I'm joining this thread even later than my learned friend hicksd8, so apologies for that.
Do you get any errors at all? I'm thinking of it failing to connect and leaving a dead.letter file, return e-mail to the sending account, mail stuck in the mail queue (use mailq to see this)
If it is all clear, then see if you can try sendmail -v target.user@domain.name
It will just sit at a prompt, but you can type some simple message and then a line just containing a full-stop . to end the text.
My sanitised session looks like this. I type the parts in green:-
If you get a train of output like this and without errors, then you can be happy that the mail is leaving your unix server. You will then need to talk to whomever manages the mail relay server. There can be filtering in place to prevent spam generation and you may be getting caught in that. Some companies only allow mail from recognised systems.
Hi all,
We've an application that is for recording our daily services to clients, and it has mailing option for sending email to any account to inform them about client requests ,but at this time the mailing part doesn't work.
So i want to know that this WS should be assigned as mail server for... (2 Replies)
hi ,
before installing dns on my server, all was ok
I was able to send message from aix to my lotus notes server thanks to this command:
mail -v aaaaaaaaaa@bbbbbbb.fr
in my /etc/hosts , there was
xx.xx.xx.xx lotus
xx.xx.xx.xx server name
in my... (3 Replies)
I recieve 553 5.3.4 mail.xxxx.com config error: mail loops back to me (MX problem?) when I try to send email from client . The message reaches the server and dies there
I'm using sendmail 8.12.9 on OpenBSD 3.3. I can check mail on client with no problem
Thanks for any help (5 Replies)
It seems that mail from our servers are going through a third party security mail scanner (offsite),
due the the mx records specified on our internal and external DNS servers.
However, our internal user to user email does not go through the third party security mail scanner.
I discovered... (2 Replies)
Hello all,
I've a very strange thing hapenning in my Sys, I've configured the IP, DNS eveything for my internat connection, but Im only able to browse Redhat.com websites.
I cant open anyother site!!! :eek:
Im sure the internet is configured 'coz it displays the list of avail updates for... (11 Replies)
Hi Chaps and Chappettes,
I've had a short period of time recently to learn and implement DNS cache-only in our organisation. Trouble is, according to my tcpdumps, the amount of traffic on port 53 has increased. This is of course the exact opposit of the desired effect. Would y'all mind looking... (2 Replies)
Hello fellow unix dudes, I have a question on DNS.
Basically the error is my domain.com server can not send email to my
mail.domain.com server.
I have a virtual server with one IP say 192.10.11.12 and a mail server with
iP 172.4.5.6
When the virutal server on ip 192.10.11.12 was setup,... (0 Replies)
Dear Concern,
As per below article, we have configured qmail in our system.
THE LINUX STUFF: qmail Installation Steps on Linux
But when we try to send any mail in own domain, got below error message. Please advise.
Apr 17 17:01:20 BLAUDITSCPTEST sendmail: alias database /etc/aliases... (0 Replies)
Discussion started by: makauser
0 Replies
LEARN ABOUT DEBIAN
pyspf
python-spf(1) General Commands Manual python-spf(1)NAME
pyspf - pure-Python SPF library
VERSION
2.0.7
DESCRIPTION
SPF does email sender validation. For more information about SPF, please see http://www.openspf.org/
One incompatible change was introduced in version 1.7. Prior to version 1.7, connections from a local IP address (127...) would always
return a Pass result. The special case was eliminated. Programs calling pySPF should not do SPF checks on locally submitted mail.
This SPF client is intended to be installed on the border MTA, checking if incoming SMTP clients are permitted to forward mail. The SPF
check should be done during the MAIL FROM:<...> command.
USAGE
There are multiple ways to use this package:
To check an incoming mail request:
% pyspf [-v] {ip} {sender} {helo}
% pyspf 69.55.226.139 tway@optsw.com mx1.wayforward.net
To test an SPF record:
% pyspf [-v] "v=spf1..." {ip} {sender} {helo}
% pyspf "v=spf1 +mx +ip4:10.0.0.1 -all" 10.0.0.1 tway@foo.com a
To fetch an SPF record:
% pyspf {domain}
% pyspf wayforward.net
To test this script (and to output this usage message):
% pyspf
For instance, during an SMTP exchange from client 69.55.226.139::
S: 220 mail.example.com ESMTP Postfix
C: EHLO mx1.wayforward.net
S: 250-mail.example.com
S: ...
S: 250 8BITMIME
C: MAIL FROM:<terry@wayforward.net>
Then the following command line would check if this is a valid sender:
% pyspf 69.55.226.139 terry@wayforward.net mx1.wayforward.net
('pass', 250, 'sender SPF authorized')
Command line calls return RFC 4408 result codes, i.e. 'pass', 'fail', 'neutral', 'softfail, 'permerror', or 'temperror'.
RFC 4408 TEST SUITE
The package also installs the python-spf test driver and the current (as of the release date) YAML (Yet Another Markup Language) RFC 4408
test definitions. As errors or improvements in the test definitions are approved, they are available from:
<http://www.openspf.net/Test_Suite>
To run the test suite, change the directory the test suite is installed in:
$ cd /usr/share/doc/python-spf
Uncompress testspf.py.gz, testspf.py.gz, and rfc4408-tests.yml.gz
and then run testspf.py:
$ python testspf.py
The test suite supports multiple allowed results with a warning for a non-preferred result. For the current version, the expected results
are:
WARN: invalid-domain-long in rfc4408-tests.yml, ['8.1/2', '5/10']: fail
preferred to temperror
WARN: txttimeout in rfc4408-tests.yml, 4.4/1: fail preferred to temperror
WARN: spfoverride in rfc4408-tests.yml, 4.5/5: pass preferred to fail
WARN: multitxt1 in rfc4408-tests.yml, 4.5/5: pass preferred to permerror
WARN: multispf2 in rfc4408-tests.yml, 4.5/6: permerror preferred to pass
OTHER PROGRAMS
This package also provides two additional helper scripts; type99.py and spfquery.py. The type99.py script will convert DNS TXT strings to
a binary equivalent suitable for use in a BIND zone file. The spfquery.py script is a Python reimplementination of Wayne Schlitt's spf-
query command line tool. These scripts are described in pyspf-type99(1) and spfquery.pyspf(1) man pages.
SEE ALSO
RFC 4408, <http://www.openspf.org>
AUTHORS
This version of pyspf was written by Terence Way <terry-spf@wayforward.net> and updated by Stuart Gathman <stuart@bmsi.com> and Scott Kit-
terman <scott@kitterman.com>.
This man-page was created by Scott Kitterman <scott@kitterman.com>.
2012-02-05 python-spf(1)