http://bugzilla.spamassassin.org/show_bug.cgi?id=3615





------- Additional Comments From [EMAIL PROTECTED]  2004-07-19 08:24 -------
Subject: Re:  SPF_(PASS|FAIL|SOFTFAIL) rule doesn't hit when it should

On Monday 19 July 2004 12:35, you wrote:

> I don't think this is required. With SPF you're only able to check reliably
> if the last untrusted relay before your own trusted relays is legitimately
> sending the message. All information that was added by untrusted relays
> should be discarded anyway (since it can be faked).

This needs some fine tuning. Of course, information added by trusted relays 
should not be discarded, which solves the problem of relays modifying the 
envelope sender. On the other hand, if you know that your trusted relays 
don't modify the envelope sender, there is no reason to distrust that either 
(as is the case now in the SPF.pm plugin).

How about an additional parameter like 'trust_envelope_sender' which will 
indicate that all trusted relays will pass on the envelope sender intact? 
Alternatively, one might exclude the relays which *do* modify the envelope 
sender from the 'trusted_network' range. Strictly speaking a mailinglist 
server is not a relay, since it will resend messages instead of forwarding 
them (to be SPF compliant). This will work too and remove the need for 
checking if there are trusted relays in the chain. Assuming that the 
maillinglist server will do it's own SPF checking and spamfiltering, this 
would remove the requirement for having MTA's add an 'envelope from' line.

Best regards,
Arjen




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to