http://bugzilla.spamassassin.org/show_bug.cgi?id=3615
------- Additional Comments From [EMAIL PROTECTED] 2004-07-19 08:24 ------- Subject: Re: SPF_(PASS|FAIL|SOFTFAIL) rule doesn't hit when it should On Monday 19 July 2004 12:35, you wrote: > I don't think this is required. With SPF you're only able to check reliably > if the last untrusted relay before your own trusted relays is legitimately > sending the message. All information that was added by untrusted relays > should be discarded anyway (since it can be faked). This needs some fine tuning. Of course, information added by trusted relays should not be discarded, which solves the problem of relays modifying the envelope sender. On the other hand, if you know that your trusted relays don't modify the envelope sender, there is no reason to distrust that either (as is the case now in the SPF.pm plugin). How about an additional parameter like 'trust_envelope_sender' which will indicate that all trusted relays will pass on the envelope sender intact? Alternatively, one might exclude the relays which *do* modify the envelope sender from the 'trusted_network' range. Strictly speaking a mailinglist server is not a relay, since it will resend messages instead of forwarding them (to be SPF compliant). This will work too and remove the need for checking if there are trusted relays in the chain. Assuming that the maillinglist server will do it's own SPF checking and spamfiltering, this would remove the requirement for having MTA's add an 'envelope from' line. Best regards, Arjen ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
