[conspire] spf and relay
Michael Paoli
michael.paoli at berkeley.edu
Fri Mar 14 17:29:50 PDT 2025
Well, it's not so much "last mile", as last [E]SMTP TCP connection,
notably/generally
from some client (presumably) under authority or working on behalf of
authorized sending client,
to some otherwise unrelated server entity on The Internet - unrelated
other than by domain of recipient(s).
So, it's that connection, and relevant bits in the [E]SMTP protocol,
notably envelop data,
FROM (not to be confused with header From:) and HELO[/EHLO], and
domain(s) thereof,
and SPF data (and further related DNS data), and domain(s) thereof,
and client IP address
(as seen by server on the TCP connection). The rest isn't of direct
relevance to SPF, but that doesn't mean that and related data can't
also be used, e.g. by SMTP server in (gu)estimating probability of
mail (or attempt thereof) being spam.
On Fri, Mar 14, 2025 at 3:03 PM Ivan Sergio Borgonovo
<mail at webthatworks.it> wrote:
>
> To summarize... just the "last mile" is checked.
> If the server delivering at the boundary of the recipient match the spf
> record that's fine and enough.
>
> Did I get it right?
>
> If I was planning to use my home MTA to directly deliver my outgoing
> email I'd have to add my home IP... but I don't want to take the burden
> and responsibility to do so.
>
> thanks
>
> --
> Ivan Sergio Borgonovo
> https://www.webthatworks.it https://www.borgonovo.net
>
>
>
> _______________________________________________
> conspire mailing list
> conspire at linuxmafia.com
> http://linuxmafia.com/mailman/listinfo/conspire
More information about the conspire
mailing list