Hi,
The sample SPF informational message from doc/experimental-spec.txt is not
completely correct. Usually $sender_address_domain applies, but when
$sender_address is null, SPF ressorts to $sender_helo_name for verification.
If the latter is used and test fails, we get to reply something like:
"1.2.3.4 is not allowed to send mail from "
Attached patch adds the necessary checks so that message ends with
$sender_helo_name when this happens.
While I was at it, I also improved the message a bit with a link to the
dynamical http://www.openspf.org/Why page with appropiate parameters.
--
Robert Millan
My spam trap is honeypot@aybabtu.com. Note: this address is only intended
for spam harvesters. Writing to it will get you added to my black list.
The sample SPF informational message from doc/experimental-spec.txt is not
completely correct. Usually $sender_address_domain applies, but when
$sender_address is null, SPF ressorts to $sender_helo_name for verification.
If the latter is used and test fails, we get to reply something like:
"1.2.3.4 is not allowed to send mail from "
Attached patch adds the necessary checks so that message ends with
$sender_helo_name when this happens.
While I was at it, I also improved the message a bit with a link to the
dynamical http://www.openspf.org/Why page with appropiate parameters.
--
Robert Millan
My spam trap is honeypot@aybabtu.com. Note: this address is only intended
for spam harvesters. Writing to it will get you added to my black list.