In <1074729432(_dot_)30130(_dot_)592(_dot_)camel(_at_)code3> James Couzens
<jcouzens(_at_)obscurity(_dot_)org> writes:
I'm thinking that we should always check *both* the HELO and the MAIL
FROM:. An invalid HELO string causes the connection to be immediately
rejected.
I've been seeing an increasing amount of email lately that is indeed
valid email but does not contain a HELO. It seems that some clients are
taking the lazy approach and not even bothering?
Yes, and I see a lot of invalid HELO strings. (Ok, the RFC says the
HELO string is just a comment, but...)
So, the problem is, these systems will be able to send SPF-enabled
email just fine, but any bounces created by them will be rejected.
That doesn't strike me as a good thing to have happen.
-wayne
-------
Sender Permitted From: http://spf.pobox.com/
Archives at http://archives.listbox.com/spf-discuss/current/
Latest draft at http://spf.pobox.com/draft-mengwong-spf-02.9.4.txt
To unsubscribe, change your address, or temporarily deactivate your
subscription,
please go to
http://v2.listbox.com/member/?listname(_at_)©#«Mo\¯HÝÜîU;±¤Ö¤Íµø?¡