snbforumstom
Occasional Visitor
whats the easiest way to fix it?
I'm not wrong... SMTP validates DOMAIN's at the MTA level, which is server to server...
Some SMTP host may reject based on USER@DOMAIN, but most don't... note that I say "may" not "must"... postfix accepts anything sent to it via MTA connection, and then deals with it accordingly.
Once it gets thru the MTA, then it's up to local SMTP host to either drop the message in the user's mail spool, or route it back to the sending MTA as a bounce (no such user), or route to trash (/dev/null)
So cool your jets man...
whats the easiest way to fix it?
So what is the purpose of the DNS TXT SPF record type? The synology mail server should bounce off the the forged email from fake server. I put in my DNS server in SPF record that only mail.skynetisp.ca is permitted to send mail on behave skynetisp.com domain. So why the heck the mail is accepted from fake server when is precisely specified to drop that kind of email.
An SPF record is a type of Domain Name Service (DNS) record that identifies which mail servers are permitted to send email on behalf of your domain. The purpose of an SPF record is to prevent spammers from sending messages with forged From addresses at your domain.
I still think a SMTP preprocessor like Untangle or Baracuda will stop rogue email bounces. If the internet can bounce email off your server they will chew all your bandwidth up on your ISP connection.
I assume you have an MX record in your DNS.
Ok... starting to understand the gap you're having with what SPF is for (along with another similar tools like DKIM/DMARC/etc...)
SPF uses DNS to confirm that your SMTP host is who it says it is... as SMTP basically runs on "trust", it used to be very easy for someone to set up a SMTP relay host and call it smtp.someisp.ca or whatever, even if it wasn't actually part of that domain - let's say it was actually spamhost.badactor.ru claiming to be smtp.someisp.ca - this is what spammers used to do in the past, to a fair degree of success... Tools like SPF and DKIM put that little bit more into things..
What SPF does - the upstream relays will now double check that your mail host is who it claims to be by doing a DNS lookup and actually confirming that your host really is who it says it is...
What SPF doesn't do (nor does DKIM for that matter) is check to see if a recipient (or sender) is valid, that's out of scope for SMTP when being a smarthost or relay - that is up to the local mail host and the local desktop clients and/or gateways.
"SPF uses DNS to confirm that your SMTP host is who it says it" so u r saying that spamMailServer.myserver.com is OK for my domain to send email? IT uses to confirm, CHECK, double check , check validateion, validate etc ball shirt.................. I AM GETTING STILL SPAM. have nice day
I'm pondering what that male server would look like.
I can tell you I'm mostly happy with my female server, she always responds to HELO. It's when the DATA part comes that she proves a bit unreliable. And our conversations always end with me having to tell her QUIT!
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!