On Wed, 2009-02-11 at 19:29 +0000, Ned Slider wrote:
> Martin Gregorie wrote:
>
> > This backscatter is precisely what SPF records are meant to alleviate.
> > You should have a valid SPF message set up for every registered domain
> > handled by your mail servers.
> > 
> 
> How so?
> 
> The backscatter he is receiving is most likely DSN messages sent from 
> mail servers in response to his (forged) sender address.
>
Yes, of course. My understanding is that SPF lets the receiving MTA
determine whether the sender's domain was forged. If it is there's no
point in sending a bounce message for undeliverable mail. So, SPF-aware
MTAs will silently discard undeliverable mail which has a forged sender.

I was getting flooded with backscatter until I set up an SPF record for
my domain, at which  point it stopped coming and I haven't been bothered
since. Was that coincidence or SPF doing its stuff? I don't much believe
in coincidence except for random & rare events.

> SPF will only help if other people's mail servers deploy and bounce
> mail on failed SPF, but as I asserted in an earlier post to this
> thread, how much faith do you place in a mail admin deploying SPF
> _AND_ bouncing messages on SPF failure when they can't even address
> the issue that their servers are responsible for the backscatter
> problem by accepting mail for non-existent addresses and then sending
> DSNs to a forged address.
> 
AFAIK a lot of current MTA versions will use SPF checks out of the box.
This means that even a numpty-administered MTA will do SPF checks before
sending rejections. 

That certainly seems to be the case for Postfix: its manual says its
default is to silently drop backscatter for unknown local users and I
haven't seen any of that or any for valid users for a very long time.


Martin


Reply via email to