Hi Indunil,

On 2016-05-30 Mon 08:47 AM |, Indunil Jayasooriya wrote:
> 
> Waiting your INPUTS.
> 

There is an SPF help mailing list, see http://www.OpenSPF.Org/Forums

Most of your questions can be answered from http://www.OpenSPF.Org/
*) FAQ
*) Best Practices
*) Record Syntax
*) testing tools

See also: http://www.zytrax.com/books/dns/ch9/spf.html?pf=yes






*NOTE*: When a domain publishes an SPF FAIL policy,
SPF breaks plain message forwarding.
(MX backup, MTA forwarding, ~/.forward, procmail/sieve forwarding).

https://en.wikipedia.org/wiki/Sender_Policy_Framework#FAIL_and_forwarding

http://www.openspf.org/Best_Practices/Checking_at_border_MTAs
'... only the initial ("border") MTA can check SPF status of a message.
Otherwise the internal MTA would see the incoming connection coming from
the border MTA.'


http://wiki.junkemailfilter.com/index.php/Email_Server_Setup_Tips#SPF_Records
http://david.woodhou.se/why-not-spf.html

http://wiki.junkemailfilter.com/index.php/Bounced_Email#SPF_is_hopelessly_broken_and_needs_to_die.21
http://wiki.junkemailfilter.com/index.php/SPF_-_Sender_Policy_Framework_-_is_broken_and_must_Die


http://www.onlamp.com/pub/a/bsd/2004/10/28/openbsd_3_6.html?page=3
Bob Beck:
"What's my conclusion? SPF and caller ID does 2 things,
which I would do if I were writing spam software:
  1. Encourages spammers to publish SPF records (and they have).
     The biggest SPF adopters I see are spammers.
  2. Encourages spammers not to spam from SPF-publishing addresses.

(And don't forget, this is what AOL and MSN *really* care about.)"


2004: http://www.theregister.co.uk/2004/09/03/email_authentication_spam/
"34% more spam is passing SPF checks than legitimate email because
spammers are actively registering their SPF records.
.... useful in curtailing spoofing and phishing attacks"


Cheers,
-- 
Craig Skinner | http://linkd.in/yGqkv7

Reply via email to