Looking at the last 8 days, I see about 1.5% of minor (or larger) spf pra's
we've evaluated had an error (pra's with errors / pra's with a pass), which
includes DNS errors, bogus mechanisms, timeouts, etc.  That does rise to 7%
if you include all senders, but those are some pretty small fry.

I make no claims as to whether our handling is rigorous or not, and due to
the evaluation order in spf, evaluating for a particular ip may pass before
the error in the record is encountered.

Without a DMARC p=reject, it is unlikely we would ever reject based on
bogus spf records, however.

Brandon



On Tue, May 16, 2017 at 2:07 PM, Renaud Allard via mailop <mailop@mailop.org
> wrote:

>
>
> On 16/05/17 22:12, D'Arcy Cain wrote:
>
>> On 2017-05-16 03:35 PM, Laura Atkins wrote:
>>
>>> Because in large, international corporations there are processes.
>>>
>>> I worked with a bank a few years ago looking at authentication. It took
>>> an inconceivable amount of time just to identify which country IT group
>>> held the authoritative records for rDNS and who needed to approve
>>> changes. Because, no, you don’t want some J. Random Person authorizing
>>> DNS changes.
>>>
>>> “A Day” is just not going to happen in the real world. Even just for
>>> banks.
>>>
>>
>> It doesn't have to happen for banks.  All it takes is for some bank
>> president to not be able to email a client to get questions asked.  We just
>> need a significant number of addresses blocked due to incompetent
>> administration.
>>
>>
> Actually, all it needs is a big freemail provider like gmail to start
> blocking on bad DNS info and banks will get it mostly right within the next
> 24/48 hours.
>
>
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
>
>
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to