On Mittwoch, 8. Februar 2006 22:09 Theo Van Dinter wrote: > Your problem is that if the dial-up person sends mail to you and > destined for you, your server will then do a SPF check, and it'll > fail since the mail is coming from the dial-up IP and not your > server.
I look more thoroughly now, and from the same customer I received an e-mail mid december and beginning of january, one with SPF_FAIL and one without: X-Spam-Status: No, hits=3.303 tagged_above=-999 required=5 tests=AWL=-2.755, DOMAIN_4U2=1.429, HTML_MESSAGE=0.001, MSGID_FROM_MTA_ID=0.927, RCVD_IN_NJABL_DUL=1.713, RCVD_IN_SORBS_DUL=1.988 X-Spam-Status: No, hits=4.145 tagged_above=-999 required=5 tests=AWL=-0.671, BAYES_00=-2.599, DOMAIN_4U2=1.994, HTML_40_50=0.496, HTML_MESSAGE=0.001, MSGID_FROM_MTA_ID=1.393, RCVD_IN_NJABL_DUL=1.946, RELAY_AT=0.01, SPF_FAIL=1.142, X_PRIORITY_HIGH=0.433 But generally you seem right: Mails are marked SPF_FAIL, when they end on my server. With some exceptions, obviously. We're never gonna build a spaceship Enterprise, at least not a working one. mfg zmi -- // Michael Monnerie, Ing.BSc --- it-management Michael Monnerie // http://zmi.at Tel: 0660/4156531 Linux 2.6.11 // PGP Key: "lynx -source http://zmi.at/zmi2.asc | gpg --import" // Fingerprint: EB93 ED8A 1DCD BB6C F952 F7F4 3911 B933 7054 5879 // Keyserver: www.keyserver.net Key-ID: 0x70545879
pgpgaigib4oUe.pgp
Description: PGP signature
