Scott Kitterman <post...@kitterman.com> writes:

> On Friday, April 12, 2019 10:46:50 AM micah anderson wrote:
>> The site https://hardenize.com provides relatively decent Email reports,
>> along with other reports. It checks a number of things including certs,
>> MTA-STS, TLS-RPT, DANE, SPF, DMARC, and then also TLS. These are all
>> good checks and recommendations, with the exception of the TLS one, I do
>> not see how its possible to meet their standards, and provide an email
>> server on the internet. However, I could be wrong, so I'm interested to
>> know if I am.
>
> If I followed their DMARC recommendation, that would translate into 90% of 
> the 
> mail I send getting spam foldered or rejected.  At a glance, I'm not 
> convinced 
> this is any more than "let's make a list of all the things".  For the parts I 
> looked at, I don't thinks it's all well thought through.

Technically, their DMARC test does not give you a warning or a failure,
it just says "Feature is not implemented or disabled" and it colors it
'grey' -- this is their way of saying that this is not something they
are currently recommending, one way or the other.

They have this text:

 Although syntactically valid, your DMARC policy is effectively
 disabled. An effective policy must set the value of the 'p' directive
 to either 'quarantine' or 'reject'. In addition, if the 'pct' directive
 is present, it must be set to a value other than zero. (The default is
 100, which means to apply policy to all emails.)

I think they are being fair here, it is true my policy is effectively
disabled, and it is true that an effective policy has to do that. They
don't give me any penalty for having a policy that p=none.

However, I do think that it might be more 'clear' if they said something
like "if you set p=reject, you are likely to have 90% of the mail you
send getting spam foldered or rejected".

-- 
        micah

Reply via email to