Overview

Getting your MailUp account properly configured is an important part of maximizing your deliverability, that is your ability to deliver your emails in your recipients' inbox. You can think of deliverability as an equation: the result is whether or not your emails end up in the inbox, and many variables affect it. Among them: your reputation as a sender, the content of the message being sent, the level of engagement of the message recipients, the reputation of the sending infrastructure that you are using, etc.

Glossary

Email authentication methods

  1. Sender Policy Framework (SPF):
    SPF (Sender Policy Framework) is one of the ways to authenticate email communication. Some information is added to your Web domain settings indicating that certain systems are authorized to send an email on your behalf. Adding SPF authentication can increase your deliverability. That is the percentage of your messages that are delivered to in the Inbox instead of the Spam folder. In more detail, SPF provides a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is being sent from a host authorized by that domain's administrators. The list of authorized sending IPs for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record (see using SPF authentication with MailUp).

  2. DomainKeys Identified Mail (DKIM):
    DKIM is one of the ways to authenticate email communication by adding an encrypted signature to your emails. Some information (our DKIM public Key) is added to your Web domain settings, and a specific signature is added to all the emails that we send for you. This signature is encrypted based on some elements of the email being sent and, for this reason, it is unique for each email. When the receiving mail server analyzes your email, it will decrypt the signature using the public key mentioned above and It will generate a new hash string based on the same elements. If the decrypted signature matches the newly generated hash string then the email is considered DKIM authenticated. An example of DKIM signature is the following: 

    DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=transactional; d=mailup.com;
     h=From:To:Date:Subject:MIME-Version:Content-Type:List-Id:List-Unsubscribe:Message-ID; i=news-it@mailup.com;
     bh=eFMbGLxi/7mcdDRUg+V0yHUTmA1F4EXExVBQxIxBr2I=;
     b=ra3pGFHHvCr9OZsm9vnOid........Yj00/+nTKs=


    If the message has a valid signature (it is not forged), the signing domain, identified by the d= tag will tell the receivers who you are and they will handle your mail accordingly. Reputation assessment systems will look at the reputation of the signing domain and decide whether place the email in the inbox or the spam folder based on that assessment.


  3. Domain-based Message Authentication, Reporting, and Conformance (DMARC):
    DMARC is a method of email authentication focused on mitigating email-based phishing. It allows a domain owner and sender of email messages to ask mailbox providers not to deliver unauthorized messages that appear to have been sent from the same domain. This helps in the prevention of phishing schemes and spoofing attacks.

    Technically speaking, DMARC – which stands for Domain-based Message Authentication, Reporting & Conformance – is a system that builds on the DKIM and SPF authentication protocols to help to receive servers (e.g. Gmail, Yahoo!, Hotmail, etc.) know what to do when a message cannot be authenticated. It does so by allowing the sender of an email to publish a "policy" on which mechanism (DKIM, SPF, or both) is employed when sending email, which will instruct how email receivers should deal with failures (monitor, send to spam or reject the messages).
    Additionally, it provides a reporting mechanism of actions performed under those policies. It thus coordinates the results of DKIM and SPF and specifies under which circumstances the FROM. which is often visible to end-users, should be considered legitimate.

    For more, please see to using DMARC with MailUp.

  4. Forward-confirmed reverse DNS (FCrDNS):
    Also known as full-circle reverse DNS, double-reverse DNS, or prev, FCrDNS is a networking parameter configuration in which a given IP address has both forward (name-to-address) and reverse (address-to-name) Domain Name System (DNS) entries that match each other. This is the standard configuration expected by the Internet standards supporting many DNS-reliant protocols and It is recommended as a best practice. An FCrDNS verification can create a weak form of authentication in that there is a valid relationship between the owner of a domain name and the owner of the network that has been given an IP address.

  5. Author Domain Signing Practices (ADSP):
    ADSP is an optional extension to the DKIM e-mail authentication scheme, whereby a domain can publish the signing practices it adopts when relaying mail on behalf of associated authors. It is a way to tie the DKIM signing domain with the domain in the email address in the From header of a message (also known as the "author domain"). To create that connection, a domain owner publishes an ADSP record in the DNS, containing a policy statement about the mail sent from that domain. A policy of "all" is intended to convey to receiving systems that all of their mail is signed with DKIM, but does not make any request about what to do with unsigned mail. A policy of "discardable" requests that unsigned messages be discarded. ADSP never achieved widespread adoption and in 2013 it was demoted to "historic". It has been superseded by DMARC.

Each MailUp account comes with authentication enabled by default (FCrDNS, SPF, DKIM), but on domains owned by us and directly associated with our sending infrastructure. These domains - by definition - are not related to the sender's brand identity. Even though the default settings are enough in terms of email authentication, some senders may need additional configurations (e.g. DMARC) and branding by using a custom domain.

Notes:

  • Emails will appear to come directly from their domain, instead of from our servers. 
  • Use of a custom domain is mandatory for enhanced authentication settings such as DMARC.
  • Custom DKIM signatures and DNS settings are needed, which require that the sender has full access to their domain's DNS records.

For authentication purposes, it is possible to use the service Delivery Suite

Configuration steps

  1. Pick the FROM domain
    Which domain will you be using to send emails with MailUp? Your top-level domain (i.e. the apex domain as discussed above) or a subdomain (e.g. news.mydomain.com)? In the first scenario, the FROM EMAIL would be something like updates@mydomain.com, whereas in the second it would be something like updates@news.mydomain.com. The decision should be based on whether you have access and can modify the DNS records of that domain. Check with the person in your organization that has access to your domain management system to find the answer. In the examples below we are assuming that the sending domain corresponds to the apex domain (mydomain.com). If you cannot modify the DNS records of your apex domain, then you will need to set up a subdomain (eg news.mydomain.com) and refer to that one (in place of mydomain.com) in the steps outlined below.
     
  2. Verify your FROM EMAIL
    Now that you have picked the FROM domain, create a FROM EMAIL under that domain, and verify it in your MailUp account. To prevent abuse, MailUp requires that the FROM EMAIL is verified before it can be used. Verification is very simple: MailUp will send a verification message to the provided FROM EMAIL address, and you will need to click the link contained in the message. You can verify the FROM EMAIL when you configure a List in your MailUp account, when you set up a new mailing, or when you add a new From email in the Senders authentication page.
     
  3. Configure the SPF record for the sending domain
    Adding SPF authentication is easy. Here is what you need to do:

    v=spf1 include:musvc.com ~all 

    Example: v=spf1 include:mydomain1.com include:mydomain2.com include:musvc.com ~all 


  4. Enable DKIM authentication
     Adding DKIM authentication is easy. Here is what you need to do:  
  5. Configure a Web interface domain (optional)
    If you wish to use a custom Web interface domain (see the Glossary above for a definition), create a C-NAME in your domain management system (e.g. news.mydomain.com) and point c.mailup.com
    For more information, please see MailUp account settings. Please note that this configuration is available only for PRO and ENTERPRISE clients. 

  6. Configure a custom Envelope Sender (optional)
    Using a custom Envelope Sender (see the Glossary above for details) you can to "align" it with the FROM EMAIL address, which allows for more advanced sender configurations, as mentioned above. This address can be any email account of your choice under a subdomain as the one used for the FROM EMAIL (e.g. if the FROM EMAIL is news@mydomain.com the Envelope Sender could be bounce@bounce.mydomain.com). For the MailUp system to be able to process bounces, it will need to access sent to that address.
    Create two DNS records as follows:
    1) Type: MX
    Name
    : bounce.mydomain.com
    Value
    : mx01.musvc.com
    Priority
    :10

    2) Type: TXT
    Name
    : bounce.mydomain.com
    Value
    :"v=spf1 include:musvc.com ~all"

    For more information regarding the second record(SPF) please see this page.

    By modifying the MX record, MailUp will take control over the email management for that domain that will be handled by the platform. Previously created accounts will no longer be able to send and receive emails.


  7. PTR of SMTP servers (For dedicated IPs):
    If your email streams will be delivered through dedicated SMTP servers, each one of them should have a PTR aligned with the base host domain. Example: 

    mx67202.mydomain.com A 93.174.67.202
    mx67203.mydomain.com A 93.174.67.203

    Each PTR should have the same SPF / Sender ID records as the sending domain:
    mx67202.newsletter.mydomain.com TXT v=spf1 include:musvc.com ~all 
    mx67202.newsletter.mydomain.com TXT spf2.0/pra include:musvc.com ~all


  8. Enable DMARC
    Since DMARC is built upon SPF and DKIM all the previous steps are required before enabling DMARC.

    The proper TXT record (_dmarc.mydomain.com) should be added to the DNS settings for your sending domain.
    It can change depending on what you want your DMARC policy to be.

    A simple DMARC record is the following: v=DMARC1; p=quarantine; pct=100; rua=mailto:dmarc.rua@mycompany.com; ruf=mailto:auth-reports@mycompany.com.
    where:
    * v is the version, DMARC1 is the only version available at the moment.
    * p is the policy. Allowed values are *none* (take no action, just collect data and send reports) *quarantine* (treat with suspicion unqualified mail) *reject* (block any unqualified mail for the domain)
    * pct is the percentage of non-aligned messages that should be rejected (from 1 to 100 where 100 means all the messages)
    * rua: Send aggregate reports to this address (should be closely monitored)
    * ruf: Send forensic (detailed) reports to this address.

    Note that the email addresses that receive the aggregate and detailed reports (“rua” and “ruf”) can be on any domain, not necessarily the domain used for the authentication, for reporting purposes only.

    We strongly suggest ramping up DMARC use slowly by using the p=none policy at first. Monitor your traffic and look for anomalies in the reports (eg.: messages that are not yet being signed)
    Then, once you have verified that all legitimate messages are correctly being authenticated, move to "quarantine."
    Review the results again (look also in your spam folder) and when you're sure all of your messages are signed, change the policy setting to "reject" to make full use of DMARC.

    You can also leverage the pct tag to sample your DMARC deployment. If you want to be extremely conservative, after moving to the quarantine policy, you may start with pct=1 and then move to 10, 25, 50, 100