On Wed, 7 Oct 2015, Benny Pedersen wrote:
David B Funk skrev den 2015-10-06 22:33:
So that explicit forward breaks the SPF chain, thus triggering that SPF
fail.
The valid DKIM signature indicates that the message is legit.
its a brain dead forwarder that use the From: header so, if it used the
envelope sender it would not break spf, forwarding hosts must use there own
domain as envelope sender, if thay think we just use From: header it breaks
spf
Why do you say "forwarding hosts must use there own domain as envelope sender"?
Unless forwarders correctly implement SRS they should NOT change the envelope
sender.
Otherwise in the case of a transport failure the DSN will not make it back to
the originator.
--
Dave Funk University of Iowa
<dbfunk (at) engineering.uiowa.edu> College of Engineering
319/335-5751 FAX: 319/384-0549 1256 Seamans Center
Sys_admin/Postmaster/cell_admin Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{