Hi Phil, many thanks for your very helpfull explanation.
Just a few comments... Am Fr den 24. Jul 2020 um 20:40 schrieb Phil Pennock via mailop: > With a poor IP-based reputation, you need to see if you can score a > better domain-based reputation. This is where DKIM comes into play: > once you can provably link a message to really be from a given domain, > then even if you don't send much mail you can benefit from stuff like > "not on day-old-bread domain-lists". But having DKIM and then a DMARC > record does help (and I'm no fan of DMARC). I will give it a try. Even that I am no fan either. ;-) > For the mail-server's TLS: for that to count in your favor instead of > being a wash, I strongly suspect that it needs to be a certificate which > senders can verify. For those people scoring up for "better TLS", those > senders using DANE will be happy with a TLSA record in DNSSEC for your > CACert anchor. I already implemented that. At least for my .ch domains, the .de domain is registered with hetzner and even that my DNS is configured to add DNSSEC to it, I am unable to configure the glue in hetzner GUI. Unfortunately the Lookaside Validation is not in use anymore so I have no way to use DNSSEC with my .de domain. > At that point, CACert is not going to cut it. You'd need to > try Let's Encrypt instead. I will never, never ever use Let's Encrypt! They did destroy every left over of trust you could ever have in the whole CA system. The fact, that Let's Encrypt certificates are only valid for 3 months makes it impossible to check the cert manually every time you use that side. And I would not trust any CA, not Let's Encrypt, nor others. CACert was the only one that has earned SOME trust but giving the nature of the CA system that any rotten CA out there can issue a certificate for your domain, I can not trust the CA system at all. DNSSEC is and was the answer that could ever solve the misery but it is actively denied by the big players, all in front mozilla with firefox making it even impossible for the tlsa check addon to still work. It would in fact helps a lot if browsers would start using DNSSEC but I think, mozilla (and the others) have high interest that this secure solution will die. It would be the death of all that rotten CAs out there. By the way, you not only find TLSA record for my mail server than also for my web addresses. Finally, yea, I could install that tool to issue a new cert every month with Let's Encrypt. But I don't like to give that company the control over my working system. So, no, I will never, never ever use Let's Encrypt at all! > + avoid `-all` at the end because with the sole exception of "this > domain never sends email" records, it tends to be a sign of > over-enthusiasm and counts slightly against you; That is something that I do not understand. This is the only legitimisation of SPF to have a -all at the end. Otherwise SPF has no use at all. > + remember to have an SPF record for your HELO hostname, because when > you send a "bounce" rejection, this is the thing which will be > looked up (since there's no domain in `<>`). A good measurement is to never send bounces out of your system. If you would need to send bounces, don't accept the mail in the begin. Every bouncing could be misused for bacscatters. And I seen a lot of that shit. > * Seeing if you can get your IP onto one of the open DNS-based > allow-lists (also called "whitelists" but some folks are moving away > from that term), such as <https://www.dnswl.org/> or Spamhaus's SWL. Side note, I use the marketing tags there on the whitelist as blacklist. I will never accept marketing mails so it is a pretty good measurement. header RCVD_IN_DNSWL_SPAM eval:check_rbl_sub('dnswl-firsttrusted', '^127\.0\.15\.\d+') describe RCVD_IN_DNSWL_SPAM Selftagged Marketing mailer score RCVD_IN_DNSWL_SPAM 10.00 > * If your communications base includes people using OpenPGP with email, > then set up WKD to publish PGP keys for your domain too. This is > just a fixed schema for laying out keys for HTTPS retrieval. There is a different system to have the cert in DNS (secured with DNSSEC): host -t cert 4iwmtum663r8xnewtn7ugkdixws1d1n8._pka.ethgen.ch > * The moment you start specifying "must be TLS-secured" it's worth > adding CAA records into DNS, so that CAs which are broadly trusted > will refuse to issue for your domain unless you list them. That CAA record is broken from the begin and idiotic measurement at all. If you don't implement DNSSEC, you cannot trust it and if you DO implement DNSSEC, there is no need for it, just use TLSA. Regards Klaus -- Klaus Ethgen http://www.ethgen.ch/ pub 4096R/4E20AF1C 2011-05-16 Klaus Ethgen <kl...@ethgen.ch> Fingerprint: 85D4 CA42 952C 949B 1753 62B3 79D0 B06F 4E20 AF1C
signature.asc
Description: PGP signature
_______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop