While analyzing the behavior, I noticed that the MTA Postfix is already receiving emails with a wrong source IP (127.0.0.1) in the headers. This makes me think that there is an internal process or inspection engine that sits *before* the MTA and handles SMTP sessions initially, modifies the headers (source IP – deletes it), and then relays the email to the Postfix instance via localhost (127.0.0.1).
If that's correct, then:
- Postfix configuration (editing mta_postfix_options.cf) cannot fix this, because it receives already altered headers
- SPF validation will always fail under any circumstances, since the original sender IP is completely lost before reaching Postfix
- The only real fix would be an architectural change or engine patch delivered via future Jumbo Hotfix
This means all incoming emails will always be marked as spam due to SPF failure, and there will be no reliable way to determine whether a message is spoofed or legitimately sent?