virtualmin
This is an old revision of the document!
Check SPF records
Step 1
Install the SPF Checker for postfix
apt-get install postfix-policyd-spf-python
Step 2
edit your /etc/postfix/master.cf
policyd-spf unix - n n - 0 spawn
user=policyd-spf argv=/usr/bin/policyd-spf
Step 3
edit your /etc/postfix/main.cf
policyd-spf_time_limit = 3600
smtpd_recipient_restrictions =
...
reject_unauth_destination,
check_policy_service unix:private/policyd-spf,
...
Make sure, you are putting the check_policy_service unix after the reject_unauth_destination line, to not become an open relay to the world.
Step 4
Finally, do not forget to reload / restart your postfix
/etc/init.d/postfix restart
Step 5
If you find the following in received Email Headers, your SPF is working properly
Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=209.85.216.181; helo=mail-qt0-f181.google.com; envelope-from=yourmailaddress@gmail.com; receiver=info@miyw.de
Step 6 (optional)
instead of blocking wrong SPF Senders(default behaviour), you can just let python-spf tag them for spamassasin
edit /etc/postfix-policyd-spf-python/policyd-spf.conf and set
HELO_reject False
Mail_From_reject False
this will accept Emails with wrong SPF but SA will mark them as spam afterwards.
virtualmin.1741273487.txt.gz · Last modified: 2025/03/06 12:04 by protocol
