Mercurial > dnsbl
diff xml/dnsbl.in @ 409:e018ed19a1cc
require 3 dots in bare ip addresses
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Sun, 16 Apr 2017 09:06:52 -0700 |
parents | 29d54e7028f6 |
children | d5a1ed33d3ae |
line wrap: on
line diff
--- a/xml/dnsbl.in Thu Mar 30 10:31:23 2017 -0700 +++ b/xml/dnsbl.in Sun Apr 16 09:06:52 2017 -0700 @@ -545,7 +545,8 @@ identical to a DMARC reject policy with strict identifier alignment. When doing SPF fallback, DMARC checks SPF based on the rfc5321 envelope from domain. DNSBL checks SPF based on the rfc5322 header - from domain. DMARC does not allow mail from good.example.com to be + from domain, but we ignore mx: and ptr: elements in the txt record. + DMARC does not allow mail from good.example.com to be signed by trusted.example.net - which is a common case. Both Microsoft Office365 and Google run mail for customer domains, but use DKIM signing domains in onmicrosoft.com and gappssmtp.com, which are @@ -955,11 +956,11 @@ # # blacklisting based on header from value - requiring signatures # from an impossible signer. - spammer.domain require_signed " "; + spammer.domain require_signed .; # # whitelisting based on strong spf pass - whitelisted if signed by # an impossible signer (which will never happen) or strong spf pass. - some.domain signed_white " "; + some.domain signed_white .; # # whitelisting based on valid signature or strong spf pass. # some paychex mail is signed, some is unsigned but passes strong spf.