On Wed, 14 Oct 2015, Dave Wreski wrote:

Hi,

On 10/14/2015 06:08 PM, Dianne Skoll wrote:
On Wed, 14 Oct 2015 17:51:23 -0400
Alex <mysqlstud...@gmail.com> wrote:

I'd like to make sure incoming mail that appears to be "From:" one of
our internal users has indeed gone through one of the systems
specified in the SPF record, resulting in an SPF_PASS.

Can't be done.  SPF looks at the envelope sender (what end-users know
as the Return-Path:) and not at all at the From: header.

Yes, I realize SPF is only concerned with the envelope-sender. I was thinking it would be possible to somehow correlate the SPF_PASS with a rule that analyzes the From: header and use that to compare?

Thanks,
Alex

The problem with that approach is that the phish spammer can create a
valid SPF record for a domain they control, put that in the envelope
from, and your domain in the header "From:"

Thus you'll have a message that passes SPF for the env-from but still
has a deceptive header "From:"

DKIM is the way to go as Dianne says, then you know you can trust
the contents of the header "From:" (assuming you've checked to make sure
that the DKIM sig came from your system).

--
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to