Rajesh,
SPF Definition:
"Sender Policy Framework (SPF)
SPF authenticates the envelope HELO and MAIL FROM identities by
comparing the sending mail server's IP address to the list of authorized
sending IP addresses published by the sender domain's owner in a
"v=spf1" DNS record. SPF has succeeded several older envelope sender
authentication protocols. Currently SPF is the only widely deployed
envelope authentication protocol. For more info about this see the
Statistics and Research pages.
Envelope sender authentication protocols like SPF are typically used
early during the SMTP transaction, before the bulk of the message (its
header and body) is transmitted. All of the following protocols require
that an entire message be received before it can be rejected, due to the
rules of the SMTP protocol. As a result, SPF continues to be an
essential front-line defense against sender address forgery when
deploying protection for the header fields and body. By rejecting
envelope forgeries early, not only network traffic can be saved but also
computing power for further protection measures, thus making the entire
process more efficient.
One of the anticipated features of a future version of SPF is a way for
domains to publish that they — or even just specific e-mail addresses of
theirs — always use some content authentication protocol (see below)
like DKIM, S/MIME, or PGP. This will allow receivers to automatically
discard unsigned messages from such domains or addresses."
--http://www.openspf.org/Related_Solutions
As an example of SPF checking I'll use your email header sent to the
qmailtoaster list that was sent to me as a list member, below:
<SPF Check>
Received: from unknown (HELO mail.qmailtoaster.com) (162.213.42.64)
by pet105.whitehorsetc.com with SMTP; 30 Aug 2016 12:59:21 -0000
Received-SPF: pass (pet105.whitehorsetc.com: SPF record at
_spf.qmailtoaster.com designates 162.213.42.64 as permitted sender)
</SPF Check>
Note especially these two lines:
1) Received: from unknown (HELO mail.qmailtoaster.com) (162.213.42.64)
and
2) pass (pet105.whitehorsetc.com: SPF record at _spf.qmailtoaster.com
designates 162.213.42.64 as permitted sender.
My original questions were "Are you saying that the spam sender is
spoofing the originating IP address?"
and
"Do you have an spf text record set up for domain_on_my_server.com?"
My first question was rhetorical. Your statement "but email is sent not
from within my server but from some other external server," indicates
the reason for my second question. An SPF record for "mycustomer.com"
SHOULD take care of this according to how SPF works. Do you have one (an
SPF text record) in the DNS settings for the spoofed domain
(mycustomer.com or domain_on_my_server.com).
Please let me know if I'm missing something. It must be clear to both of
us WHAT SPF is checking before we can communicate rationally about it,
and I'm not sure we're on the same page yet.
To find out if you have an SPF record for 'mycustomer.com' or
'domain_on_my_server.com' run the following command:
# dig txt mycustomer.com
There should be a line in the output that resembles this
mycustomer.com. 3600 IN TXT "v=spf1 mx
a:mail.mycustomer.com -all"
Eric
On 8/30/2016 6:57 AM, Rajesh M wrote:
eric
spf checks the envelope sender (reply to) and not the "mailfrom" email id
the spammer is sending an email with "mail from" as some user on my server
example c...@mycustomer.com to emplo...@mycustomer.com
but email is sent not from within my server but from some other external server.
the scammer however has the envelope-sender / reply to as his legitimate email
id and correctly configured. the qmailtoaster spf check is done not on the
mailfrom but on the reply-to and the email gets delivered safely to the inbox
of the employee.
now what happens is that the employee sees that the email is from the ceo and
immediately takes action which leads to a phishing scam.
i wish to block emails where the mailfrom domain is on my server but the scam
email is sent by a spammer from an external server posing as
c...@mycustomer.com ... in other words email spoofing.
thanks,
rajesh
----- Original Message -----
From: Eric [mailto:ebr...@whitehorsetc.com]
To: qmailtoaster-list@qmailtoaster.com
Sent: Sun, 28 Aug 2016 13:03:16 -0600
Subject:
Do you have an spf text record set up for domain_on_my_server.com?
SPF should check the 'a' and 'mx' record for the domain,
domain_on_my_server.com, against the sender IP address (the one that
actually connected to you server). Are you saying that the spam sender
is spoofing the originating IP address?
On 8/28/2016 7:14 AM, Rajesh M wrote:
hi
facing issue with email spoofing
example spammer sends an email with "mailfrom" as : user@domain_on_my_server.com
and the envelope sender is the spammer's email id which has spf records
correctly in place
and hence spf is not able to catch such spammers.
how do i handle this ?
thanks
rajesh
---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com
---------------------------------------------------------------------
To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com