> -----Original Message-----
> From: Daryl C. W. O'Shea [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, July 25, 2006 3:13 PM
> To: Spamassassin Users List
> Subject: Re: SPF breaks email forwarding
> 
> 
> 
> You find me a large scale installation that is actually checking, and 
> rejecting on, SPF records before DATA and isn't frequently rejecting 
> mail their users want and I'll buy you lunch.

You find me a large scale installation that is rejecting SPAM and isn't
frequently rejecting mail their users want and I'll buy dinner.

Lets face it: SMTP is broken, but the fixes are just compromises between
allowing spam, viruses, phishing and email.
Any changes to SMTP will break legitimate email.

You wonder what happens if you enforce all the RFC's on email?
How many large installations use 'localhost.localdomain' as the FQDN for
their outbound helo?
(send an email to [EMAIL PROTECTED] and see the headers!)

How many large installations doesn't use ANY fqdn for RDNS, and the PTR
and A records don't match?
How many large installations don't have abuse@ or postmaster@ records?

http://www.rfc-ignorant.org/tools/lookup.php?domain=hotmail.com
http://www.rfc-ignorant.org/tools/lookup.php?domain=gmail.com
http://www.rfc-ignorant.org/tools/lookup.php?domain=yahoo.com
(with a bad whois record, can't they lose their yahoo.com domain :-)?

Even if you enforce existing RFC's, you will drop email 'users want'.

For 12 years, people have been arguing about how to fix it.
If someone wants to advertise spf records, and wants to use ?all, or
~all if they are timid, more power to them.

host -t txt microsoft.com
microsoft.com descriptive text "v=spf1 mx include:_spf-a.microsoft.com
include:_spf-b.microsoft.com include:_spf-c.microsoft.com ~all"

host -t txt hotmail.com
hotmail.com descriptive text "v=spf1 include:spf-a.hotmail.com
include:spf-b.hotmail.com include:spf-c.hotmail.com
include:spf-d.hotmail.com ~all"

host -t txt _spf.google.com
_spf.google.com descriptive text "v=spf1 ip4:216.239.56.0/23
ip4:64.233.160.0/19 ip4:66.249.80.0/20 ip4:72.14.192.0/18 ?all"

If a bank decides that forwarding email send to clients is a bad idea,
and wants to publish -all records, that's fine also.

If an ISP wants to trigger additional tests for email that softfails, or
block at smtp session email that hardfails, then all they are doing is
taking the suggestions of the sending domain.

 host -t txt chase.com
chase.com descriptive text "v=spf1 ip4:170.148.48.0/24
ip4:159.53.36.0/24 ip4:159.53.46.0/24 ip4:159.53.110.0/24 -all"

Reply via email to