Technical

Life of an Email

life-of-an-email

I’m repeating the presentation I gave at M3AAWG in London for the Certified Senders Alliance.It’s all about how to send an email by hand, and how knowing the mechanics of how an email is sent can help us diagnose email delivery issues.We’re starting in about five hours from when I post this.Register at https://register.gotowebinar.com/register/2268789893122531343

Read More »

Stop with the incorrect SPF advice

stop-with-the-incorrect-spf-advice

Another day, another ESP telling a client to publish a SPF include for the wrong domain. It shouldn’t annoy me, really. It’s mostly harmless and it’s just an extra DNS look up for most companies. Heck, we followed Mailchimp’s advice and added their include to our bare root domain and it’s not really a huge deal for companies with only a couple SaaS providers. Still

Read More »

Command Line Tools

command-line-tools

Tools that you run from the command line – i.e. from a terminal or shell window – are often more powerful and quicker to use than their GUI or web equivalents. Their output is plain text so it’s much easier to copy and paste into an email or a slack conversation – sure, you can take a screenshot of a GUI tool and share that

Read More »

Apple MPP reporting and geolocation

apple-mpp-reporting-and-geolocation

A while back I wrote about Apple Mail Privacy Protection, what it does and how it works. Since MPP was first announced I’d assumed that it would be built on the same infrastructure as iCloud Private Relay, Apple’s VPN product, but hadn’t seen anything from Apple to explicitly connect the two and didn’t have access to enough data to confirm it independently. But the nice

Read More »

Apple MPP

apple-mpp

You’ve probably heard about Apple Mail Privacy Protection. Email marketing chat has been all a-twitter about it since it was announced in June. Skipping over all the “Openpocalypse” panic, what is it and what does it do? Image Loads It’s all about images in email and how they’re loaded (particularly invisible one pixel images that are used solely for tracking). Why do we care about…

Read More »

The OSI Seven Layer Model

the-osi-seven-layer-model

In the 1970s, while the early drafts of the Internet were being developed, a competing model for networking was being put together by the ISO (International Organization for Standardization). The OSI (Open Systems Interconnection) Model broke the work needed to implement a distributed network service into seven separate layers of abstraction, from the physical infrastructure at layer one all the way up to the application…

Read More »

Using Reply-To:

using-reply-to:

Yesterday I learned that some ESPs don’t support the reply to: address. I asked around to discover which ESPs did. Here’s what I learned. ESPs that support reply-to: ActiveCampaignAmazonSESConstantContactCampaign MonitorCordialDelivraDoListEloquaEmmaEpsilonGetResponseHubSpotiContactListrakMailkitMailUpMarketoN6PardotwordResponsysSailthruSFMCSharpspringTwilio / SendGridZeta Global Thanks to all the colleagues who answered my question.

Read More »

Authentication

authentication

Some notes on some of the different protocols used for authentication and authentication-adjacent things in email. Some of this is oral history, and some of it may be contradicted by later or more public historical revision. SPF Associates an email with a domain that takes responsibility for it. Originally Sender Permitted From, now Sender Policy Framework. It allows a domain owner to announce which IP…

Read More »
>