Apparently, the setup I currently have does not DKIM sign messages where
the sender is the classic email bounce empty sender <>
This means that messages will languish in the mail queue for days if the client's email systems (typically M365, Google or some such large email handler) will not accept them, and then cause double bounces.
We have servers which send out emails using a client domain: clients
have set up SPF records that allow us to do this, and DKIM keys have
been set up so our Sendmail/OpenDKIM smarthost setup can sign the
messages correctly. When mail gets delivered normally, everything
is OK.
However, there are issues when message bounces are generated for our smarthost, and it tries to deliver it to the sender the customer used.
Apparently, the setup I currently have does not DKIM sign messages
where the sender is the classic email bounce empty sender <>
This means that messages will languish in the mail queue for days if
the client's email systems (typically M365, Google or some such large
email handler) will not accept them, and then cause double bounces.
Is this just some configuration option I need to change, or what?
This means that messages will languish in the mail queue for days if
the client's email systems (typically M365, Google or some such large
email handler) will not accept them, and then cause double bounces.
SPF records must exist for the hostname in the EHLO command.
On 3/12/25 10:52 AM, Otto J. Makela wrote:
We have servers which send out emails using a client domain:
clients have set up SPF records that allow us to do this, and DKIM
keys have been set up so our Sendmail/OpenDKIM smarthost setup can
sign the messages correctly. When mail gets delivered normally,
everything is OK.
I don't know if it matters, but I feel I should ask, do the SPF
records authorize the originating servers and / or the smarthost?
However, there are issues when message bounces are generated for
our smarthost, and it tries to deliver it to the sender the
customer used.
Please clarify which system is rejecting the incoming message and
which system is the system obliged to send the DSN? [...]
Or is the recipient's MX not accepting the message from the smart host
and thus the smart host is obliged to generate the DSN?
Apparently, the setup I currently have does not DKIM sign messages
where the sender is the classic email bounce empty sender <>
I don't remember the last time I saw a DKIM signed DSN. But I don't
remember ever looking.
This means that messages will languish in the mail queue for days if
the client's email systems (typically M365, Google or some such large
email handler) will not accept them, and then cause double bounces.
Please share a sample rejection reason from the recipient's MX.
I'd think that for any message; DSN or otherwise, to get stuck in
queue until it expires, the receiving system would have to return
temporary failures. If the receiving system returned permanent
failures, the DSN would turn into a double bounce immediately.
Otto J. Makela wrote:
Apparently, the setup I currently have does not DKIM sign messages
where the sender is the classic email bounce empty sender <>
If you use a milter to create DKIM signatures then you have to send
your bounces via a sendmail process that runs that milter.
This means that messages will languish in the mail queue for days if
the client's email systems (typically M365, Google or some such large
email handler) will not accept them, and then cause double bounces.
Isn't that a nice sh!tty requirement made up by the biggest spam
sources? Isn't just SPF enough to fullfill their random (and useless) requirements?
I've even considered hard-wiring these mail recepients to only use
IPv4, but of course doing this is painful since M365 keeps shifting
around so much.
As I said, clients have added our sendmail-based server (smarthost) in
their SPF record (SPF does not come into play with the mail generating servers that are hosted with us, we use a simple IP-address based
access table to permit them to send emails to our smarthost).
On 19.03.2025 14:46 Uhr Otto J. Makela wrote:
As I said, clients have added our sendmail-based server (smarthost) in
their SPF record (SPF does not come into play with the mail generating
servers that are hosted with us, we use a simple IP-address based
access table to permit them to send emails to our smarthost).
If MAIL FROM: is <>, the SPF will be checked against the hostname in
EHLO. Check which hostname is being used there and create and SPF for
it.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (0 / 16) |
Uptime: | 164:22:22 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,057 |
Messages: | 6,416,518 |