Search the Community
Showing results for tags 'spam spoofing'.
Found 1 result
Just wondering, is anyone using DMARC or SFP settings on the Nameservers to protect against spoofing. Never noticed it before but on gmail they seem to check against sfp settings. Before: Received-SPF: none (google.com: firstname.lastname@example.org does not designate permitted sender hosts) client-ip=xx.xxx.xxx.xxx; Authentication-Results: mx.google.com; spf=neutral (google.com: email@example.com does not designate permitted sender hosts) firstname.lastname@example.org Received: from www.xxxxxxxxxxxx.ie (xxxxxxx.xxxxxxserver.net [xx.xxx.xxx.xxx]) After adding a TXT record to the Nameserver: TXT "v=spf1 mx -all" Authentication-Results: mx.google.com; spf=pass (google.com: domain of email@example.com designates xx.xxx.xxx.xxx as permitted sender) firstname.lastname@example.orgReceived: from www.xxxxxxxxxxxx.ie (xxxxxxxxxx.xxxxxxxxserver.net [xx.xxx.xxx.xxx]) by xxxxxxxxxx.xxxxxxxxserver.net (Postfix) with ESMTPA id fsdasdsdafsfdxxsdfadsf My Questions: 1. Did anyone implement this on all the domains running on a froxlor server? 2. If Yes, what record did they use? 3. Is there anything to watch out for? IE. The sender domain is not the one specified in the Postfix-Configuration. Does this cause problems? Thank you for any feedback. Regards, rolo2912