This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Rejected: SPF (SPF check failed)

I have received a complaint that an email hasn't been replied to and according to a user within our company he didn't receive it.

after checking from the mail manager there were 3 emails from same person on different dates one of them passed and the others got rejected due to SPF check failed.

Any ideas ?

 



This thread was automatically locked due to age.
Parents
  • SPF is a very weak defense.  Most spammers have it configured correctly and many legitimate senders have mistakes.  SPF only matches the internal authorized-as information to the source IP address, and that internal identifier is often unrelated to the "From" information seen by the user.

    If UTM would allow simulation of the impact, it might be useful., but at present I find it useless.

  • Are you sure about that?

    You have to know my dns-server account to change my domain SPF. Or the spammers have to manipulate the UTM spf check, because it is not provided in the email headers or body.

  • Any mailer can put anybody's information in the "From" line seen by the user, which is what matters for social engineering attacks.   SPF is not intended to check what the user sees.  The SPF check is done during the HELO before the user-visible From is even transmitted.

    I think DKIM can be used to validate either the From or the Authorized-As, and DMARC can be used to say that DKIM information must be present, but I do not think it can state that the From is always verifiable. UTM does not seem to support DMARC, nor does my other spam filter, so I may be mistaken.

    Most large companies use third parties for promotional mailing under their name.   Big web platforms like Salesforce also mail under tbe identity of their clients.  These contracts are often established without involvement of the corporate mail team, which is why the SPF informaion is often wrong.

    My attempts to evaluate SPF effectiveness have led me to conclude that the incremental volume of blocked spam is trivial, and less than the number of false positives.   Because UTM only provides a block option for SPF, it is impossible to evaluate blocked messages to discern if they are legitimate or spam.

    That, at least, has been my experience.

Reply
  • Any mailer can put anybody's information in the "From" line seen by the user, which is what matters for social engineering attacks.   SPF is not intended to check what the user sees.  The SPF check is done during the HELO before the user-visible From is even transmitted.

    I think DKIM can be used to validate either the From or the Authorized-As, and DMARC can be used to say that DKIM information must be present, but I do not think it can state that the From is always verifiable. UTM does not seem to support DMARC, nor does my other spam filter, so I may be mistaken.

    Most large companies use third parties for promotional mailing under their name.   Big web platforms like Salesforce also mail under tbe identity of their clients.  These contracts are often established without involvement of the corporate mail team, which is why the SPF informaion is often wrong.

    My attempts to evaluate SPF effectiveness have led me to conclude that the incremental volume of blocked spam is trivial, and less than the number of false positives.   Because UTM only provides a block option for SPF, it is impossible to evaluate blocked messages to discern if they are legitimate or spam.

    That, at least, has been my experience.

Children