[conspire] spf and relay
Ron
admin at bclug.ca
Fri Mar 14 04:36:39 PDT 2025
Ivan Sergio Borgonovo wrote on 2025-03-13 04:41:
> What I do is I've a postfix server at home that collect all the
> emails from my lan and relay via sender_dependent_relayhost_map and
> smtp_sasl_password_maps to my [service I use to manage my web space
> and email]. All PCs at home run a local postfix instance that relay
> on my main server at home.
Is your "service ... manage web space and email" is a VPS you rent?
Seems like a much more simple method would be to have this:
relayhost = my_VPS
...unless I'm misunderstanding the setup?
In re-reading, I now suspect it's through a registrar, not a VPS (SASL
was the clue).
> I was wondering since my MTA is in the chain of delivery and it is
> listed in the "Received:" headers if I should ask that my now fixed
> ip should be added to my spf record
If the relay host is a registrar, not your own VPS, you probably need to
update the SPF.
Should you want to strip out headers revealing the originating IP
address, since it's your home IP, try this in /etc/postfix/main.cf:
header_checks = regexp:/etc/postfix/header_checks.pcre
and in /etc/postfix/header_checks.pcre:
## https://www.postfix.org/header_checks.5.html
##
## Log a "strip:" record with the optional text... (or log a
## generic text), delete the input line from the input, and inspect
## the next input line. See IGNORE for a silent alternative.
/your.isp.com/ STRIP "Stripped ISP from header"
More information about the conspire
mailing list