Closed leandrosardi closed 2 years ago
https://instantly.ai/ --> they provide free warming up, but you have to connect your email gmail, outlook or smtp. https://quickmail.io/pricing --> free warming tool.
I have some questions:
the XX plan includes a warmed-up email server?
it includes the platform from where I set up and send campaigns?
it includes the verifications of emails before delivery?
what is the maximum bounce rate recommended by you?
messageId
when sending an email.Problem: I run mutt
, it asked for creating Mail directory, and the it closes.
Solution: Run sudo mutt
instad.
Problem: Getting "Error sending message, child exited 127 (Exec error.)." when sending email from mutt.
Solution: You didn't install postfix, or something else used to send mail.
Run sudo apt-get install sendmail
or sudo apt-get install postfix
.
Pending: How to know the real datacenter behind a hosting provider?
debconf-set-selections <<< "postfix postfix/mailname string fabulousfunfacts.site"
debconf-set-selections <<< "postfix postfix/main_mailer_type string 'Internet Site'"
apt-get install --assume-yes postfix
The IP 104.168.174.79 is listed by many blacklists. Can you replace it by a clean IP ?
Reference: https://www.hostwinds.com/tutorials/setup-spf-dkim-records-cpanel
Sender Policy Framework (SPF) records allow you to create a list containing IP addresses (or subnets) that you authorize to send emails on your behalf. This makes it harder for malicious email senders to hide their identity and use your email server for fraud or spam. This will prevent your domain name from being spoofed when an email is received. Doing this will protect against phishing attempts coming from your domain, as well as "identity theft" through emails.
DomainKeys Identified Mail (DKIM) helps ensure emails are not altered between the original and final destination. Each email is signed with a private key that's validated by a public key set in the DNS of the final destination mail server. This way, if any modifications are attempted during transit for the email, the end-user will know when checking.
I want to automate the setting up of domains
how can I do that by code?
It may be possible to do with API.
You need to enable it in your Namecheap account and whitelist your IP address in order to perform any actions.
Please go to Profile > Tools > Namecheap API access.
Here is our full list of API methods that you can use in your API calls: https://www.namecheap.com/support/api/methods/
You can check our FAQ article about API: https://www.namecheap.com/support/knowledgebase/article.aspx/9739/63/api-faq/
One more question: how is the processing of bounces and spam complaints? I want to do it programmatically, but I don't understand where I am being notified. Is it in a log file? Is it in notification emails?
Bounceback usually is like email 'Delivery failed' or something like this. Also ,you can check your MX records here: https://mxtoolbox.com/ There are no bounces to check if the email goes to spam. But you could use this tool: https://www.mail-tester.com/
Reference: https://www.mailhardener.com/kb/how-to-create-a-dkim-record-with-openssl
If you want to rotate a key, you should never change the existing record, but instead create a new record.
pending
Reference: https://www.mailhardener.com/kb/dmarc
v=DMARC1;p=reject;rua=mailto:dmarcreports@fabulousfunfacts.site
Reference: https://mxtoolbox.com/emailhealth/fabulousfunfacts.site/
Reference:
Error: "Failed to start OpenDKIM DomainKeys Identified Mail" when run sudo service opendkim restart
.
Solution:
Find what is causing the error by running this command journalctl -f -u opendkim.service
Reference: https://www.linode.com/community/questions/17690/failed-to-start-opendkim-domainkeys-identified-mail
Error: "key data is not secure: /etc/mail/dkim.key can be read or written by other users" when checking journalctl -f -u opendkim.service
Solution:
chown root:opendkim /etc/mail/dkim.key
chmod 640 /etc/mail/dkim.key
Reference: https://unix.stackexchange.com/questions/306559/problems-with-starting-process-opendkim
Problem: "Bash: mail: command not found"
Solution:
sudo** apt-get install mailutils
Reference: https://tecadmin.net/bash-mail-command-not-found/
pending
They should be in /var/log/mail.log
.
Reference: https://askubuntu.com/questions/394724/where-are-the-postfix-log-files
Problem: Email bonced with error ""is not accepted due 550-5.7.26""
Solution:
mv /etc/mail/dkim.key /etc/mail/dkim.key_old
cd /etc/mail
cd dkim-keys
cd fabulousfunfacts.site
cp ./mail.private /etc/mail/dkim.key
sudo service opendkim restart
sudo service postfix restart
References:
Reference: https://fedingo.com/postfix-mail-server-configuration-in-linux-step-by-step/
apt update -y
apt upgrade -y
apt install mailutils -y
apt install telnet -y
hostnamectl set-hostname www.fabulousfunfacts.site exec bash
nano /etc/hosts
192.168.15.25 www.fabulousfunfacts.site
apt install postfix -y systemctl start postfix systemctl enable postfix
useradd postfixuser passwd postfixuser
SantaClara123 SantaClara123
mkhomedir_helper postfixuser
nano /etc/postfix/main.cf
myhostname = www.fabulousfunfacts.site mydomain = fabulousfunfacts.site myorigin = $mydomain inet_interfaces = all inet_protocols = all mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain mynetworks = 192.168.1.0/24, 127.0.0.0/8, 127.0.0.1, localhost, <the IP of the server from where you will
home_mailbox = Maildir/
TLS parameters
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
smtpd_tls_security_level=may
smtp_tls_CApath=/etc/ssl/certs
smtp_tls_security_level=may
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
systemctl restart postfix
Reference: https://fedingo.com/postfix-mail-server-configuration-in-linux-step-by-step/
cd ~
openssl req -nodes -newkey rsa:2048 -keyout mail.key -out mail.csr
all default values except challenge password
openssl x509 -req -days 365 -in mail.csr -signkey mail.key -out mail.crt
cp mail.key mail.crt /etc/postfix
nano /etc/postfix/main.cf
smtpd_use_tls = yes smtpd_tls_cert_file = /etc/postfix/mail.crt smtpd_tls_key_file = /etc/postfix/mail.key smtpd_tls_security_level = may
systemctl restart postfix
Testing sending an email to postfixuser@fabulousfunfacts.site echo "test email 6789" | mailx -s "Test email from Postfix MailServer 6789" -r ubuntu@fabulousfunfacts.site postfixuser@fabulousfunfacts.site
https://www.tutorialspoint.com/linux_admin/linux_admin_set_up_postfix_mta_and_imap_pop3.htm https://askubuntu.com/questions/346528/easiest-way-to-set-up-an-imap-mail-server https://stackoverflow.com/questions/53780020/secure-mail-importation-in-gmail-plaintext-and-ssl-configuration
https://github.com/ruby/net-imap https://ruby-doc.org/stdlib-2.5.1/libdoc/net/imap/rdoc/Net/IMAP.html https://www.ombulabs.com/blog/ruby/imap/a-comprehensive-guide-to-interacting-with-imap-using-ruby.html https://stackoverflow.com/questions/48473130/ruby-on-rails-gets-body-message-imap
apt install dovecot-core -y apt install dovecot-imapd -y apt install dovecot-pop3d -y
/etc/dovecot/dovecot.conf login_trusted_networks = 127.0.0.1 localhost 200.114.237.5 protocols = pop3 pop3s imap imaps mail_location = maildir:~/Maildir # (for maildir)
systemctl start dovecot systemctl enable dovecot
Modify: /etc/dovecot/conf.d/10-auth.conf with disable_plaintext_auth = no Modify: /etc/dovecot/conf.d/10-ssl.conf with ssl = no
systemctl restart dovecot
openssl s_client -starttls imap -quiet -connect 104.168.174.79
Question
Hello. I need advice on running cold email campaigns on a large scale.
My concerns are the following:
Other questions that I have:
More advanced questions:
Answer 1
Reference: https://www.facebook.com/groups/2905333369789093/posts/3339421583046934/?comment_id=3339897302999362¬if_id=1661998314860456¬if_t=group_comment&ref=notif
Answer 2
Reference: https://www.facebook.com/groups/coldemailmasterclass/posts/447478137397512/?comment_id=448148430663816¬if_id=1662034179922973¬if_t=group_comment&ref=notif
Answer 3
Queston 2
Answer 1
Answer 2
Question
Answer 1