Sandy, I agree. However, the reporting company is looking for raw server logs. I can give them as many real-world numbers as I want (which I have), but they want what they want. The problem is, that I don't think the people who are asking for them, really know what they are asking for. They are just doing what they are told. My mailing lists are usually pretty clean, as I use a special mailbox to receive the bounced mail and then have a 3rd party utility called Boogie Bounce (awful name, great product) that can scan the bounced messages and determine if it is a soft or hard bounce. If if is a hard bounce, I remove the email from my list. The reporting company does not care about this though and only wants SMTP logs.
Thanks, Dean On Tue, Aug 26, 2008 at 1:19 PM, Sanford Whiteman <[EMAIL PROTECTED]> wrote: >> There are many virus scanners and smtp relays, etc that do not >> reject the messages and the user's email will later bounce. > > I would take this a giant step further. When it comes to bulk mail, > unless you are certain that you've been whitelisted with all of your > subscribers, a proportion of messages will get devnulled or dumped > into a rarely-checked spam quarantine. As Kevin rightly notes, you > have still made a good-faith effort to hand off delivery to the > persons responsible for the remote domain. But in reality, you must > subtract a consistent % from your apparent # of "true" recipients. > > This brings me to another point, though. If the reporting agency is > content with knowing how many subscribers' MXs accepted each message, > why don't you just count zero-hop _bounces_ and subtract them from the > total? Don't bother with extended log parsing. Just check the SMTP > sender's mailbox after the queue lifetime of the message has expired. > How does not get you just as "true" a number as inspecting the logs? > In fact, it'll be *more* "true" unless in your parsing logic you are > sure to not count transient failures, but only the final disposition > known to IMail. > > Generally, I find that this kind of auditing is much better done using > after-the-fact parsing of the bounce mailbox in combination with the > original recipient list. You can do a lot more fancy parsing on what > is sure to be a smaller set of data (such as separating by bounce > type, number of bounces in a row for a given user, etc.). > > --Sandy > > > ------------------------------------ > Sanford Whiteman, Chief Technologist > Broadleaf Systems, a division of > Cypress Integrated Systems, Inc. > e-mail: [EMAIL PROTECTED] > > SpamAssassin plugs into Declude! > http://www.imprimia.com/products/software/freeutils/SPAMC32/download/release/ > > Defuse Dictionary Attacks: Turn Exchange or IMail mailboxes into IMail > Aliases! > > http://www.imprimia.com/products/software/freeutils/exchange2aliases/download/release/ > > http://www.imprimia.com/products/software/freeutils/ldap2aliases/download/release/ > > > To Unsubscribe: http://imailserver.com/support/discussion_list/ > List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ > Knowledge Base/FAQ: http://imailserver.com/support/kb.html > -- __________________________________________ Dean Lawrence, CIO/Partner Internet Data Technology 888.GET.IDT1 ext. 701 * fax: 888.438.4381 http://www.idatatech.com/ Corporate Internet Development and Marketing Specialists To Unsubscribe: http://imailserver.com/support/discussion_list/ List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://imailserver.com/support/kb.html