On Sat, Apr 9, 2016, at 09:33 AM, li...@lazygranch.com wrote:
> Per the DROWN mitigation, I stopped allowing sslv2 and sslv3

Did that as well.  Actually before even that point.

> so I made it a point to read the headers and look for encryption issues. 

I admit I never even bothered to look for the effects of that^, voting instead 
for the BOFH-inspired "screw-em" approach.  In retrospect, I've never ended up 
missing a mail that made a tangible difference as a result.

> My conclusion is there is always "that one guy" that doesn't use encryption. 
> In my case, literally one guy. Not being able to get his "regular" email to 
> work, I got him to switch to gmail. ‎
> 
> This is on my personal server. If you have customers, then each customer can 
> have that "one guy", so it depends on how much time you want to sink into 
> getting a third party to encrypt. 

Points made.  I'm not a provider, but do have clients.  I guess I'm thinking 
about how long to mollycoddle folks still in the dark ages, clients or not.

> I also made it a point to look for use of SPF and DKIM. Excluding the 
> spammers that got through, nearly every user had both SPF and DKIM, but not 
> all. One lacking SPF is a new business partner. The account without DKIM was 
> a commercial vendor. My point here was I had considered setting up policies 
> to reject email that didn't have both SPF and DKIM, but doing a survey 
> realized there would be real situations where legitimate email would not get 
> through.  One person I know uses pobox.com, and that fails SPF. 

I block on strict FAILs of any if SPF, DKIM or DMARC.  *missing* support for 
those is logged, but not - yet - acted on.

> I think policing everyone's email set up will lead to a lot of busy work. 

True.  One option is to stop policing, make sure MY postfix provides correct 
error-messages, and leave them to their own troubles.

Thanks for the comments.

'Someone' out there has some thorough statistics ... Interesting to know a bit 
more.

Jason

Reply via email to