XF 1.4 Automated Bounce Email Handling

Most forums need to deal with members whose email address becomes invalid. Sometimes the user will go ahead and change it, but other times your forum will fire off emails to this now invalid address. When this happens, if you have a bounce email address setup in XenForo (and possibly with the -f option enabled in the mail configuration), you will receive an email telling you about the failure.

Email delivery failures can happen for a wide variety of reasons. If you continually send to an address that has been disabled, for example, this can count against your domain/IP's email reputation. A lower email reputation can lead to reduced email deliverability as your domain may appear to be a spammer.

Therefore, when you are notified that an email can't be delivered, you may want to prevent further emails from being sent to that user. XenForo 1.3 added a new user state that represents an invalid email, but you had to manually change users into this state. With a decent size forum, this could be tedious and time consuming at best and impossible to manage at worst.

To handle this, XenForo 1.4 implements an automated bounce email processing system. This is a fairly detailed and technical system, but it allows an important maintenance action to be automated.

Automated Bounce Parsing
ss-2014-07-11_17-27-16.webp

The core component of this system is a process that reads emails from a specific account and then parses those emails to determine if they are bounce messages.

As bounce notifications will be sent to the value you enter for the "Bounced Email Address", you would enter the POP3 or IMAP details for that account here. Once you do that, the system will automatically start checking this account for bounce messages. Note that the emails in this account will be removed after reading so this account needs to be dedicated to bounces from your forum only.

Every email that is read from this account will be analyzed to determine if it fits a known type and the appropriate action will be taken (changing the user state to indicate that the email is invalid, if appropriate). This is all displayed in the email bounce log in the control panel:

ss-2014-07-11_17-38-46.webp


The action taken will depend on the content of the email. The sections below discuss why an email could be untrusted and the distinction between soft and hard bounces.

Bounce email notification parsing is notoriously difficult due to a wide range of servers that don't actually give good bounce responses. We have covered a number of common cases but this will certainly need to be expanded over time, so if you use this feature, keep an eye on the bounce log and let us know if you see emails that aren't being handled correctly. The "view original" link will take you to a raw output of the original email (headers and all encoded data). This data can be used to help us determine any additional cases to handle.

Note that you may get non-bounce emails to this address, such as delay notifications, challenge verifications and auto-replies. These will be logged, but they don't represent any errors so no action will be taken.

Bounce email logs will be maintained for 30 days.

VERP and Validation
While you would think that a bounce notification would always tell you who the email was sent to, you'd be wrong. Sometimes, the notification will only show you the address of the final recipient, and maybe they forwarded their email to another address. In rare cases, it might not list any address.

A common way around this is with a technique called Variable Envelope Return Path (VERP). The concept behind VERP is to encode the recipient email into the Return-Path header (which is where the bounce notification is sent).

Another important component is validating that the original email was actually sent by your forum. Without this, someone could manually create a bounce notification, send it to your bounce address, and trigger the bounce behavior for any email. By adding a validation hash into the return path, we can simply ignore any email that doesn't validate. This is what the "untrusted" component is in the email bounce log screenshot.

Let's look at a quick VERP example:
  • Bounce handler address: bounce@yourdomain.com
  • Email recipient: user@example.com
The VERP may look like: bounce+1234abcd+user=example.com@yourdomain.com. The "1234abcd" part is the validation key that is generated using a secret key.

Keep in mind that the Return-Path is never shown to the end user (unless they look at the raw email contents). The Return-Path and the From/Sender values are always unrelated.

ss-2014-07-11_17-58-14.webp


We would recommend enabling VERP support if you enable the automated bounce handling option. However, it does require that your SMTP server ignores anything after the + sign. This is quite common these days; Gmail does it, for example.

If you don't (or can't) enable the VERP option, we will embed this data in the original email via another header. Some bounce notifications include the original message (or the headers from it) and we can parse this data out of that. However, it may not be as reliable as the VERP option.

Soft and Hard Bounces
Bounce notifications report a wide range of issues. Some of these are unlikely to ever be resolved and others may be temporary or specific to a single message. This is where a soft and hard bounce distinction becomes necessary.

When a hard bounce happens, action will be taken immediately (setting the user state to indicate that their email is invalid). These issues are unlikely to ever be resolved, except maybe through dumb luck. Most commonly, this will be an invalid mailbox (the part to the left of the @ in the address).

Soft bounces include:
  • The recipient's mailbox being full
  • DNS/connectivity issues
  • The message being too long (as other messages may go through)
Soft bounces don't trigger the user state change until multiple messages bounce. The exact behavior is defined by a set of criteria:
ss-2014-07-11_18-06-50.webp

The criteria is designed to give the recipient (or their server admin) a chance to resolve the issue. If the limit was based solely on the number of emails, a flurry of messages in a short time span could trigger the soft bounce threshold.

Using the values in the screenshot, the email would only be considered invalid if:
  • We received 3 or more bounce notifications
  • The bounce notifications happened on 3 or more distinct days
  • The amount of time between the first and last bounce is at least 5 days
These values can be tuned to fit your needs and how strict you want to be.




Phew, that was a long one. Let us know if you have any questions or thoughts and keep an eye out for more 1.4 features being revealed soon.

Just a reminder: Please do not post suggestions in this thread (even if you feel they are related). Use the dedicated suggestion forum so they can be tracked; suggestions made in this thread are unlikely to be implemented.
 
With mandrill you can only forward the bounced mails to one email account. How will this work if you have multiple forums? Can multiple forums check the same mail box and recognise which bounces are from which forum.
 
The best way is not to use Mandrill etc. Use instead phplist, a professional free (open surce) newsletter which you can install on your own server. Look here:

http://www.phplist.com/

We only need a plugin for the integration with xenforo. I woud be willing to pay for such a plugin.
 
And there is the reason, why I use Mandrill. I don't want to send mails from my own server. It's a lt more secure, if you use external service providers like mandrill.
 
How do I set the user state (which prevents them using the forum until the email is updated).

Thanks.

EDIT: Hello?
 
Last edited:
Please direct any support questions to the appropriate forum. Especially as with your last comment, I'm unclear what you're asking.
 
Just gotta say I love this functionality. Was a bit worried when only one bounced email had been processed in 3 days - then found out all the bounces went to gmail spam folder. Fixed that and processed several hundred bounces tonight. Works great! :love:
 
There are several types of bounce emails so make a filter that catches every email.
I just set "-zsdlkawdfcpiu\sdyfpoaidfh.\kdjf" in the content box.

It's not significant, just a random string with a minus sign in front - this will match all emails that do not contain that string.
Then just set it to never send to spam and never skip inbox. :)
 
There are several types of bounce emails so make a filter that catches every email.
I just set "-zsdlkawdfcpiu\sdyfpoaidfh.\kdjf" in the content box.

It's not significant, just a random string with a minus sign in front - this will match all emails that do not contain that string.
Then just set it to never send to spam and never skip inbox. :)

You do realise you could have just set a criteria of "@" to match all email addresses and set that to "never send to spam" (or whatever the option is called) ?? :D
 
A couple of weeks ago I set up our server to accept all emails for a given domain and submit them directly to the XF bounce handling script. Setting up the XF side of things was super simple. The postfix side was a little more complex, but once I worked out what I was doing, straight forward as well.

Seems to be working really well and no more frigging around with mailboxes, pop, junk mail or any other complicating factor implicit in a reliance on a system controlled and managed by a third party.

If anybody is that interested, and you have to be comfortable on a linux command line, I'll put up something.
 
I have this configured and sent a test email to the bounce account, ran the cron - just to test connectivity - and it popped up in the log. Great!

So, can I now forward bounce emails that have previously gone to my account and expect it to parse them correctly, or will no action happen? (Or, risk getting my own account flagged heh)
 
If you're forwarding the emails, it likely won't pick up the correct details and will thus ignore them. If you have previous ones, you may need to take action manually (change the user state to invalid email).
 
If you're forwarding the emails, it likely won't pick up the correct details and will thus ignore them. If you have previous ones, you may need to take action manually (change the user state to invalid email).

That's simple enough, thanks!
 
Quick question,

Is this not part of the core XF 1.4 yet? I do not see any VERP option in Email Options admin panel.
 
Top Bottom