Sophos XG 17.5 - SPF Check not working

I installed Sophos XG 17.5 on a Sophos XG in HA Active/Passive Cluster.

Yesterday and today we received several E-Mails from to our internal domain

SPF-Records are set for

The E-Mail was sent from an external adress that doesn't match the SPF-Record.

All these mails were accepted without restrictions or filtered out as beeing probable Spam.


The Policy is configured accordingly and SPF Check is activated in the Policy.

It looks like SPF isn't checked at all.


I already opend a ticket with our Distribution and waiting for response.

Anyone here experiencing the same?

  • Can you show us the mail header of this email?

    Maybe they only spoof the FROM? 

  • In reply to LuCar Toni:

    This is the header (anonymized) of an example Mail that got through:

    Received: from ( by
     SBSPZ2011.domain.local ( with Microsoft SMTP Server (TLS)
     id 14.3.382.0; Thu, 6 Dec 2018 11:25:35 +0100
    Received: from ([]:51434 helo=localhost)    by with esmtps (TLSv1.2:AECDH-AES256-SHA:256)    (Exim 4.91)
        (envelope-from <>)    id 1gUqqF-0001Vp-Hs    for; Thu, 06 Dec 2018 11:25:11 +0100
    Received: by localhost (Postfix, from userid 33)    id F2BE6D5CF7; Thu,  6 Dec
     2018 11:25:10 +0100 (CET)
    To: <>
    Subject: Test Fakemail
    From: Administrator <>
    X-Priority: 3 (Normal)
    Importance: Normal
    Reply-To: <>
    Content-Type: text/plain; charset="utf-8"
    Message-ID: <20181206102510.F2BE6D5CF7@localhost>
    Date: Thu, 6 Dec 2018 11:25:10 +0100
    X-Sophos-IBS: success
    X-CTCH-PVer: 0000001
    X-CTCH-Spam: Unknown
    X-CTCH-VOD: Unknown
    X-CTCH-Flags: 0
    X-CTCH-RefID: str=0001.0A0C0207.5C08F907.00BE,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0
    X-CTCH-Score: 0.000
    X-CTCH-ScoreCust: 0.000
    X-Sophos-Firewall: smtpd v1.0
    MIME-Version: 1.0
    X-MS-Exchange-Organization-AuthSource: SBSPZ2011.domain.local
    X-MS-Exchange-Organization-AuthAs: Anonymous


    The same mail that came through on this domain was catched by Office 365 in SPF Check.

  • In reply to Bjoern Ebner:

    In my Tests during Beta, SPF was working. Unfortunatedly, anonymized Mailheaders do not help in this case... Nobody can proof how the SPF Record looks like...

    In UTM's world softfail was ignored. Maybe your customer is using softfail as well instead of hardfail (~ instead of -).

    Additionally, you should provide Logfiles to your Partner (/log/smtpd_main.log) and name him a Timestamp where this mail was sent. This will help for further troubleshooting (cause here we cannot due to lack of informations).


    Edit: Just found your Support Case in our system. It's not configured to be softfail on this Domain. As seen, my colleague is allready helping you. I'll let him do his work :-)

  • In reply to HuberChristian:

    Great. :)

    I'm waiting for his response.

    It's kind of strange that it doesn't work.

    Maybe I do misunderstand the configuration completely or something is not working as it should be.

    Just wanted to see if there are others were SPF does or doesn't work. :)


    SPF Checking seems to work fine if any external address is used as sender.

    It doesn't semm to work when as sender an internal domain is used for which a smtp policy is present.

  • In reply to Bjoern Ebner:

    Maybe you have configured any exception for this on a Domain Level, which is skipping SPF ?

  • In reply to HuberChristian:

    Previously there was an exception but to skip SPF.

    Currently there is no exception for this domain.

    I could reproduce the same behaviour on Sophos UTM 9.510.

  • In reply to Bjoern Ebner:

    Meanwhile I tested with XG17.5 and as fakemailer as you did.

    First mail was dropped because uses inproper RDNS (localhost instead of something valid.)

    Switched RDNS-Check off in my XG.

    Second mail was dropped because of Greylisting.

    Switched this off in my XG.

    Third mail was dropped because lack of authentication (It's a Mail of my domain, but the user did not authenticate, so it was dropped).

    If you switched off all those protection features, I can well imagine you do have issues recieving that kind of spam... Furthermore you maybe should check what you configured under "Host based relay".


    Any shouldn't be in there :)

  • In reply to HuberChristian:

    I know that this Fake Mailer doesn't have a valid RDNS Entry.

    I just disabled it to be able to test it with this Fake Mailer.

    The original mail, that was the reason I started testing, did have a valid RDNS Entry, so that wouldn't have helped.

    Greylisting is currently turned off because it often takes some time for mails to get delived, which is the downside of this mechanism.

    Do you mean a authenticated relay, when you mention authentication?

    I'm using Host Based Relays, which doesn't stop that. ;)