On 03/25/2016 09:17 AM, Michael Shulman wrote:

> 
> The SPF and DKIM passes make it seem like this spam is actually being
> sent from my server, not just from somewhere else with a spoofed
> sender.  Is there some way that my mailman may be misconfigured that
> could be allowing the spammer to spam through it in this way?  Or has
> my server been hacked?


Neither.

The mail was sent to "mylist-owner <mylist-ow...@my.server.com>". It was
delivered to Mailman for mylist-owner. Mailman then resent it to the
owner address <listmas...@my.server.com> and the outgoing MTA DKIM
signed it.

This has nothing to do with the fact that the original mail spoofed
<mylist-ow...@my.server.com> as the From: or the envelope sender of the
original, except that depending on your DKIM signing rules you may have
not DKIM signed it if it was From: a different domain.

It passes SPF because it came to google from your server and it passes
DKIM because you signed it on the way out. It would have been exactly
the same if it had been sent to an alias that forwards directly to your
google address. I.e. had it been sent to <listmas...@my.server.com>
instead of <mylist-ow...@my.server.com>, it would have been forwarded
and signed in exactly the same way without having gone through Mailman
at all.

-- 
Mark Sapiro <m...@msapiro.net>        The highway is for gamblers,
San Francisco Bay Area, California    better use your sense - B. Dylan
------------------------------------------------------
Mailman-Users mailing list Mailman-Users@python.org
https://mail.python.org/mailman/listinfo/mailman-users
Mailman FAQ: http://wiki.list.org/x/AgA3
Security Policy: http://wiki.list.org/x/QIA9
Searchable Archives: http://www.mail-archive.com/mailman-users%40python.org/
Unsubscribe: 
https://mail.python.org/mailman/options/mailman-users/archive%40jab.org

Reply via email to