spf Modules – spf_macros, spf_v1, and senderid (SPF v2)
Sender Policy Framework (SPF) is an emerging standard for sender-based authentication which provides a framework for administrators, through DNS TXT records, to specify authorized senders for the domains they control. SPFv1 performs validation on the domain found in the envelope sender (sometimes defined as the MAIL FROM header). SPFv2 (also known as Sender ID) supports MAIL FROM validation, but adds the concept of Purported Responsible Address (PRA), which defines an algorithm for selecting among a set of RFC2822 headers. The domain for validation is extracted from the appropriate header as defined by the PRA header selection algorithm. For a more detailed description of the differences between spf_v1 and senderid, see SPF_vs_Sender_ID.
SPF consists of two basic components:
-
DNS records published by senders, which describe their policies
-
A parsing engine for receivers, which looks up the published policies for inbound mail and takes actions based on it
A full description of SPF is available at http://spf.pobox.com.
The following is a basic configuration for the SPF modules:
spf_macros {
}
spf_v1 "spf_v1" {
default_rule = "?all"
add_headers = true
add_authentication_results = true
context_variable = "spf_status"
fail_fallback_string = "SPF validation failure"
softfail_fallback_string = "SPF validation soft failure"
nxdomain_override_string = "Could not resolve sender's domain"
temperror_override_string = "Temporary SPF failure"
}
senderid "senderid" {
default_rule = "?all"
default_pra_rule = "?all"
add_headers = true
add_authentication_results = true
context_variable = "senderid_status"
context_pra_variable = "senderid_pra_status"
fail_fallback_string = "SPF validation failure"
softfail_fallback_string = "SPF validation soft failure"
nxdomain_override_string = "Could not resolve sender's domain"
}
Note
To alter the SMTP session disposition, use scripts to implement policy based on the results of SPF or SenderID validation. For more information about the scriptlet module, see “scriptlet - Lua Policy Scripts”.
In the default configuration, the SPF modules have the following settings:
- `add_headers = true`
-
Add a
Received-SPF
header to the message for Mail User Agent based categorization. - `context_pra_variable = "senderid_pra_status"`
-
What message context variable to store the SenderID PRA status in, so that its status may be acted on in another module.
- `context_variable = "spf_status"`
-
What message context variable to store the SPF status in, so that its status may be acted on in another module.
- `default_pra_rule = "?all"`
-
Set the default rule for a domain not implementing SenderID. The default behavior is to use
?all
, as indicated by the SenderID specification. - `default_rule = "?all"`
-
Set the default rule for a domain not implementing SPF. The default behavior is to use
?all
, as indicated by the SPF specification. - `fail_code = 250`
-
SMTP code to return in the event of a hard failure (i.e. ‘
-
’). This option is not configurable and always defaults to 250 (success). To override this value, use a policy script. - `fail_fallback_string = "SPF validation failure"`
-
Text DSN to return to the client in the event of a failure.
- `nxdomain_code = 550`
-
SMTP code to return in the event that the sender's domain is nonexistent. This option is not configurable and always defaults to 250. To override this value, use a policy script.
- `nxdomain_override_string = "Could not resolve sender's domain"`
-
Text DSN to return to the client in the event of a non-existent sending domain.
- `pass_code = 250`
-
SMTP code to return in the event of a successful validation. This option is not configurable and always defaults to 250 (success). To override this value, use a policy script.
- `permerror_code = 250`
-
SMTP code to return in the event of an unexpected error. This option is not configurable and always defaults to 250 (success). To override this value, use a policy script.
- `softfail_code = 250`
-
SMTP code to return in the event of a soft failure (i.e.
~
). This option is not configurable and always defaults to 250 (success). To override this value, use a policy script. - `softfail_fallback_string = "SPF validation soft failure"`
-
Text DSN to return to the client in the event of a soft failure.
- `unknown_code = 250`
-
SMTP code to return in the event an 'unknown' (i.e. ‘
?
’) result. For a description of the SPF mechanism syntax, see SPF Record Syntax. This option is not configurable and always defaults to 250 (success). To override this value, use a policy script.
The default action of the SPF module is to accept everything (except for non-existent sender domains) and set a context variable for taking adminstrative action in other modules.
SPF is an authentication technology, and as such a positive authentication does not necessarily represent that the message is 'good' or 'wanted', but simply that the sender is who they claim to be. Furthermore, since it is IP-based, SPF does not work with forwarders, and thus -all
(the indicator that the domain sends no mail at all) should only be used for domains that absolutely never send any mail. Unfortunately, there is poor understanding of the ramifications of -all
even within the SPF community and thus it is widely regarded as irresponsible to reject on negative results. This does not mean that SPF is useless, only that to be effective it needs to be combined with some sort of authorization setup, for example a reputation, accreditation, or domain-based whitelist/blacklist solution. SPF is only part of a comprehensive anti-spam strategy.
The following macro letters are expanded:
- s =
-
The "s" macro expands to the
argument. It is an e-mail address with a localpart, an "@" character, and a domain. - l = localpart of
-
The "l" macro expands to just the localpart of the sender. Note also that if the original
had no localpart, the localpart is set to "postmaster" in initial processing. - o = domain of
-
The "o" macro expands to just the domain part of the sender.
- d =
-
The "d" macro expands to the current domain on which an SPF lookup is being performed.
- i = remote connecting
-
For IPv4 addresses, this macro expands to the standard dotted-quad format.
For IPv6 addresses, the "i" macro expands to a dot-format address; it is intended for use in %{ir}.
- p = the validated domain name of
-
The "p" macro expands to the validated domain name of
. The procedure for finding the validated domain name is defined in Section 5.5 of the SPF specification. If the is present in the list of validated domains, it SHOULD be used. If a subdomain of the is present, it SHOULD be used. Otherwise, any name from the list may be used. If there are no validated domain names or if a DNS error occurs, the string "unknown" is used. - v = the string "in-addr" for
-
The "v" macro expands the in-addr.arpa form of the
that would typically be used for a PTR lookup. - h = HELO/EHLO domain
-
This is the argument passed to the HELO/EHLO command that started the current SMTP session.
- c = SMTP client IP (easily readable format)
-
The "c" macro expands similarly to the "i" macro with the noted exception that IPv6 addresses are printed in hex, not dotted decimal.
- t = current timestamp
-
The "t" macro expands to the decimal representation of the approximate number of seconds since the Epoch (Midnight, January 1st, 1970, UTC). This is the same value as is returned by the POSIX time() function.
= zero or more digits -
The number transformer indicates the number of right-hand parts to use, after optional reversal. If a number is specified, the value MUST be nonzero. If no numbers are specified or if the value specifies more parts than are available, all the available parts are used.
- 'r' = reverse value, splitting on dots by default
-
The 'r' transformer indicates a reversal operation. The original string is tokenized on the given delimiter, the tokens are reassembled in reverse order with the given delimiter.
Within the SPF system, macros may be expanded as the SPF specification dictates by enclosing the desired macro arguments within %{macro}
. The spf_macros
module also exports these macros as a general macro language that can be used within other modules. When SPF macros are used in that context, they must be name-spaced as %{spfv1:macro}
so as not to conflict with other macro languages.
SPF macros may be followed immediately by the following transformation operations. If transformers or delimiters are provided, the replacement value for a macro letter is split into parts. After performing any reversal operation and/or removal of left-hand parts, the parts are rejoined using "." and not the original splitting characters.
By default, strings are split on "." (dots). Note that no special treatment is given to leading, trailing or consecutive delimiters, and so the list of parts may contain empty strings. Macros may specify delimiter characters, which are used instead of ".".
These macro examples are taken directly from the SPF specification.
The <sender> is strong-bad@email.example.com. The IPv4 SMTP client IP is 192.0.2.3. The IPv6 SMTP client IP is 2001:DB8::CB01. The PTR domain name of the client IP is mx.example.org. macro expansion ------- ---------------------------- %{s} strong-bad@email.example.com %{o} email.example.com %{d} email.example.com %{d4} email.example.com %{d3} email.example.com %{d2} example.com %{d1} com %{dr} com.example.email %{d2r} example.email %{l} strong-bad %{l-} strong.bad %{lr} strong-bad %{lr-} bad.strong %{l1r-} strong macro-string expansion -------------------------------------------------------------------- %{ir}.%{v}._spf.%{d2} 3.2.0.192.in-addr._spf.example.com %{lr-}.lp._spf.%{d2} bad.strong.lp._spf.example.com %{lr-}.lp.%{ir}.%{v}._spf.%{d2} bad.strong.lp.3.2.0.192.in-addr._spf.example.com %{ir}.%{v}.%{l1r-}.lp._spf.%{d2} 3.2.0.192.in-addr.strong.lp._spf.example.com %{d2}.trusted-domains.example.net example.com.trusted-domains.example.net IPv6: %{ir}.%{v}._spf.%{d2} 1.0.B.C.0.0.0.0. 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.B.D.0.1.0.0.2.ip6._spf.example.com