Академический Документы
Профессиональный Документы
Культура Документы
Email Infrastructure
Guide
Executive Summary
This companion to the SendGrid Deliverability Guide takes a deeper dive into the issues and
challenges around managing a commercial email infrastructure. If your business relies on email
to reach new customers and keep current customers engaged and informed this guide is the
answer. Get tips to avoid costly blunders that could get your IPs blacklisted. Make sure Internet
Service Providers can easily discern legitimate, wanted email from spam, phish emails and
other online fraud. Stay up-to-date on industry terms with a comprehensive glossary for email
infrastructure. Find out what you can do today to transform your email infrastructure from your
biggest headache to a major business asset.
sendgrid.com p2
However, if youre sending higher volumes or transactional or triggered emails, then using a shared IP is not a
good idea. A dedicated IP means just that, an IP address for your exclusive use and youre responsible for all
activity good and bad. For most businesses, a dedicated IP is the best option.
Warm it up
Regardless of your reputation, you will at various times need to add or switch IP addresses so you need a
process for warming up IPs. As weve discussed, a new IP with no reputation history is treated the same as
one with a poor reputation so if you just start blasting from a fresh IP youll quickly find yourself blocked and
blacklisted. Youll want to methodically warm up the IP by sending a few messages each day to high-value
segments that wont generate complaints. Gradually increase the volume over a period of days or weeks to
build a reputation for consistent sending with no complaints. Keep in mind warming up only really matters if
youre on a dedicated IP.
sendgrid.com p3
Code
Category
Issue
Action
Soft bounce
Hard or
Soft bounce
Hard bounce
Hard bounce
Soft bounce
Soft bounce
sendgrid.com p4
An individual receives an email message that they dont recognize, dont want or dont trust
The individual clicks the report spam or mark as junk option provided by their email reader (the exact
functionality varies amongst webmail providers and email software like Outlook or Apple Mail)
The ISP processes the complaint and provides the sender with the details of the complaint and assigns this
complaint to your IP address
The sender removes the address from their email file, treating it like an unsubscribe request
Most major ISPs allow senders to sign-up for FBL services via a simple web form, sign-up links include:
AOL
http://postmaster.aol.com/SupportRequest.php
Comcast
http://feedback.comcast.net/
Cox
http://fbl.cox.net/
Excite (Bluetie)
http://feedback.bluetie.com/
Fastmail
http://fbl.fastmail.fm/
Hotmail/ MSN
https://support.msn.com/eform.aspx?productKey=edfsjmrpp&ct=eformts&scrx=1&st=1&wfxredirect=1
Rackspace
http://fbl.apps.rackspace.com/
RoadRunner
http://feedback.postmaster.rr.com/
Synacor
http://fbl.synacor.com/
Tucows (OpenSRS)
http://fbl.hostedemail.com/
USA.net
http://fbl.usa.net/
Yahoo!
http://feedbackloop.yahoo.net/
A number of other ISPs also host feedback loops but you need to get in touch with their Postmaster to sign-up.
sendgrid.com p5
sendgrid.com p6
Step 4: Publish your authentication records. If you are using SPF, Sender ID or DKIM, work with whoever manages
your DNS records to publish the email authentication records youve collected. The actual publishing is easy -finding the responsible party who controls your DNS may be the tricky part.
Step 5: Setup your mail server to sign outbound email with DKIM. DKIM requires that your MTA have the appropriate
software implementation to sign all outgoing emails. Learn more at: http://www.sendmail.com/sm/wp/dkim/
Step 6: Test your authentication records. SPF, SenderID and DKIM provide options to publish your records in test
mode. This provides the opportunity for testing without risking delivery failures. The following resources can also
help you test your DKIM signed messages: http://testing.dkim.org/
Why authenticate?
Many ISPs will soon begin requiring that all inbound mail streams have published authentication records. Strong
reputation metrics in combination with properly implemented authentication can significantly improve your chances
of reaching the inbox.
sendgrid.com p7
Want to be whitelisted?
Gaining acceptance to a whitelist is a great medium-term goal for any business that relies on email
communications. The first step is to focus on building a world-class email program dedicated to best practices.
This will get you the reputation you need to gain acceptance and ensure you have the resources and expertise to
stay on the list.
sendgrid.com p8
4. Contact. Get in touch with the blacklist host and request removal based on the documentation and/or
your investigation.
It can take some time to get your IPs removed and it will be frustrating but remember that threatening legal
action and other aggressive tactics will probably only make the situation worse.
sendgrid.com p9
Domain Name System (DNS): DNS translates a domain name into an IP address to find the owners site.
Email Authentication: Technical standards to help ISPs and other receivers validate the identity of
an email sender. There are three authentication standards in use: Sender Policy Framework (SPF)
developed by AOL, SenderID developed by Microsoft and DomainKeys Identified Mail (DKIM) developed
by Yahoo!
Feedback Loop: The process by which an ISP forwards emails reported as spam (see complaint) for
immediate removal by the sender.
Header: The documentation that accompanies the body of an email message, the header contains
information on the email and the route it has taken across the Internet. Email readers display the to
(identity of the recipient) and from (identity of the sender) in the inbox.
IP Address: A unique number assigned to each device connected to the Internet. An IP address can
be dynamic, meaning it changes each time an email message is deployed, or it can be static meaning it
does not change. A static IP address is recommended for senders of commercial email.
MTA (Mail Transfer Agent): Software that transfers electronic mail messages from one computer to
another using a clientserver application architecture. An MTA implements both the client (sending) and
server (receiving) portions of the SMTP (Simple Mail Transfer Protocol).
MX Record: A Mail Exchanger (MX) record in the DNS system specifies a mail server responsible for
accepting email addresses on behalf of a domain. The MX records associated with a domain assure
that the email is properly routed via Simple Mail Transfer Protocol (SMTP).
Open Relay: An SMTP server configured in such a way that it allows anyone on the Internet to send
email through it, not just mail destined for or originating from known users. This is not a recommended
configuration because it can be exploited by spammers and servers with open relays are routinely
blocked and/or blacklisted.
Phishing: Technique for acquiring information such as user names, passwords, credit cards, social
security numbers and other personal data by masquerading as a trusted business like a bank or credit
card company. With phish messages, the email appears to be sent by the trusted entity and the
consumer is tricked into providing their personal information.
Reverse DNS: The resolution of an IP address to a designated domain name. The reverse of the process
where computer networks use DNS to determine the IP address associated with a domain name.
sendgrid.com p10
SenderID: An email authentication standard developed by Microsoft that compares the email senders
From address to the IP address to verify that it is authorized to send email from that domain.
Shared IP Address: In the context of deploying email, this means that a single IP address or IP
range is used to send email for multiple domains. The reputation of this IP is based on the aggregate
performance of all the senders that use it.
SPF (Sender Policy Framework): An email authentication standard developed by AOL that compares
the email senders actual IP address to a list of IP addresses authorized to send mail from that domain.
The IP list is published in the domains DNS record.
SMTP: Simple Mail Transfer Protocol, the server-to-server process used to send email across the Internet.
Spam Filter: Software filters that block email on a range of attributes from words or phases within the email
to header information and other factors. The goal is to identify spam before it is delivered to the inbox.
Spam Trap: Also called a honeypot, email addresses are created (or re-activated) by ISPs specifically
to lure spammers. In many cases, the only way to acquire the address is through an automated email
address harvesting process.
Spoofing: Technique where forged email addresses are used to trick recipients into opening an email
because the source has been hidden. This deceptive tactic is used to spread viruses and other malicious
programs.
Suppression List: A list of email addresses kept by an organization that cannot be mailed because the
recipients have request removal either by unsubscribing or by logging a complaint.
Unknown User: A hard bounce error indicating the email address (user) does not exist at the
organization or domain.
Whitelist: A list of trusted IP addresses and domains for which all mail is delivered, bypassing spam filters.
WHOIS Record: A record of domain registration whereby you can discover when and by whom a
domain was registered along with contact information and expiry dates.
sendgrid.com p11