|The following article only applies to our NZ based server cluster, and not our CPanel hosting plans
We recommend clients add a SPF rule to their domain name(s) to combat spam, and to assist we have the following predefined rules which will whitelist our servers accordingly.
This will make it easier for you to deploy a SPF rule on your domain where you wish to use our services for sending email.
We have created a DNS entry for _spf.webhost.co.nz as per below;
"v=spf1 ip4:188.8.131.52/24 ip4:184.108.40.206/24 ip4:220.127.116.11/24 ip4:18.104.22.168/24 ~all"
This will whitelist the NZ based shared hosting systems.
You can implement this by adding the following TXT record to your domain name record;
@ TXT "v=spf1 include:_spf.webhost.co.nz ~all"
If you have an existing SPF record, then you can just the include:_spf.webhost.co.nz section to your existing SPF record to include the NZ Servers systems. For example;
@ TXT "v=spf1 a mx include:_spf.webhost.co.nz ~all"
The ~all qualifier will soft fail messages that do not originate from one of the IPs listed above. This means the message will most likely arrive at the recipient's system but be tagged as Spam.
Please note that "v=spf1 a mx ~all" or "v=spf1 a mx:smtp.webhost.co.nz ~all" won't work as the NZ Servers have a clustered mail system and smtp.webhost.co.nz does not map to the IP addresses that actually sends out the messages.
Checking the SPF rules work can be done by looking at the source of the message. Below is a before and after look at the SPF check done by Web Drive.
X-Spam-Status: No, score=1.0 required=5.0 tests=SPF_SOFTFAIL
X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled