{"id":1607,"date":"2024-12-09T14:28:38","date_gmt":"2024-12-09T07:28:38","guid":{"rendered":"https:\/\/infosystem.id\/?p=1607"},"modified":"2024-12-09T15:04:02","modified_gmt":"2024-12-09T08:04:02","slug":"understanding-mail-flow-from-sender-to-receiver-inbox","status":"publish","type":"post","link":"https:\/\/infosystem.id\/index.php\/2024\/12\/09\/understanding-mail-flow-from-sender-to-receiver-inbox\/","title":{"rendered":"Understanding Mail Flow: From Sender to Receiver Inbox"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1607\" class=\"elementor elementor-1607\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ce33267 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ce33267\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4326538a\" data-id=\"4326538a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ef2a728 elementor-widget elementor-widget-text-editor\" data-id=\"6ef2a728\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p id=\"bh-cf4gwNl20DRuKdti5yw2p\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\" data-pm-slice=\"1 3 []\">This document provides a comprehensive overview of the email flow process, detailing how an email travels from the sender to the receiver&#8217;s inbox. It outlines the critical steps involved, including the use of SMTP, MX records, and the verification of SPF, DKIM, and DMARC. Additionally, it discusses the various anti-spam and anti-virus measures that emails must pass through to ensure successful delivery.<\/p>\n<h1 id=\"bh-58_5YuFNqLAKUPDO4y3tm\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">Email Flow Process<\/h1>\n<p id=\"bh-3TeCU4YwHcrkPwQ9eHiUW\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-qA4YtxW7uZHJKkNqSCMC5\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-xsnKV2XSALARjUrRIDfyD\" data-hook-type=\"blockHook\">\n<p id=\"bh-d6F73B8ZiGKubB3SU5J9g\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Sender Initiates Email<\/strong>: The process begins when a sender composes an email and hits the send button.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-s0H-ikFAxTGHO7xqai0Ci\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-fSlof7WktjA2972kGUwUf\" dir=\"ltr\" start=\"2\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-Cd4C--k7TO7rgEtgHshFZ\" data-hook-type=\"blockHook\">\n<p id=\"bh-9iuZ1ZQxFMeFmDotqT1EB\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>SMTP Protocol<\/strong>: The email is transmitted using the Simple Mail Transfer Protocol (SMTP). This protocol is responsible for sending the email from the sender&#8217;s mail server to the recipient&#8217;s mail server.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-wDHE12HaTNyE8CBAbKXzs\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-1TS9crY0iCsBEgfle4GjX\" dir=\"ltr\" start=\"3\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-ffHHZmVyeN_LApPhAtXO9\" data-hook-type=\"blockHook\">\n<p id=\"bh-W3X_k3rcpTbcpqgr7TlHL\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Finding MX Records<\/strong>: The sender&#8217;s mail server queries the Domain Name System (DNS) to find the Mail Exchange (MX) records associated with the recipient&#8217;s domain. MX records specify the mail servers responsible for receiving emails on behalf of the domain.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-M3DP8M29pgO8x4rs0-sbx\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-267sIuV2eNo3rXr3aaOak\" dir=\"ltr\" start=\"4\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-Rog_jFYbPU_RayCf0u9iF\" data-hook-type=\"blockHook\">\n<p id=\"bh-PuC0vfDC2zW3BmcWNKadJ\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Email Acceptance<\/strong>: Once the sender&#8217;s server locates the appropriate MX record, it attempts to deliver the email to the recipient&#8217;s mail server.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-osh7ERyQdW91RGg_xfoGj\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-aIakRe_JQMSJ_HufjUXDf\" dir=\"ltr\" start=\"5\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-rlsBaNd5QJFh4FoQY9EwV\" data-hook-type=\"blockHook\">\n<p id=\"bh-raGem5DmK4WXWqJ5SfWRr\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>SPF Verification<\/strong>: The recipient&#8217;s mail server checks the Sender Policy Framework (SPF) record to verify that the sender&#8217;s IP address is authorized to send emails on behalf of the sender&#8217;s domain. If the SPF check fails, the email may be rejected or marked as spam.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-9C-m79yo0pjeSlPCD2wsj\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-xJD1Ck5KoLU3xrtnRHUxB\" dir=\"ltr\" start=\"6\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-lT50PDqRh-rjx-8imw-HN\" data-hook-type=\"blockHook\">\n<p id=\"bh-W-XqUCr3_Et9lSRkWeFDY\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>DKIM Signing<\/strong>: The email is checked for DomainKeys Identified Mail (DKIM) signatures. DKIM adds a digital signature to the email header, allowing the recipient&#8217;s server to verify that the email has not been altered in transit and that it is indeed from the claimed sender.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-IKSgy5YFs25FE2OHcXBLj\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-uqRD34McH_va5E0Sigv2r\" dir=\"ltr\" start=\"7\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-J0CyDVbuHAQyEH-fBwhdF\" data-hook-type=\"blockHook\">\n<p id=\"bh-cIuhww_yEhnxMPg0_SqjY\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>DMARC Policy<\/strong>: The recipient&#8217;s server then checks the Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) policy. DMARC builds on SPF and DKIM, providing instructions on how to handle emails that fail authentication checks.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-K2vWTrKMrYH06zpMgmAt4\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-PFDIGv5LhxF0jDD-bU2Ib\" dir=\"ltr\" start=\"8\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-zu5gQ5_RzfA5v4lPkm0cI\" data-hook-type=\"blockHook\">\n<p id=\"bh-FOHNqfgS30ZwT74i1SxoA\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Anti-Spam Filters<\/strong>: After passing SPF, DKIM, and DMARC checks, the email is subjected to various anti-spam filters. These filters use algorithms, including Bayesian filtering, to assess the likelihood of the email being spam based on its content and sender reputation.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-M75p5gbrCClHWOEQ7SjOC\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-7DqeIjrG8omwQ3IujVcf5\" dir=\"ltr\" start=\"9\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-8tOgjc1i_JQVGSLmSenIg\" data-hook-type=\"blockHook\">\n<p id=\"bh-qNdCVjgS1-soyeK-hBVUQ\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Anti-Virus Scanning<\/strong>: The email is scanned for viruses and malware. This step is crucial for protecting the recipient&#8217;s system from potential threats.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-jlKYFMMt2hMhssIUa9Zgv\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-5iDWHjGg4QOf9_GCp1Ezc\" dir=\"ltr\" start=\"10\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-aWpF7d7eJbE0in5IS1elO\" data-hook-type=\"blockHook\">\n<p id=\"bh-qsF2z1gJqhAy9rnFU91aP\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Compliance with Rules<\/strong>: The email must comply with a series of predefined rules set by the recipient&#8217;s mail server. These rules may include checks for blacklisted IP addresses, content filtering, and attachment policies.<\/p>\n<\/li>\n<\/ol>\n<p id=\"bh-jU0XHSD9ND6kMdFLXt7hw\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\u00a0<\/p>\n<ol id=\"bh-Eavs-A4Dn7XgzQVzzF3zx\" dir=\"ltr\" start=\"11\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\">\n<li id=\"bh-Mwd8ZWtDNErc0Clx4koyw\" data-hook-type=\"blockHook\">\n<p id=\"bh-dxqK7AxyPRwsbFHu_GuOP\" dir=\"ltr\" data-hook-type=\"blockHook\" data-bubble-menu=\"true\"><strong>Delivery to Inbox<\/strong>: If the email successfully passes all the above checks, it is finally delivered to the recipient&#8217;s inbox. If it fails any of the checks, it may be redirected to the spam folder or rejected altogether.<\/p>\n<\/li>\n<\/ol>\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-060c160 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"060c160\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a39c2\" data-id=\"e0a39c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9f1ecd elementor-widget elementor-widget-image\" data-id=\"a9f1ecd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/uploads\/2024\/12\/email-flow.png\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/infosystem.id\/wp-content\/uploads\/2024\/12\/email-flow.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This document provides a comprehensive overview of the email flow process, detailing how an email travels from the sender to the receiver&#8217;s inbox. It outlines the critical steps involved, including the use of SMTP, MX records, and the verification of SPF, DKIM, and DMARC. Additionally, it discusses the various anti-spam and anti-virus measures that emails&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-1607","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/comments?post=1607"}],"version-history":[{"count":8,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1607\/revisions"}],"predecessor-version":[{"id":1616,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/1607\/revisions\/1616"}],"wp:attachment":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media?parent=1607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/categories?post=1607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/tags?post=1607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}