Package: postfix-policyd-spf-python Version: 1.3.1-1 Severity: normal Dear Maintainer,
* What led up to the situation? Setting up "Domain_Whitelist" inside /etc/postfix-policyd-spf-python/policyd-spf.conf. * What exactly did you do (or not do) that was effective (or ineffective)? Setting up a domain name in "Domain_Whitelist" Parameter, enabling debug and restarting postfix did not whitelist SPF checkst for mails from these domain. root@froxlor ~ # cat /etc/postfix-policyd-spf-python/policyd-spf.conf debugLevel = 4 defaultSeedOnly = 1 HELO_reject = SPF_Not_Pass Mail_From_reject = Fail PermError_reject = False TempError_Defer = False skip_addresses = 127.0.0.0/8,::ffff:127.0.0.0/104,::1 Domain_Whitelist = getinternet.de * What was the outcome of this action? Aug 11 17:00:48 froxlor policyd-spf[19847]: Starting Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "helo_name=some.domain.tld" Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "sender=f...@getinternet.de" Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "recipient=b...@lmv-hartmannsdorf.de" Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "client_address=1.2.3.4" Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "client_name=another.domain.tld" Aug 11 17:00:56 froxlor policyd-spf[19847]: Read line: "" Aug 11 17:00:56 froxlor policyd-spf[19847]: Found the end of entry Aug 11 17:00:56 froxlor policyd-spf[19847]: Config: {'Void_Limit': 2, 'skip_addresses': '127.0.0.0/8,::ffff:127.0.0.0/104,::1', 'Domain_Whitelist': 'getinternet.de', 'HELO_reject': 'SPF_Not_Pass', 'Lookup_Time': 20, 'defaultSeedOnly': 1, 'Header_Type': 'SPF', 'Mail_From_reject': 'Fail', 'TempError_Defer': 'False', 'PermError_reject': 'False', 'debugLevel': 4, 'Domain_Whitelist_PTR': 'getinternet.de'} Aug 11 17:00:56 froxlor policyd-spf[19847]: Cached data for this instance: [] Aug 11 17:00:56 froxlor policyd-spf[19847]: PTR Domain Whitelist enabled. Aug 11 17:00:56 froxlor policyd-spf[19847]: spfcheck: pyspf result: "['None', '', 'helo']" Aug 11 17:00:56 froxlor policyd-spf[19847]: None; identity=helo; client-ip=1.2.3.4; helo=some.domain.tld; envelope-from=f...@getinternet.de; receiver=b...@lmv-hartmannsdorf.de Aug 11 17:00:56 froxlor policyd-spf[19847]: spfcheck: pyspf result: "['Fail', 'SPF fail - not authorized', 'mailfrom']" Aug 11 17:00:56 froxlor policyd-spf[19847]: Fail; identity=mailfrom; client-ip=1.2.3.4; helo=some.domain.tld; envelope-from=f...@getinternet.de; receiver=b...@lmv-hartmannsdorf.de Aug 11 17:00:56 froxlor policyd-spf[19847]: Action: reject: Text: Message rejected due to: SPF fail - not authorized. Please see http://www.openspf.net/Why?s=mfrom;id=f...@getinternet.de;ip=1.2.3.4;r=b...@lmv-hartmannsdorf.de * What outcome did you expect instead? Result should not be "fail" or "reject". -- System Information: Debian Release: 8.9 APT prefers oldstable APT policy: (990, 'oldstable'), (500, 'oldstable-updates') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.12.5-sus (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)