About TLS in smtp, I looked up the RFC about it:
A publicly-referenced SMTP server MUST NOT require use of the
STARTTLS extension in order to deliver mail locally. This rule
prevents the STARTTLS extension from damaging the interoperability of
the Internet's SMTP infrastructure. A publicly-referenced SMTP
server is an SMTP server which runs on port 25 of an Internet host
listed in the MX record (or A record if an MX record is not present)
for the domain name on the right hand side of an Internet mail
address.
Any SMTP server may refuse to accept messages for relay based on
authentication supplied during the TLS negotiation. An SMTP server
that is not publicly referenced may refuse to accept any messages for
relay or local delivery based on authentication supplied during the
TLS negotiation.
In short, it means that traffic between two smtps do not need to be encrypted. If you do configure Exim to require encryption, you'd simply be not getting all e-emails.
It also says that it's OK to require TLS from your users to your smtp.
The problem is that everyone running a mailserver would need to have purchased a certificate, although with the letsencrypt.org initiative things might be getting into the right direction. They will offer free trusted certificates for everyone. At one point in time I expect they will have to modify the RFC to make TLS required.
About the old thread, the idea behind it seems to be still valid I think, with GPG you've got clients issuing their own certificates in a way. Just with SSL/TLS you've got a private and public key, with GPG this is the same. But the clients are signing the e-mails with the public known key of the recipient, and the recipient is decrypting it with their private key. But GPG never became popular because it's too much hassle to work with. But in the sense that it is the clients who encrypt their messages, not the server is quite valid if you really want to secure your messages. Simply because the encrypted data can be transfered, stored and it doesn't matter because only the receiver can decrypt it with his own key.
So to communicate secure, you need the other party to participate:
- GPG, both parties need to know how this works
- Requiring TLS: both smtps need to have trusted certificates + both have to validate them, also configure strong ciphers
What a best practice is in the current state of things, I would say configure TLS for your clients. A lot of snooping takes place between client<>server, with open wifi's etc.