http://www.emailsherpa.com/sample.cfm?contentID=2102

Tips on Avoiding Spam Filters: Yes Even Opt-In Email Lists Are in Danger

Recently a well-known email marketing executive called us up to 
share her excitement about her new viral campaign. We were psyched 
too - viral friend-tell-a-friend campaigns can be such a powerful 
tactic to grow your opt-in email list. 
But then our Tech Editor, Alexis Gutzman, started eyeing the way 
the marketer's viral email was being sent. Turns out, the way the 
email was sent meant that many big ISPs would filter it out as 
"suspected spam" before it got to the recipient. 

The whole problem had to do with the way the message "header" was 
set up. And, it's something every email marketer should be aware 
of -- especially if you have a tell-a-friend function on your site 
or if you use a third party email broadcast firm. 

Here's a column on the header problem by Alexis. Read it over 
yourself, and then pass it on to the tech team who send your 
broadcast email.    

   -> Yes, Spam Filtering Affects Opt-In Emailers Too 

Spam has increased by more than 600% in the past year. To cope 
with the influx, ISPs such as AOL, Mindspring and Verizon, as well 
as most big company IT/MIS departments are using spam filters. 

This affects legitimate broadcast emailers - such as opt-in email 
marketers and email newsletter publishers - because there's no set 
way these various spam filters can know if the email is requested 
opt-in or not. Currently the filters can only guess at what's 
spam. Which means legitimate email gets caught up in the net along 
with its less legitimate cousins sometimes. 

To avoid being filtered, first you have to know that there are 
three ways that ISPs filter spam: 

1. By looking at the header of the message 

2. By looking at the contents of the subject line or message body 
to identify likely spam words and phrases 

3. By subscribing to a blacklist service that provides an up-to-
date list of domains that have been identified as being used by 
spammers 

Today we're going to explain how to avoid being filtered based on 
your headers. (We'll cover avoiding the other two ways in future 
issues.) 

   -> Are Your Messages Already Being Filtered Out?

Are you already being filtered based on your headers? 
Unfortunately there's no way to tell exactly how much of your 
broadcast email is being filtered prior to reaching its intended 
recipients. 

Some ISPs that filter at the server level will send your message 
back to you as a "bounceback." But not all. In fact AOL, among 
others, doesn't send back filtered messages. (Another reason why 
if you have a large slice of AOL email addresses on your list, make 
sure you add a "seed" name of your own there to see if mail gets 
through properly.) 

Sometimes a lower-than-expected open or click rate will tip you off 
that you have a filtering problem. So, make sure that you 
routinely check these metrics on a regular basis. 

Luckily, even if you're not sure how much of your email broadcast 
is being filtered, header filtering is one of the easiest things to 
fix. 

-> Headers Are Your Calling Card 

Back when society was more civilized, you would visit an 
acquaintance and hand your calling card to the butler. While you 
waited patiently, your calling card would be delivered to the 
acquaintance, who would decide whether he or she wanted to receive 
you. 

In the email universe, your calling card is your header, and the 
butler is the recipient's mail server.

When you send a message to someone on your list, a conversation 
takes place between your email server and your recipient's. Your 
email server sends the recipient's email server just your header 
(the FROM email address in your email message.) If the recipient's 
email server doesn't like the way your header looks, it will reject 
your message. 

One way filters evaluate your header is by making sure it's the 
same as the actual domain that's sending the email. 

For example, if the FROM email address claims to be 
"[EMAIL PROTECTED]," but the email server from which the message is 
sent is "spamcentral.com," then the email server can reasonably 
assume that the header has been falsified. 

This sounds trivial, but falsifying headers can get you into big 
legal trouble, as some ISPs including AOL have strict terms and 
conditions for anyone sending them email and explicitly say that 
they will delete mail with falsified headers and will prosecute 
(and have successfully prosecuted) offenders. 

When you send bulk email, it's easy to change the FROM address, but 
it is much more complicated to disguise the identity of the sending 
mail server. Spam filters understand this. They believe the domain 
information. They don't believe the FROM address - nor should they. 

   -> Alert: You May Be Falsifying By Mistake

There are two scenarios under which you might be inadvertently 
falsifying your header, without even realizing it's happening. 

Scenario #1: You send email using a third party broadcast email 
service (aka a "list host"), and you put your own FROM email 
address, rather than a FROM address on the third party's server. 

If you send email from a list host, make sure that the FROM email... 

Sponsor: How to Sell Subscriptions to Web Sites
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
             *** Make Your Content More Profitable *** 

10 web site and email newsletter execs share their Case Studies, 
including never-before-revealed data on:
       -> How to market subscriptions profitably
       -> Pricing subscriptions
       -> What type of content sells best in B2B and B2C 

Get your 100% guaranteed-to-be-useful copy today:
http://sherpastore.com/store/page.cfm/1950?a=es
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 

...address is one that is hosted on their mail server. Ask them to 
assign you one. 

Yes, you can still put your FROM name as your own name. And you 
still should put your own email address as the REPLY-TO address. 
Most human replies will go to the REPLY-TO address, rather than the 
FROM address. Bounce messages often go to the FROM address (or the 
BOUNCE address, if you set one up for that purpose). 

Scenario #2: You have a "forward to a friend" feature on your site 
or email messages, and when it sends email, it uses the referring 
friend's email address as the FROM email address rather than yours. 

We certainly see the logic of having the forwarded message come 
FROM the trusted party - it's more likely to be opened, for one 
thing - but this can get you into big trouble. 

Quick fix: Rather than sending the message FROM the friend's email 
address, send it FROM an address on your email server. 

But, be sure to use the friend's name at the start of the subject 
line of the message, and the friend's email in the REPLY-TO 
address. These two things will increase your open rates and pass-
along success. 

However, we do want you to be aware that by forcing the first 
friend to enter an email address, a first name, and a friend's 
email address, in order to use your forward function, you might 
have raised the barriers too high for him or her to use the 
feature. 

Our best-practices workaround is a bit on the technical side, so 
it's in the Tech Notes.

   -> Boring But Necessary Technical Notes: 

If you want to use an address on your own server for the FROM 
address, set up an MX record on your Web server with a third-level 
domain that points to the mail server of your list host. 

For example, we have the address lists.marketingsherpa.com that 
actually resolves (in the DNS) to our list host. Since the 
recipient's mail server will frequently check the DNS to make sure 
your domain exists. Since lists.marketingsherpa.com resolves to the 
IP address it's coming from, the messages go through no problem. 

By having this MX record set up, you can have all subscribe and 
unsubscribe messages also appearing to go through your own domain, 
rather than [EMAIL PROTECTED] 

As part of testing your email campaign, you should have test 
accounts set up with ISPs that filter on each of these bases 
mentioned above, so that you can test what's getting blocked on a 
regular basis. (We'll cover testing in much more detail in a future 
issue.) 

If you see any messages in your delivery report from recipients' 
mail servers that "malformed headers" or something like that, it 
may be that you are being filtered on this basis. 

-> Best-practices recommendation for forwarding to a friend: 

If you have a "forward to a friend" feature in your email message, 
include a hidden field in the forward form to hold the recipient's 
email address. 

You obviously have the recipient's email address, since you're 
sending the message to that address. When your reader clicks "send" 
on the forward form, your server will know who is doing the sending 
and will be able to apply the right REPLY-TO address without having 
to ask for it. 

This feature won't work on your Web site unless you have cookies in 
place with visitors' email addresses, which is something you might 
want to think about adding. It's relatively trivial to update your 
cookies with email information from an HTML newsletter or from the 
opt-in thank-you page on your Web site. 

Good Luck! 

Got feedback or questions? You can reach Alexis at:
[EMAIL PROTECTED]


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
PC Mods, Computing goodies, cases & more
http://thinkgeek.com/sf
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to