Solved

Can I properly track an SMTP message round-trip?

Posted on 2009-04-09
2
348 Views
Last Modified: 2013-11-30
Hi there,

I've never had a request like this before, so I need to post this question in order to find out if this is possilble?

Our web app sends out smtp messages to users upon request.

I've been asked if it 's possible to put an ID in our outbound smtp messages from our web-app so that when a user replies to them and they come back in .. we can associate the reply to the original email, by retrieving the ID from the reply message.

Is that posible in the realm of smtp messaging?  We use a windows socket to connect to our smtp server and then output the message thru code .... so, there is no limit to what we can put into the smtp message.  

I guess what I am asking is .. is there some place in there that I can put something as a unique ID (that I provide) that will ALWAYS come back in the reply message?  Obviously, the body is not reliable as the user may delete the original text.

Thx, in advance, for any help in this regard.

Scott
0
Comment
Question by:srbarker8
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24121617

While adding an additional header into the SMTP session when sending the message would work for the message sent out, there is no guarantee the header will be returned by the recipient's MTA when the message is replied to. In fact, chances are, it will not be included in the return message. This approach would therefore not work.

The usual method for going about this would be to add a unique identifier to the subject or body of the message. It is possible this could be deleted, but that is the only location where you can guarantee that 99% of the messages returned will have the code attached.

-Matt
0
 

Author Closing Comment

by:srbarker8
ID: 31568694
Thx for the advice, Matt.

Cheers,

Scott
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question