On 12/02/2021 8:50 am, Bill Cole wrote:
On 11 Feb 2021, at 10:25, Benny Pedersen wrote:

On 2021-02-11 15:12, Bill Cole wrote:
On 11 Feb 2021, at 4:32, Eugene Podshivalov wrote:

Is it safe enough nowadays to drop dmarc failed incoming mail with
opendmarc?

No. It very likely never will be, particularly as long as Sendmail is
in widespread use.

why ?

is it the 8bitmime problem signing 8bitmime content ?, or other problems ?

reference amavisd how to dkim sign

Sendmail will modify headers after Milter actions. See confMUST_QUOTE_CHARS in cf/README and the README for dkimpy-milter for details. If a message is signed without doing a preliminary Sendmail-like fixup of To and Cc headers, Sendmail may break the signature.

To me that sounds like a reason not to use Sendmail, rather than a reason not to apply DMARC policy? ;-)

FWIW I do apply whatever DMARC policy is published for all email I receive. So if a domain publishes a reject policy (i.e. p=reject), and I receive an email from that domain that fails DMARC, I reject the email. (If the reason it failed is because they are using Sendmail and it mangled the content, then IMHO they probably shouldn't have published a reject policy in the first place?)

Perhaps the advice should be: If you are using Sendmail, then (a) you shouldn't publish a DMARC policy and (b) you shouldn't reject emails based on failed DMARC check; but if you aren't using Sendmail then as long as you don't mind rejecting emails from misconfigured domains, then it is fine to apply whatever policy is published by that domain? The way I see it at least when you reject an email it might give the sender a clue that they have a DMARC problem? ...That is, except when their email has been forwarded by a mailing list. :-(

Nick.

Reply via email to