> > On 23.02.10 16:17, Bowie Bailey wrote:
> >> SPF enforcement at the MTA is useless for the reasons you specified. 
> >> The only exception is if you have a strict SPF policy for your own
> >> domain, you can use it to reject spam pretending to be from your users.

> Matus UHLAR - fantomas wrote:
> > And what is this, if not enforcing SPF at MTA level?

On 24.02.10 09:03, Bowie Bailey wrote:
> This is selective enforcement of a domain (or list of domains) that are
> known to have working SPF records.

so, it's enabling/disabling of SPF usage for some domains.

> > Also, this can be solved at MTA level without SPF enforcement. Afaik some
> > servers are already rejecting mail from "their users" without proper
> > authentification.

> True, but then you need to keep track of which mail servers are allowed
> to send mail for each domain.  Which, coincidentally, is exactly what
> SPF does.

that's why I'd keep it on SPF, probably with listing of domains that
should/shoult not be checked. It's much easier to do it with SPF than
maintaining list of domains/servers.

And you can even tell which domains (or their users) have broken setup and
optionally notify them.

For some domains/senders (e.g. freemails), we could argument that it's the
freemail provider who wishes it this way and the sender is breaking the
domain policy...

> (This is assuming a more complex configuration than just rejecting
> everything that does not originate locally.)

otoh, it does much more for you.

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
"One World. One Web. One Program." - Microsoft promotional advertisement
"Ein Volk, ein Reich, ein Fuhrer!" - Adolf Hitler

Reply via email to