M.Ede  via Mailman-users writes:
 > Mark Sapiro wrote:
 > 
 > > The following patch will remove the header. 
 > 
 > Thanks for the hint, I removed authentication-results header as
 > well as arc-authentication-results with your patch, but rspamd
 > still results in SPOOFED_UNAUTH.

I don't think Mark was suggesting that would help with the
SPOOFED_UNAUTH problem.  I read his mail as saying that it needs to be
fixed because it breaks anonymous_list.  I don't think that rspamd is
paying attention to any of the smtp.*from information because the one
that matters is the one in the SMTP MAIL FROM command, which only
appears in the message header by accident.  (It could be some kind of
machine learning thing, but I doubt that would get dinged for 50
points.)

If you're still having issues

1.  Does your problem resemble any of those in the links Mark sent?
2.  Where is rspamd running?  On your host or at Mailcow?
3.  Who is [email protected], is it a placeholder for a random user,
    or is it an address associated with your Mailcow account?
4.  Are my.mailserv.er and lists.list.domain the same host?  If not,
    what is their relationship?
5.  Where are you running the ARC and DKIM processors?
6.  Do you have Mailman set to strip DKIM signatures?  (I find it hard
    to believe that a major ESP like t-online doesn't sign outgoing
    email.)
7.  What is the list address?  Specifically, is it @lists.list.domain,
    or is it @list.domain?  You need a DKIM public key record in DNS
    for the exact domain of the list as it is added to From.
8.  Do you have a non-permissive DMARC policy for lists.list.domain?
9.  How do you send list mail to Mailcow?  (a) Regular SMTP directly
    to the Mailcow MX (b) Regular SMTP indirectly via a different host
    that is not authorized in SPF to send mail for your list domain
    (c) Authenticated SMTP (usually SASL on port 587)?

Something is definitely odd about your ARC installation.  It should
not be possible for ARC verification to fail within the administrative
domain that applied the ARC headers, because in theory the ARC
signature and seal are performed on the *outgoing* message at the
administrative boundary.  Also, in the example in your third post[1]
the server names in the ARC headers doesn't match:

    ARC-Message-Signature: i=1; d=lists.serv.er;
    ARC-Authentication-Results: i=1; mailserv.er;
    ARC-Seal: i=1; s=dkim; d=lists.serv.er;

Maybe that's just a typo, but if not that could be the problem, I'm
pretty sure those are expected to match.

I think the missing DKIM signature may be important.  One
interpretation of "SPOOFED_UNAUTH" is "I think it's spoofed because I
can't authenticate it".  In question 9 above, if you send mail via (a)
SPF *could* authenticate it, and via (c) that's pretty good
authentication, but DKIM is best and Mailcow may insist on it.

[1]  <[email protected]>
Aaargh, gmx.de has a non-permissive DMARC policy -- hope you're not
deleting dupes because that almost always means you don't get the list
version.


-- 
GNU Mailman consultant (installation, migration, customization)
Sirius Open Source    https://www.siriusopensource.com/
Software systems consulting in Europe, North America, and Japan
_______________________________________________
Mailman-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
https://lists.mailman3.org/mailman3/lists/mailman-users.mailman3.org/
Archived at: 
https://lists.mailman3.org/archives/list/[email protected]/message/WOLPI6ILUEVCTXSPYUL5PY56BIABYPML/

This message sent to [email protected]

Reply via email to