In part because headers added by servers not trusted by local SA may be considered advisory but not trusted for hard local judgements. IE a remote MTA server can put anything in the headers that they want, only trust what you find from your local trusted MTA

On Wed, 29 Jan 2025, Tom Williams via users wrote:

Hi!  Casual observer here, but I have a question about the headers.

On 1/29/25 12:23 AM, Niamh Holding wrote:

(snip)

Authentication-Results: spf=softfail (sender IP is 2a01:111:f403:48::209)
  smtp.mailfrom=euroland.fr; dkim=pass (signature was verified)
  header.d=paypal.com;dmarc=pass action=none header.from=paypal.com;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
  euroland.fr discourages use of 2a01:111:f403:48::209 as permitted sender)

(snip)

Why wouldn't the SPF softfail messages not trigger some kind of rule? Especially the "discourages use of" message.      Also, I noticed Spamassassin 3.4.6 is being used.  Would Spamassassin 4.0 have done a better job at processing these headers?

Thanks!

Tom



--
Dave Funk                               University of Iowa
<dbfunk (at) engineering.uiowa.edu>     College of Engineering
319/335-5751   FAX: 319/384-0549        1256 Seamans Center, 103 S Capitol St.
Sys_admin/Postmaster/cell_admin         Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to