[conspire] spf and relay

Ron admin at bclug.ca
Fri Mar 14 04:36:39 PDT 2025


Ivan Sergio Borgonovo wrote on 2025-03-13 04:41:

> What I do is I've a postfix server at home that collect all the 
> emails from my lan and relay via sender_dependent_relayhost_map and 
> smtp_sasl_password_maps to my [service I use to manage my web space 
> and email]. All PCs at home run a local postfix instance that relay 
> on my main server at home.

Is your "service ... manage web space and email" is a VPS you rent?


Seems like a much more simple method would be to have this:

relayhost = my_VPS

...unless I'm misunderstanding the setup?

In re-reading, I now suspect it's through a registrar, not a VPS (SASL 
was the clue).



> I was wondering since my MTA is in the chain of delivery and it is 
> listed in the "Received:" headers if I should ask that my now fixed 
> ip should be added to my spf record

If the relay host is a registrar, not your own VPS, you probably need to 
update the SPF.






Should you want to strip out headers revealing the originating IP 
address, since it's your home IP, try this in /etc/postfix/main.cf:

header_checks = regexp:/etc/postfix/header_checks.pcre

and in /etc/postfix/header_checks.pcre:

## https://www.postfix.org/header_checks.5.html
##
## Log  a  "strip:"  record  with  the  optional  text... (or log a
## generic text), delete the input line from the input, and inspect
## the next input line. See IGNORE for a silent alternative.
/your.isp.com/                        STRIP "Stripped ISP from header"




More information about the conspire mailing list