Aug 082009

Even though spammers may not have thought to do the email forgery yet, I’m publishing SPF txt record in dns.

# dig txt +short
"v=spf1 ip6:2001:470:19:13c::2 -all"

I don’t even know whose gonna validate my spf record anyway 😀 But for the sake of my curiousity, i’m continue developing SPF on my ipv6 postfix smtp. first i need to publish spf txt record    86400   IN      SPF     "v=spf1 ip6:2001:470:19:13c::2 -all"

for the scanner, i’m using postfix-policyd-spf-perl, can be download at The following Perl version and packages are required for running postfix-policyd-spf-perl: Perl 5.6 NetAddr-IP 4 Mail-SPF (not Mail-SPF-Query) perl-Net-DNS >= 0.65 perl-Net-IP >= 1.25 Test the postfix-policyd-spf-perl script, just make sure it works with ipv6 address.

# ./postfix-policyd-spf-perl

action=PREPEND Received-SPF: pass ( 2001:470:19:13c::2 is authorized to use '' in 'mfrom' identity (mechanism 'ip6:2001:470:19:13C::2' matched)) receiver=unknown; identity=mailfrom; envelope-from="";; client-ip="2001:470:19:13c::2"

Continue reading »

Aug 052009

Postfix, by default only listen on ipv4 interface.
this is howto make Postfix listen on both ipv4/ipv6
This example using IPv6 address given by


-- others config --
-- snippet --
inet_protocols = ipv4, ipv6
inet_interfaces =,, [::1], [2001:470:19:xxxx::2]

mynetworks = [2001:470:19:xxxx::/64], [::1/128],,

-- others config --
-- end of snippet --

easy isn’t it? 🙂 IPv6 is enabled out of the box in postfix, all you have to is little configuration tweak.
Have a nice try 😉