←back to thread

429 points pabs3 | 1 comments | | HN request time: 0.213s | source
Show context
jeroenhd ◴[] No.43469827[source]
For me, as someone with their own mail server, these technologies mostly serve to inform me that Russian IP addresses are still trying to send email in the name of my domain for some stupid reason.

It makes sense that people whose business is sending email know how to set up email correctly. I'm mostly surprised at how many legitimate sysadmins struggle with getting the basics correct. Surely those dozens of DMARC emails you get that your sendgrid email has been refused because of a bad SPF signature should set in motion some kind of plan to ask if maybe marketing is using them legitimately?

Automated signatures are of limited value but I rarely see rejections based on SPF and DKIM that are a mistake. Things are probably worse for big organizations but as a small email server, technical rejections are usually the right call. The only exception is mailing lists, but the dozens of people who still use those can usually figure out how to add an exception for them.

replies(6): >>43470005 #>>43470195 #>>43470668 #>>43471472 #>>43473790 #>>43482338 #
zelon88 ◴[] No.43471472[source]
The problems I noticed were, it doesn't matter what the SPF and DKIM look like. If Google or Microsoft refuse to relay your email based on secret internal factors then you're out of business.
replies(4): >>43473185 #>>43473798 #>>43473899 #>>43476471 #
miohtama ◴[] No.43473899[source]
Best, and often practically only, way to avoid this problem is to buy your email services from Google Microsoft duopoly.
replies(2): >>43473988 #>>43480498 #
1. catlikesshrimp ◴[] No.43473988[source]
Workaround (?) Buy their services for 1 (one) year and then move to something good (?)