On 2024-08-16 at 08:03:05 UTC-0400 (Fri, 16 Aug 2024 08:03:05 -0400)
Alex <mysqlstud...@gmail.com>
is rumored to have said:

It says that SPF failed, but SPF_PASS was hit, presumably from our
connection to Microsoft, not their connection to the spammer client:

Correct. You can only check SPF on the first SMTP transaction guided by an MX record and recorded by a trusted server.

Received-SPF: Fail (protection.outlook.com: domain of toppersrvs.com does
not
 designate 35.230.39.135 as permitted sender) receiver=
protection.outlook.com;
 client-ip=35.230.39.135; helo=[127.0.0.1];

Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=52.100.167.207;
helo=nam12-mw2-obe.outbound.protection.outlook.com; envelope-from=
administra...@toppersrvs.com; receiver=buckknives.com

ARC also failed:
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=fail (sender ip is
 35.230.39.135) smtp.rcpttodomain=buckknives.com smtp.mailfrom=
toppersrvs.com;
dmarc=none action=none header.from=toppersrvs.com; dkim=none (message not
 signed); arc=none (0)

Should I also somehow be checking these SPF failures?

You really can't with SA, because it is not generally safe to trust the Received headers written by systems you don't control or have some sort of explicit relaying arrangement with. Because the initial submission of messages CANNOT be subjected to SPF tests, you don't want to test transactions that are not following an MX record.



--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo@toad.social and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire

Reply via email to