https://www.getdrip.com/features
- Root: "Inbox"
- To recognize standard folder names delete .pst/.ost file after account setup
- Fix folder subscription, see: ${D}/mail/courier-outlook-subscribe-bug.sh (Outlook 2007)
Advanced/IMAP Path Prefix: "INBOX"
https://github.com/Yeraze/ytnef
See: ${D}/repo/debian/pool/main/y/ytnef/
MIME type: application/ms-tnef
https://toolbox.googleapps.com/apps/checkmx/
- see: mail/imapsync
- OVH ImapCopy
- OfflineIMAP
See: ${D}/mail/mbox_send2.py
- SSL?
- headers: From, from name, To, Reply-to, Return-path, SMTP "MAIL FROM:"
http://www.courier-mta.org/makehosteddomains.html http://www.courier-mta.org/dot-courier.html
echo "|pipe/command" > /var/mail/domain.net/user/.courier-foo-default
D0 CAPABILITY
D1 AUTHENTICATE PLAIN
echo -en "\0USERNAME\0PASSWORD" | base64
D2 LOGOUT
Build Courier SRS
apt-get install -y build-essential libsrs2-dev libpopt0
git clone https://github.com/szepeviktor/couriersrs
cd couriersrs
./configure --sysconfdir=/etc
make
make install
See package: http://szepeviktor.github.io/
Create users SRS0 and SRS1.
echo "|/usr/bin/couriersrs --reverse" > /etc/courier/aliasdir/.courier-SRS0-default
echo "|/usr/bin/couriersrs --reverse" > /etc/courier/aliasdir/.courier-SRS1-default
Set up SRS secret
./couriersrs -v
pwgen 30 1 > /etc/srs_secret
Add forwarding alias
user: |/usr/bin/couriersrs username@external-domain.net
See the description of /etc/courier/aliasdir
in man dot-courier
DELIVERY INSTRUCTIONS
echo > /etc/courier/aliasdir/.courier-kitchensink
Add alias: ANY.ADDRESS@ANY.DOMAIN.TLD: kitchensink@localhost
sudo -u daemon -- spamassassin --test-mode -D < msg.eml
# For specific tests see: man spamassassin-run
sudo -u daemon -- spamassassin --test-mode -D dkim < msg-signed.eml
opendkim -vvv -t msg-signed.eml
- http://en.wikipedia.org/wiki/Sender_ID
- http://tools.ietf.org/html/rfc4407#section-2
- PRA: Resent-Sender > Resent-From > Sender > From > ill-formed
- http://www.appmaildev.com/
- setup http://www.spfwizard.net/
- check http://www.kitterman.com/spf/validate.html
- monitor
host -t TXT <domain>; pyspf
- RFC 6376
- setup http://www.tana.it/sw/zdkimfilter/
- check
- monitor
An optional extension to the DKIM E-mail authentication scheme.
https://unlocktheinbox.com/resources/adsp/
Deprecated.
?
Specs: https://datatracker.ietf.org/doc/draft-kucherawy-dmarc-base/?include_text=1
- setup https://unlocktheinbox.com/dmarcwizard/
- check
- monitor
host -t TXT <domain>
http://www.returnpath.com/solution-content/dmarc-support/what-is-dmarc/
- Descriptive From name "Firstname from Company"
- Descriptive subject line
- Short preview line at top of the message
- Link to online version (newsletter archive)
- Short main header line
- Subheader lines
- Sections: image + title + description + call2action https://litmus.com/subscribe
- Sender's contact details (postal address, phone number)
- Who (name, email address, why) is subscribed
- Unsubscribe link
- List-Unsubscribe: URL (invisible)
- Precedence: bulk (invisible)
- Return-Path: bounce@addre.ss (invisible)
- Reply-to: reply@addre.ss (invisible)
- From: sender@domain.net
- To: recipients@addre.ss
- SMTP
MAIL FORM: <user@domain.net>
- HTML and plain payload
- From address SPF
include:servers.mcsv.net
- Bulk Senders Guidelines by Google
- https://litmus.com/blog/go-responsive-with-these-7-free-email-templates-from-stamplia
- https://www.klaviyo.com/
- https://litmus.com/subscribe
- https://www.mail-tester.com/ by Mailpoet
- mailtest@unlocktheinbox.com https://www.unlocktheinbox.com/bulkemailvalidator/
- checkmyauth@auth.returnpath.net
- https://winning.email/checkup/DOMAIN
List of blacklists: https://mxtoolbox.com/problem/blacklist/
Anti-abuse's list: http://www.anti-abuse.org/
bl.spamcop.net
cbl.abuseat.org
b.barracudacentral.org
dnsbl.sorbs.net
http.dnsbl.sorbs.net
dul.dnsbl.sorbs.net
misc.dnsbl.sorbs.net
smtp.dnsbl.sorbs.net
socks.dnsbl.sorbs.net
spam.dnsbl.sorbs.net
web.dnsbl.sorbs.net
zombie.dnsbl.sorbs.net
dnsbl-1.uceprotect.net
dnsbl-2.uceprotect.net
dnsbl-3.uceprotect.net
pbl.spamhaus.org
sbl.spamhaus.org
xbl.spamhaus.org
zen.spamhaus.org
bl.spamcannibal.org
psbl.surriel.com
ubl.unsubscore.com
rbl.spamlab.com
dyna.spamrats.com
noptr.spamrats.com
spam.spamrats.com
cbl.anti-spam.org.cn
cdl.anti-spam.org.cn
dnsbl.inps.de
drone.abuse.ch
httpbl.abuse.ch
korea.services.net
short.rbl.jp
virus.rbl.jp
spamrbl.imp.ch
wormrbl.imp.ch
virbl.bit.nl
rbl.suresupport.com
dsn.rfc-ignorant.org
ips.backscatterer.org
spamguard.leadmon.net
opm.tornevall.org
multi.surbl.org
ix.dnsbl.manitu.net
tor.dan.me.uk
rbl.efnetrbl.org
dnsbl.dronebl.org
access.redhawk.org
db.wpbl.info
rbl.interserver.net
query.senderbase.org
bogons.cymru.com
csi.cloudmark.com
Check RBL-s
cat anti-abuse.org.rbl|xargs -I%% host -tA $(revip "$IP").%% 2>&1|grep -v "not found: 3(NXDOMAIN)"
Trendmicro ERS
wget -qO- --post-data="_method=POST&data[Reputation][ip]=${IP}" https://ers.trendmicro.com/reputations \ | sed -n 's;.*<dd>\(.\+\)</dd>.*;\1;p' | tr '\n' ' '
Response: "IP Unlisted in the spam sender list None"