On Wed, 7 Oct 2015, Benny Pedersen wrote:

David B Funk skrev den 2015-10-06 22:33:

So that explicit forward breaks the SPF chain, thus triggering that SPF fail.
The valid DKIM signature indicates that the message is legit.

its a brain dead forwarder that use the From: header so, if it used the envelope sender it would not break spf, forwarding hosts must use there own domain as envelope sender, if thay think we just use From: header it breaks spf

Why do you say "forwarding hosts must use there own domain as envelope sender"?

Unless forwarders correctly implement SRS they should NOT change the envelope 
sender.
Otherwise in the case of a transport failure the DSN will not make it back to the originator.

--
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to