Thanks for the tip! I didn't know how to debug that stuff. Here's what
happens with a spammer faking one of my own domains:

>spamd[21654]: spf: query for 
>isabelle.2...@nro.ca/41.203.191.125/!41.203.191.125!: result: permerror, 
>comment: , text: Included domain 'srs.bis.na.blackberry.com' has no applicable 
>sender policy

Looks like Mail::SPF is broken on my system. srs.bis.na.blackberry.com has
legit spf txt records. What's weird is that the spfquery command gives
correct results.

I started reading SPF.pm and saw that I could hack it to avoid using
Mail::SPF and instead use (what seems to be) the less preferred
Mail::SPF::Query

Installing Mail::SPF::Query had to be forced because most of its tests fail
but it looks like it is returning correct SPF evaluations. 

It's recognizing mail sent via blackberry trusted relays, and giving me fail
results on spammers as it should.

If I get the time I'll look into the guts of Mail::SPF and try to figure out
where it's going wrong.

Reply via email to