> On Feb 13, 2017, at 10:30 AM, /dev/rob0 <r...@gmx.co.uk> wrote: > >> [Nitin:] >> One reason why we would like to have Perfect Headers is that one >> of the domains is a B2C platform where many users can register. We >> want to reduce all possibilities (as much as we can) of our first >> email to these users from getting marked as Spam. So, we believe >> having a CA Trusted certificate might just add some more >> credibility in this scenario.
It should perhaps be pointed out that certificates have a negligible (likely negative) impact on (outbound) deliverability because receiving servers rarely request client certificates from sending systems, and when they are requested, they are at best ignored. Some receiving systems shoot themselves in the foot and abort TLS handshakes with client-certificates they don't like for various silly reasons. The mail is then often delivered in the clear instead. The solution to that problem is to follow the advice in the Postfix docs and to NOT configure any client certificates. http://www.postfix.org/postconf.5.html#smtp_tls_cert_file Do not configure client certificates unless you *must* present client TLS certificates to one or more servers. Client certificates are not usually needed, and can cause problems in configurations that work well without them. The recommended setting is to let the defaults stand: smtp_tls_cert_file = smtp_tls_key_file = smtp_tls_dcert_file = smtp_tls_dkey_file = smtp_tls_eccert_file = smtp_tls_eckey_file = We may at some point in the next year or two have a spec for DANE client TLSA records. At that point, client certificates may start to be used for reasons other than to impede email delivery. Broad use is at least a decade away... -- Viktor.