> Matus UHLAR - fantomas <[EMAIL PROTECTED]> writes:
> > Maybe the SA people decided not to do that. Maybe only those
> > should provide SPF records who can verify their own customers -
> > why should you use SPF otherwise?

On 25.03.08 18:25, Enrico Scholz wrote:
> Sorry, I don't understand the logic behind this...

I mean, is SPF usefull for a domain, when some hosts (even not trusted) can
send you mail from that domain, without authentication?

> >> What would be the sideeffects of adding '+ip4:192.168.0.0/16'
> >> to the SPF record?
> >
> > mailservers on other networks could have FP's when receiving
> > spam with your domain from their private networks...
> 
> An SPF_PASS is pretty worthless (there are rumors that more
> SPF_PASS are generated by spammers than by legitimate mail ;) ),
> but SPF_FAIL can give important scores to mark spam as such one.

I should have said FN's. Hosts would get SPF_PASS even when they should get
SPF_FAIL. So, any server in the world using internal addresses in 192.168/16
could be spammed by hosts on the same network, using your domain and the spams
would get SPF_PASS. And you would get bounces.

> For now, I added the whole IANA blackhole ranges to my SPF
> record... The openspf documentation uses this in an example too
> so it should be ok.

So anyone with private range can now spam using your domain on its network,
without SPF to fire? Why?

-- 
Matus UHLAR - fantomas, [EMAIL PROTECTED] ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
BSE = Mad Cow Desease ... BSA = Mad Software Producents Desease

Reply via email to