https://datatracker.ietf.org/doc/html/rfc7208#section-5.2
See the table at the bottom of the section regarding recursive check_host() evaluation. In this case, the recursive check_host() function returned "none" as a result from the include mechanism, and therefore according to the table, the parent check_host() function returns permerror as a result. So your customer is correct. -Mark Alley On Tue, Jun 6, 2023, 2:42 AM Benoit Panizzon via mailop <mailop@mailop.org> wrote: > Hi List > > One more technical question after some discussion with one of our > customers. > > Sender has SPF entry: > > "v=spf1 ip4:10.1.2.0/25 include:_spf.example.com -all" > > _spf.example.com either has no txt entry or just does not exist. > > So from my point of view, the SPF entry is still valid as it has at > least one valid element which designates an ip range which wending is > permitted. > > My customer claims an invalid include: renders the whole entry invalid > causing some service provider to classify such emails as spam. > > Mit freundlichen Grüssen > > -Benoît Panizzon- > -- > I m p r o W a r e A G - Leiter Commerce Kunden > ______________________________________________________ > > Zurlindenstrasse 29 Tel +41 61 826 93 00 > CH-4133 Pratteln Fax +41 61 826 93 01 > Schweiz Web http://www.imp.ch > ______________________________________________________ > _______________________________________________ > mailop mailing list > mailop@mailop.org > https://list.mailop.org/listinfo/mailop >
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop