Am 17.01.2023 um 03:34 schrieb Scott Kitterman:

On January 17, 2023 2:25:34 AM UTC, raf<post...@raf.org>  wrote:
On Mon, Jan 16, 2023 at 08:01:10PM +0100, Maurizio Caloro<mauri...@caloro.ch>  
wrote:

Hello

Please one more thing about Opendmarc, if send any email to any where
i see in log SPF fail, domain.ch fail ?

Jan 16 19:43:39 nmail opendkim[16490]: B6090404C3: DKIM-Signature field
added (s=nmail, d=caloro.ch)
Jan 16 19:43:39 nmail opendmarc[16483]: B6090404C3: SPF(mailfrom): caloro.ch
fail
Jan 16 19:43:39 nmail opendmarc[16483]: B6090404C3: caloro.ch fail

if recieve any mail from any where, any thing pass
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: mailc-bb.linkedin.com
[A.B.C.D] not internal
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: not authenticated
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: message has signatures
from linkedin.com, mailc.linkedin.com
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: signature=muv88Rcz
domain=linkedin.com selector=d2048-201806-01 result="no signature error";
signature=IKaXoyzS domain=mailc.linkedin.com selector=proddkim1024
result="no signature error"
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: DKIM verification
successful
Jan 16 19:37:10 nmail opendkim[13804]: 10003404C3: s=d2048-201806-01
d=linkedin.com SSL
Jan 16 19:37:10 nmail opendmarc[15095]: 10003404C3 ignoring
Authentication-Results at 2 from nmail.caloro.ch
Jan 16 19:37:10 nmail opendmarc[15095]: 10003404C3: SPF(mailfrom):
bounce.linkedin.com pass
Jan 16 19:37:10 nmail opendmarc[15095]: 10003404C3: linkedin.com pass

--
on the header from any mail that i send will appair following
Authentication-Results-Original: caloro.ch, calm-ness.ch; spf=fail

# cat opendmarc.conf
AuthservID                      caloro.ch, calm-ness.ch
AuthservIDWithJobID             false
AutoRestart                     false
AutoRestartRate                 10/1h
Background                      true
DNSTimeout                      5
HistoryFile                     /var/spool/postfix/opendmarc/opendmarc.dat
*IgnoreAuthenticatedClients      true*
IgnoreHosts                     /etc/opendmarc/ignore.hosts
PidFile                         /var/run/opendmarc/opendmarc.pid
RejectFailures                  false
RequiredHeaders                 true
PublicSuffixList /etc/opendmarc/effective_tld_names.dat
Socketinet:8892@127.0.0.1
SoftwareHeader                  true
SPFSelfValidate                 true
SPFIgnoreResults                false
Syslog                          true
SyslogFacility                  mail
# TrustedAuthservIDs            nmail.caloro.ch, nmail.calm-ness.ch
TrustedAuthservIDs              caloro.ch, calm-ness.ch
UMask                           077
UserID                          opendmarc:opendmarc

if checking online dmarc, dkim, spf from domain appair anything correct!
please why me email will fail?

thanks for any hint
Mauri
I could be wrong, but I suspect that the problem is
that you haven't configured OpenDMARC to not check
locally originating mail. According to the first
Received: header, the mail is coming from 37.120.190.188
(which is mentioned in multiple ways in the SPF record),
but your mail server at that IP address shouldn't be
performing this check on outgoing mail.

Perhaps you need to add this to your /etc/opendmarc.conf:

  IgnoreAuthenticatedClients true

Unfortunately, the code doing the SPF check doesn't
explain why it failed. Some do. For example, the
  package on debian would
probably show the IP address that caused the failure.
Maybe it's 127.0.0.1 (or the IP address of an
authenticated submission client).
The internal SPF implementation in OpenDMARC is not a full implementation of 
the protocol.  In general, you are likely to be better off having something SPF 
specific check SPF and then have OpenDMARC consume that result for it's DMARC 
processing.  If you are inclined towards Perl, then postfix-policyd-spf-perl is 
a good choice.  SPF Engine supports either a milter (pyspf-milter) or policy 
server (postfix-policyd-spf-python) interface with Postfix, depending on which 
you prefer, if you're up for a Python based solution.

Scott K
this was bevor always in opendmarc.conf present
        IgnoreAuthenticatedClients true

# opendmarc-check caloro.ch
DMARC record for caloro.ch:
        Sample percentage: 100
        DKIM alignment: strict
        SPF alignment: relaxed
        Domain policy: none
        Subdomain policy: unspecified
        Aggregate report URIs:
mailto:etczb...@ag.dmarcian-eu.com
        Failure report URIs:
                (none)

but please why "fail" appair, i think this will post from opendmarc

Jan 17 19:17:50 nmail opendkim[801]: 6A2F040132: DKIM-Signature field added (s=nmail, d=caloro.ch) Jan 17 19:17:50 nmail opendmarc[766]: 6A2F040132: SPF(mailfrom): caloro.ch fail
Jan 17 19:17:50 nmail opendmarc[766]: 6A2F040132: caloro.ch fail


# dig caloro.ch txt
; <<>> DiG 9.11.5-P4-5.1+deb10u8-Debian <<>> caloro.ch txt
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62132
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 13, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 34ed9f18546262197eb3532863c6ee9dc447edcb667b812b (good)
;; QUESTION SECTION:
;caloro.ch.                     IN      TXT

;; ANSWER SECTION:
*caloro.ch. *            776     IN      TXT     "*v=spf1 a mx ip4:37.120.190.188/32 a:nmail.caloro.ch -all*"

;; AUTHORITY SECTION:
.                       68162   IN      NS m.root-servers.net.
.                       68162   IN      NS k.root-servers.net.
.                       68162   IN      NS g.root-servers.net.
.                       68162   IN      NS j.root-servers.net.
.                       68162   IN      NS b.root-servers.net.
.                       68162   IN      NS a.root-servers.net.
.                       68162   IN      NS l.root-servers.net.
.                       68162   IN      NS i.root-servers.net.
.                       68162   IN      NS f.root-servers.net.
.                       68162   IN      NS e.root-servers.net.
.                       68162   IN      NS d.root-servers.net.
.                       68162   IN      NS h.root-servers.net.
.                       68162   IN      NS      c.root-servers.net


how i can this trace so that i can find the right solution?

thanks
Mauri

Reply via email to