Solved

send e-mail with asp

Posted on 2013-12-04
3
1,500 Views
Last Modified: 2013-12-04
Hey,

I send an automatic email to users after they have completed a form. Recently though, the e-mail is being block by some spam filters with the following error:

 ----- Transcript of session follows -----
.. while talking to gw1.security.comendo.com
>>> DATA
<<< 552 5.6.0 Body line too long (see RFC2822 section 3.5)

I have been told that the error might be in the break lines of my script which look like that:

 str = str & "  <span" & cssBold & ">Configurator link:</span> " & config_url & "<br>"

Any thoughts?
0
Comment
Question by:webdesigner_dk
  • 2
3 Comments
 
LVL 42

Expert Comment

by:Rob Jurd, EE MVE
ID: 39694987
You will need to break the line with \r\n.  Even though you're using <br> that doesn't break the line as the line is interpreted as text.  By using \r\n you are sending the command to break the line.
0
 
LVL 42

Accepted Solution

by:
Rob Jurd, EE MVE earned 500 total points
ID: 39694990
http://www.ietf.org/rfc/rfc2822.txt

3.5 Overall message syntax

   A message consists of header fields, optionally followed by a message
   body.  Lines in a message MUST be a maximum of 998 characters
   excluding the CRLF, but it is RECOMMENDED that lines be limited to 78
   characters excluding the CRLF.  (See section 2.1.1 for explanation.)
   In a message body, though all of the characters listed in the text
   rule MAY be used, the use of US-ASCII control characters (values 1
   through 8, 11, 12, and 14 through 31) is discouraged since their
   interpretation by receivers for display is not guaranteed.

CRLF is "Carriage Return Line Feed" which is \r\n

so to take part of your code above:

str = str & "  <span" & cssBold & ">Configurator link:</span> " & config_url & "<br>\r\n"

Open in new window

0
 

Author Comment

by:webdesigner_dk
ID: 39695098
Thanks! That solved it!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This article discusses four methods for overlaying images in a container on a web page
This article discusses how to create an extensible mechanism for linked drop downs.
In this tutorial viewers will learn how to position overlapping items using z-index in CSS. They will also learn the restrictions on the z-index property.  Create a new HTML document with an internal stylesheet.: Create a div in CSS and name it Red.…
The viewer will learn the basics of jQuery including how to code hide show and toggles. Reference your jQuery libraries: (CODE) Include your new external js/jQuery file: (CODE) Write your first lines of code to setup your site for jQuery…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now