# Amount of debugging information logged. 0 logs no debugging messages # 5 includes all debug messages. debugLevel = 1 # If set to 0, no messages are rejected by SPF. This allows you to see the # potential impact of SPF checking in your mail logs without rejecting mail. TestOnly = 1 # Reject and deferred reason #Reason_Message = Message {rejectdefer} due to: {spf}. Please see {url} # HELO check rejection policy. Options are: # HELO_reject = SPF_Not_Pass (default) - Reject if result not Pass/None/Tempfail. # HELO_reject = Softfail - Reject if result Softfail and Fail # HELO_reject = Fail - Reject on HELO Fail # HELO_reject = Null - Only reject HELO Fail for Null sender (SPF Classic) # HELO_reject = False - Never reject/defer on HELO, append header only. # HELO_reject = No_Check - Never check HELO. HELO_reject = Fail # HELO pass restriction policy. # HELO_pass_restriction = helo_passed_spf - Apply the given restriction when # the HELO checking result is Pass. The given restriction must be an # action as defined for a Postfix SMTP server access table access(5). #HELO_pass_restriction # Mail From rejection policy. Options are: # Mail_From_reject = SPF_Not_Pass - Reject if result not Pass/None/Tempfail. # Mail_From_reject = Softfail - Reject if result Softfail and Fail # Mail_From_reject = Fail - Reject on Mail From Fail (default) # Mail_From_reject = False - Never reject/defer on Mail From, append header only # Mail_From_reject = No_Check - Never check Mail From/Return Path. Mail_From_reject = Fail # Reject only from domains that send no mail. Options are: # No_Mail = False - Normal SPF record processing (default) # No_Mail = True - Only reject for "v=spf1 -all" records # Mail From pass restriction policy. # Mail_From_pass_restriction = mfrom_passed_spf - Apply the given # restriction when the Mail From checking result is Pass. The given # restriction must be an action as defined for a Postfix SMTP server # access table access(5). #Mail_From_pass_restriction # Reject mail for Netural/Softfail results for these domains. # Recevier policy option to reject mail from certain domains when SPF is not # Pass/None even if their SPF record does not produce a Fail result. This # Option does not change the effect of PermError_reject or TempError_Defer # Reject_Not_Pass_Domains = aol.com,hotmail.com # Policy for rejecting due to SPF PermError. Options are: # PermError_reject = True # PermError_reject = False PermError_reject = False # Policy for deferring messages due to SPF TempError. Options are: # TempError_Defer = True # TempError_Defer = False TempError_Defer = False # Prospective SPF checking - Check to see if mail sent from the defined IP # address would pass. # Prospective = 192.168.0.4 # Do not check SPF for localhost addresses - add to skip addresses to # skip SPF for internal networks if desired. Defaults are standard IPv4 and # IPv6 localhost addresses. skip_addresses = 127.0.0.0/8,::ffff:127.0.0.0/104,::1 # Whitelist: CIDR Notation list of IP addresses not to check SPF for. # Example (default is no whitelist): # Whitelist = 192.168.0.0/31,192.168.1.12 # SPF HELO WHITELIST: HELO/EHLO host names to skip SPF checks for. # Example (default is no HELO_Whitelist): # HELO_Whitelist = relay.example.com,sender.example.org # Domain_Whitelist: List of domains whose sending IPs (defined by passing # their SPF check should be whitelisted from SPF. # Example (default is no domain whitelist): # Domain_Whitelist = pobox.com,trustedforwarder.org # Domain_Whitelist_PTR: List of domains to whitelist against SPF checks base # on PTR match. # Example (default is no PTR whitelist) # Domain_Whitelist_PTR = yahoo.com # SPF ENHANCED STATUS CODES: Override Postfix enhanced status codes to use the # RFC 7372 codes. Disable by setting this option to "No". # SPF_Enhanced_Status_Codes = No # Type of header to insert to document SPF result. Can be Received-SPF (SPF) # or Authentication Results (AR). It cannot be both. # Examples: (default is Received-SPF): # Header_Type = AR # Header_Type = SPF # In order to avoid disclosing BCC recipients in SPF header fields, # Hide_Receiver is set to Yes by default in the interest of maximizing # privacy. This setting will replace the actual recipient with <UNKNOWN> both # in header fields and SMTP responses. The latter may make it more difficult # for senders to troubleshoot issues with their SPF deployments. #Hide_Receiver = No Hide_Receiver = Yes # Every Authentication-Results header field has an authentication identifier # field ('Authserv_Id'). This is similar in syntax to a fully-qualified domain # name. See policyd-spf.conf.5 and RFC 7001 paragraph 2.4 for details. # Default is HOSTNAME (as provided by socket.gethostname). Authserv-Id must # be provided if Header_Type 'AR' is used. # Authserv_Id = mx.example.com Authserv_Id = HEADER # RFC 7208 recommends an elapsed time limit for SPF checks of at least 20 # seconds. Lookup_Time allows the maximum time (seconds) to be adjusted. 20 # seconds is the default. # Lookup_Time = 20 # Some of the available whitelisting mechanisms, i.e. Domain_Whitelist, # Domain_Whitelist_PTR, and HELO_Whitelist, require specific non-SPF DNS # lookups to determine if a connection should be white listed from SPF checks. # The maximum amount of time (in seconds) allocated for each of these checks, # when used (none are enabled by default), is controlled by the # Whitelist_Lookup_Time parameter. It defaults to 10 seconds and is applied # independently to each whitelisting method in use. # Whitelist_Lookup_Time = 10 # RFC 7208 adds a new processing limit called "void lookup limit" (See section # 4.6.4). Default is 2, but it can be adjusted. # Void_Limit = 2 # In some versions of postfix, for bizarre Sendmail compatibility reasons, the # first header field added by a policy server is not visible to milters. To # make this easy to work around, set the Mock value to true and a fixed header # field will be inserted so the actual SPF check will be the second field and # visible to milters such as DMARC milter. # Mock = False
Generated by dwww version 1.14 on Thu Apr 3 08:51:42 CEST 2025.