And furthermore...

On 2 Jun 2017, at 19:05, spamassas...@nro.ca wrote:

I started reading SPF.pm and saw that I could hack it to avoid using
Mail::SPF and instead use (what seems to be) the less preferred
Mail::SPF::Query

This is a wrong approach. SA will use whichever is installed but prefers Mail::SPF because it is not broken on modern Perl and is maintained, whereas Mail::SPF hasn't been right since Perl 5.10.1 and never will be, as it has not been touched since 2006.

Installing Mail::SPF::Query had to be forced because most of its tests fail
but it looks like it is returning correct SPF evaluations.

Forcing installation of abandoned Perl modules that fail most of their tests is not a wise practice.

It's recognizing mail sent via blackberry trusted relays, and giving me fail
results on spammers as it should.

If I get the time I'll look into the guts of Mail::SPF and try to figure out
where it's going wrong.

Mail::SPF v2.009 is documented as having exactly one change:

--- 2.009 (2013-07-21 03:30)

  Mail::SPF:
* Default to querying only TXT type RRs (query_rr_types = Mail::SPF::Server-> query_rr_type_txt). Experience has shown that querying SPF type RRs is
    impractical.

If you update to 2.009, your local issue may vanish even without removing your SPF record. However, anyone else still checking SPF records instead of or in preference to TXT records will still break on your record because it includes the Blackberry record which no longer exists (SOA implies that it may have been removed last week.)

Reply via email to