Solved

Java Program Sends out Email to Bad Email Address -- No 'mailer daemon' Response Received

Posted on 2013-02-03
3
447 Views
Last Modified: 2013-02-03
I have written a Java program using the Java Mail functionality.  It sends out a set of emails to various email addresses.

I intentionally tested by putting in a fictitious email address, expecting to receive a response from the mailer daemon telling me that the email could not be delivered; but there was no such response.

I would not have thought that in this regard there would be a distinction between an email sent by Java code and an email sent, say, from my Outlook application.  Yet, there clearly is.

Can someone explain that and, hopefully, give me a way to insure that the mailer daemon will send me a response in the event of a bad address?

Thank you.
0
Comment
Question by:david_m_jacobson
  • 2
3 Comments
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 500 total points
ID: 38848991
I suspect you're not going to get that because the message saying that email is bad is not part of the sending process.  That is especially true if the domain exists because the NDR (Non Delivery Report) comes from the remote server, not the local one.  The only way you would get the NDR is to send from a valid email account so that the message would be returned there.
0
 

Author Comment

by:david_m_jacobson
ID: 38849067
Pity.  OK.  Thanks for the response.
0
 

Author Comment

by:david_m_jacobson
ID: 38849646
I need to correct what I said here.

I just found that, indeed, the mailer daemon WAS sending a response.  Gmail had put that email into the Spam folder with a warning that it appeared that that email was a response to an email that I hadn't sent.

Very interesting, and very clever of Gmail to have marked it so.

In any case, I was able to indicate that it was not Spam and thereafter, such an email from the mailer daemon IS getting through to me.

Thank you again for your interest in this issue.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of Google's most recent algorithm changes affecting local searches is entitled "The Pigeon Update." This update has dramatically enhanced search inquires for the keyword "Yelp." Google searches with the word "Yelp" included will now yield Yelp a…
Article by: Nadia
Suppose you use Uber application as a rider and you request a ride to go from one place to another. Your driver just arrived at the parking lot of your place. The only thing you know about the ride is the license plate number. How do you find your U…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now