Monday, December 16, 2013

Five best practices to improve your email delivery success rate

Standard
In the modern day world of email delivery, recipient ISPs place great amount of emphasis on verifying the legitimacy of senders email to their customers.
By Linda Musthaler, Principal Analyst with Essential Solutions Corp.
I recently helped a client conduct a marketing campaign via email. This company sent an email message to more than 2,400 people and had a dismal response rate of 14 people. Looking back, we now see that at least part of the problem could be that the message was blocked from recipients' inboxes for various technical reasons.
In the modern world of email delivery, recipient ISPs place a great amount of emphasis on verifying the legitimacy of senders attempting to send email to their customers. As email volume increases, so does the abuse of email by illegitimate senders using bots and other techniques to send spam, viruses, malware, phishing ploys, and so on. As ISPs continue to clamp down on their war against these illegitimate senders, legitimate email senders can easily get caught in the crossfire, resulting in their emails not being delivered or being delivered to the spam folder.
There are important best practices and principles that must be followed by legitimate senders to avoid the crossfire. These principles apply to anybody running an email server that delivers outgoing email messages, regardless of the volume or content of those messages. If your company does any sort of email marketing or customer communications, your email administrator needs to be cognizant of the settings listed below, which have been provided to us by Heath Morrison, vice president of technology for SMTP.com, a service provider focused on email delivery.
Each of the following gives recipient ISPs a means of evaluating the legitimacy of a mail server that is attempting to send them email:
DKIM settings
DomainKeys Identified Mail (DKIM) is a modern Internet standard for authenticating the delivery chain for email messages. It operates by signing messages with a special cryptographic signature that can be verified but not counterfeited by a third-party source. The signature, which is included in the message by a relay server in the delivery chain, proves that the message passed through that server. This helps prevent spammers and scammers from creating fraudulent messages appearing to come from that source.
DKIM does not prevent spam from passing through a network, but it gives recipient servers confidence in the source of the message. Recipient servers can then more confidently use the reputation of the delivery network in order to judge whether a message is legitimate or not.
Configuring DKIM requires the functionality to be enabled in the outgoing mail server, and it requires a small TXT record to be added to the DNS configuration of the sending server's domain. The simplest way to check whether a mail server is sending DKIM-signed messages is to deliver a message from the server to a yahoo.com or gmail.com address. Once delivered, you can check the Full Headers of the message received to determine if the message passed the DKIM checks of that recipient ISP.
Here is a Wikipedia article for further reference.
Here's a tool that SMTP.com provides for checking a domain's DKIM records in DNS.
SPF records
The Sender Policy Framework (SPF) is another Internet standard for authenticating email messages. Unlike DKIM, however, SPF allows recipient ISPs to authenticate the sender listed on the From header of an email message. It does this by giving domain owners a means of specifying which IP addresses on the Internet are allowed to send email on their behalf. Recipient ISPs check the IP of a sending server against this list of valid sending IPs to determine if the sender is legitimate or not.
To configure SPF, domain owners must create a special TXT record in their DNS configuration listing the valid IPs for relaying email. The great thing about SPF is that it is not necessary to make any changes to the outgoing mail server.
Reverse DNS
A standard, forward DNS record is the association of a hostname with an IP address on the Internet. The corollary to this is reverse DNS, which uses an IP address to look up a hostname. Despite their similarities, these two records are independent. Forward DNS is configured by the owner of the domain. Reverse DNS, however, is configured by the ISP that controls the IP address.
In the world of email it is important for everything to match. When a mail server receives a connection from a particular IP address, it performs a reverse DNS lookup for that IP address. This yields a hostname. The server then performs a forward lookup on that hostname and checks whether the resulting IP address matches the original IP address used. This is called forward- confirmed reverse DNS (FCdDNS). If these records do not match it can impact the delivery success for messages from that IP address.
Here's a Wikipedia article for further reference.
Here's a tool that SMTP.com provides for checking FCdDNS for an IP.
MX records
In the world of email, MX records are DNS records that designate the servers handling incoming email for a particular domain. This is part of the basic framework of the Internet that allows senders to successfully route email to recipients. Surprisingly, in the modern world of email, the MX record of a domain plays an important role not just in incoming email but also in outgoing email.
Recipient ISPs place a huge emphasis on the legitimacy of the sender and server attempting to deliver email to their users. To that end, when looking at the From address of a message, some recipient ISPs evaluate whether reply messages for that From domain can successfully be delivered. If an email address contains an invalid domain, or if the domain does not have the basic facilities for receiving a reply message, recipient mail servers may choose to reject or delay messages to their users.
It is important to always use a valid email address on the envelope of email messages, and to ensure that MX records for the domain are configured in a way that allows that address to successfully receive replies. Here is a Wikipedia article for further reference.
IP blacklists
An IP blacklist is a third-party service that tracks IP addresses that people may not want to receive email from. Servers receiving email can subscribe to the blacklist service to help them determine IPs that they should reject email from. Blacklists may include IP addresses that have previously sent spam or viruses, or even IPs that simply represent computers on the Internet that don't have normal reasons to be emitting email.
There are a few common ways for a normal, well- managed mail server to find itself on a blacklist: infected computers with access to send email through the server, bad behavior by users of the server, or pre- existing conditions.
It is important to always check the status of a fresh IP against all major blacklists, to ensure that previous tenants on the IP had not behaved in a way to land it on a blacklist. It is also important to periodically check the blacklist status of an IP, particularly after any incident where spam email may have been sent from the network.
Here is a Wikipedia article for further reference.

source : http://www.activecampaign.smtp.com/resources/docs/best-practices

0 comments:

Post a Comment