Automatic Email Quarantine Challenges

All,

I am having an issue where email being sent by a third party vendor is automatically being quarantined. We have white listed all domains and IP's, but the problem persists. I worked with google support and they stated that the security quarantine spoofing rules are causing the failure. Looking at the headers I see an amended version of this, coming from the 3rd party: 

dkim=pass header.i=@3rdpartyvendor.com header.s=pic header.b=m4Moig+l;
spf=pass (google.com: domain of bounce+65eb58.85e784c-2032.endusername=mydomain@3rdpartyvendordomain designates 1.1.1.1 as permitted sender) smtp.mailfrom="bounce+65eb58.85e784c-2032.endusername=mydomain@3rdpartyvendordomain

"Return-Path: <bounce+65eb58.85e784c-2032.endusername=mydomain@3rdpartyvendordomain. 

Google support is stating that regardless of whitelisting and adding the 3rd party domain to all lists, that the spoofing security takes place after the mail has been delivered. The problem is that the 3rd party company is an application that handles communication for teachers, parents, and students for a school system. So basically all learning applications communications between these parties are being quarantined causing endless touches and constant allow exceptions. 

Unfortunately the sys admin is no longer with us and I am the network admin, so a bit out of my element. I do not want to disable the spoofing security check, as that simply allows all "real" spoofing, at the same time I don't want to use the "send to inbox with an alert" option as that just teaches all the customers and staff to start ignoring security alerts.

I have reached out to the 3rd party company to see why they are injecting our end users email and our domain in their return-path, but as I am ignorant on email, maybe this is completely normal for companies. 

Assuming the 3rd party comes back and states that "this is just how we do it", is there anyway on my end, other than disable or send the messages with a warning, to allow these messages to go through? 

1 1 993
1 REPLY 1

All,

In an attempt to bypass the problem I edited the SPF to include the companies domain and whitelisted their ip's at the domain registrar etc... Still being marked as quarantine. One thing I did notice is that in the headers, at the top, I am seeing the following:

Delivered-To: user@work.com
Received: by 2002:ac9:5a0f:0:b0:4ea:7014:3c50 with SMTP id b15csp2451301oco;
        Tue, 19 Sep 2023 04:42:29 -0700 (PDT)
X-Gm-Auto-Quarantined: 1
X-Google-Smtp-Source: AGHT+IF7C5Xh/ptfjiO1zYcBZ3TF2k3DBi49xXlXdv9nTjGsVPmIYYnpqcVN6YMw1HOiZjE/ljBV
X-Received: by 2002:ad4:5dcb:0:b0:63d:2a0b:3f91 with SMTP id m11-20020ad45dcb000000b0063d2a0b3f91mr14280244qvh.2.1695123749664;
        Tue, 19 Sep 2023 04:42:29 -0700 (PDT)

 Usually I think of X- as something being inserted by the sender. In this case is this google injecting this at the very top of the header are going through the spoofing filtering or is this actually being injected by the sender? 

Top Labels in this Space
Top Solution Authors