Package: postfix-policyd-spf-python
Version: 1.3.1-1
Severity: normal

Dear Maintainer,


   * What led up to the situation?
Setting up "Domain_Whitelist" inside 
/etc/postfix-policyd-spf-python/policyd-spf.conf.


   * What exactly did you do (or not do) that was effective (or
     ineffective)?
Setting up a domain name in "Domain_Whitelist" Parameter, enabling debug and 
restarting postfix did not whitelist SPF checkst for mails from these domain.

root@froxlor ~ # cat /etc/postfix-policyd-spf-python/policyd-spf.conf
debugLevel = 4
defaultSeedOnly = 1
HELO_reject = SPF_Not_Pass
Mail_From_reject = Fail
PermError_reject = False
TempError_Defer = False
skip_addresses = 127.0.0.0/8,::ffff:127.0.0.0/104,::1
Domain_Whitelist = getinternet.de


   * What was the outcome of this action?
Aug 11 17:00:48 froxlor policyd-spf[19847]: Starting
Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: 
"helo_name=some.domain.tld"
Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: 
"sender=f...@getinternet.de"
Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: 
"recipient=b...@lmv-hartmannsdorf.de"
Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: "client_address=1.2.3.4"
Aug 11 17:00:52 froxlor policyd-spf[19847]: Read line: 
"client_name=another.domain.tld"
Aug 11 17:00:56 froxlor policyd-spf[19847]: Read line: ""
Aug 11 17:00:56 froxlor policyd-spf[19847]: Found the end of entry
Aug 11 17:00:56 froxlor policyd-spf[19847]: Config: {'Void_Limit': 2, 
'skip_addresses': '127.0.0.0/8,::ffff:127.0.0.0/104,::1', 'Domain_Whitelist': 
'getinternet.de', 'HELO_reject': 'SPF_Not_Pass', 'Lookup_Time': 20, 
'defaultSeedOnly': 1, 'Header_Type': 'SPF', 'Mail_From_reject': 'Fail', 
'TempError_Defer': 'False', 'PermError_reject': 'False', 'debugLevel': 4, 
'Domain_Whitelist_PTR': 'getinternet.de'}
Aug 11 17:00:56 froxlor policyd-spf[19847]: Cached data for this instance: []
Aug 11 17:00:56 froxlor policyd-spf[19847]: PTR Domain Whitelist enabled.
Aug 11 17:00:56 froxlor policyd-spf[19847]: spfcheck: pyspf result: "['None', 
'', 'helo']"
Aug 11 17:00:56 froxlor policyd-spf[19847]: None; identity=helo; 
client-ip=1.2.3.4; helo=some.domain.tld; envelope-from=f...@getinternet.de; 
receiver=b...@lmv-hartmannsdorf.de
Aug 11 17:00:56 froxlor policyd-spf[19847]: spfcheck: pyspf result: "['Fail', 
'SPF fail - not authorized', 'mailfrom']"
Aug 11 17:00:56 froxlor policyd-spf[19847]: Fail; identity=mailfrom; 
client-ip=1.2.3.4; helo=some.domain.tld; envelope-from=f...@getinternet.de; 
receiver=b...@lmv-hartmannsdorf.de
Aug 11 17:00:56 froxlor policyd-spf[19847]: Action: reject: Text: Message 
rejected due to: SPF fail - not authorized. Please see 
http://www.openspf.net/Why?s=mfrom;id=f...@getinternet.de;ip=1.2.3.4;r=b...@lmv-hartmannsdorf.de


   * What outcome did you expect instead?
Result should not be "fail" or "reject".


-- System Information:
Debian Release: 8.9
  APT prefers oldstable
  APT policy: (990, 'oldstable'), (500, 'oldstable-updates')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.12.5-sus (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to