North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: On the inoc-dba subject

  • From: Suresh Ramasubramanian
  • Date: Mon Feb 06 10:55:05 2006
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=MmcMUfsuKSw2SANy9Jgv/5l58asNv9Y/fvN6buVKJyrjcScPskWgp/v2qZ+AfNDiB66GoNlNs23MMT5ocioqNSlnTmTpt56LQroOBBOxLmLqhEnEDjt+SzQmvqd2zscXbHq+L9DOzmKUUZJ5RrHOjbhEzO6aClEJusreEe/1C9I=

On 2/6/06, Rubens Kuhl Jr. <[email protected]> wrote:
>
> pch.net publishes a SPF record:
> "v=spf1 ip4:204.61.210.70/32 mx mx:woodynet.net a:sprockets.gibbard.org
> a:ghosthacked.net ~all"
>
> Besides going from soft-fail (~all) to fail (-all), they are already
> giving you the tools you need to validate a MAIL FROM: claim.
>

*koff* .forwards etc cans of worms *koff*

Woody's clear enough there - make sure your filters allow email from us.

Minor but tedious details like "how to do that" can best be left to
individual administrators.  Probably get the job done without turning
on spf lookups.

--
Suresh Ramasubramanian ([email protected])