lists composed of spf servers
2009-05-07 by Adam Katz
A growing number of spammers are using anti-spam tools like SPF and
DKIM (and even DNSWL) these days. Therefore, specifying global rules
for behavior in response to passing SPF is dangerous.
I'd love the ability to specify specific actions for known
SPF-protected domains (e.g. whitelist_from_spf in SpamAssassin).
In other words, I want to do this:
########
list "bypass spfs" spf { \
salesforce.com vbulletin.com paypal.com gmail.com \
}
list "bypass dkims" dkim { \
ebay.com \
}
racl whitelist list "bypass spfs"
racl whitelist list "bypass dkims"
########
(This would allow the "broken mta" list to shrink considerably, even
if it's just Google.) These actions are triggered by spf=pass and
dkim=pass respectively.
Another option to specify what response type would enable other
things. Example follows:
########
list "bypass spfs" spf pass { \
salesforce.com vbulletin.com paypal.com gmail.com \
}
list "bypass dkims" dkim pass { \
ebay.com \
}
list "broken spfs" spf soft-fail { \
example.com \
}
racl whitelist list "bypass spfs"
racl whitelist list "bypass dkims"
racl whitelist list "broken spfs"
racl greylist spf soft-fail delay 30m autowhite 2d
########
So if trusted domain example.com is known to violate its own SPF
record (there are lots of these!), this skips that before hitting the
clause that would delay it.