

The VPN hostname is now the custom (created as an A record in the company DNS) which points to the VPN's dedicated IP (213.312.21.52).

Received: from ( ) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPSA id 1B8D112C78 for Fri, 04:53:06 +0000 (UTC) Once all of this is in place and resolving correctly, you should now see something like this in the first hop when you send: A -> M1

"Please could you add a PTR record for our dedicated IP (213.312.21.52) that points to ". Request a PTR record be setup for that IP from the VPN provider that resolves to the subdomain above. Within your company DNS, set up an A record for an unused company subdomain that points to your new VPN dedicated IP.Į.g. *preferably port 587, since 465 has officially been deprecated (although still largely supported) 2.
#VPN CANT SEND EMAIL IVPN PLUS#
These IP addresses may be different every time, plus they are also likely shared by as many as tens of thousands of other users, making tracing your movements online even harder. When you browse through a regular shared-IP VPN, you can usually choose from a range of server locations with anonymous IPs to use. However, the public IP 203.116.164.13 was on two major blacklists at the time of send, marring the receiving server's assessment of the legitimacy of the sender - not good.Īside from security over open/unknown networks, another key reason people turn to VPNs is to provide anonymous browsing. Therefore forward-confirmed reverse DNS (FCrDNS) checks out this is a weak but useful form of authentication which receiving mailservers use to help determine whether a sender is legitimate or not. This is in pretty good shape since a lookup on the hostname points to 203.116.164.13, and a reverse DNS lookup on the IP points to the hostname. Here, my mobile phone has been given the IP address 10.124.184.56 by the telco's 4G network, but the important one here is the telco's server with IP 203.116.164.13. Received: from ( ) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPSA id 174CD415EA for Fri, 05:39:38 +0000 (UTC) the first hop is the first “Received: from” line, reading from the bottom-up. Note that when reading an email's headers (view headers/source in most mail programs), the route is in reverse i.e. Let’s take a look at what those “Received: from” headers might look like, sending from a laptop in a typical office environment to a Gmail address. and this will be scrutinised by M2’s spam-filtering system. When it’s received by the recipient’s mailserver (M2), the details of both the hop from A -> M1, and the hop from M1 -> M2 will be present in the header of the email. Outlook, Apple Mail, Thunderbird etc.) and a standard POP3/IMAP mailbox, the email’s journey will look something like this: When you send an email from your device using an email client (e.g. Here's a brief guide to using a VPN (Virtual Private Network) to remedy the situation. being marked as spam by receiving systems. If you run your own company mailserver and/or send through device-based email clients, you might find that emails sent when you're out and about suffer unexpected deliverability issues i.e.
