
On Sat, 5 May 2007, Jo Booth wrote:
It seemed to take about 30 seconds to return an OK to the unleash address.
One thing they are doing is connecting to my mail server and running a VRFY against the address you specify ( of course 99% of mail servers block verify) : 2007-05-05 16:33:04 verify failed for SMTP recipient bogusaddress(a)darkmere.gen.nz from <> H=gobo.hosts.net.nz [210.48.108.207] and they also count a timeout as a failure I guess so when I try a few minute later: 220 Iconz Hosting Group SMTP frontend - ESMTP - red helo boggle 250 red.hosts.net.nz Hello green.darkmere.gen.nz [202.49.59.210] mail from:<simon(a)darkmere.gen.nz> rcpt to:<test(a)freeparking.co.nz> 250 OK 550 Previous (cached) callout verification failure (0/1) It's all fairly standard anti-spam stuff. These days they best way to ensure your mail gets through is to send via a server that: (a) Originates *only* non-spam [1] (b) Sends enough email per day that the receivers see it as a "good guy" rather than an "unknown". and of course remember that you'll still lose the odd one. [1] Better still would be one that doesn't originate any general bulk email like HTML mailouts from companies. Some people add these to spam filters instead of unsubscribing. They also trigger general filters easily. -- Simon Lyall | Very Busy | Web: http://www.darkmere.gen.nz/ "To stay awake all night adds a day to your life" - Stilgar | eMT.