On 8/27/20 6:07 AM, Victor Ivanov wrote:
I have been quietly following this discussion and I've seen SRS being
mentioned a number of times.
Welcome to an active part in the conversation. :-)
Now, I know what SRS _does_ (perhaps not fully?) to prevent unintended
rejection by a receiving MTA due to SPF policy and I know it's highly
recommended if not mandatory for any sensible MTA set-up (allegedly).
I don't think that SRS qualifies as recommended, much less mandatory.
More specifically, I think some of the email industry discourages it.
I know that Google wants people to not use SRS and instead would prefer
that people forward things without using SRS. I think that Google wants
to see the original SMTP envelope sender and make judgement calls on
that, even if doing so would violate the purported sending domain's SPF
records.
Note: SRS means that the domain that is used in the re-written sender
domain becomes associated with the content. So if you are forwarding
and re-writing bad content (virus, spam, or malware) your domain becomes
associated with said bad content.
Aside: One of the most important things when forwarding email is to
*ONLY* forward believed -> known to be clean and good email. Do *NOT*
forward spam, virus, malware, or otherwise questionable email.
I've heard / read about many people talking down / bad about SRS. But,
I personally have used SRS for 10-15 years and have not knowingly had
any ill side effects from doing so. I do conditionally apply SRS to
outgoing messages from domains that my server is not responsible for (MX
for inbound email).
However, I'm less aware of the actual use cases where it is absolutely
necessary to prevent above issues with SPF. Is SRS only relevant for
MTAs that do any sort of forwarding/open relay?
In short, "yes" and "correct".
You only /need/ (for however much value you give "need") SRS when you
are sending an email that would otherwise violate the SMTP envelope from
domain's SPF record. So you /might/ be able to conditionally apply SRS
to any outgoing email where there is an SPF policy that you would be
violating.
This is most likely going to happen when you are forwarding email. As
in someone has a .forward file.
I think that an open relay is a bad thing. Despite the fact that it
would benefit from things like SRS for the above mentioned reasons, I
think an open relay should be avoided. As such, I don't give it much
more thought.
Oddly enough, I find some of the explanations I came across (including
Wikipedia) fairly atrocious compared to SPF, DKIM, and DMARC which
are perfectly explained and their use-cases are very clear. Though
frankly, these three are fairly self explanatory themselves for anyone
with technical background.
I think there are those in the email industry that have an adverse
reaction to SPF in general and view SRS as a nasty hack (which might be
fair) that is only needed in response to SPF. They seem to really
dislike SPF and hate SRS.
I have been running my own MTA for just under a decade without SRS
(but with the rest of the above) and never had issues with delivery
- be that local or remote. However, I have explicitly disabled open
relay and do not make use of any forwarding maps.
That sounds reasonable. It also sounds like you have little to no need
for SRS.
I have a few friends that I forward email for. As such, I have need for
SRS.
It makes me wonder - am I missing something and have I just been lucky?
I don't think you're missing anything. Perhaps you have been lucky in
that your user base doesn't need forwarding. But that is perfectly fine
and perfectly legitimate use case.
--
Grant. . . .
unix || die