You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@spamassassin.apache.org by Apache Wiki <wi...@apache.org> on 2012/04/27 20:33:41 UTC
[Spamassassin Wiki] Update of "Rules/SPF_HELO_SOFTFAIL" by AndrewDaviel
Dear Wiki user,
You have subscribed to a wiki page or wiki category on "Spamassassin Wiki" for change notification.
The "Rules/SPF_HELO_SOFTFAIL" page has been changed by AndrewDaviel:
http://wiki.apache.org/spamassassin/Rules/SPF_HELO_SOFTFAIL?action=diff&rev1=4&rev2=5
## page was copied from Rules/SPF_PASS
## page was copied from Rules/SPF_NEUTRAL
#language en
- == SpamAssassin Rule: SPF_SOFTFAIL ==
+ == SpamAssassin Rule: SPF_HELO_SOFTFAIL ==
- ''Standard description:'' SPF: sender does not match SPF record (softfail)
+ ''Standard description:'' SPF: HELO does not match SPF record (softfail)
=== Explanation ===
SPF ([[http://www.openspf.org|Sender Policy Framework]])
- is an open standard specifying a technical method to prevent sender address forgery. The sender's domain is matched against a list of allowed mail relays for that domain. This states, for example, that mail from someone@example.com should have come via mail.example.com and not mail.badguys.info.
+ is an open standard specifying a technical method to prevent sender address forgery. The domain in the HELO command is matched against a list of allowed mail relays for that domain. This states, for example, that mail from someone@example.com should have come via mail.example.com and not mail.badguys.info.
- This often breaks where users have forwarded their email to another domain, but the forwarding mechanism is not SPF-aware. Such a user would see SPF_FAIL tags on some of their incoming mail.
+ In a normal mail client, the HELO command uses the internet name of the computer sending the mail, so that someone might use their computer 1-2-3-dyn.bigisp.com to send mail through bigisp.com's mail relay, which has an SPF record indicating that that's allowed.
==== Soft Fail ====