On 5/3/19 9:47 AM, RW wrote:
> On Fri, 3 May 2019 06:55:40 -0700 (MST)
> user321 wrote:
> 
>> Any reason why SA is checking for SPF against envelope from not the
>> header from?
> 

See the SPF link on this page:

https://blog.returnpath.com/how-to-explain-dmarc-in-plain-english/

> Because that's how SPF works.
> 
>> I am rejecting the SPF_FAIL e-mails on Postfix (-all only), but still
>> spammers can forge the header from field.
>> Can I change SPF plugin to work with header from? If yes how?
>> What are the pros and cons of that?
> 
> Generally you don't want to enforcing a modified standard that no one
> else knows about.
> 
> DMARC solves the problem by requiring that for a DMARC pass from SPF
> the envelope address has to be aligned with the from header address.
> 

FYI,

If opendmarc is setup in your MTA with local SA rules...

DMARC_PASS = SPF_PASS and From: domain aligns with envelope-domain
  _OR_  DKIM_VALID_AU (DKIM_SIGNED and aligns with the From: domain)

I am rejecting DMARC failures of incoming domains with p=reject within 
opendmarc then have these rules in SA:

(change the rule below to match your header in opendmarc.conf)

header    DMARC_PASS Authentication-Results =~ /smtp\.ena\.net; dmarc=pass/
describe  DMARC_PASS DMARC check passed
score     DMARC_PASS 0.001

header    DMARC_FAIL Authentication-Results =~ /smtp\.ena\.net; dmarc=fail/
describe  DMARC_FAIL DMARC check failed
score     DMARC_FAIL 0.001

header    DMARC_NONE Authentication-Results =~ /smtp\.ena\.net; dmarc=none/
describe  DMARC_NONE DMARC check neutral
score     DMARC_NONE 0.001

-- 
David Jones

Reply via email to