayes_auto_learn 0
report_safe 0
clear_report_template
report SPAM Content analysis details:   (_HITS_ points)
report _SUMMARY_

# FOR SPF
envelope_sender_header Return-Path
clear_trusted_networks
clear_internal_networks

Reply via email to