I'm trying to figure out how to stop SPF_FAIL on messages generated on an internal rfc1918 network and routed through a trusted host.

Host A: generates mail, origin IP 10.x.x.x

Host B: relays mail for Host A, to Host C

Host C: receives mail, marks SPF_FAIL

Host B is both in the valid SPF record, and in trusted networks.

Example:

    host A: 10.0.0.1 generates e-mail, routes via HostB

    Host B: has outside IP 64.13.143.16

Host C: sees message from Host B, sees Host B is valid SPF sender, sees Host B is trusted Host

_APPARENTLY_ skips to the next Received header because B is trusted.



Received: from arran.svcolo.com (arran.sc.svcolo.com [64.13.143.17]) by kininvie.sv.svcolo.com (8.14.1/8.14.1) with ESMTP id m5K2o3it016795 for <[EMAIL PROTECTED]>; Thu, 19 Jun 2008 19:50:03 -0700 (PDT) (envelope-from [EMAIL PROTECTED])

Received: from apc0.sv.svcolo.com (apc0.sv [10.0.0.1]) by arran.svcolo.com (8.13.8/8.13.4) with SMTP id m5K2o1sL002910 for <[EMAIL PROTECTED] >; Thu, 19 Jun 2008 19:50:02 -0700 (PDT) (envelope-from [EMAIL PROTECTED] )

X-Spam-Status: Yes, score=4.157 tagged_above=-10 required=4 tests=[AWL=0.656, NORMAL_HTTP_TO_IP=0.001, SPF_FAIL=3.5

Obviously, putting 10/8 into the published SPF record makes no sense at all, nor does adding 10/8 to the trusted_networks.

So... how can I say "I trust Host B so much that I don't want to go any farther for SPF checks?"

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other randomness


Reply via email to