?
Solved

e-mail sent verification

Posted on 2004-08-28
6
Medium Priority
?
267 Views
Last Modified: 2010-04-11
I need to know if there is a way to verify that a sent e-mail message was actually received by the intended recipient. I am not talking about a "delivery receipt" setting for future e-mail, but rather, a past message where no such options were enabled. I have an archived e-mail for which I need to verify validity, and all I can see in the header that could be a unique identifier is a key labled "message ID." I asked my service provider (Earthlink) if it is possible, but I was told by a support tech that there is no way to trace the information. He further said that the same identifier key might actually be assigned to another message going through their system at some point in the future. Is this correct? It didn't sound quite right to me, hence my reason for approching the experts. To make matters more difficult (and archaic), the message in question is a year and a half old, and was sent from an older machine on a 16-bit platform with Netscape 3. Can any kind of a viable outgoing trace, at any level, be executed under these circumstances?
0
Comment
Question by:rontree
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 2

Expert Comment

by:marcin79
ID: 11923239
Your isp is 100% right its not possible
sorry

regards
Marcin
0
 
LVL 7

Accepted Solution

by:
LimeSMJ earned 1500 total points
ID: 11923291
The message ID field is an optional header field.  Its purpose is to give the email a unique identifier - it is generated by the originating MTA.  This field by RFC 822 should be globally unique but since it can be spoofed, it can't be guaranteed.

SMTP servers, at the administrators discretion, can be set to log incoming message ID headers but given your email is over a year old, I highly doubt that log file would even exist still - but who knows... it may be archived on a tape somewhere.
0
 
LVL 2

Expert Comment

by:marcin79
ID: 11923393
but this will show You only that destination server was reached not the recipient.... (IMHO of course)

Regards
Marcin
0
 
LVL 31

Expert Comment

by:rid
ID: 11926928
"...actually received by the intended recipient..."
Only theoretically possible, if there is a log on the far end server, showing the recipient downloading the message (with the message ID), but of course it doesn't show that the actual recipient did indeed do the download, or even saw the message at all. All such logs are probably long gone anyway...
/RID
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 11928148
Trace of the actual message on the users computer.....that is assuming the user in question has not updated his computer or reloaded all software from scratch etc.  
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Originally, this post was published on Monitis Blog, you can check it here . It goes without saying that technology has transformed society and the very nature of how we live, work, and communicate in ways that would’ve been incomprehensible 5 ye…
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question