Subsections of email trends
eine gute Alternative zu E-Mails mit BCC
In einem früheren Beitrag haben wir die Vor- und Nachteile der Verwendung von BCC-E-Mails erläutert,
siehe:„So versenden und begrenzen Sie BCC-E-Mails“.
In den Schlussfolgerungen haben wir unter anderem Folgendes festgestellt:
Verwenden Sie spezielle Apps für den Versand von Massen-E-Mails.
Die professionellen Systeme verfügen über einen Genehmigungsworkflow
und eine schrittweise Kontrolle;
sie sind darauf ausgelegt, Fehler zu vermeiden.
Zusammenfassung dieses Artikels:
So funktioniert es
E-Mail-Marketing-Plattformen können schwierig zu erlernen und zu betreuen sein (falls Sie diese Ihren Kunden zur Verfügung stellen).
Wir möchten Ihnen hier die Möglichkeit vorstellen, die Open-Source-Software „GNU Mailman“ für den Versand Ihrer Massen-E-Mails zu nutzen.
Dieser Vorschlag basiert auf unseren eigenen Erfahrungen mit der benutzerfreundlichen„Copymail App“.
Eine „One-Way“-Liste in Mailman ist eine Konfiguration für Newsletter oder Ankündigungen
,
bei der nur autorisierte Moderatoren Beiträge veröffentlichen können und Mitglieder nicht auf der Liste antworten können.
So funktioniert es:
-
Der Nutzer sendet die Nachricht über seinen E-Mail-Client oder über das Webmail an die E-Mail-Adresse der Liste:
Anschließend muss er den Versand bestätigen, woraufhin die Nachricht serverseitig an alle Abonnenten verteilt wird.
-
Das System verarbeitet automatisch Bounces (zurückgesendete E-Mails) und führt auf Wunsch die Abmeldung durch.
Abonnements müssen manuell registriert werden.
-
Der Dienst ist äußerst zuverlässig und kann problemlos Tausende von Adressen verarbeiten.
Der Versand erfolgt über RealSender oder andere SMTP-Server.
Zurück zum Anfang
GNU Mailman „Einweg“-Liste
GNU Mailman ist eine weit verbreitete Software, die von den meisten Internetdienstanbietern angeboten wird.
Im Internet gibt es einige Anleitungen, die erklären, wie man sie für Massenversendungen konfiguriert und nutzt:
- Mitglieder melden sich an, indem sie ein Formular auf Ihrer Website ausfüllen (und auf die Bestätigungs-E-Mail antworten)
- Sie erhalten eine Willkommensnachricht, in der nicht erwähnt wird, wie man Beiträge in der Liste veröffentlicht
- Sie erhalten Ihre Newsletter mit einer Fußzeile, die eine kurze Anleitung zum Abbestellen enthält
- Nur autorisierte Personen dürfen Beiträge in der Liste veröffentlichen (die Newsletter versenden)
Die wichtigste Quelle ist dieses Dokument, das auf zwei Beiträgen von Barry Warsaw in der Mailman-Users-Liste basiert:
Wie erstelle ich einen Newsletter, eine Ankündigung oder eine Einweg-Liste?
Der Text erläutert die wichtigsten Punkte im Detail:
- Wie erstellt man eine individuelle Begrüßungsnachricht und eine Seite mit Informationen zur Liste, ohne dabei zu erwähnen, wie man Beiträge in der Liste veröffentlicht?
- Wie lassen sich Passwortprobleme und Probleme beim Abmelden, mit denen man bei dieser Art von Liste häufig konfrontiert ist, minimieren?
- Wie kann man die Liste so einschränken, dass nur autorisierte Personen Beiträge verfassen können?
- So richten Sie eine Ankündigungsliste ein, um an eine Kontaktadresse zu antworten
- So postest du in der Ankündigungsliste
Ein weiterer Artikel der Stanford University erklärt, wie Mailman
genutzt werden kann, um eine Liste einzurichten, die ausschließlich für Ankündigungen gedacht ist:
So richten Sie eine „einseitige“ Liste nur für Ankündigungen oder einen Newsletter ein – Wissensartikel KB00010792
Zurück zum Anfang
Ein kurzer Rückblick auf GNU Mailman
Mailinglisten können entweder als Diskussionsforen oder als Ankündigungsplattformen dienen. Die Mailman-Software ist in Python geschrieben; vor ihrer Veröffentlichung nutzte die Python-Community Majordomo, einen auf Perl basierenden Mailinglisten-Manager.
Heute betreut Mark Sapiro den stabilen 2.1-Zweig,
,
während sich Barry Warsaw auf die neue 3.X-Version konzentriert.
Zwei übergeordnete Grundsätze, die für den anhaltenden Erfolg von Mailman entscheidend sind:
- Keine Nachricht sollte jemals verloren gehen
- Eine Nachricht sollte niemals mehr als einmal übermittelt werden
In Mailman 2 haben die Entwickler das System zur Nachrichtenverarbeitung neu gestaltet, um sicherzustellen, dass diese beiden Grundsätze stets oberste Priorität haben. Dieser Teil des Systems ist nun seit mindestens einem Jahrzehnt stabil und einer der Hauptgründe dafür, dass Mailman heute so weit verbreitet ist.
Zurück zum Anfang
VERP-Bounce-Management
VERP steht für „Variable Envelope Return Path“.
Es handelt sich um eine bekannte Technik, die Mailinglisten einsetzen, um Adressen von Empfängern, bei denen es zu Rückläufern kommt, eindeutig zu identifizieren.
Wenn die Mailingliste einen Rückläufer erhält, kann sie entsprechende Maßnahmen ergreifen, beispielsweise die betreffende Adresse deaktivieren oder aus der Mitgliederliste entfernen.
Es gibt ein Standardformat für Rückmeldungen, das als „Zustellstatusbenachrichtigungen“ bezeichnet wird. Mailman nutzt eine Bibliothek, die Dutzende von Heuristiken für das Format von Rückmeldungen enthält, die alle im Laufe der zwanzigjährigen Geschichte von Mailman in der Praxis aufgetreten sind.
VERP nutzt eine Anforderung des grundlegenden SMTP-Protokolls aus, um eine eindeutige Erkennung von Bounce-Nachrichten zu gewährleisten, indem solche Bounce-Nachrichten an den Absender der Hülladresse zurückgesendet werden.
Dies ist nicht die Von: Feld im Nachrichtentext, aber tatsächlich ist das E-MAIL VON Wert, der im SMTP-Dialog festgelegt wurde. Dieser Wert bleibt während des gesamten Zustellungsvorgangs erhalten, und der endgültige empfangende Mailserver ist gemäß den Standards verpflichtet, die Rückmeldungen an diese Adresse zu senden.
Wenn der Mailman-Server mylist@example.org, dann der VERP-kodierte Absender einer E-Mail, die an eine Mailingliste gesendet wurde anne@example.com lautet:
mylist-bounce+anne=example.com@example.org. Zurückgewiesene E-Mails werden an die VERP-verschlüsselte Empfängeradresse gesendet. Mailman kann dann die An: Header, um den ursprünglichen Empfänger zu ermitteln anne@example.com
Die Verwendung von VERP setzt voraus, dass Mailman genau eine Kopie der Nachricht pro Empfänger versendet.
VERP erfordert eine eindeutige E-MAIL VON für jeden Empfänger, und das geht nur, indem man eine eigene Kopie der Nachricht versendet.
Dieser Ansatz trägt zudem dazu bei, dass die Nachricht nicht als Spam eingestuft wird.
Zurück zum Anfang
Ausrichtung der Absender- und E-Mail-Absenderadresse
Während der Testphase ist die Standardeinstellung „Copymail-AppBei der Konfiguration „“ wird eine von uns bereitgestellte Domain als E-Mail von Adresse (auch bekannt als Bounce-/Return-Path-/Envelope-Adresse), an die zurückgewiesene E-Mails zurückgeschickt werden. Diese E-Mail von Die Domain unterscheidet sich von der Von Absenderadresse (die für die Empfänger sichtbare Adresse des Absenders).
Bevor das System in Betrieb genommen wird, müssen einige Änderungen am DNS vorgenommen werden, um die mit dem Von Domain.
Die neuesten E-Mail-Standards ermöglichen es Ihnen, authentifizierte E-Mails unter Verwendung einer Subdomain als E-Mail von Adresse (zum Beispiel, email.deine-E-Mail-Domain.com), wobei die Basisdomain weiterhin als Von/Absender Adresse (zum Beispiel, info@youremaildomain.com). Weitere Einzelheiten finden Sie in der E-Mail-Authentifizierung – Erweitert Seite.
Die gleiche Situation kann auch in anderen Umgebungen auftreten. Wir empfehlen Ihnen, dies bei Ihrem Internetanbieter zu überprüfen.
Zurück zum Anfang
Reverse-Proxy für SMTP-Server
A reverse proxy is a server that sits in front of one or more web servers
to handle client requests, improving security, performance, and scalability.

Instead of communicating directly with servers,
clients send their requests to the reverse proxy,
which routes them to the appropriate servers
acting as a single, secure access point.
Key Benefits:
- Security
It can block malicious requests, encrypt traffic,
and protect backend servers from direct attacks.
- Performance
It distributes incoming traffic across multiple servers, preventing overload
of a single server and ensuring greater availability.
- Scalability
It allows you to add or remove backend servers without service interruption,
offering the ability to handle growing traffic.
HTTP-only reverse proxy (Layer 7)
There are several tools available on the internet; after research, we initially ruled out those that only support the HTTP protocol (Layer 7):
NO Apache
“Oh dear. Take a moment to learn about the technologies you’re dealing with. Email uses SMTP.
Apache uses HTTP. Apache knows absolutely nothing about SMTP. If you want to work with email messages, you’ll need a technology that speaks SMTP.”
– EEAA Commented Aug 18, 2016 at 2:49
NO Caddy
“Caddy cannot proxy TCP, only HTTP over TCP.
Use a reverse proxy that can proxy TCP like Traefik, Nginx, or haproxy, or use this experimental plugin.”
– ElevenNotes Commented Sep 24, 2024
We then focused on the three recommended in the comments:
“Traefik, NginX, or HAProxy,” installing and testing them one by one.
Traefik was the first choice.
Most of the tutorials started with Docker, a platform I wanted to avoid and opt for a simple solution,
possibly based on one of the Linux package managers, such as YUM for RPM-based distributions like Fedora and CentOS,
or APT (Advanced Package Tool), which is used on Debian-based distributions like Ubuntu and Debian.
After a long search, we found this recent article, which describes the type of installation we were looking for:
Setup Traefik as a systemd Service.
One note: you need to change the SELinux settings from “Enforcing” to “Permissive.”
Again, after trying two courses on Udemy, we found this excellent course:
Traefik Crash Course (Without Docker)
We managed to get it working by reproducing the examples provided.
Toward the end of the video, the excellent instructor expressed his complete disapproval of this tool:
Traefik Crash Course - 53:50 Summary.
This discouraged us from further testing, leading us to try something else.
NginX was the second choice
In this case, the installation was simpler, using YUM in short:
yum install epel-release nginx nginx-mod-stream nginx-mod-mail
A note: in SELinux, you need to enable relay:
setsebool -P httpd_can_network_relay 1
For the training, we played it safe, with the same instructor as the previous course:
NginX Crash Course (the first part ends after about an hour and twenty minutes).
The instructor is also NOT convinced about this application, particularly the fact that it acts as both a web server and a reverse proxy:
NginX Crash Course - 1:20:10 Summary.
The report ends with “I’ll pick HAProxy over NginX,” so we decided to try HAProxy as well.
Finally, we also tried HAProxy.
Installation turned out to be the easiest thing ever, as it’s a very common application,
available in all Linux package managers, for example: yum install haproxy
We’ve also consulted our trusted instructor:
HAProxy Crash Course.
It works, but unfortunately, it’s NOT good for SMTP authentication:
“It’s not possible to configure haproxy this way, because haproxy doesn’t support SMTP at all.”
– lukastribus Commented Aug 17, 2023
A standard SMTP server as a reverse proxy
At this point, after two weeks of testing, we realized that
it’s better to use a standard SMTP server as a reverse proxy for other SMTP servers.
It does its job, using only the SMTP protocol, properly authenticates connections,
and can forward requests to other SMTP servers via the “smarhost” function.
In Postfix, in main.cf, as
relayhost = [smarthost_address]:port
In Sendmail, in sendmail.mc, as
define(`SMART_HOST',`mail.example.com')
Zurück zum Anfang
Manchmal haben Sie Daten von Ihrer Website oder Ihrer Unternehmenssoftware exportiert
, die Bestellinformationen oder Kundendaten enthalten.
Möglicherweise benötigten Sie nur die E-Mail-Adresse und das Bestelldatum.
Eine Möglichkeit besteht darin, alle Daten in Excel zu importieren, die unerwünschten Spalten zu löschen
und die verbleibenden zu exportieren.
This may not work well if the email field also contains the email address description,
for example: “Dave Martin <davemartin@bogusemail.com>”.
Es kann mühsam sein, wenn man die Aufgabe mehrmals wiederholen muss
oder wenn man alle Schritte jemand anderem erklären muss.
Ein regulärer Ausdruck (kurz „regex“ oder „regexp“ genannt),
ist eine Zeichenfolge, die ein Muster angibt, nach dem im Text gesucht wird.
Ein ganz einfacher Fall ist es, ein Wort, das auf zwei verschiedene Arten geschrieben wird, in einem Texteditor zu finden,
der reguläre Ausdruck seriali[sz]e passt sowohl auf „serialise“ als auch auf „serialize“.
Eine komplexere Situation stellt die Syntax zur Identifizierung im Text dar
Tutorial zu regulären Ausdrücken (Regex)
Empfohlenes YouTube-Video
„38 Minuten, die sich gelohnt haben, das war es absolut wert “:
So finden Sie beliebige Textmuster
(ab Minute 25 wird die Syntax zum Extrahieren von E-Mail-Adressen erklärt)
Spickzettel zur Verwendung regulärer Ausdrücke
Reguläre Ausdrücke werden in der Regel
in fortgeschrittenen Texteditoren wie Notepad++ oder Atom unterstützt.
Es stehen auch kostenlose Online-Tools zur Verfügung, darunter:
https://regexr.com – ein Online-Dienst zum Erlernen, Erstellen und Testen regulärer Ausdrücke.
Erläuterung der Weboberfläche:
„Expression“ ist das Feld, in das die Regex-Syntax eingegeben wird.
„Text“ ist der Inhalt, den Sie analysieren möchten.
Unter „Tools > List“ werden die Ergebnisse der Extraktion angezeigt.
Ausdruck:
[a-zA-Z0-9._-]+@[a-zA-Z0-9._-]+\.[a-zA-Z0-9_-]+
Text:
Dave Martin
615-555-7164
173 Main St., Springfield RI 55924
davemartin@bogusemail.com
Charles Harris
800-555-5669
969 High St., Atlantis VA 34075
charlesharris@bogusemail.com
Eric Williams
560-555-5153
806 1st St., Faketown AK 86847
laurawilliams@bogusemail.com
Extras > Liste:
$&\n
Ergebnis:
davemartin@bogusemail.com
charlesharris@bogusemail.com
laurawilliams@bogusemail.com
Beispiel 2: Um die E-Mail-Adresse und das Datum zu extrahieren
Ausdruck:
","(.*?)([a-zA-Z0-9._-]+@[a-zA-Z0-9._-]+\.[a-zA-Z0-9_-]+)(.*?)",".*",(\d{2}\.\d{2}\.\d{4})
Text:
"lorem ipsum dolor sit amet","Robert Farrell <rmfarrell@bogusemail.com>","",02.01.2024, ,5379,
"consectetur adipiscing elit","""Mesa, Rene <rmesa@bogusemail.com>""","",04.01.2024, ,20826,
"sed do eiusmod tempor incididunt","Antonio Bugan <antonio@bogusemail.com>","",04.01.2024, ,2856,
"ut labore et dolore magna aliqua","Crawley Down Tennis Club <hello@bogusemail.com>","",05.01.2024, ,4453,
Extras > Liste:
$2,$4\n
Ergebnis:
rmfarrell@bogusemail.com,02.01.2024
rmesa@bogusemail.com,04.01.2024
antonio@bogusemail.com,04.01.2024
hello@bogusemail.com,05.01.2024
Spickzettel zur Verwendung regulärer Ausdrücke
. - Any Character Except New Line
\d - Digit (0-9)
\D - Not a Digit (0-9)
\w - Word Character (a-z, A-Z, 0-9, _)
\W - Not a Word Character
\s - Whitespace (space, tab, newline)
\S - Not Whitespace (space, tab, newline)
\b - Word Boundary
\B - Not a Word Boundary
^ - Beginning of a String
$ - End of a String
[] - Matches Characters in brackets
[^ ] - Matches Characters NOT in brackets
| - Either Or
( ) - Group
Quantifiers:
* - 0 or More
+ - 1 or More
? - 0 or One
{3} - Exact Number
{3,4} - Range of Numbers (Minimum, Maximum)
Quelle: GitHub-Codeausschnitte
Zurück zum Anfang
So schützen Sie „NO-MAIL“-Domains
Most companies and public bodies register multiple domain names.
Businesses often purchase more than one domain to defend against user error and protect their brands.
Other times to promote events or projects that deserve special visibility.
The numbers can vary from a few dozen domains up to several hundred for a single activity.
They range from about two hundred in a Municipality of a large city, to the thousands of Ferrari and Goldman Sachs.
Up to staggering numbers when you count the total number of registered domains,
which at the end of 2022 reached 350 million domain names, as claimed by Verisign.
Many of these domains are used as a “showcase”. There are no email addresses listed on the website.
Contact requests are generally redirected to forms to be filled in or to social media channels.

The management of email sendings, with the necessary authentications (SPF, DKIM, DMARC, …) is becoming more and more complex.
For this reason, only one domain is usually the one actually used for official external communications via email.
However, the idea of protecting one’s online presence can prove to be a double-edged sword.
Misconfigured “showcase domains” can easily be exploited by malicious actors.
They often abuse the well-known name of the sender, to gain the trust of recipients and demand actions
that expose confidential information or the opening links and attachments.
Recipients are at risk of compromising the security of their systems,
allowing access from the outside to gangs of digital criminals.

The complex authentication systems mentioned above also have their positive sides.
The DMARC protocol was designed to act on fake emails,
to prevent unauthorized individuals or organizations from shipping with our senders.
A quick setup allows you to declare that a given domain is NOT in use,
warning recipients to reject any email from that domain.
It is sufficient to insert a record (single row) in the domain dns with this indication:
_dmarc.yourdomain.com. TXT "v=DMARC1; p=reject"

Whether this rule applies depends on the system receiving the messages.
The good news is that the DMARC protocol has been an approved IETF standard since March 2015.
Most online email services implement it to protect their users.
Messages from “NO-MAIL” domains will be BOUNCED automatically.
In this way, in addition to protecting your company from abuse, you will prevent “old” domains,
that are no longer authorized to send nor authenticated, from being used by mistake.
Warum nutzen Unternehmen SMS?
The issue: unread emails, unanswered calls
An email inbox is full of competition for the consumer’s attention,
making it that much harder for businesses to get noticed by their customers and prospects.
Getting someone to read an important email (or even getting them on a phone call)
is becoming more and more difficult.

48% of consumers have more than 50 unread messages in their inbox.
Most consumers refrain from weeding out unread messages, so emails keep piling up.
– source: ZipWhip Why Your Customers Don’t Read Your Emails Anymore (pdf 15 MB)
Some updates are urgent and may be critical. Delivering them by email entails a risk
of the message not being read or landing in the spam folder.
When asked “how many email accounts do you have?” 77% answered “two or more”.
Usually only one is configured on the smartphone.

Calling customers and NOT getting an answer
or having the call go to voicemail,
is becoming increasingly common.
97% of consumers admit to ignoring calls from businesses and unknown numbers.
– source: ZipWhip Why Your Customers Don’t Answer the Phone Anymore (pdf 15 MB)
The solution: text me
covid-19 increased the use of electronic devices,
64% of interviewed people declared: “I spend more time on my phone”.

58% of consumers say that texting is the most effective way for businesses to reach them quickly.
– source: ZipWhip State of texting 2021 (pdf 21 MB)
Even in e-commerce, where email is usually required for registration,
some large companies, including Amazon, offer the possibility to register via the mobile number.
The explanation: five good reasons for texting
-
It is immediate
Text messages are almost always read, usually seconds after they’re received.
Open rates exceed the 95% threshold (of this 95%, 90% occur within three minutes of delivery).
SMS messages are short and concise, communications are essential and immediate.
-
It is simple
They don’t need an internet connection to get to their recipient.
It allows your brand to reach demographics that are not well-versed in technology.
The use is similar to video content (fast, instantaneous, that can be said in 160 characters).
-
It is ubiquitous
SMS is compatible with every mobile phone on the planet, without installing new apps.
The smartphone (or old generation mobile phone) is always at the owner’s side like the wallet and the house keys.
Gives the possibility to interact with a customer wherever he is, through a reliable channel.
-
It is cheap
SMS messages have a low cost of sending.
The average length of messages sent does not exceed 155 characters (the limit is 160 characters for a single message).
Using texts in combination with phone calls or emails can save time when communicating with customers.
-
It is interactive
Communication takes place through an “unloaded” channel, it is not “pushed”, it is not “stressed”.
SMS is associated with higher importance, it is more likely to be opened and read. They are also more likely to be answered.
The language of text messaging is simple and encourages interaction. Response rates are up to 45%.
Wie man mit zurückgesendeten E-Mails umgeht
Bounced emails or simply “bounces” are the emails sent automatically
by an MTA (Mail Transfer Agent) to the sender,
to inform that the message was NOT received correctly by the recipient
The subject is usually “Returned mail: see transcript for details”.
The explanatory bounce information, a code with a description, can be found in the content.
The “status-code” should clearly identify the type of error that caused the return
but often the codes and descriptions used by each email service provider
must be analyzed and interpreted to classify the bounce correctly.
What are the risks with bounced emails?
Mailing to wrong/inactive recipients is considered a “spammer behaviour”.
you cannot ignore them
If you want to reach the rest of your list, it’s best to stop sending to the “bad” part of it.
Sometimes this is called “list hygiene”.
you should understand their meaning
There are three types of Delivery Status Notification (DSN):
Success - The email has been delivered (notification is sent only if requested by the sender)
Hard Bounce - A permanent error has occurred
Soft Bounce - A temporary error has occurred
hard bounce (status-code 5.XXX.XXX): the email address generated a permanent error
such as “550 5.1.1 … User unknown” or “5.1.2 … Host unknown”
A permanent error indicates that you should never send to that recipient again.
A single bounced message should trigger email address blocking.
soft bounce (status-code 4.XXX.XXX): the email address generated a temporary error
such as “452 4.2.2 … Mailbox full”
A transient error indicates that you can retry delivery in the future.
At least three bounced messages, within a few days of each other, should trigger email address blocking.
you should know how bounce handling works (and how to tweak it)
- all returned messages are downloaded by an application
they’re made available for human review, either through the app interface or through a JSON file
- the Classification follows some rules, which can be edited
- the Options define when soft bounces will be “upgraded” to to hard bounces level

» Zurück zum Anfang
Check the number of bounces
Sometimes a configuration error on both the sender’s side and the recipient’s side
can cause a soft bounce or even a hard bounce.
A good habit is to check the number of bounced messages in the last week
to see if the values are the same as before or if there are any anomalies.
If there is something wrong, you will notice immediately.
Reading the details of the bounces will help you find the cause.
Some systems allow you to define the number of days (eg 180)
after which a subscriber’s bounce information is discarded.
In this way the smtp server will try to contact that recipient again.
Blocks activated by mistake will be cleared automatically
but the reputation of the smtp server can suffer.
» Zurück zum Anfang
New trends for bounce handling
In one sentence: prevention is better than cure.

To avoid damage to the reputation of their SMTP servers,
more and more ESPs (Email Service Providers) use an “email suppression list”
that acts before the messages reach the recipient’s mailbox.
When any customer sends an email that results in a hard bounce,
the email address that produced the bounce is added to the suppression list.
The suppression list applies to all the customers. In other words,
if a different customer attempts to send an email to an address that’s on the suppression list,
the SMTP server won’t send it out, because the email address is suppressed.
Using smtp servers with dedicated IP can avoid some issues related to reputation sharing.
For example, the “email suppression list” can only be limited to your IP address,
so that if another customer causes a blacklisting of the smtp server and the related bounces,
your mailings will not be affected.
» Zurück zum Anfang
Bounced messages status codes
Status codes used to identify hard bounces and soft bounces have the following syntax:
status-code = class “.” subject “.” detail
Status codes consist of three numeric fields separated by “.”
- the first sub-code (class) indicates whether the distribution attempt was successful
- the second sub-code (subject) indicates the probable source of any delivery anomaly
- the third sub-code (detail) indicates a specific error condition
The sub-code (class) provides a general classification of the status.
The values listed for each class are defined as follows in the RFC 3463 and the RFC 6522:
2.XXX.XXX Success (NOT sent unless requested by the sender)
Success specifies that the DSN is reporting a positive delivery action.
Detail sub-codes may provide notification of transformations required for delivery.
4.XXX.XXX Persistent Transient Failure
A persistent transient failure is one in which the message as sent is valid,
but persistence of some temporary condition has caused abandonment or delay of attempts to send the message.
If this code accompanies a delivery failure report, sending in the future may be successful.
5.XXX.XXX Permanent Failure
A permanent failure is one which is not likely to be resolved by resending the message in the current form.
Some change to the message or the destination must be made for successful delivery.
Some code and description examples:
2.0.0: Sent (Message accepted for delivery)
4.2.2: Over quota
4.4.5: Insufficient disk space
5.0.0: Invalid domain name
5.1.1: User unknown
5.7.1: Message content rejected
» Zurück zum Anfang
Wie kann ich überprüfen, ob mein SMTP sicher ist?
With the increasing number of ransomware attacks in the 2020s
email, our main communication channel on the Internet, is it safe?
The SMTP servers are a particularly sensitive infrastructure.
They can spread email messages on our behalf,
that our counterparts accept as coming from trusted senders
because they are correctly authenticated by the sending server.
SMTP servers are a particularly sensitive infrastructure.
They spread email messages on our behalf,
that our counterparts accept as coming from trusted senders
because they are properly authenticated by the sender’s SMTP server.
What happens if someone else uses your SMTP server?
How to check if my SMTP server is safe?
The use of sensitive infrastructures on the Internet
requires a high level of protection to prevent abuse.

If you try to send messages via smtp.gmail.com
you’ll be blocked and receive this “Critical security alert”:
Less secure app blocked
Google blocked the app that you were trying to use
because it doesn't meet our security standards. [...]
The only alternative is to use OAuth2, a protocol that doesn’t share password data
but instead uses authorization tokens to prove identity.
The most used mailservers on the Internet (August 2021 data) are:
Exim (58%), Postfix (35%), Sendmail (4%)

To continue using your own mailserver
reducing the risk of being hacked,
the minimum requirements to check are:
-
accept only secure authentication
username and password must be transmitted via secure connections,
typically port 587+TLS or port 25+TLS or port 465+SSL
plain text sensitive data communications are disabled
-
there must be a check on the “Mail-From” address (the sender),
only those you have authorized will be able to pass
-
configure Fail2ban to block all external attacks
to prevent attempts to force your protections.
In particular Fail2ban should block all repeated attempts:
- to log in with the wrong username or password
- to send emails with an unauthorized sender
- to interrupt the smtp connection during the authentication process
(multiple broken connections make the smtp service unavailable for legitimate users)
The block usually occurs between three and ten attempts
and bans the source IP for three to twenty-four hours.
It is quite easy to test these points and decide whether or not
your smtp infrastructure requires a security upgrade.
Fail2ban protects your server against BruteForce/DDOS attacks.
It works as if when a stranger knocks on the door,
after a certain number of strokes, the door disappears.

A testimony from Hacker News:
I manage my own mailserver since several years and I think many others here
use solutions like Mail-in-a-box, mailcow, Mailu, etc
Until Corona I never had big problems with my mailserver but in the last weeks
I got very big incoming Traffic - that was too much for my server and i had to manually reboot it every time ...
[...] Edit: I changed my fail2ban settings and found out I was primarily targeted
by brute force attacks which I should be able to protect against with tools like fail2ban
Fail2ban is a log-parsing application that monitors system logs
looking for the symptoms of an automated attack.
When an abuse attempt is located, using the defined parameters,
Fail2ban adds a new rule to the firewall (iptables or firewalld)
to block the IP address of the attacker, either for a set amount of time, or permanently.
Fail2ban can also alert you through email that an attack is occurring.
Fail2ban is primarily focused on SSH attacks, although it can be further configured
to work for any service that uses log files and can be subject to a compromise.
It is widely used. Searching for it on Google, it’s easy to find
configuration examples for protecting mail servers.
DNS-Einstellungen für den E-Mail-Versand
What domain DNS settings are required to send emails ?
Email service providers usually require you to verify the sender’s domain
before using their smtp servers. There are two reasons for this:
-
Prove domain ownership
by managing the DNS, you prove that you control the sender’s domain
this means you are not using someone else’s domain (spoofing)
-
Sending of authenticated emails
by setting SPF and DKIM authentication, your messages
are recognized by the recipients as coming from a “real” sender
if your domain and your smtp provider have a good reputation
the messages should reach the recipients’ inbox
Summary:
Email service providers: requirements for verified senders
Below there are some of the major providers we checked, in alphabetical order.
At the end of July 2021, we tested the basic settings required to start sending emails.
The verified domain was “emailperfect.com”. It was registred in 2012 and never used to send emails before.
| Provider name |
DKIM “From” domain alignment |
SPF “Mail-From” domain alignment |
Notes |
| Amazon SES |
yes (3 CNAME records) |
NO (@amazonses.com) |
|
| Mailgun |
yes (TXT record) |
yes (TXT record) |
Hotmail and Yahoo delivery check* |
| Mailjet |
yes (TXT record) |
NO (@mailjet.com) |
Hotmail and Yahoo delivery check* |
| RealSender |
yes (2 CNAME records) |
yes (TXT record) |
feste IP-Adresse |
| Sendgrid |
yes (2 CNAME records) |
yes (CNAME record) |
Hotmail delivery check* |
Sendinblue |
NO (sendinblue.com) |
NO (@aa.d.sender-sib.com) |
NO sender verification required |
| Smtp2go |
yes (1 CNAME record) |
yes (CNAME record) |
|
* = we sent a message to each of the following mailboxes and noted if anything suggested that we check again:
Gmail, Hotmail, Yahoo, Gmx, Aruba, Tiscali, Exchange Online
Why is a verified sender so important?
In 2021 we consider mandatory that the sender’s domain is authenticated
so that the recipient knows that the sender’s email address has not been forged.
Preemptive authentication checking also greatly reduces the risk of abuse of sending systems.
For this reason we have “deleted” a provider from the list:
It does not require the domain validation before allowing them to send messages.
What is domain alignment?
When sending a message, we are dealing with two domains:
- in the senders’s From address, that is visible to the recipients
- in the Mail-From address (also called “envelope sender” or “return-path”),
that is hidden and managed directly by the ESP to receive the bounced mails
The “domain alignment” requirement is summarized in this sentence:
“when a sender authenticates their email using SPF and/or DKIM,
at least one of the domains must align with the sending From domain”
CNAME record and TXT record, which one is best?
For DKIM authentication, a CNAME record is easier to implement.
The same result can be achieved by adding a 2048-bit TXT record but it is more complicated.
In addition, delegation of the DKIM record via CNAME allows your provider
to modify its key when necessary for security reasons.
For SPF authentication using a CNAME record means that the Mail-From address
will be a subdomain managed by your email service provider, such as: bounce.your-company-name.org.
The provider will handle both SPF authentication and bounced messages.
TXT record for SPF authentication is the best choice with email servers such as Zimbra or Exchange,
where each sender receives the bounced messages directly.
There is only one TXT record for domain authentication,
it may be difficult to maintain if you manage multiple smtp servers.
What is a dedicated IP address?
The “Internet Protocol address” or “IP address”
is similar to a telephone number on your home phone or mobile device.
Most SMTP services provide “shared” IP addresses to their customers.
Each time a mailing is sent, a different IP address is assigned.
“Dedicated IP address” means that your email sending IP address will not change over time.
This provides great control over the sender’s reputation that cannot be harmed by the use of others.
Should we manage the company’s domain DNS settings directly?
Not necessarily, because it requires some technical skills.
The company management should be aware that a few changes in the DNS settings
can lead to serious consequences such as:
- bring website visitors to another web server
- redirect incoming messages to a different mail server
- break email authentication so that messages are considered as spam or rejected
» Zurück zum Anfang
So verwalten Sie MAILINGLISTEN
How to manage mailing lists with foresight ?
-
First of all: why use a mailing list manager?
CRM systems (such as Salesforce and Microsoft CRM)
and business emails (such as Office 365 and Google Apps Gmail)
they are not suitable for mass mailings.
They were created for one-to-one communication.
Often to avoid abuses they impose daily sending limits.
Many times companies have to send emails to most of their contacts or to some selected groups.
Bulk mailings must be managed with dedicated systems,
capable of processing large amounts of messages and automatic unsubscriptions.
-
Second step: where to look for these solutions?
The easy answer is to look at “Saas” - Software as a service - offers
(Mailchimp is the most famous system, Inxmail is less known, is used by large companies).
Local installation versus cloud services is always an important choice.
Our reflection is that the local option helps to “regain email control”, which we are promoting.
Even if you decide to use a self-hosted application in the cloud,
this allows you to easily change supplier while maintaining the same solution.
-
Three osolutions are worth mentioning:
- Sendy is mature but “closed source” and paid.
- Listmonk is open source. Version 1 was released in 2021. It has been developed in Go,
it comes as a standalone binary and the only dependency is a Postgres database. On GitHub it has 5.4k stars
- Mailtrain is open source too. The first version was first released in 2016, version 2 in 2021.
It uses a MySQL database. On GitHub it has 4.8k stars
In search of a clean interface, a list-centered solution, easy to maintain
and easy to restore in case of problems, we have considered listmonk as the best choice.
listmonk is a self-hosted, high performance mailing list and newsletter manager.
It comes as a standalone binary and the only dependency is a Postgres database.

First steps of the application
This is the original announcement on Hacker News:
knadh on July 12, 2019 [–]
Author here. To give some context on why listmonk was built, at work (regulated financial business),
we have to deliver e-mails, mostly important updates, to 1.5mn+ customers regularly.
We used phpList for the longest time and then tried MailTrain and Sendy before finally deciding to reinvent the wheel
after running into a number of issues, of which, a few important ones are mentioned below.
- Performance. Unreasonably long amounts of time to send out e-mails.
phpList degraded to the point of taking several days to process a campaign.
listmonk can spawn N goroutines (~threads) and push e-mails to multiple SMTP servers.
On a commodity ec2 instance, we're able to send 1.5mn+ e-mails in a couple hours.
- Subscriber imports were extremely slow. Direct integration to keep subscribers in sync with external CRMs was cumbersome.
Direct DB inserts were complicated due to the complex table structures. listmonk imports 10k records/sec into a Postgres DB on a commodity ec2 instance.
- Segmentation. Often, we have to rapidly segment users by custom attributes and conditions and relay an update to them.
listmonk supports SQL expressions to segment users on their attributes that are defined as arbitrary JSON maps (thanks to Postgres JSONB type).
- Unavailability of dynamic templates. listmonk templates support Go template expressions so it's possible to write logic in messages to make them dynamic.
Kailash Nadhis a very active developer in the FOSS (Free and Open Source Software) area.
He works at Zerodha, India’s largest stock broker.
The blog of Zerodha’s technical staff is published at zerodha.tech.
The details
Listmonk is well documented for standard use (via web interface) and developers (via api).

The solution is suitable for large lists (up to millions of subscribers) and also for small groups.
Thanks to the Querying and segmenting subscribers feature,
it lets you query and export a selection of subscribers based on their profiles and attributes.
The extracted data can be easily imported in a new targeted mailing list.
It lacks certain important features like email bounce handling.
But it should be available in the next major release:
Bounce processing #166
Bounce processing screenshot preview
Technical considerations
We used another Go application in the past: RealSender - DMARC REPORTS.
Source: dmarc-report-converter. It worked immediately with no hassle.
"PostgreSQL database management system with over two decades of development behind it,
is now the most advanced open-source database available anywhere."
-- A Brief History of PostgreSQL - https://www.postgresql.org/docs/9.3/history.html
We had a little experience of that when working in the past with Inxmail Professional server installation.
In 2017 Inxmail GmbH announced that they’ll support PostgreSQL only, dropping all the other DBs:
From 1 January 2019, we will focus on the optimal technical basis and discontinue support
for Windows servers as well as MySQL, Oracle and MS SQL Server databases.
This means that we will only offer support for Inxmail Professional based on Linux servers and PostgreSQL.
-- Inxmail Professional licence solution: Changes to our system support
https://www.inxmail.de/files/files/de/downloads/Inxmail-Professional-licence-solution-EN.pdf
It is certainly a good choice and an investment in valuable knowledge for newbies.
Udemy online courses can help with the initial installation and maintenance of PostgreSQL.
Open source has risks: will a recent project, launched in 2019, be maintained in the future?
Nobody knows, maybe in the worst case some other developer will take care of it, but:
- it seems essential in its characteristics, if too complex it becomes difficult to maintain
- we submitted a bug report for listmonk and received a response from the developer within two hours
- the author works in a large company that uses it internally
Email deliverability
Email Deliverability, question and answer:
hemancuso on July 12, 2019 [–]
Projects like this seem like a great idea, but deliverability seems like a big concern
that is hard to measure unless you have a reasonable amount of experience.
What are best practices for using/selecting an ESP
if you were to use a project like this and want to ensure reasonable deliverability?
knadh on July 12, 2019 [–]
Author here. We've been using listmonk in production at our company (regulated financial business)
to deliver e-mail updates including regulatory ones for over 6 months.
We host our own SMTP instances using Postal on EC2 instances and have never had any issues with deliverability.
If it's legitimate e-mail, I don't think it's much of an issue.
We agree that sending expected communications to customers should help avoid most delivery issues.
In our experience, the larger the number, the more likely there will be drawbacks.
AWS EC2 servers are often blacklisted in Gmail - all sent messages are delivered to the Spam folder.
RealSender offers dedicated ip smtp servers,
that operate in a reliable and constantly monitored environment.
About the name

goberoi on July 13, 2019 [–]
Totally random question: how did you pick the name?
knadh on July 13, 2019 [–]
I can't quite recollect, but I think the thought process was along the lines of
"hassle free, peaceful list management".
Let’s try it
You can get a working demo installation in minutes using the docker image.
Alternatively ask RealSender a listmonk demo account.
» Zurück zum Anfang
So versenden Sie Newsletter
After blacklisting, the customer support of a major anti-spam service often replies:
“please audit your list hygiene to ensure recipients interest in your mailings”.
“list hygiene” and “recipients interest” have many facets:
A - on the MACHINE side - “list hygiene”
-
well managed subscriptions and unsubscriptions
the subscriber must have validated her/his email address (double opt-in),
recipients should be able to easily and with certainty unsubscribe (opt-out)
-
send to “active” and fully engaged recipients only
do not repeatedly send to bad / mailbox full recipients
stop sending to inactive recipients, if they do not interact, is a clear signal of no interest
-
the content must be well paginated (not a single image) and “responsive”, so as to be readable on multiple devices
otherwise, spam filters may block the message before it reaches the recipient’s inbox
-
make sure the machines recognize who is sending
email authentication allows destination mailservers to identify messages as being sent by trusted senders
B - on the HUMAN side - “recipients interest”
-
subscribers should expect the content they receive
recipients should be looking forward to your message and appreciating it
-
user responses should be managed
sometimes something goes wrong or just some recipient needs to communicate with you,
maybe just to tell you that he doesn’t want to receive any more messages, even if there is an unsubscribe link
MACHINE side - “list hygiene”
The points listed above can be easily managed for small lists, with a few hundred recipients.
Often the sender knows them individually, because they are customers or members of an association.
Things get complicated when the list is larger, with thousands of recipients
and there are more people working on the mailings.
In this case it is mandatory to use professional tools.
On the internet there are many professional solutions for email marketing,
the best known internationally is MailChimp
many websites also list MailChimp alternatives.
EmailTrends’ mission is “to take back email control”,
for this reason we suggest an alternative way.
According to W3Techs, WordPress powers 40% of all the websites on the Internet
and it’s the most popular technology on the Entire Internet in Open Source category.

With over 200,000 active installations, Mailpoet
is one of the most used Wordpress plugin for newsletters.
MailPoet is open source software and from the end of 2020
is part of the companies connected to Automattic, the parent company of Wordpress.
Some screenshots may give you an idea of how the various points are met:
subscriptions and unsubscriptions

fully engaged recipients

change subscriber status to "Bounced"

responsive email templates

Mailpoet has a “freemium” profit model, which allows you to choose the option:
“I just want the Premium with no sending”.
RealSender dedicated smtp server can be configured via the “Send With… > Other” option.
The “Bounce Handler MailPoet” plugin together with the newsletter mailboxes provided by RealSender
will guarantee the correct authentication of the email messages sent.
» Zurück zum Anfang
HUMAN side - “recipients interest”
The human side is harder to achieve,
it is also the point that makes the difference
when the technical management is not perfect.

“BE RELEVANT”
is a slogan used a few years ago in email marketing.
When you send valuable information to people
you know deeply after talking to them for a long time,
it doesn’t matter how bad the formatting is
or if the message goes to the spam folder.
They will always forgive technical imperfections,
they’ll be waiting for your emails, read them
and click the “not spam” button if necessary.
» Zurück zum Anfang
So versenden Sie private E-Mails
How to send private and encrypted emails ?
Email is not private or secure.
It wasn’t designed with privacy or security in mind.
Anyone who handles your email in transit can read it,
including your ISP, a hacker, or the NSA (U.S. National Security Agency).
Summary:
what is happening today

on the “legal” side
“The value of any piece of information is only known when you can connect it
with something else that arrives at a future point in time.
Since you can’t connect dots you don’t have, it drives us into a mode of,
we fundamentally try to collect everything and hang on to it forever.”
“They’ve said it’s just metadata, it’s just metadata, […]
who you’re talking to, when you’re talking to them, where you traveled.
These are all metadata events.
PRISM is about content. […] They can all see it because it’s unencrypted.”
There are dozens of psychological studies that prove
that when somebody knows that they might be watched,
the behavior they engage in is vastly more conformist and compliant.
[…] mass surveillance creates a prison in the mind […]
on the “illegal” side
Scammers might also use malware to infiltrate a company’s computer network
and access email exchanges about financial matters.
Business email compromise (BEC)—also known as email account compromise (EAC)
is one of the most financially damaging online crimes.
In a BEC scam, criminals send an email message that appears to come from a known source
making a legitimate request […]
Zurück zum Anfang
the challenges
Anonymity and Confidentiality
Anonymity is different from confidentiality
[…] we’re encrypting messages
so that even if people see that we’ve sent a message
they can’t read what it is
but sometimes we don’t even want people to see that we sent a message at all
Internet anonymity is difficult to achieve.
It requires a deep knowledge of the tools you decide to use.
This guide might give you an idea of its complexity:
Private Email Providers
Confidentiality is easier to get.
Even if you have nothing to hide, using encryption
helps protect the privacy of people you communicate with
and makes life difficult for bulk surveillance systems.
If you do have something important to hide, you’re in good company;
these are the same tools that whistleblowers use to protect their identities
while shining light on human rights abuses, corruption and other crimes.
The essential first step is to protect yourself
and make surveillance of your communication as difficult as possible.
End-to-End Encryption
End-to-end (e2ee) encryption for email can be used to ensure
that only the sender and the recipients of a message can read the contents.
Without this protection it is easy for network administrators,
email providers and government agencies to read your messages.
Achieving e2ee requires carefulness by both the sender and the recipients.
A single mistake by any of the involved parties can be sufficient to break the security of e2ee.
Email metadata, such as sender email, recipient email, date and time, cannot be protected using e2ee.
The subject of the mail may also remain unprotected and easily readable, even when e2ee is used.
Zurück zum Anfang
the solutions

< technical > Pretty Good Privacy - also known as PGP
PGP software follows the OpenPGP standard of encryption,
standard (RFC 4880) for encrypting and decrypting data.
PGP encrypts your email body into a code
that only the right person can read.
PGP runs on pretty much any computer or smartphone.
It’s freely licensed and costs no money.
Each user has a unique public key and private key,
which are random strings of numbers.
Your public key isn’t like a physical key, because it’s in an online directory, where people can download it.
People use your public key, along with PGP, to encrypt emails they send to you.
Your private key is more like a physical key, because you keep it to yourself (on your computer).
You use PGP and your private key to decode encrypted emails other people send to you.
If an email encrypted with PGP falls into the wrong hands, it’ll just look like nonsense.
Without the real recipient’s private key, it’s almost impossible to read it.
To protect ourselves form surveillance, we need to learn when to use PGP
and start sharing our public keys whenever we share email addresses.
< technical > How to use PGP encryption
To use PGP, you’ll need a public key and a private key (known together as a keypair).
Each is a long string of randomly generated numbers and letters that are unique to you.
Your public and private keys are linked together by a special mathematical function.
An application that manages the keys and the encryption/decryption of messages is required,
this is a selection of the most popular ones:
< easy > Alternatives to PGP encryption
PGP is the best solution for secure communications with a partner that is already using it.
Asking your counterpart to start using PGP could be hard.
The services that allow you to share a secret only once are an alternative.
When sending something a single time, there are open-source web apps
that allows you to enter information that can only be viewed once.
After the recipient has opened the page, the information is deleted,
and the only thing remaining in your chat logs or email is a bad link.
It’s not as robust as your entire team using PGP, but it’s much easier to set up or explain.
We’ve been able to use it to send login information to fairly non-technical people, and they find it easy to use.
Example (without adding a password):
Let's say you have a password. You want to give it to your coworker, Jane.
You could email it to her, but then it's in her email, which might be backed up,
and probably is in some storage device controlled by the NSA.
If Jane gets a link to the password and never looks at it, the password goes away.
If the NSA gets a hold of the link, and they look at the password... well they have the password.
Also, Jane can't get the password, but now Jane knows that not only is someone looking in her email,
they are clicking on links.
Some of these services, all free and opensource, are listed below.
You could also decide to host an instance on your own webserver.
PrivateBin (like a secure version of PasteBin) is developed in PHP
PrivateBin code is published on Github - 3100 stars
PrivateBin instructions are available on a different website
OneTimeSecret is developed in Ruby
OneTimeSecret code and instructions are published on Github - 1200 stars
SnapPass is written in Python. It was originally developed by Pinterest
SnapPass code and instructions are published on Github - 600 stars
Zurück zum Anfang
So versenden und begrenzen Sie E-Mails mit BCC
Wie versendet und begrenzt man E-Mails mit Bcc?
„Cc“ steht für „Carbon Copy“ im (alten) Sinne der Anfertigung einer Kopie
auf einer Schreibmaschine unter Verwendung von Kohlepapier.
Das Feld „Bcc:“ in E-Mails (wobei „Bcc“ für „Blind Carbon Copy“ steht)
enthält die Adressen von Empfängern der Nachricht
, deren Adressen den anderen Empfängern der Nachricht nicht offenbart werden sollen.
– IETF RFC 2822 „Internet Message Format“
Der Unterschied zwischen „Bcc“ und „Cc“ liegt in der Anonymität der Empfänger.
Bei Verwendung der Cc-Funktion sind die E-Mail-Adressen im Cc-Feld
für alle Empfänger der E-Mail sichtbar.
Ein Bcc-Empfänger kann den direkten Empfänger (An:) sehen,
er kann jedoch nicht erkennen, wer sonst noch per Bcc in die E-Mail aufgenommen wurde.
Bcc wird oft als benutzerfreundliches System für den Massenversand von E-Mails angesehen.
Im Folgenden finden Sie eine kurze Analyse der Vor- und Nachteile der Verwendung von Bcc.
Am Ende der Seite finden Sie die Schlussfolgerungen sowie einige Vorschläge.
VORTEILE
Es ist ganz einfach: Jeder kann es benutzen.
- Das ist eine einfache Möglichkeit, mehrere E-Mail-Empfänger zu kontaktieren
- Jeder, der über ein E-Mail-Programm verfügt, kann es nutzen
- Bei korrekter Verwendung wird die Privatsphäre der Empfänger gewahrt, da ihre E-Mail-Adressen nicht offengelegt werden
Zurück zum Anfang
NACHTEILE
E-Mail ist ein Ausgangs-Gateway ohne vorherige Überprüfung.
Über „Bcc“ lässt sich die Reichweite auf Hunderte oder Tausende von Kontakten ausweiten.
Bcc sollte als risikoreiches,
potenziell gefährliches Kommunikationsmittel betrachtet werden.
- Es handelt sich um einen fehleranfälligen Prozess; die Risiken sind:
- versehentlich Bcc-Empfänger in das Cc-Feld einfügen
dies führt in der Regel zu schwerwiegendem Imageschaden
eine neue Entschuldigungsnachricht ist der häufigste Ausweg aus dieser Situation
» Die Namen aller Empfänger werden öffentlich gemacht
» Unbeabsichtigte (und manchmal absichtliche) Verwendung von „Allen antworten“
was zu unkontrollierten E-Mail-Ketten führt
» Es könnte zu einem Datenschutzvorfall aus Sicht der DSGVO kommen
wenn der Betreff/Text „besondere Kategorien“ personenbezogener Daten enthält und dadurch
Personen identifiziert, die derselben Kategorie angehören (z. B. Krankheit, sexuelle Orientierung oder Weltanschauung)
- jemanden versehentlich als Hauptempfänger (sichtbaren Empfänger) hinzufügen
- jemanden vergessen oder jemanden hinzufügen, der die Nachricht nicht erhalten sollte
- Es besteht eine hohe Wahrscheinlichkeit, dass die Nachricht als Spam eingestuft wird
- Das Problem ist, dass die meisten Spammer ihre E-Mails über „Bcc“ versenden
Die Ziel-Mailserver sind bei der Annahme von Bcc-Nachrichten zurückhaltend
- Wenn ich dir eine Nachricht per Bcc sende,
,
erhältst du eine E-Mail, die nicht an dich adressiert ist,
,
was bei der Spam-Bewertung als negativer Punkt gewertet wird
- Wenn dieselbe Nachricht gleichzeitig an „mehrere“ E-Mail-Adressen
derselben Domain gesendet wird, lassen sich diese leicht zählen und blockieren
- Es gibt keine Möglichkeit, falsche Adressen zu kontrollieren
- Es kann vorkommen, dass ein Empfänger mehrere E-Mail-Adressen hat (z. B.
).
Dies beeinträchtigt den Versand an diesen Empfänger, selbst wenn eine oder mehrere Adressen korrekt sind.
- Syntaxfehlerhafte Adressen werden ohne Warnung akzeptiert
zum Beispiel, wenn das @-Zeichen fehlt oder Leerzeichen enthalten sind
- keine individuelle Anpassung / geringe Auswirkungen / kaum oder gar keine Reaktionen
- Die Nachricht ist zwangsläufig standardisiert und „anonym“
Eine persönliche Ansprache ist nicht möglich, kein „Sehr geehrter Herr/Frau …“
- Ihre Bcc-Empfänger erhalten eine Nachricht, die eigentlich an jemand anderen gerichtet ist
Es ist unwahrscheinlich, dass sie darauf achten oder darauf reagieren
- Es ist sehr wahrscheinlich, dass es zu technischen Problemen kommen wird
- Jede missbräuchliche Handlung durch Spammer oder Hacker kann sich schnell auf viele Empfänger auswirken
und den Ruf des SMTP-Servers gefährden (z. B. durch die Aufnahme des Servers in eine Blacklist)
- Das Postfach des Absenders könnte durch Rückläufer (Empfänger unbekannt, Postfach voll usw.) überfüllt werden
Ihr Anteil kann zwischen 5 % und 20 % der versendeten E-Mails betragen
- Der Versand kann sich negativ auf E-Mail-Zustellungssysteme (SMTP-Server) auswirken, z. B.:
zahlreiche „Bitte später erneut versuchen“-Antworten, eine große Anzahl von Nachrichten in der Mail-Warteschlange, Systemabsturz
Zurück zum Anfang
SCHLUSSFOLGERUNGEN
- Grenzen setzen
- Überprüfen Sie die von Ihrem E-Mail-Anbieter zugelassene Empfängeranzahl:
Probieren Sie es selbst aus, um ganz sicher zu sein:
RealSender stellt eine Liste mit 300 @bogusemail.net-Adressen zum Testen zur Verfügung:
Die Nachrichten gelangen an einen „Black-Hole“-Mailserver:
bogusemail-test.txt
- Begrenzen Sie die Anzahl der Empfänger in einer einzelnen Nachricht auf eine kleine Zahl, beispielsweise 20,
Wenn Sie mehr Empfänger zulassen, können Sie Nachrichten
ganz einfach an Tausende von E-Mail-Adressen versenden, indem Sie diese einfach in kleine Gruppen aufteilen
- Werden Sie Profi
- nur den Versand großer E-Mail-Mengen über verschiedene Kanäle zulassen
- Verwenden Sie beim Versenden vieler Nachrichten eine andere Absenderadresse
zum Beispiel eine andere Subdomain, wie @news.firmenname.com
nur autorisierte Personen haben Zugriff darauf
und sie werden damit sorgfältiger umgehen
- in strukturierten Büroumgebungen, in denen viele Mitarbeiter mit E-Mails arbeiten,
verwenden spezielle Apps zum Versenden von Massen-E-Mails
die professionellen Systeme verfügen über einen Genehmigungs-Workflow
und eine schrittweise Kontrolle; sie sind darauf ausgelegt, Fehler zu vermeiden
Zurück zum Anfang
Maßnahme E-MAIL-MARKETING
Wie lässt sich die Leistung Ihrer E-Mail-Marketing-Kampagnen messen?
Die folgenden Informationen basieren auf unserer fünfzehnjährigen Erfahrung
mit der E-Mail-Marketing-Plattform Inxmail.
Was sind „E-Mail-Marketingkampagnen“?
Es handelt sich um umfangreiche, auf Einwilligung basierende E-Mails,
deren Inhalt in der Regel auf die Interessen des Empfängers zugeschnitten ist,
und bei denen der Absender anhand des Verhaltens der Empfänger Feedback-Daten erhalten kann.
Die Antworten oder „Feedback-Daten“ bilden die Grundlage für die Kennzahlen
, auf denen die Berichte zur Performance von E-Mail-Marketingkampagnen basieren.
Lassen Sie uns einen Überblick darüber geben, was diese Kennzahlen sind und wie sie gemessen werden:
Selbst die besten technischen Tools nützen nichts, wenn die Nachrichten nicht im Posteingang des Empfängers ankommen.
Hier kommt die „E-Mail-Zustellbarkeit“ ins Spiel:
E-Mail-Marketing-Kampagnen
Permission-basiertes Marketing
Permission-Marketing, auch „Dialog-Marketing“ genannt,
ist ein Konzept, das Seth Godin 1999 in seinem Bestseller „Permission Marketing“ vorgestellt hat.
In dem Buch wird es als Gegenstück zum „Interruptionsmarketing“ definiert
, das üblicherweise in traditionellen Massenmedien wie Fernsehen und Zeitungen zum Einsatz kommt.
Ziel ist es, eine persönliche und direkte Kommunikation herzustellen,
eine Beziehung zwischen den beiden Parteien aufzubauen und einen „menschlichen“ Dialog in Gang zu setzen,
dessen Erfahrung für beide Seiten nützlich und bereichernd ist.
Zurück zum Anfang
Reaktionen der Nutzer verfolgen
Je nach den erteilten Datenschutzberechtigungen kann der Absender Folgendes aufzeichnen:
- aggregierte Daten
- Daten des einzelnen Nutzers (z. B. wer die E-Mail geöffnet hat, wer darauf geklickt hat)
Aggregierte Daten
Sie liefern allgemeine Rückmeldungen und Informationen zu allgemeinen Trends
(z. B. wie viele die E-Mail geöffnet haben, wie viele darauf geklickt haben)
Einzelbenutzer-Daten
Sie ermöglichen es, individuelle Informationen zu erhalten
durch die Erfassung personenbezogener Daten und das anschließende Versenden personalisierter Nachrichten
auf der Grundlage früherer Interaktionen und des Nutzerverhaltens
Zurück zum Anfang
So funktioniert die Nutzerverfolgung
Unter Link-Tracking versteht man das Ersetzen der endgültigen URL der Website
durch eine fiktive Adresse, die den Besuch erfasst und den Nutzer auf die Zielseite weiterleitet.
In E-Mail-Nachrichten können nur Klicks auf Links nachverfolgt werden.
Externe Bilder, bei denen der E-Mail-Client vor dem Herunterladen um Bestätigung bittet,
werden als Links behandelt. Daher reicht es aus, die URL eines externen Bildes zu tracken
, um die E-Mail-Öffnungsrate zu ermitteln.
Bei der Nachverfolgung wird in der Regel nur die „Mail-ID“ erfasst,
eine eindeutige Kennung der versendeten E-Mail.
Die personalisierte Nachverfolgung erfolgt durch Hinzufügen eines oder mehrerer von der Software generierter Parameter zu den besuchten Seiten,
wie zum Beispiel: example.com/test.html?id=54725788327466628654
Der Parameter „id“ bezieht sich auf einen bestimmten Nutzer und einen bestimmten Link in der Nachricht.
Die gewonnenen Informationen können automatisch
die Daten des Empfängers in der E-Mail-Marketing-Anwendung
aktualisieren oder die Angaben zur Herkunft des Klicks an die Webanalyse-Plattform weiterleiten.
Beispiel: Ein Reisebüro könnte unter
erfassen, wie oft der Nutzer auf Nachrichten zum Thema „Meer“ oder „Berge“ klickt,
wodurch sich ein bestimmter Zähler im Laufe der Zeit erhöht.
Die gesammelten Daten geben Aufschluss über das bevorzugte Reiseziel des Empfängers.
Zurück zum Anfang
So funktioniert die Messung der Öffnungsrate
Die Öffnungsraten werden ermittelt, indem Daten zu Klicks auf nachverfolgte Links
und zu „verborgenen Klicks“ kombiniert werden, die durch heruntergeladene, nachverfolgte Bilder generiert wurden.
Wenn eine Nachricht in der Vorschau des E-Mail-Clients geöffnet wird,
ohne dass die Bilder heruntergeladen oder Links angeklickt werden,
ist es nicht möglich zu erkennen, dass sie geöffnet wurde.
Seit 2003 – zunächst Outlook, dann die meisten E-Mail-Clients –
begannen zum Schutz der Privatsphäre ihrer Nutzer
den automatischen Download von Bildern zu blockieren
, die andernfalls bei jedem Gelesen einer E-Mail nachverfolgt worden wären.
Seit 2013 werden Bilder in Gmail standardmäßig automatisch angezeigt.
Der Download erfolgt über einen Drittanbieter-Server, einen sogenannten „Proxy“,
der das Endgerät des Nutzers verbirgt, es den Betreibern von E-Mail-Marketing-Kampagnen
jedoch dennoch ermöglicht, zu erkennen, dass das Bild heruntergeladen und die Nachricht geöffnet wurde.
Weitere Informationen finden Sie hier:
So funktioniert der neue Gmail-Bild-Proxy und was das für Sie bedeutet
Die Erfassung der Öffnungsraten ist ungenau;
liefert einen niedrigeren Wert als die tatsächlichen Öffnungen.
Es ist dennoch sinnvoll, diese zu messen,
und sei es nur, um die Ergebnisse verschiedener Kampagnen zu vergleichen.
Zurück zum Anfang
E-Mail-Zustellbarkeit
E-Mails versenden
Zunächst muss überprüft werden, ob die E-Mails in den Postfächern
der wichtigsten Freemail-Domains aus Ihrer Liste
sowie im Posteingang der beiden wichtigsten Anbieter von Unternehmens-E-Mail-Konten
– Google Apps und Office 365 – ankommen.
Inhaltsbasierte Spamfilter werden in der Regel durch Domains in URLs (http …) ausgelöst
Ein guter Tipp ist es, in den Links Ihrer Nachrichten nur eine einzige Domain zu verwenden.
Die Domain sollte mit der in der Absenderadresse verwendeten übereinstimmen;
Dies wird als „Domain-Alignment“ bezeichnet und verringert das Risiko, von Phishing-Filtern erfasst zu werden.
Aus demselben Grund sollten Links, sofern sie getrackt werden, eine Subdomain
der in der Absenderadresse verwendeten Domain nutzen.
Echte Tests lassen sich ganz einfach durchführen, indem Sie für jeden E-Mail-Anbieter ein „Test“-Postfach aktivieren:
und anschließend die Weiterleitung der Nachrichten an Ihre E-Mail-Adresse aktivieren:
Senden Sie an jedes Postfach eine Nachricht mit dem Betreff „Testnachricht“
und dem Inhalt „Testnachricht“ sowie dem Link zu Ihrer Domain:
Wenn die Nachricht die Spamfilter passiert, sollten Sie sie in Ihrem Posteingang erhalten.
Zurück zum Anfang
Absprungraten
Es ist normal, dass E-Mails als unzustellbar zurückkommen.
Dies kann an nicht mehr genutzten Adressen,
überfüllten Postfächern oder anderen technischen Problemen liegen.
Je nach „Sauberkeit“ Ihrer Liste,
kann die Absprungrate zwischen 5 % und 20 % schwanken.
Mit steigender Anzahl wird es unmöglich, die zurückgewiesenen E-Mails manuell zu verwalten.
E-Mail-Marketing-Anwendungen verfügen über eine Funktion namens „Bounce Handler“
die zurückgewiesene Nachrichten automatisch herunterlädt,
sie analysiert und entsprechend ihrem Inhalt klassifiziert.
Die Ziel-E-Mail-Adresse wird automatisch deaktiviert
nach einer bestimmten Anzahl von „Hard Bounces“ – also dauerhaften Fehlern wie „Benutzer unbekannt“ und „Host nicht erreichbar“
– oder nach einer größeren Anzahl von „Soft Bounces“ – also vorübergehenden Fehlern wie „Postfach voll“.
Es ist wichtig, die „Bounce-Raten“ (abgewiesene Nachrichten)
oder die komplementären „Zustellungsraten“ (angenommene Nachrichten) zu überwachen. Ihre Summe ergibt 100 %.
Eine Veränderung ihrer Werte ist ein Anzeichen, das untersucht werden sollte.
Zurück zum Anfang
Benchmarks für E-Mail-Marketing
Die größten E-Mail-Marketing-Plattformen veröffentlichen Vergleichszahlen
,
die auf den von all ihren Kunden gesammelten Daten basieren.
In den Berichten verwendete Fachbegriffe:
- Öffnungen: Anzahl der Empfänger, die auf mindestens einen nachverfolgten Link geklickt
oder mindestens ein nachverfolgtes Bild geöffnet haben
- Öffnungsrate: Öffnungen / Anzahl der Empfänger (ohne Bounces)
- Eindeutige Klicks: Anzahl der Empfänger, die mindestens einmal auf einen Link geklickt haben
- Klickquote (CTR): Einmalige Klicks / Anzahl der Empfänger (ohne Bounces)
- Klick-zu-Öffnungs-Rate (CTOR): Eindeutige Klicks / Öffnungen
Hier ist eine kurze Liste; die meisten davon beziehen sich auf die USA:
-
Zu den Kunden von Mailchimp zählen Ein-Personen-Startups,
kleine Unternehmen bis hin zu „Fortune 500“-Unternehmen,
das gesamte Spektrum ist in diesen Daten vertreten
-
E-Mail-Marketing-Benchmarks und Statistiken nach Branchen
-
Campaign Monitor hat über 100 Milliarden E-Mails analysiert, die weltweit
zwischen Januar und Dezember 2020 versendet wurden
-
E-Mail-Benchmarks nach Branche und Tag
-
Benchmarks zwischen Regionen vergleichen
-
Der achte jährliche Deliverability-Benchmark-Bericht von Return Path
um zu sehen, wie viele E-Mails im Posteingang, im Spam-Ordner oder blockiert gelandet sind.
Inhalt des Deliverability-Benchmark-Berichts 2020 (PDF):
-
Was versteht man unter Zustellbarkeit und wie wird sie gemessen?
-
Was passiert mit einer E-Mail, nachdem man auf „Senden“ geklickt hat?
-
Wie viele E-Mails landen weltweit durchschnittlich im Posteingang und im Spamfilter?
-
Zustellbarkeitsstatistiken für 30 einzelne Länder
Zurück zum Anfang
Was gilt als SPAM?
What users and mail servers qualify as spam emails ?
Starting from our experience with RealSender,
we have tried to summarize the main points that could affect inbox delivery.
It is useless to evaluate the other points
if the messages are not expected/desired by their recipients.
USERS reactions
The sender should put himself in the recipient’s shoes, trying to figure out how an email message will be treated.
User complaints can lead to the blacklisting of the entire smtp server or of the domain name, affecting the delivery of all future messages.
- users generally* can manage their inbox: it is “spam” what every single user considers spam
* = many freemail providers DO NOT give the option to opt-out of their “internal advertising”
- the user expresses his choice by clicking the “Report Spam” button (within Gmail)
or the “Junk” button (within Outlook/Hotmail)
- the spam filters of modern mail servers are all connected to user complaints,
after a certain number of clicks on “Report as Spam”,
all messages with similar content will be delivered directly to the Spam folder
Basic technical settings are required to get email messages accepted.
IP address and IP class reputation
- smtp server IP blacklisting, you can find a lot of tools online googling for “blacklist check”
- smtp server IP class reputation, check our blog article for more information SMTP IP REPUTATION MATTERS
- if the messages are sent from a personal computer, the reputation of the public IP address of the Internet connection should also be checked
(some smtp server providers mask the IP address of the internet connection, so that the recipient’s system only sees their IP address)
correct smtp server SETUP
- reverse DNS
to make sure the IP address of your mail server points to the domain name that you use for sending mail
- the mail transfer agent, the application that routes and delivers email,
should be properly configured, following the latest RFC published by IETF
see for example: Making Postfix RFC Compliant
proper email AUTHENTICATION
Use email authentication methods, such as SPF and DKIM, to prove that your emails and your domain name belong together.
The nice side-effect is you help in preventing that your email domain is spoofed.
- SPF, a path-based email authentication protocol that allows email receivers to determine if the sender is authorized to use the domains in the message’s header by evaluating the IP address of the sender’s outbound MTA based on information published by the sender in DNS TXT records. SPF is defined in IETF RFC 4408.
- DKIM, an email authentication protocol that enables the sender to use public-key cryptography to sign outgoing emails in a manner that can be verified by the receiver. DKIM is defined in IETF RFC 4871. The DKIM standard is adopted by Gmail and other large corporations to completely eliminate phishing and spoofing from internet mail.
- DMARC, relies on the established SPF and DKIM standards for email authentication. Destination mail servers take action on unauthenticated mail, based on the sender “dmarc policy” and report on the outcome to the sender. DMARC is defined in the Internet Engineering Task Force’s published document RFC 7489.
SPAMASSASSIN check
- SpamAssassin is a server side software, used for email spam filtering. It uses a variety of spam-detection techniques.
Each test has a score value. The scores can be positive or negative, with positive values indicating “spam” and negative “ham” (non-spam).
The default score threshold for the recipient is “5.0”. If an email score lands higher than the threshold, is marked as spam.
It is so widely used that the score check before sending email messages should be considered mandatory.
- two online tools can help you to check your SpamAssassin score: isnotspam and mail-tester
- you have to send the message to the email address provided
- after a few seconds click the “view your report” or the “then check your score” buttons
The only surefire way to see if an email is classified as spam is to…
send it, and see how it shows up on the other side.
TRY and see what happens
- If you receive a bounced message, this can be of great help, because the last few lines usually describes the problem that caused the rejection.
If the explanation is incomprehensible, simply try sending a message with subject and content “Test message” and check if it is accepted.
In this case, you should send the same message several times, reducing the content gradually, until you identify which part activates the spam filter.
- Having a detailed sending log, can help you to verify if the messages are accepted of rejected
examples of information available in the log
- In some (rare) cases a sort of “whitelisting” is required.
Some spam system learns from what users do with the messages they receive.
If the individual recipient flags once the received mail as NON spam,
it will learn that they are valid messages and will begin delivering them in the “Inbox” folder instead of “Junk”.
Alternatively, the sender must be in the address book of the recipient or have previously exchanged emails with him.
Open-Source-E-Mail-Clients
Wie kann man mit einsatzbereiten Open-Source-E-Mail-Clients wieder die Kontrolle über seine E-Mails erlangen?
In den letzten zehn Jahren hat sich der Bereich der Unternehmens-E-Mail-Postfächer
fast vollständig gewandelt: weg von lokalen E-Mail-Servern hin zu Cloud-Diensten wie Exchange Online (Office 365) oder Gmail for Business (Google Apps).
Die Hauptgründe dafür sind:
- die Notwendigkeit, über mobile und Web-Schnittstellen auf E-Mails zugreifen zu können
- die Notwendigkeit, E-Mail-Postfächer vor Spam und Malware zu schützen
Auf diese Weise wurde das Leben von IT-Fachkräften vereinfacht, indem
die Verantwortung für die Verwaltung der E-Mail-Infrastruktur auf die „großen Tech-Unternehmen“ abgewälzt wurde.
Das Risiko, grundlegende E-Mail-Kenntnisse zu vernachlässigen, kann dazu führen, dass wir E-Mail-
als etwas betrachten, das wie von Zauberhand funktioniert, nur weil Microsoft und Google sich darum kümmern.
Wir können die Kontrolle über unsere E-Mails zurückgewinnen, indem wir die einzelnen Komponenten des E-Mail-Systems aufschlüsseln und separat verwalten:
- der Posteingangsserver
- der E-Mail-Client
- der Postausgangsserver
Dies sorgt für eine Isolierung und Segmentierung der Dienste und trägt erheblich zur Sicherheit bei.
Daher gilt die Verringerung der Angriffsfläche durch Isolierung/Segmentierung als bewährte Vorgehensweise.
Zudem erhöht dies die Skalierbarkeit und Stabilität.
E-Mail-Clients sind die wichtigste Schnittstelle zu E-Mail-Postfächern.
Es handelt sich um komplexe Software, die mit den Benutzern interagiert.
Auf dem Markt gibt es zahlreiche Lösungen; wir haben sie anhand von zwei Kriterien ausgewählt:
- plattformübergreifende, aktiv betreute und Open-Source-Projekte
- gebrauchsfertig, sodass Systemadministratoren sie problemlos verwalten können
Wir haben uns zwei Optionen überlegt:
-
Mozilla Thunderbird ist ein plattformübergreifender E-Mail-Client mit offenem Quellcode für PCs. Entwickelt von der Mozilla Foundation.
Es unterstützt sowohl IMAP als auch POP (wobei E-Mails lokal auf Ihrer Festplatte gespeichert werden, sodass Sie auch ohne Internetverbindung darauf zugreifen können).
Es bietet hervorragende Funktionen zur E-Mail-Filterung und -Verwaltung.
Thunderbird bietet umfassende Unterstützung für die Verwendung mehrerer Konten und Identitäten, einschließlich automatischer Signaturfunktionen.
Es enthält installationsfertige Versionen für: Windows, Mac OS und Linux. Um aus der Ferne Zugriff zu erhalten, müssen sich Benutzer zunächst mit ihrem Computer verbinden.
-
Die neue Rainloop-Gabelist ein einfacher, moderner, schlanker und schneller webbasierter E-Mail-Client.
Es kann eine große Anzahl von E-Mail-Konten verwalten, ohne dass eine Datenbankverbindung erforderlich ist.
Es unterstützt sowohl das SMTP- als auch das IMAP-Protokoll, sodass E-Mails problemlos gesendet und empfangen werden können.
Im Jahr 2020 hat die SnappyMail-GitHub-Projekt wurde veröffentlicht.
Es handelt sich um eine grundlegend überarbeitete und gesicherte Abspaltung der RainLoop Webmail Community Edition.
Hier ist die Demo des E-Mail-Clients SnappyMail. Wenn Sie die Admin-Oberfläche ausprobieren möchten, Kontaktieren Sie uns.
Arbeit, E-Mail und Datenschutz
Warning: this is a topic with strong legal implications.
Contact qualified consultants to verify the regulations and their application.
The work email is a business work tool
which contains an impressive amount of business-related information.
The companies can do whatever they want with the email,
which is a business work tool, but is it written and read by employees?
Can they read it? Can they backup it? Can they archive it?
Summary:
generic work email addresses, no constraints
The work mailbox has an ambivalent nature,
it is a tool owned by the employer, but is used by the employee.
We must distinguish between two different types of business email addresses:
- personal company mailbox, i.e. name.surname@companyname.com
- generic company mailbox such as info, support, sales, marketing, billing, etc.
that is, all those that are NOT related to a single person
The generic company mailboxes are not problematic at all,
the company checks them, reads all the messages, has no constraints.
personal company mailbox, such as company cars
The personal mailboxes, such as name.surname@companyname.com,
may contain personal data of the employee that the employer must protect.
If we choose to use this kind of mailbox,
as an employer we need to know which technical standards to adopt
and which tools to use to be able to process the data adequately.
The mailbox can be compared to the company car,
it is made available to the employee for use within the business tasks.
The employer for example can check the mileage, to verify that the employee
has not abused this work tool, using it for personal purposes.
The employer can not, however, monitor systematically and without specific reasons
what the employee does inside the company car.
The mailbox is the equivalent of the company car, a work tool that is owned by the company,
given to the employee to use it use it for work, just to carry out its tasks.
What the employee sends and receives, even during working hours, is like what happens
inside the cockpit of the company car and is equated to private correspondence.
Zurück zum Anfang
read only under certain conditions
The company cannot read what is written in the email messages,
it cannot be done systematically and without a specific reason.
Even if there is a specific motivation, it can be done only under certain conditions.
Three different interests are at stake, which must be balanced:
- the employer’s interest in accessing this content
for organizational/production, work safety or other reasons
- the legitimate expectation of employees
who consider this content as confidential
- the expectation of third parties who write to that company name account
they may not be aware that the content of their correspondence is NOT private and confidential.
(the standard disclaimer at the bottom of email messages usually warns that the content may be read by others)
The employee must be informed, with adequate written communication, that the email messages
can only be used for all purposes related to the employment relationship, for example by prohibiting personal use.
The document must contain how to use the company tools,
including the email box, and inform that, in compliance with the privacy regulations:
- email messages will be archived to comply with the law and to protect company assets
- the company may, in some cases, carry out checks on the content of the employee’s mailbox
massive checks are prohibited
The so-called “massive controls” are prohibited,
such as the systematic reading of the contents of an employee’s mailbox.
Limits in employer control are based on three cardinal principles:
-
one is good faith, which is the possibility for the employer to carry out a check
on the employee’s company mailbox only if there is a well-founded reason
for example, for the protection of company assets that could be compromised or put at risk by a virus;
or in the case of suspected infidelity of the employee, to carry out defensive checks
-
the others are proportionality in the control and limitation in time and in the object of the research
Zurück zum Anfang
obligation to archive email messages
The rules require that the employer must prove
to have adopted adequate and effective security measures
to protect company data, such as corporate email archiving.
Access to data by the employer
if carried out in the absence of detailed company information:
-
represents a very serious violation
sensitive data may be found in the employee’s personal space,
for example information about political, religious, sexual or trade union trends,
which must be guaranteed at the highest level of confidentiality
-
it is a criminal offense
there is also the risk for all illegally acquired data
to be unusable in any legal process
obligation to delete email messages
Business correspondence should generally be kept for a maximum of ten years.
To preserve the company’s assets and to be able to defend itself in any litigation situations.
The storage and processing of personal data is permitted only for a specific purpose.
If this purpose ceases to exist after a certain period of time, for example after ten years, this data must be deleted.
obligation to deactivate the mailboxes
In the event of employee dismissal or resignation,
the name.surname mailbox must be deactivated within a short period of time.
The company can activate an automatic reply informing the sender that the account has been deactivated,
inviting him to write to another internal email address.
The historical archive of company messages of terminated employees
can be kept only if the employee had been informed that his messages were stored.
Zurück zum Anfang
E-Mails vor Spam schützen
How to protect business emails from spam ?
It is almost impossible to think about email without considering the issue of spam.
We tried to summarize the current situation and the strategies that can be followed:
How much email traffic is spam?
A reputable source is SenderBase, now called Talos,
showing about 85% spam email and 15% legitimate email
compared to the email traffic recorded in September 2020.
This percentage has been stable, with little changes in the last twelve months.

Source: Email & Spam Data - Total global email & spam volume.
Zurück zum Anfang
What are the costs of spam?
Sometimes spam is just for promotional purposes, and the sender
is merely trying to generate more customers for his business,
causing distractions and loss of time. It can fill your inbox
so that it’s difficult to find emails that are important.
Not all spam are friendly promotional emails.
There are many cases where the intentions are malicious, aiming to damage or hijack user systems.
The most common variants of malicious spam worldwide include trojans, spyware, and ransomware.
Zurück zum Anfang
What are the latest anti-spam techniques?
Imagine your company’s inboxes as your house door:
you have to decide who can come in and who you leave out.
No technique is a complete solution to the spam problem.
Each has trade-offs between incorrectly rejecting legitimate email (false positives)
as opposed to not rejecting of spam (false negatives)
and the associated costs in time, effort, and cost of wrongfully blocking good mail.
Anti-spam techniques can be broken into two areas: prevention and cure.
Spam prevention (before it happens)
Restrict the availability of your email addresses, with the goal of reducing the chance of receiving spam.
-
Discretion
don’t give your email address to everybody
the less known it is, the less spam you will receive
whenever it is possible, use a different email for online registrations
-
Contact forms
don’t publish your email address online
anybody can see it, “spambots” catch them all the time
to get contacted online, use secure* web forms / contact forms
* = protected by robots that fill them automatically
Spam cure (while it’s happening)
Once the spammers have your email address, the fight moves to your mail server and inbox.
-
SpamAssassin-like score systems
They use several spam-detection techniques including DNS based email blacklists
(commonly called Realtime blacklist, DNSBL or RBL), text analysis and Bayesian filtering.
Each test has a score value. The scores can be positive or negative, with positive values indicating “spam” and negative “ham” (non-spam).
The default score threshold for the recipient is “5.0”. If an email score lands higher than the threshold, is marked as spam.
There are a lot of “SpamAssassin Tests” available on the net,
that let the spammers check their messages before sending them.
-
Powered by users
Users of these systems can flag incoming emails as legitimate or spam and these notations are recorded into a central database.
After a certain number of users mark a particular email as junk, the filter automatically blocks it from reaching the rest of the community’s inboxes.
Sometimes users feedback is integrated with automated controls like the number of interactions with message contents,
as the amount of click on links and the images downloaded, or the count of the occurrences of the same message in multiple mailboxes.
When a collaborative content filtering system involves a large, active user base,
it can quickly block a spam outbreak, sometimes within a matter of minutes.
This kind of filter can hardly be overcome by spammers.
-
Email Authentication
SPF, DKIM and DMARC are authentication techniques that let you recognize if the from address is really who it claims to be.
In 2020 they’re widely used and they are a good source to identify the trusted senders.
It is important to know in advance the exact domain the emails are coming from,
otherwise it is easy to be misled by the simple change of a letter.
It’s possible for spammers to comply with email authentication
so that their messages look to come from “legitimate senders”.
-
Authorized senders, whitelist
In a whitelist one can specify a series of trusted addresses or domains.
In the beginning the personal address book and the past received emails will be of great help.
If a sender is in this list, all controls are skipped and the message is received without delays.
This method is easy to implement and very effective when associated with Email Authentication, to avoid email address spoofing*.
* = use of a fake sender to make the message appear from someone other than the actual source
Once your list of trusted contacts is filled, no unknown sender will reach your mailbox.
All unwanted messages can be redirected to a different mailbox to be checked once a day or more rarely.
Spammers will hardly find which are the trusted senders of each recipient.
Even when they do it, email authentication checks will alert you of the fraudulent use.
Zurück zum Anfang
So funktioniert DMARC – aktualisiert
How dmarc works with Google Mail and Office 365 ? (updated)
We’ve tested again how email authentication affects the delivery
to Google Mail and Office 365 mailboxes, the most popular business emails providers.
The results can be divided into two groups:
emails delivery
(how spf, dkim and dmarc affect the delivery of sent messages)
# Google mail: the emails are always accepted, the spf authentication seems not to be considered at all
Dkim signature is evaluated only if it’s aligned with the From email address and dmarc is set with policy “quarantine” or “reject”.
# Office 365: is fully responsive to spf, when a message passes the spf check, it reaches the Inbox.
Dkim signature is considered only if it’s aligned with the From email address, otherwise it doesn’t matter.
Notes: in the last week of August Office 365 had a strange behavior:
only the messages signed with dkim (signing domain aligned with the From address)
and dmarc record set (with any policy), were delivered to the Inbox
spoofing protection
(how spf, dkim and dmarc protect the sender’s email address from being spoofed*)
* = make the message appear from someone other than the actual source
# Google mail: activating dmarc, the spoofed senders get filtered to the Spam folder (with p=quarantine) or rejected (with p=reject).
Nothing happens if the policy is set to “none” (p=none), in this case all the messages reach the Inbox.
# Office 365: “spf fail” or “spf softfail” results, are enough to send the fake senders to the Junk email folder.
authentication requirements
the suggested email authentication requirements, are summarized as follows:
|
emails delivery |
spoofing protection |
| Google Mail |
dkim pass (domain aligned) |
dmarc set with p=quarantine or p=reject |
| Office 365 |
spf pass and dkim pass (domain aligned) |
spf set and dmarc set (for added security) |
email delivery test results
below there is the full range of tests that have been made
|
|
Google Mail |
Google Mail (dmarc set) |
Office 365 |
Office 365 (dmarc set) |
| spf Pass |
dkim none |
inbox |
inbox |
inbox |
inbox |
| spf Fail |
dkim none |
inbox |
spam |
junk |
junk |
| spf SoftFail |
dkim none |
inbox |
spam |
junk |
junk |
| spf none |
dkim none |
inbox |
spam |
junk |
junk |
|
|
|
|
|
|
| spf Pass |
dkim diff |
inbox |
inbox |
inbox |
inbox |
| spf Fail |
dkim diff |
inbox |
spam |
junk |
junk |
| spf SoftFail |
dkim diff |
inbox |
spam |
junk |
junk |
| spf none |
dkim diff |
inbox |
spam |
junk |
junk |
|
|
|
|
|
|
| spf Pass |
dkim pass |
inbox |
inbox |
inbox |
inbox |
| spf Fail |
dkim pass |
inbox |
inbox |
inbox |
inbox |
| spf SoftFail |
dkim pass |
inbox |
inbox |
inbox |
inbox |
| spf none |
dkim pass |
inbox |
inbox |
inbox |
inbox |
|
|
|
|
|
|
| spf Pass |
dkim invalid |
inbox |
inbox |
inbox |
inbox |
| spf Fail |
dkim invalid |
inbox |
spam |
junk |
junk |
| spf SoftFail |
dkim invalid |
inbox |
spam |
junk |
junk |
| spf none |
dkim invalid |
inbox |
spam |
junk |
junk |
Notes:
- the From address (visible sender) and the Mail-from (also said “envelope from” or “return-path”) are the same, they refer to the same domain
- “dkim pass”: the dkim signing domain is the same as the one of the From address (the domain is aligned)
- “dkim diff”: the dkim signing domain is different than the one of the From address (the domain IS NOT aligned)
DKIM-Domäne für DMARC
Wie wirkt sich die DKIM-Domänenabgleichung auf die DMARC-Authentifizierung aus?
DMARC (Domain-based Message Authentication, Reporting and Conformance),
ist ein Standard zur E-Mail-Authentifizierung, der entwickelt wurde, um gefälschte E-Mails mit gefälschten Domänen zu bekämpfen.
Im Kapitel „3.1. Identifikatorabgleich“ heißt es:
E-Mail-Authentifizierungstechnologien authentifizieren verschiedene (und
unterschiedliche) Aspekte einer einzelnen Nachricht. Beispielsweise authentifiziert [DKIM]
die Domäne, die die Nachricht signiert hat,
während [SPF] entweder die Domäne authentifizieren kann, die im
RFC5321.MailFrom-Teil (Mail-From) von [SMTP] oder im RFC5321.EHLO/
HELO-Domäne oder beides. Dies können unterschiedliche Domänen sein, und sie sind
für den Endbenutzer in der Regel nicht sichtbar.
DMARC authentifiziert die Verwendung der RFC5322.From-Domäne, indem es verlangt, dass
diese mit einem authentifizierten Identifikator übereinstimmt (abgestimmt ist).
-- https://tools.ietf.org/html/rfc7489#section-3.1
Das bedeutet ganz einfach:
Wenn ein Absender seine E-Mail mittels SPF und/oder DKIM authentifiziert,
muss mindestens eine der Domains mit der Absender-Domain übereinstimmen
Uns war nicht klar, ob eine Nachricht die SPF- oder DKIM-Prüfung
nicht bestehen und dennoch die DMARC-Authentifizierung bestehen könnte.
Wir haben es mit einem Tool getestet, das jedem zur Verfügung steht: einem Gmail-Postfach.
Um das Ergebnis zu sehen, öffnen Sie die Nachricht und wählen Sie „Original anzeigen“:
Test 1 – weitergeleitete Nachricht: SPF-Fehler, DKIM-Bestätigung (abgestimmt)

Test 2 – fehlerhafter DKIM-Schlüssel: DKIM-Fehler, SPF-Bestätigung (abgestimmt)

The result is evident, the message passes DMARC authentication if it occurs:
SPF and domain alignment <OR> DKIM and domain alignment
Um die DMARC-Prüfung zu bestehen, ist es daher in manchen Fällen wichtig, die DKIM-Signatur zu validieren:
Die signierende Domain (d=example.com) muss mit der „From“-Domain übereinstimmen.
Beispiele für „DMARC-PASS“-Ergebnisse, die andernfalls nicht funktioniert hätten:
Fall 1 – Durch die Weiterleitung wird die SPF-Authentifizierung unterbrochen
-
SPF-FEHLER: SPF-Authentifizierungsprüfungen schlagen meist fehl,
da eine neue Entität, die nicht im SPF-Eintrag des ursprünglichen Absenders aufgeführt ist, die weitergeleitete E-Mail versendet
-
DKIM-PASS (angepasst): Die Weiterleitung von E-Mails hat keinen Einfluss auf die DKIM-Signatur
Ergebnis: Dank der DKIM-Übereinstimmung besteht die Nachricht die DMARC-Prüfung.
Fall 2 – Die vom ESP (E-Mail-Dienstanbieter) bereitgestellte SPF-Domäne
kann NICHT mit der Absender-Domäne abgeglichen werden
-
SPF~PASS (nicht abgeglichen): Die SPF-Authentifizierung schlägt beim Abgleich der Domänen fehl,
da die von ESP in der „Mail-From“-Adresse verwendete Domäne von der im „From“-Feld angegebenen abweicht
-
DKIM-PASS (abgestimmt): Die DKIM-Signatur verwendet dieselbe Domain wie der Absender
Ergebnis: Dank der DKIM-Übereinstimmung besteht die Nachricht die DMARC-Prüfung.
Die beliebtesten E-Mail-Anbieter
Which are the most popular email providers in 2020 ?
To monitor email deliverability, it is important to know which email providers your recipients are using.
Busines to Business
For B2B world we don’t have precise numbers. The most part of business mailboxes are moving to “Cloud Office Suites”, where the market is divided among “G Suite” and “Office 365”.
Together they cover more than 90% of global business email market share, according to datanyze.com data.
Gathering this information for a single business is quite easy.
From the mx record of the company domain, we can see the email provider being used:
aspmx.l.google.com for “G Suite”
mail.protection.outlook.com for “Office 365”
If your company works in B2B, it is recommended that you regularly monitor a mailbox for each of these two providers.
A third player is Zoho (mx.zoho.com), its market share is around 2% (source: ciodive.com).
Busines to Consumer
With B2C the analysis is more complex. There are no public “email open data” based on the internet traffic.
The only way to get information on email recipients is to extract them from our contact list or to get them by big email service providers. Some of them produce yearly reports to share them with the internet community.
The data below show the top three email providers in twenty-five countries, the information comes from the “2019 Email Benchmark and Engagement Study” published by Sendgrid.
Countries
Argentina, Australia, Belgium, Brazil, Canada, Chile, China, Colombia, Denmark, France, Germany, India, Indonesia, Italy, Japan, Mexico, New Zealand, Russia, Saudi Arabia, Spain, South Africa, Sweden, Switzerland, United Kingdom, United States
Argentina
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| AR |
gmail.com |
45.8% |
hotmail.com |
33.7% |
yahoo.com.ar |
8.2% |
|
87.7% |
Zurück zum Anfang
Australia
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| AU |
gmail.com |
38.0% |
hotmail.com |
18.7% |
bigpond.com |
5.4% |
|
62.1% |
Zurück zum Anfang
Belgium
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| BE |
gmail.com |
30.6% |
hotmail.com |
23.0% |
telenet.be |
9.8% |
|
63.4% |
Zurück zum Anfang
Brazil
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| BR |
gmail.com |
52.9% |
hotmail.com |
22.5% |
yahoo.com.br |
6.1% |
|
81.5% |
Zurück zum Anfang
Canada
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| CA |
gmail.com |
38.6% |
hotmail.com |
18.8% |
yahoo.com |
4.5% |
|
61.9% |
Zurück zum Anfang
Chile
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| CL |
gmail.com |
67.3% |
hotmail.com |
18.2% |
yahoo.es |
1.7% |
|
87.2% |
Zurück zum Anfang
China
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| CN |
NetEase (126.com 163.com) |
n.a. |
Tencent (qq.com) |
n.a. |
Sina (sina.com) |
n.a. |
|
n.a. |
Note: information taken from “Country overview: China” by ReturnPath
Zurück zum Anfang
Colombia
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| CO |
gmail.com |
41.3% |
hotmail.com |
38.7% |
yahoo.com |
4.3% |
|
84.3% |
Zurück zum Anfang
Denmark
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| DK |
gmail.com |
35.8% |
hotmail.com |
14.0% |
live.dk |
3.7% |
|
53.5% |
Zurück zum Anfang
France
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| FR |
gmail.com |
36.0% |
hotmail.fr |
9.8% |
orange.fr |
8.2% |
|
54.0% |
Zurück zum Anfang
Germany
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| DE |
gmail.com |
20.8% |
gmx.de |
10.0% |
web.de |
9.5% |
|
40.3% |
Zurück zum Anfang
India
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| IN |
gmail.com |
82.4% |
yahoo.com |
3.4% |
yahoo.co.in |
1.6% |
|
87.4% |
Zurück zum Anfang
Indonesia
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| ID |
gmail.com |
82.6% |
yahoo.com |
7.1% |
yahoo.co.id |
1.0% |
|
90.7% |
Zurück zum Anfang
Italy
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| IT |
gmail.com |
46.8% |
libero.it |
9.9% |
hotmail.it |
7.2% |
|
63.9% |
Zurück zum Anfang
Japan
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| JP |
gmail.com |
33.8% |
yahoo.co.jp |
12.7% |
docomo.ne.jp |
8.6% |
|
55.1% |
Zurück zum Anfang
Mexico
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| MX |
gmail.com |
42.6% |
hotmail.com |
31.5% |
yahoo.com.mx |
4.0% |
|
78.1% |
Zurück zum Anfang
Netherlands
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| NL |
gmail.com |
35.4% |
hotmail.com |
19.5% |
live.nl |
2.5% |
|
57.4% |
Zurück zum Anfang
New Zealand
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| NZ |
gmail.com |
46.3% |
hotmail.com |
10.9% |
xtra.co.nz |
9.0% |
|
66.2% |
Zurück zum Anfang
Russia
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| RU |
mail.ru |
34.8% |
gmail.com |
22.7% |
yandex.ru |
19.6% |
|
77.1% |
Zurück zum Anfang
Saudi Arabia
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| SA |
gmail.com |
47.0% |
hotmail.com |
31.0% |
yahoo.com |
7.8% |
|
85.8% |
Zurück zum Anfang
Spain
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| ES |
gmail.com |
50.2% |
hotmail.com |
25.8% |
yahoo.es |
3.8% |
|
79.8% |
Zurück zum Anfang
South Africa
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| ZA |
gmail.com |
65.5% |
yahoo.com |
4.1% |
hotmail.com |
2.9% |
|
72.5% |
Zurück zum Anfang
Sweden
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| SE |
gmail.com |
33.2% |
hotmail.com |
21.0% |
live.se |
3.0% |
|
57.2% |
Zurück zum Anfang
Switzerland
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| CH |
gmail.com |
25.5% |
bluewin.ch |
14.6% |
hotmail.com |
10.5% |
|
50.6% |
Zurück zum Anfang
United Kingdom
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| UK |
gmail.com |
30.8% |
hotmail.com |
10.4% |
hotmail.co.uk |
9.2% |
|
50.4% |
Zurück zum Anfang
United States
| ISO |
Provider #1 |
% |
Provider #2 |
% |
Provider #3 |
% |
|
Total |
| US |
gmail.com |
41.9% |
yahoo.com |
15.1% |
hotmail.com |
5.3% |
|
62.3% |
Zurück zum Anfang
So funktioniert DMARC
How dmarc works with Google Mail and Office 365 in 2020 ?
We’ve tested how email authentication affects the delivery
to Google Mail and Office 365, the most popular business emails providers.
The results can be divided into two groups:
-
emails delivery
(how spf, dkim and dmarc affect the delivery of sent messages)
Google mail: the emails are always accepted, authentication seems not to be considered at all
Office 365: is generally responsive to spf and dkim. The only way to get consistent results, reaching the inbox, is to associate them with dmarc
-
spoofing protection
(how spf, dkim and dmarc protect the sender’s email address from being spoofed*)
* = make the message appear from someone other than the actual source
Google mail: combining dmarc and spf (fail or softfail qualifiers), the spoofed senders get filtered to the Spam folder or rejected (depending on your dmarc settings)
Office 365: spf (fail or softfail qualifiers) is enough to send fake senders to the Junk email folder
They are summarized as follows:
|
emails delivery |
spoofing protection |
| Google Mail |
always accepted, authentication is not considered at all |
dmarc + spf (fail or softfail) |
| Office 365 |
dmarc + spf pass or dmarc + dkim pass |
spf (fail or softfail) |
Below there is the full range of tests that have been made.
|
Google Mail |
Office 365 |
| spf Pass - dkim none |
inbox |
inbox |
| spf Fail - dkim none |
inbox |
junk |
| spf SoftFail - dkim none |
inbox |
junk |
| spf Neutral - dkim none |
inbox |
inbox |
| spf none - dkim none |
inbox |
junk |
|
|
|
| spf Pass - dkim pass |
inbox |
junk* |
| spf Fail - dkim pass |
inbox |
junk |
| spf SoftFail - dkim pass |
inbox |
junk* |
| spf Neutral - dkim pass |
inbox |
junk* |
| spf none - dkim pass |
inbox |
junk* |
|
|
|
| spf Pass - dkim invalid |
inbox |
junk |
| spf Fail - dkim invalid |
inbox |
junk |
| spf SoftFail - dkim invalid |
inbox |
junk |
| spf Neutral - dkim invalid |
inbox |
junk |
| spf none - dkim invalid |
inbox |
junk |
|
|
|
| spf Pass - dkim invalid - dmarc reject |
inbox |
inbox |
| spf Fail - dkim invalid - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
| spf SoftFail - dkim invalid - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
| spf Neutral - dkim invalid - dmarc reject |
inbox |
inbox |
| spf none - dkim invalid - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
|
|
|
| spf Pass - dkim pass - dmarc reject |
inbox |
inbox |
| spf Fail - dkim pass - dmarc reject |
inbox |
inbox |
| spf SoftFail - dkim pass - dmarc reject |
inbox |
inbox |
| spf Neutral - dkim pass - dmarc reject |
inbox |
inbox |
| spf none - dkim pass - dmarc reject |
inbox |
inbox |
|
|
|
| spf Pass - dkim diff - dmarc reject |
inbox |
inbox |
| spf Fail - dkim diff - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
| spf SoftFail - dkim diff - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
| spf Neutral - dkim diff - dmarc reject |
inbox |
inbox |
| spf none - dkim diff - dmarc reject |
dsn=5.0.0, stat=Service unavailable |
junk |
Notes:
- the from address (visible sender) and the envelope from (return-path) are from the same domain
- “dkim pass”: the dkim signing domain is the same as the one of the from address
- “dkim diff”: the dkim signing domain is different than the one of the from address
- the asterisks in the second group means that the results have not been consistent over time