Post by Charles SwigerPerhaps English isn't your native language?
no, it isn't
first: i know that SPF is not relevant for clamav, but since it's a
clean way to verify the source of a message and clamav can't do this
such spoofing rules in clamav which can't be disabled without disable
other things too is bad
second: i know about scoring - as said i have more than one clamd and
what i had to do now is move safebrowsing rules to the other instance
because they whould have disabled too by "PhishingScanURLs no"
yes, i know that the milter is not flexible and *hence* there are
different clamd instances with different configs and different
signatures - *but* the last ressort instance for clamav-milter is
terrible unflexible to configure because the weakness of ign2 which is
waht this topic is about and hence i would nearly need 3 instances to
get the granualry i need - but that's not really doable because
currently the two running instances eare eating around 800 MB RAM
Post by Charles SwigerI spoke precisely; I did not say that epsl1.com was the sending domain. Your logs demonstrate that it, or more precisely mta106b.pmx1.epsl1.com was the MTA sending the message to your mailserver and that mail.paypal.at was the SMTP "Mail from" domain.
Post by Reindl HaraldPost by Charles Swigerwhich domain not only doesn't appear in the SPF records for paypal.com / paypal.at, but also doesn't appear to have any published MX records at all (per "dig -t mx epsl1.com.")...?
sorry but you don't understand SPF really good and since when have MX records something to do with outbound mail
mail.paypal.at. 3600 IN TXT "v=spf1 ip4:142.54.244.96/27 ip4:142.54.244.128/29 -all"
142.54.244.106 is the sending IP
1) I got different SPF results here, although hitting a third-party website to lookup the SPF records for mail.paypal.at does give the result you've shown. (I'm travelling and using someone else's network at the moment, so it's possible that they/their ISP is swizzling DNS lookups.)
or you did "dig TXT paypal.at" which is not the same as "dig TXT
mail.paypal.at"
anyways - "dig NS paypal.at"
paypal.at. 300 IN NS ns2.p57.dynect.net.
paypal.at. 300 IN NS ns1.p57.dynect.net.
paypal.at. 300 IN NS ns3.p57.dynect.net.
paypal.at. 300 IN NS ns4.p57.dynect.net.
dig TXT mail.paypal.at @ns2.p57.dynect.net
mail.paypal.at. 3600 IN TXT "v=spf1
ip4:142.54.244.96/27 ip4:142.54.244.128/29 -all"
Post by Charles Swiger2) In the absence of MX records stating otherwise, I expect that any mailserver which sends outbound email should be willing to accept inbound mail for the same domains it terminates or relays email on behalf of.
that is not how email works
a) the sender is @mail.paypal.at and not "@epsl1.com"
b) every smarter setup these days has strictly
seperated outbound and inbound servers
what you expect is completly pointless - as example you have no business
to deliver mail to our outbound server unless you are a customer with a
valid username and password since inbound mail is expected at the MX
(spamfirewall) and not at the submission server
why?
because it's much easier to define MTA policies for spamfiltering when
you need not to mix with mail clients and when you do outbound
spamfiltering you need completly different rules (no RBL looksups, no
PTR checks, different scorings and first of all no postscreen in front
which a MUA can't handle)