• The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Any way to cause SPF rejection for locally hosted domains in failure scenario?

HostaHost

Regular Pleskian
We have our servers set to SPF checking on, and checking mode set to 'Reject mail when SPF resolves to "fail" (deny)'. This works great when a forged third party email comes in where the sender domain has an explicit SPF record. The issue we're having is that the filter does not appear to reject email if the forged sender domain is a locally hosted domain. For example:

Spam message #1
From: [email protected]
To: [email protected]
Delivered by: remote hacked server

That would be rejected.

Spam message #2
From: [email protected]
To: [email protected]
Delivered by: remote hacked server

That one would be accepted even though it fails SPF. The header "Received-SPF: none (no valid SPF record)" will be present in the headers of the message even though the domain in question does have a valid SPF record. So it seems to not do a lookup if the domain is local. We don't have any scenarios where a non-authenticated remote email would be coming into a user using their own email address, so we'd like to block those.
 
Back
Top