SPF (RFC 7208) explicitly allows recipient to block e-mail based on SPF policy in the case of the hard fail. In practice, blocking mail based on hard fail policy is rare, but not unusual.
In short, there are 2 recommendations for you situation: 1. Consider implementing SRS (sender rewrite schema) for forwarders. 2. Never use -all for domains with real mail traffic, -all may be used to prevent domain from being used in mail, e.g. to protect A-records. For mail domains use ~all or even ?all, especially if DMARC is implemented. More detailed explanations are here: https://hackernoon.com/myths-and-legends-of-spf-d17919a9e817 It also explains why SPF, DKIM and DMARC are all required and can not replace each over. 07.12.2018 4:52, Autumn Tyr-Salvia пишет: > Hello Mail Operators, > > My job is to help large organizations figure out their email > infrastructure and authenticate everything legitimate with the goal of > going to DMARC p=reject. A customer recently reported an issue to me > about receiver behavior that I hadn't heard before, so I wanted to > reach out to get a feel for whether this is more widespread than I > realized or if this particular receiver is behaving strangely. > > It's a bit of a long story why things are set up in the way they are > for this particular situation, and in the interests of not writing a > novel here, I'm going to cut to the chase: > > Customer is sending messages that pass DKIM with first party signing, > so they pass DMARC. Unfortunately, SPF fails, and the SPF record uses > a -all, so it's a hard fail. There is an SPF entry at the sending > subdomain, and the SMTP MAIL FROM domain is aligned, but the SPF > record does not include the sending IPs. There are complicated reasons > why they can't just do that easily. > > DMARC requires only one aligned method of authentication to pass, > either SPF or DKIM. Since these messages pass with aligned DKIM, they > pass DMARC. In theory, all should be good, right? > > We have received reports that a particular organization they are > sending to is seeing the SPF hard fail and choosing not to further > evaluate DKIM, and is rejecting these messages on SPF hard fail alone. > I don't have the bounce message handy, but it said something like "SPF > hard fail: your organization's security policy does not permit this > message." The organization they're sending to is a small nonprofit, > but the MX record shows that they are using GoDaddy's hosted email. > > When one of the email admins involved had the recipient ask their > email vendor about it, they were explicitly told that if senders use > an SPF -all, if messages fail SPF, they will not accept them even if > they pass DKIM and DMARC. As a consequence, I had them try setting the > domain to use a soft fail ~all and test, and initial reports say that > delivery was successful. > > I have a lot of experience with SPF, though admittedly, I don't have > as much experience with SPF failures (I see a lot of cases of no SPF, > or passing but not aligned SPF, but comparatively few actual > failures), but I haven't heard this distinction between hard and soft > fail modes before. > > How common is it to have receiver systems set so that SPF hard fail > will reject messages even if they otherwise pass DKIM and DMARC, but > to accept them on the DKIM pass if the domain uses SPF soft fail? > > Given this situation, the customer is now considering whether they > want to move every domain they own to SPF soft fail instead, so I > wanted to ask around and get a feel for how common this is before they > change all of their many domains. > > > Thanks, > > Autumn Tyr-Salvia > atyrsalvia@agari > tyrsalvia@gmail > > > _______________________________________________ > mailop mailing list > mailop@mailop.org > https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop -- Vladimir Dubrovin @Mail.Ru
_______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop