On Mittwoch, 8. Februar 2006 22:09 Theo Van Dinter wrote:
> Your problem is that if the dial-up person sends mail to you and
> destined for you, your server will then do a SPF check, and it'll
> fail since the mail is coming from the dial-up IP and not your
> server.

I look more thoroughly now, and from the same customer I received an 
e-mail mid december and beginning of january, one with SPF_FAIL and one 
without:

X-Spam-Status: No, hits=3.303 tagged_above=-999 required=5 
tests=AWL=-2.755, DOMAIN_4U2=1.429, HTML_MESSAGE=0.001, 
MSGID_FROM_MTA_ID=0.927, RCVD_IN_NJABL_DUL=1.713, 
RCVD_IN_SORBS_DUL=1.988

X-Spam-Status: No, hits=4.145 tagged_above=-999 required=5 
tests=AWL=-0.671, BAYES_00=-2.599, DOMAIN_4U2=1.994, HTML_40_50=0.496, 
HTML_MESSAGE=0.001, MSGID_FROM_MTA_ID=1.393, RCVD_IN_NJABL_DUL=1.946, 
RELAY_AT=0.01, SPF_FAIL=1.142, X_PRIORITY_HIGH=0.433

But generally you seem right: Mails are marked SPF_FAIL, when they end 
on my server. With some exceptions, obviously. We're never gonna build 
a spaceship Enterprise, at least not a working one.

mfg zmi
-- 
// Michael Monnerie, Ing.BSc  ---   it-management Michael Monnerie
// http://zmi.at           Tel: 0660/4156531          Linux 2.6.11
// PGP Key:   "lynx -source http://zmi.at/zmi2.asc | gpg --import"
// Fingerprint: EB93 ED8A 1DCD BB6C F952  F7F4 3911 B933 7054 5879
// Keyserver: www.keyserver.net                 Key-ID: 0x70545879

Attachment: pgpgaigib4oUe.pgp
Description: PGP signature

Reply via email to