We are now enabling Sender Policy Framework (SPF) checking for email destined to our members’ mail forwarding or backup smtp spooling domains.
If the SPF validation equates to hardfail for a domain with SPF validation enabled, our mail servers will reject the inbound message, all other outcomes will be prepended into an additional SPF-Received: header in the message and processed normally. Members can then add additional filters keying on this header in their mail clients or downstream MTAs.
This feature is currently in beta , if you wish to be a beta tester for SPF checks, please contact support and ask to have your beta user settings activated.
For more background on Sender Policy Framework (SPF) and how it can reduce email forgery, see our SPF tutorial and the SPF homepage
Leave a Reply