Package: libmail-spf-query-perl Version: 1:1.999.1-2 Severity: wishlist Tags: patch
Here's a simpler example for exim4 setup, using spfquery. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.17-1-amd64-k8 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Versions of packages libmail-spf-query-perl depends on: ii libnet-cidr-lite-perl 0.20-1 Merge IPv4 or IPv6 CIDR address ra ii libnet-dns-perl 0.57-1 Perform DNS queries from a Perl sc ii libsys-hostname-long-perl 1.4-1 Figure out the long (fully-qualifi ii liburi-perl 1.35-2 Manipulates and accesses URI strin ii perl 5.8.8-4 Larry Wall's Practical Extraction libmail-spf-query-perl recommends no packages. -- no debconf information
# Use "spfquery" to obtain SPF status for this particular sender/host. # If the return code of that command is 1, this is an unauthorized sender. # # Hint: you can hook this in Debian's exim4 setup by adding: # # CHECK_RCPT_LOCAL_ACL_FILE = /usr/share/doc/libmail-spf-query-perl/examples/exim-acl_spfquery # # in /etc/exim4/conf.d/main/000_localdefs deny message = [SPF] $sender_host_address is not allowed to send mail from $sender_address_domain. \ Please see http://www.openspf.org/why.html?sender=$sender_address&ip=$sender_host_address log_message = SPF check failed. set acl_m9 = -ip=$sender_host_address \ -sender=$sender_address \ -helo=\"$sender_helo_name\" set acl_m9 = ${run{/usr/bin/spfquery $acl_m9}} condition = ${if eq {$runrc}{1}{true}{false}}