At last the beginning of a dialogue on this.
It will do the check irrespective, but naturally spfquery won't repond with a "fail" for a domain that doesn't have an SPF record in place. Only a matching "-all" (hard fail) will cause Exim to drop the message.
As far as your example code is concerned, what's the difference between
~all and
?all? Does it treat them both the same?
I don't see why any properly configured mailing list would be affected, as it should have the "MAIL FROM:" correctly rewritten.
That information came from the author of SPF quite some time ago, at the conference I mentioned.
Have you checked to see what majordomo, as used by DirectAdmin, does?
Have you checked other mailing lists to see if they're correctly configured? I just checked four mail lists to which I'm currently subscribed, and which use the author's email address in the
From field. None of them have
MAIL FROM configured. Am I missing something? Or would these all fail if the original sender had spf configured with
-all?
Some forwards no doubt could be blocked, but in the two years or so I've been dropping messages failing an SPF check, nobody has complained! The one problem I do notice is that some companies (and government departments in particular) haven't listed all the IPs they send messages from in their SPF record and yet have set the policy as "-all". Naturally this means some of their legitimate e-mails get rejected (and rightly so!)
rightly so from your point of view as the admin, but what happens when you tell your client they didn't get an important piece of email because the sender got it wrong? Or do you couch it in such a way that they don't know you have a choice of accepting the email or not?
Admittantly the SPF check only rejects a small percentage of e-mail compared to what Spamhaus DNSBL checks (and others) catch, but it's certainly better than nothing.
Is it? The author of SPF has said to never block email based on SPF, but only use it as part of a scoring something. It seems that he considers using it to block is not better than nothing, but rather worse than nothing. Has he changed his mind? If so, show me where.
If he hasn't changed his mind, then checking it in SpamAssassin is where it belongs.
You could easily restrict the SPF check to certain domains, but I think it would tend to defeat the purpose and make it not worth while for the amount of SPAM it would trap.
The only way I'd ever consider using it would be for banks. Right now the SpamBlocker-Powered eixm.conf file i distributel blocks PayPal phishing attempts, but not from other banks, because I can't be sure what mailservers they may use. But if I could get a list of banks that publish correctly configured SPF I might want to check it only for those banks. Again, to eliminate phishing attempts, which is what SPF was designed to do.
If there was really a need to implement SRS I would consider it, but doing this on your own MTA only fixes one side of the equation. It wouldn't make any difference to the SPF check added in Exim on your own server, because that would rely on the "MAIL FROM:" having been rewritten at the server that forwarded the e-mail in the first place.
Which as I've shown, isn't happening.
Nevertheless, wouldn't it be hypocritical to check fix only one side (receiving) without the other (sending)?
What else am I missing?
Jeff