@adbenitez @delta Sure, so let's stop framing DeltaChat as a "chat app that uses #SMTP + #IMAP at its backbone". It's either just "chat app" or "chat app that uses a bunch of standard protocols (incl. SMTP, IMAP, OpenPGP, MIME, XMPP, HTTP, TLS), proprietary protocols and proprietary extensions to standard protocols". The latter doesn't have the markting ring to it, so maybe just stick with "chat app" and stop talking about protocols at all.
Hashtag
#SMTP
45 posts tagged with this hashtag.
I am very sorry for you to need to cope with this:
the best option for private chatting TODAY when it comes to #security, usability/user-friendly, #resilience, #digitalindependence and #freedom is #DeltaChat a chat app that uses #SMTP + #IMAP at its backbone, not your favorite "perfect" chat protocol, you don't need new better protocols, you need tools that actually work for the people
Now i'm reading this https://bifurcation.github.io/mimi-aim/draft-barnes-mimi-aim.html and it seems to confort me in my stubborness.
bifurcation.github.io
ActivityPub for Interoperable Messaging
The MIMI working group is chartered to define tools that messaging providers can use to interoperate with one another. The W3C ActivityPub protocol is already widely used for several use cases that resemble the MIMI use case. This document examines whether ActivityPub might be a good baseline for providing the sort of interoperability that MIMI intends to achieve.
Now i'm reading this https://bifurcation.github.io/mimi-aim/draft-barnes-mimi-aim.html and it seems to confort me in my stubborness.
bifurcation.github.io
ActivityPub for Interoperable Messaging
The MIMI working group is chartered to define tools that messaging providers can use to interoperate with one another. The W3C ActivityPub protocol is already widely used for several use cases that resemble the MIMI use case. This document examines whether ActivityPub might be a good baseline for providing the sort of interoperability that MIMI intends to achieve.
Thought for the day::
POSIWID
def.
"The Purpose Of a System Is What It Does "
(not what the design intention was)
This and other thoughtful observations around protocols...
Here >>
https://connectedplaces.online/the-purpose-of-protocols/
Longish read , that is well argued...
#Socialmedia #Computer #Science #Protocols #SMTP #ActivityPub #RSS #XMPP #POSIWID #Engineering
connectedplaces.online
The Purpose of Protocols
Every open social protocol generates shared resources, but none has produced a governance framework adequate to those resources. So who fills that vacuum?
Thought for the day::
POSIWID
def.
"The Purpose Of a System Is What It Does "
(not what the design intention was)
This and other thoughtful observations around protocols...
Here >>
https://connectedplaces.online/the-purpose-of-protocols/
Longish read , that is well argued...
#Socialmedia #Computer #Science #Protocols #SMTP #ActivityPub #RSS #XMPP #POSIWID #Engineering
connectedplaces.online
The Purpose of Protocols
Every open social protocol generates shared resources, but none has produced a governance framework adequate to those resources. So who fills that vacuum?
And finally, #SMTP. Looking at the Top 1M Domains' MX records, over 52% are IPv4-only; 45% fully dual-stack, and another 2% or so having at least one MX record with an IPv6 address.
But there are also large MX service providers who have IPv6 addresses on some MX records *and then don't accept traffic on those IPv6 addresses*, and large mail service providers like Yahoo, GoDaddy, and Namecheap (to name just a few) are completely IPv4-only.

ALT text
Total | % of MX records All MX IPv4 only 334,696 52.03 All MX IPv6 only 74 0.01 All MX dual-stack 288,849 44.91 At least one MX dual-stack 301,273 46.84 At least one MX IPv4-only 347,119 53.96 At least one MX IPv6-only 271 0.04 Only IPv4-only and IPv6-only MXs 89 0.01 Dual-stack with at least one IPv4-only MX 12,334 1.92 Dual-stack with at least one IPv6-only MX 108 0.01 Dual-stack + IPv4-only + IPv6-only MX 18 0.002 Dual-stack + only IPv4-only MX 12,316 1.91 Dual-stack + only IPv6-only MX 90 0.01 At least one MX IPv6 enabled (dual-stack or IPv6-only) 301,436 46.86
New blog post: Why every organization should enable DANE https://davestork.nl/why-every-organization-should-enable-dane/
#security #SMTP #mail #MSExchange #Microsoft365 #DNSSEC #AzureDNS

ALT text
A black Great Dane puppy sitting on brown mulch with white fence and some green grass behind. "Why every organization should enable DANE" English: A black Great Dane puppy. Source: https://www.flickr.com/photos/92123561@N00/720806587 Author: https://www.flickr.com/photos/92123561@N00 CCA2 Generic License.
New blog post: Why every organization should enable DANE https://davestork.nl/why-every-organization-should-enable-dane/
#security #SMTP #mail #MSExchange #Microsoft365 #DNSSEC #AzureDNS

ALT text
A black Great Dane puppy sitting on brown mulch with white fence and some green grass behind. "Why every organization should enable DANE" English: A black Great Dane puppy. Source: https://www.flickr.com/photos/92123561@N00/720806587 Author: https://www.flickr.com/photos/92123561@N00 CCA2 Generic License.
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Introducing #Upyo!
A simple, cross-runtime email library that works seamlessly on #Deno, #Node.js, #Bun, and edge functions. Zero dependencies, unified API, and excellent testability with built-in mock transport.
Switch between #SMTP, #Mailgun, #SendGrid without changing your code. Available on #JSR & #npm!
upyo.org
Upyo
A simple and cross-runtime library for sending email messages using SMTP and various email providers
Remember the threads¹² about #LetsEncrypt removing a crucial key usage from certificates issued by them in predictive obedience to their premium sponsor Google?
We were at first concerned about #SMTP. While I had lived through this problem with #StartSSL by #StartCom back in 2011, I only had a vague recollection of Jabber but recalled in detail that it broke server-to-server SMTP verification (whether the receiving server acted on it or just documented it).
Well, turns out someone now reported that it indeed breaks #XMPP entirely: https://community.letsencrypt.org/t/do-not-remove-tls-client-auth-eku/237427/66
This means that it will soon no longer be possible at all to operate Jabber (XMPP) servers because the servers use the operating system’s CA certificate bundle for verification, which generally follows the major browsers’ root stores, which has requirements from the CA/Browser forum who apparently don’t care about anything else than the webbrowser, and so no CA whose root certificate is in that store will be allowed to issue certificates suitable for Jabber/XMPP server-to-server communication while these CAs are the only ones trusted by those servers.
So, yes, Google’s requirement change is after all breaking Jabber entirely. Ein Schelm, wer Böses dabei denkt.
While https://nerdcert.eu/ by @jwildeboer would in theory help, it’s not existent yet, and there’s not just the question of when it will be included in operating systems’ root CA stores but whether it will be included in them at all.
Google’s policy has no listed contact point, and the CA/B forum isn’t something mere mortals can complain to, so I’d appreciate if someone who can, and who has significant skills to argument this in English and is willing to, to bring it to them.
① mine: https://toot.mirbsd.org/@mirabilos/statuses/01JV8MDA4P895KK6F91SV7WET8
② jwildeboer’s: https://social.wildeboer.net/@jwildeboer/114516238307785904
social.wildeboer.net
Jan Wildeboer 😷:krulorange: (@jwildeboer@social.wildeboer.net)
Attached: 1 image Dear #Letsencrypt, you helped secure millions and millions of servers, not just web servers. But your announcement at https://letsencrypt.org/2025/05/14/ending-tls-client-authentication/ about ending Ending TLS Client Authentication Certificate Support in 2026 because Google changes their requirements would result in your certificates becoming a possible risk for ensuring SMTP traffic. Please think again. Please. 1/5
@rl_dane @ShinjiLE if you or someone else wants to help argue, the thread is at https://community.letsencrypt.org/t/do-not-remove-tls-client-auth-eku/237427 (Discourse, so JS webbrowser), I’m exhausted.
#LetsEncrypt #SSL #TLS #certificates #X509 #X509v3 #sendmail #SMTP #XMPP #Jabber
community.letsencrypt.org
Do *NOT* remove TLS Client Auth EKU!
Re. Ending TLS Client Authentication Certificate Support in 2026 Do not remove that! It is required for SMTP (the sending MTA must have that in its certificate for the receiving MTA to consider it a both-sides-authenticated connection). It’s also useful on the web (and I’ve seen it used), but it is absolutely crucial for SMTP, for which people generally use the same key/certificate on the same box.
System Administration
Week 8, The Simple Mail Transfer Protocol, Part III
In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (#SPF), DomainKeys Identified Mail (#DKIM), and Domain-based Message Authentication, Reporting and Conformance (#DMARC). #SMTP doesn't seem quite so simple any more...
youtube.com
CS615 System Administration, Week 08, Segment 3 - E-Mail, Part III
In this video, we look at ways to combat Spam. In the process, we learn about email headers, the Sender Policy Framework (SPF), DomainKeys Identified Mail (D...
System Administration
Week 8, The Simple Mail Transfer Protocol, Part II
In this video, we observe the incoming mail on our MTA, look at how STARTTLS can help protect information in transit, how MTA-STS can help defeat a MitM performing a STARTTLS-stripping attack, and how DANE can be used to verify the authenticity of the mail server's certificate.
youtube.com
CS615 System Administration, Week 08, Segment 2 - E-Mail, Part II
In this video, we observe the incoming mail on our MTA, look at how STARTTLS can help protect information in transit, how MTA-STS can help defeat a MitM perf...
System Administration
Week 8, The Simple Mail Transfer Protocol
In this video, we begin our discussion of E-Mail by looking at the components of the larger mail system (the Mail User Agent, Mail Transfer Agent, Mail Delivery Agent, Access Agent); we observe the packets involved in a simple #SMTP exchange and track an email from one system to the other, both through the logs and on the wire, before we then learn to speak SMTP via telnet(1).
youtube.com
CS615 System Administration, Week 08, Segment 1 - E-Mail, Part I
In this video, we begin our discussion of E-Mail by looking at the components of the larger mail system (the Mail User Agent, the Mail Transfer Agent, the Ma...
I thought I had seen it all when it comes to mail delivery and security issues.
But this morning I was introduced to the fact that there are Exchange admins who will implement a rule that all incoming mail from outside their own organization should be flagged as potentially dangerous and presented to the user with the option to block sender and no option to mark the message or the sender as valid.
Yes, that for every single message.
I thought I had seen it all when it comes to mail delivery and security issues.
But this morning I was introduced to the fact that there are Exchange admins who will implement a rule that all incoming mail from outside their own organization should be flagged as potentially dangerous and presented to the user with the option to block sender and no option to mark the message or the sender as valid.
Yes, that for every single message.
The Problem Isn't Email, It's Microsoft Exchange -- it turns out my 2011-vintage rant still rings true, now also available trackerless: https://nxdomain.no/~peter/the_problem_isnt_email_its_microsoft_exchange.html #inefficiency #timewasted #email #archiving #microsoft #exchange #compliance #deduplication #unsolvedproblems #smtp #mail #annoyances
nxdomain.no
The Problem Isn't Email, It's Microsoft Exchange
The Problem Isn't Email, It's Microsoft Exchange -- it turns out my 2011-vintage rant still rings true, now also available trackerless: https://nxdomain.no/~peter/the_problem_isnt_email_its_microsoft_exchange.html #inefficiency #timewasted #email #archiving #microsoft #exchange #compliance #deduplication #unsolvedproblems #smtp #mail #annoyances
nxdomain.no
The Problem Isn't Email, It's Microsoft Exchange
Announcing Email-Simplified (and Flask-Email-Simplified), a library for creating and sending email in Python. I blogged about it here: https://davidism.com/email-simplified/
Sets up TLS trust correctly, handles international domains, HTML with inline attachments, converting to/from MIME. Works in plain Python, has an API for integrating with frameworks, and an API for writing new service providers in addition to the built-in SMTP provider. And much more! #python #email #smtp
davidism.com
Email with Python, Simplified
I just released a new Python library, ; along with a Flask/Quart extension, . I wrote most of this library a year ago and have been using it privately, but d...
TIL: JMAP, to replace IMAP
https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol
💬 "The JSON Meta Application Protocol (JMAP) is a set of related open Internet Standard protocols for handling email.
[...] using JSON APIs over HTTP
[...] developed as an alternative to IMAP/SMTP
[...] potential replacements for CardDAV and CalDAV"
en.wikipedia.org
JSON Meta Application Protocol - Wikipedia
Preventing enshittification of platforms rests on credible exit for users and devs. #ActivityPub and #SMTP are not perfect but
a) are implemented und understood by many players,
b) enable freedom of choice of servers and clients,
c) implement #RightToMigrate as well as self/community custody
Many #p2p projects promise to remove servers but often promote and depend on a single implementation stack, have no spec and no interop among #p2p islands, and thus struggle to provide credible exit.
Preventing enshittification of platforms rests on credible exit for users and devs. #ActivityPub and #SMTP are not perfect but
a) are implemented und understood by many players,
b) enable freedom of choice of servers and clients,
c) implement #RightToMigrate as well as self/community custody
Many #p2p projects promise to remove servers but often promote and depend on a single implementation stack, have no spec and no interop among #p2p islands, and thus struggle to provide credible exit.
Preventing enshittification of platforms rests on credible exit for users and devs. #ActivityPub and #SMTP are not perfect but
a) are implemented und understood by many players,
b) enable freedom of choice of servers and clients,
c) implement #RightToMigrate as well as self/community custody
Many #p2p projects promise to remove servers but often promote and depend on a single implementation stack, have no spec and no interop among #p2p islands, and thus struggle to provide credible exit.
Preventing enshittification of platforms rests on credible exit for users and devs. #ActivityPub and #SMTP are not perfect but
a) are implemented und understood by many players,
b) enable freedom of choice of servers and clients,
c) implement #RightToMigrate as well as self/community custody
Many #p2p projects promise to remove servers but often promote and depend on a single implementation stack, have no spec and no interop among #p2p islands, and thus struggle to provide credible exit.
My google foo is failing me. So lets ask here.
Is there a drop-in replacement for the /usr/bin/sendmail binary that:
* accepts the same parameters as the orignal
* can directly deliver mails to the recipient's SMTP server without an intermediary SMTP server
* can optionally be configured via environment variables to send mails via a relay server
* does NOT listen to any ports, interaction via CLI only
I feel like this should be easy to write in Go but I can't find anything suitable.
J'ai pas forcément fait la liste exhaustive de tous les outils, mais si vous en avez que vous appréciez pour ce type de travaux, je suis preneur de vos retours ! Notamment si il y a un endroit où les formulaires de delist sont listés, pour les "gros" acteurs du mail...
Et n'oubliez pas :
> le mail c'est le turfu
Tout cela est "gratuit" bien évidemment. Coté trucs payants (je vous laisse nommer ce type de pratique) :
💸
Chez Outlook, pas de "allow list", mais (le gros MAIS), vous pouvez aller payer chez "Return Path Inc." qui s'appelle à présent Validity / Everest : https://www.validity.com/everest/
Chez UCEProtect https://www.uceprotect.net/en/rblcheck.php ils ont 3 niveaux de listes : par IP, par subnet, par AS. Pour retirer un AS c'est payant ... j'imagine que le level3 est peu utilisé.
🟠 Sur Orange en ce moment il semblerait qu'ils utilisent un service qui s'appelle Abusix https://lookup.abusix.com/ permet de vérifier ses IPs et ensuite on peut créer un compte pour les delister.
Chez Microsoft il y a aussi https://sender.office.com/ pour une IP et autre formulaire plus long https://olcsupport.office.com/ pour créer un ticket.
Je crois que https://senderscore.org/ peut être utile aussi.
Coté Yahoo, il y a la possibilité de créer un ticket https://senders.yahooinc.com/contact/
Si vous voulez plus d'outils pour tester les mails sortants, @bortzmeyer a fait une excellente liste sur son blog :
là on rajoute plein de tests pour SPF, DKIM, DMARC etc.
Pour se familiariser avec ces concepts je trouve que les articles de CloudFlare sont bien faits https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/
Coté outils pour s'assurer que les mails sont bien formés et que la configuration DNS est bien, il y a bien évidemment l'incontournable MXToolbox
Qui fait aussi des vérifications sur les blacklist accessoirement.
Coté black list monitoring on utilise HetrixTools
Ça permet de faire un check toutes les 24h sur le fait que les IPs sortantes des serveurs SMTP sont pas listées dans des listes de mauvaise réputation.
Par exemple SpamHaus https://check.spamhaus.org/
Et si c'est le cas, t'as un lien vers le formulaire de delisting
On utilise Postal pour que les applications envoient leur mail
C'est du libre, en ruby, le projet est plutôt chouette avec une interface web pour gérer. Ils répondent plutôt bien sur les suggestions et anomalies sur github...
