I never mentioned mailing lists. Here's the another version of my original
post so we're clear:

Latest Mail::SPF (2.9 circa 2013) builds but fails its test suite on my new
system. New linux, perl, perl modules, etc.

After forcing it to install, I later found that spamassassing is getting
T_SPF_PERMERROR returned a lot, not just for spoofs of my own domains, but
plenty of other domains.

Oddly enough, the spfquery tool it provides works fine.

I have since switched to the much older Mail::SPF::Query. Its build tests
fail as well. (looks like they test a domain that is no longer registered).

I am having good success using Mail::SPF::Query with spamassassin
The spfquery tool also appears to work.

This bug report from 2014 reflects my experience.
Bug #99890 for Mail-SPF: Mail-SPF-v2.9.0 fails Build test
https://rt.cpan.org/Public/Bug/Display.html?id=99890

My guess for the cause of the failure is other newer perl modules that have
been maintained beyond Mail::SPF, or maybe the dns resolver that SA passes
to the spf function is somehow different than the resolver that the spfquery
tool is using.

On Mon, 05 Jun 2017 23:31:58 +0200, you wrote:

>spamassas...@nro.ca skrev den 2017-06-05 16:33:
>
>> I would guess it is some kind of issue with newer dependencies or dns
>> resolution. If I wait long enough someone else will figure it out.
>
>if it just fails on forwarded emails eq on maillists, add forwarding ip 
>to trusted_networks solves spf fails
>
>but it also disable whitelist in dnswl for that forwarding ip
>
>not all maillists have spf, and spf does generic not being breaked on 
>maillists since envelope sender changes
>
>what part fails then ?

Reply via email to