[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Microsoft O365 labels nanog potential fraud?
- Subject: Microsoft O365 labels nanog potential fraud?
- From: gtaylor at tnetconsulting.net (Grant Taylor)
- Date: Wed, 29 Mar 2017 09:25:44 -0600
- In-reply-to: <CAP-guGXTzeAv3YYgv03gzyrRrrNzf2m1eNhA4EG16=x9T=133A@mail.gmail.com>
- References: <[email protected]> <[email protected]> <CAP-guGXTzeAv3YYgv03gzyrRrrNzf2m1eNhA4EG16=x9T=133A@mail.gmail.com>
On 03/29/2017 09:12 AM, William Herrin wrote:
> Both SPF and DKIM are meant to be checked against the domain in the
> envelope sender (SMTP protocol-level return address) which the NANOG list
> sets to nanog-bounces at nanog.org. Checking against the message header "from"
> address is an incorrect implementation which will break essentially all
> mailing lists.
That may be what the original intent was.
Every SPF implementation I've seen has checked the SMTP envelope FROM
address /and/ the RFC 822 From: header address.
Granted, that does not mean that it's the correct behavior.
--
Grant. . . .
unix || die
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3717 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20170329/4492fdd3/attachment.bin>