Spam detection software, running on the system "quack.kfu.com", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
The administrator of that system for details.

Content preview:  On Jan 4, 2012, at 4:45 PM, Noel Butler wrote: > On Wed, 
2012-01-04
   at 12:51 -0800, nsayer wrote: >> >> I'm running a brand new installation
  of SA 3.3.2 with the Milter on FreeBSD >> 8.2. >> >> Everything is going 
smoothly,
   for the most part (there seems to be one >> particular spammer who's evading
   SA, but whatever), but there's one little >> thing that bugs me slightly.
   >> >> I use authenticated SMTP to send e-mail. The SPF records for my domain
   >> (kfu.com) basically say that mail must come from my mail server and 
nowhere
   >> else. However, my expectation is that my mail server should make an >>
   exception if (and only if) the mail is sent with SMTP AUTH. >> >> However,
   such mail winds up getting SPF_FAIL in the SA report. >> > > Ummm, I know
   I'm still in holiday mode (at least for another 4 days wahhhhh) but, you're
   not making sense, > If they are using smtp auth, then the server is what
  gets the mail and sends it, so, so long as that server is in your SPF RR 
entry,
   then the receiving server should only care about that. [...] 

Content analysis details:   (9.1 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 2.4 DATE_IN_FUTURE_03_06   Date: is 3 to 6 hours after Received: date
 0.9 SPF_FAIL               SPF: sender does not match SPF record (fail)
[SPF failed: Please see 
http://www.openspf.org/Why?s=mfrom;id=nsayer%40kfu.com;ip=166.250.45.174;r=quack.kfu.com]
 1.3 RCVD_IN_RP_RNBL        RBL: Relay in RNBL,
                            https://senderscore.org/blacklistlookup/
                           [166.250.45.174 listed in bl.score.senderscore.com]
 3.6 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                            [166.250.45.174 listed in zen.spamhaus.org]
 0.0 HTML_MESSAGE           BODY: HTML included in message
-0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from 
author's
                            domain
 0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily 
valid
-0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
 0.4 RDNS_DYNAMIC           Delivered to internal network by host with
                            dynamic-looking rDNS
 0.7 KHOP_DYNAMIC           Relay looks like a dynamic address
 0.0 HELO_MISC_IP           Looking for more Dynamic IP Relays

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.

--- Begin Message ---
On Jan 4, 2012, at 4:45 PM, Noel Butler wrote:

> On Wed, 2012-01-04 at 12:51 -0800, nsayer wrote:
>> 
>> I'm running a brand new installation of SA 3.3.2 with the Milter on FreeBSD
>> 8.2.
>> 
>> Everything is going smoothly, for the most part (there seems to be one
>> particular spammer who's evading SA, but whatever), but there's one little
>> thing that bugs me slightly.
>> 
>> I use authenticated SMTP to send e-mail. The SPF records for my domain
>> (kfu.com) basically say that mail must come from my mail server and nowhere
>> else. However, my expectation is that my mail server should make an
>> exception if (and only if) the mail is sent with SMTP AUTH.
>> 
>> However, such mail winds up getting SPF_FAIL in the SA report.
>> 
> 
> Ummm, I know I'm still in holiday mode (at least for another 4 days wahhhhh) 
> but, you're not making sense, 
> If they are using smtp auth, then the server is what gets the mail and sends 
> it, so, so long as that server is in your SPF  RR entry, then the receiving 
> server should only care about that.

If I am sending mail to another person on quack, then SpamAssassin tags the 
e-mail with SPF_FAIL.

As I said, it's a minor concern, but it's a concern nonetheless.

> 
> ~$ host -t spf kfu.com
> kfu.com has no SPF record
> 
> It is  not the problem, but fix the above, as SPF in TXT is deprecated and 
> has been for years.

I must have missed the memo.

> 
> ~$ host -t txt kfu.com
> kfu.com descriptive text "v=spf1 mx -all"
> 
> As 'quack' is in the above, and so long as you are not using a smart host, 
> there is no reason, when sending via quack, that it should fail.

I agree, when you're talking about forwarding mail from quack to elsewhere. But 
that's not the issue here.

> 
> 
>> Here's a received header example:
>> 
>> 
>> Received: from {my laptop} ({hostname of NAT gateway it happens to be
>> behind} [x.x.x.x])
>>      (authenticated bits=0)
>>      by quack.kfu.com (8.14.5/8.14.5) with ESMTP id q04K12lj052202
>>      (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO)
>>      for <nsa...@kfu.com>; Wed, 4 Jan 2012 12:01:05 -0800 (PST)
>>      (envelope-from nsa...@kfu.com)
>> 
>> I assert that Mail::SPF should regard Received: headers that have the
> 
> It should only ever look at the connecting server, nothing else.

As an admin of my mail server, I'd appreciate the ability to declare that if 
SMTP AUTH is used that for all intents and purposes SPF doesn't matter.

> 
> Further.. get rid of sid-milter, what an abomination, I dont think even 
> micro$lop use sid anymore, last time I had to look into it.
> This could be your problem.

No, the behavior is the same without it, but the Authorization-Result: header 
is helpful. And it does support SPF and SMTP auth as well as sid.

> 
> Since you're using sendmail, try  smf-spf.

I'll look for it in the ports tree.

Attachment: smime.p7s
Description: S/MIME cryptographic signature


--- End Message ---

Reply via email to