On Sun, Nov 17, 2024 at 01:30:24AM +0100, Olga Fischer via mailop wrote: > Some of our domains receive TLS reports for connections their mx's > didn't make on behalf of any user of such a domain.
This makes no sense, because unlike DMARC reports which are sent by receiving (server) systems, TLS reports are sent by sending (client) systems to the domains whose MX hosts had trouble with TLS. So when you receive a TLS report, it is never about mail your MX hosts sent, rather it is about mail others tried to send to you. > Are such reports usually only sent for DMARC-aligned senders or even > for forged senders to the actual MX? As we get DMARC reports from the > same receivers, that show forged senders, I believe they are sent for > forged senders as well. TLS reports (RFC 8460) have nothing to do with DMARC. If you publish conformant _smtp._tls.<domain>. (MTA-STS) or _smtp._tls.<mxhost>. (DANE) DNS records, you may get reports from *senders* about their issues with establishing a (verified) TLS connection to your system. There is active work on TLSRPT support in Postfix, if this sees non-trivial adoption, the volume of reports go up a bit. -- Viktor. _______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop