a spammer spoofs his email address as [email protected] and emails [email protected] from his home.
Cloudflare mta receives the email and correctly identifies that this email is failing spf check.
The attacker’s home isn’t allowed to send email on behalf of microsoft.com. Cloudflare will authentificate the email using SPF and DMARC and reject the email if it’s failing to pass.
thanks, but what if dmarc is missing or its policy is none for some company that’s being spoofed? spf check will still fail at Cloudflare, but it won’t show failure at the final forwarded destination and that’s kinda misleading, no? maybe there’s no proper solution for this.
going by sven2’s answer on server rewriting scheme (srs), it seems that srs was devised to facilitate delivery when spf check passes on the forwarder’s mta. by using srs and correct spf record, spf check will also pass on the forwardee’s mta.
but that introduces the issue of spf check always passing on forwardee, regardless of the prior spf checks as the message transits through forwarders.
there seems to be no good solution to that for now and it’s not exclusive to Cloudflare.
at any rate, it’s nice to have email routing on Cloudflare.