On Tue, 9 Oct 2018 20:04:53 +0000
David Jones wrote:

> On 10/9/18 2:21 PM, RW wrote:
> > 
> > I've recently noticed that newsletters from a small wordpress site
> > are hitting USER_IN_DEF_SPF_WL.
> > 
> > The headers are of the form:
> > 
> >    Return-Path: <me=example....@b.wordpress.com>
> >    ...
> >    To: m...@example.com
> >    From: Some Amateur Website <donotre...@wordpress.com>
> > 
> > and the use of the bounce handling subdomain  b.wordpress.com is
> > causing a match on:
> > 
> >    def_whitelist_auth *@*.wordpress.com
> > 
> > Theses emails are legitimate, and I've not had much wordpress spam,
> > but they are essentially freemail bulk mail.
> >   
> 
> I am not understanding the question or issue.  If they 1) don't send 
> spam, 2) only send opt-in email with a valid opt-out option and 3)
> they quickly handle any abuse reports then they should be considered
> a trusted sender.  Since these are system-generated emails and not
> real human mailboxes that can be compromised to send spam, then that 
> def_whitelist_auth entry is safe.

They aren't system generated, they come from individual end-users. For
all we know, users who run XP boxes and don't know what a firewall is.

It may well be that wordpress has the whole thing nailed down with
enforced opt-ins, CAPTCHAs etc. Without actually knowing that, it
seems a legitimate cause for concern.

Reply via email to