Fact-checked by Grok 2 weeks ago

Bounce message

A bounce message, also known as a non-delivery report (NDR) or a delivery status notification (DSN) indicating failure, is an automated electronic mail message generated by a mail transfer agent (MTA) to inform the original sender that their message could not be delivered to the intended recipient. This notification typically includes diagnostic information, such as the reason for the failure, the recipient's address, and any relevant error codes from the Simple Mail Transfer Protocol (SMTP). The standard format for such messages is defined in RFC 3464, which specifies a MIME content-type within a multipart/report structure to ensure both human-readable explanations and machine-parsable details for interoperability across email systems. Bounce messages are essential for deliverability management, as they help senders identify and correct issues like invalid addresses or server problems, thereby maintaining the reliability of electronic communication networks. They are categorized into two primary types: hard bounces, which signal permanent delivery failures (e.g., SMTP status codes starting with 5.x.x, such as 5.1.1 for a bad destination address), and soft bounces, which indicate temporary issues (e.g., 4.x.x codes, like 4.4.7 for a that expired due to queuing delays). Hard bounces often stem from non-existent addresses or domain-level rejections, while soft bounces may result from transient conditions such as full , server overload, or temporary network disruptions. In practice, bounce messages play a critical role in combating but can also contribute to problems like , a form of unsolicited where legitimate recipients receive bounce notifications originating from spam messages with forged sender addresses. To reduce backscatter, modern systems employ authentication mechanisms like (), which verify the legitimacy of sending domains before generating notifications. The evolution of bounce handling traces back to early standards, with RFC 3464 (published in January 2003) providing the current extensible framework for DSNs, building on prior specifications like RFC 1894 to support multilingual diagnostics and cross-protocol compatibility.

Fundamentals

Definition and Purpose

A bounce message, also known as a non-delivery report (NDR), is an automated response generated by a mail server when it cannot deliver an incoming message to the intended recipient's . This response is part of the error-handling mechanisms in the (SMTP), where the receiving server assumes responsibility for delivery after accepting the message and must notify the sender if that process fails. The primary purpose of a bounce message is to inform the original sender of the delivery failure, enabling them to take appropriate actions such as correcting the recipient's , resending the , or removing invalid entries from mailing lists. Unlike delivery status notifications for successful transmissions, bounce messages specifically indicate unsuccessful attempts and are designed to prevent further unnecessary retries in cases of permanent issues, while distinguishing transient problems that might warrant follow-up. This notification process supports overall system reliability by closing the feedback loop between sender and server. In practice, a common scenario involves a sender attempting to deliver an to an invalid , such as "[email protected]," prompting the receiving mail server to generate and return a detailing the , often including excerpts of the original for context.

Historical Development

Bounce messages trace their origins to the early development of systems in the 1970s on the . The formalization of bounce mechanisms began with the establishment of the (SMTP) in RFC 821, published in 1982, which outlined the core protocol for email transmission and introduced basic error reporting, including the use of a null reverse-path in the command to generate notifications for undeliverable mail. This allowed receiving servers to return failure messages with details such as reply codes (e.g., 550 for permanent failures) and explanatory text. In 1989, RFC 1123 extended these foundations by requiring hosts to implement reliable mail transmission, mandating the generation of delivery status notifications with standardized 4xx and 5xx reply codes to distinguish temporary from permanent errors, and emphasizing the inclusion of detailed failure information in bounce messages. A significant advancement occurred in 1996 with RFC 1894, which defined an extensible MIME-based format for Delivery Status Notifications (DSNs), enabling structured, machine-readable reports that included per-recipient status, action codes (e.g., "failed" or "delayed"), and diagnostic information to replace bounce formats. The early brought further refinements through RFC 3461 (SMTP service extension for DSNs), RFC 3462 (DSN format updates), RFC 3463 (enhanced status codes), and RFC 3464 (notification request handling), all published in 2003, which improved interoperability and allowed senders to request specific notification types while supporting multipart reports for better readability. These updates coincided with growing anti-spam regulations. By the 2010s, bounce handling evolved to integrate with standards, addressing forged sender addresses that often led to misdirected or unreliable notifications. The Sender Policy Framework (SPF), standardized in RFC 7208 in 2014, enabled domain owners to specify authorized mail servers via DNS records, reducing invalid bounces from spoofed domains. Building on SPF and DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting, and Conformance (DMARC) was introduced in RFC 7489 in 2015, providing policy instructions (e.g., or reject) for failing messages and aggregate reports to monitor deliverability, thereby enhancing bounce accuracy without major protocol overhauls through 2025.

Classification

Hard Bounces

A hard bounce is a type of bounce message that indicates a permanent in email delivery, where the recipient's or is unable to accept the message indefinitely, prompting recommendations to remove the address from mailing lists. These bounces are characterized by SMTP response codes in the 5xx range, such as 550 (user unknown or recipient) or 550 ( unavailable), signaling that the issue is non-retriable and sending servers do not attempt automatic redelivery. Common examples include emails sent to addresses with invalid syntax, such as those missing the "@" symbol, domains that do not exist, or accounts that have been disabled or deleted by the recipient's provider. High rates of hard bounces reflect poor email list maintenance and can severely damage sender reputation, leading Internet Service Providers (ISPs) to blacklist domains or IP addresses as a measure against perceived spam or unreliable senders. Unlike soft bounces, which stem from temporary issues and may allow retries, hard bounces necessitate immediate list cleaning to mitigate long-term deliverability risks.

Soft Bounces

Soft bounces occur when an delivery fails due to transient issues that may resolve over time, allowing sending servers to queue the message and attempt redelivery later. These failures are distinguished from permanent rejections by their retriable nature, where the recipient's remains valid. A key characteristic of soft bounces is their association with SMTP reply codes in the 4xx range, which signal temporary negative completion replies. For instance, code 421 indicates service not available due to temporary unavailability, prompting the sender to retry after a delay. Sending systems typically affected messages and retry delivery for periods ranging from several hours to up to 72 hours, depending on the provider's policy, before potentially escalating to a permanent failure. Common examples of soft bounces include a recipient's exceeding its storage quota, leading to a 452 for insufficient system storage; server overload or temporary , often resulting in a 421 ; and transient DNS failures that prevent immediate connection to the recipient's server. In each case, the underlying issue is expected to be short-lived, enabling successful delivery upon retry. Soft bounces are increasingly scrutinized by email deliverability tools, which monitor rates and patterns to prevent accumulation that could harm sender . Repeated soft bounces from the same may trigger suppression or conversion to hard bounces, emphasizing the need for proactive list to maintain high inbox placement.

Block Bounces

Block bounces, a term used primarily by certain email service providers (ESPs) such as and , represent a category of email rejections where the recipient's mail server denies delivery based on administrative policies, content analysis, or protocols, rather than issues solely with the recipient's validity. These rejections stem from mechanisms designed to protect against , , or unauthorized transmissions, often without clarifying if the block is indefinite. A key characteristic of block bounces is that they are often associated with SMTP response codes in the 4xx or 5xx series, which can indicate either temporary or permanent rejections depending on the specific or . However, they can also manifest as delayed bounces, in which the receiving initially accepts the message with a 2xx code during the SMTP transaction but subsequently rejects it after further inspection, such as during processing or scanning, and issues an NDR. This post-acceptance rejection complicates detection for senders, as initial logs may show successful . Block bounces frequently arise in bulk emailing scenarios, where high volumes trigger reputation-based filters, and they disproportionately impact marketers relying on large lists without robust . Examples of block bounces include DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy failures, where the recipient server enforces a "reject" or "quarantine" action on messages that fail SPF (Sender Policy Framework) or DKIM (DomainKeys Identified Mail) alignment checks, often due to spoofed sender domains. Other instances involve content-based blocks, such as when anti-spam filters detect suspicious keywords, embedded links to known malicious sites, or attachments flagged as potential threats. Additionally, sender reputation issues, like an IP address or domain appearing on public blocklists maintained by organizations such as Spamhaus, can trigger outright refusals. These rejections contribute to diminished sender reputation scores across major email providers, potentially escalating to broader throttling or blacklisting of future messages.

Causes

Recipient-related causes of bounce messages primarily stem from issues with the recipient's email account or mailbox configuration, which can result in the email being permanently or temporarily undeliverable. These causes often classify as hard bounces for permanent failures, soft bounces for transient problems, or block bounces for policy-based rejections, depending on the permanence of the issue. One common recipient-related cause is mailbox invalidation, where the email address is incorrect due to typos, the account has been deleted, or the domain has expired. Typos in the recipient's email address lead to immediate rejection by the receiving server, typically generating a hard bounce with an error like 550 5.1.1 indicating an invalid recipient. Deleted accounts similarly trigger hard bounces, as the server recognizes the address as non-existent and returns a permanent failure notification. Domain expiration exacerbates this by removing the necessary DNS records, causing incoming emails to fail resolution and bounce as undeliverable. Capacity issues at the recipient's end, such as an inbox that is full or has exceeded its storage quota, frequently result in soft bounces, allowing for potential retry on subsequent attempts. These occur when the recipient's mailbox cannot accept new messages due to storage limits, often indicated by a 552 signaling insufficient disk space or quota exceeded. For instance, email providers like or enforce quotas that, when surpassed, prompt the server to reject incoming mail temporarily until space is freed. Policy rejections from the recipient's can also cause bounces, particularly when the is inactive or subject to filtering rules that . Inactive user , often due to prolonged non-use or administrative deactivation, lead to rejections treated as hard or bounces, with the returning errors like 550 for users. Filtering rules enforced by the recipient's provider, such as detection or content , may generate bounces by rejecting messages that violate predefined criteria, commonly signaled by 5.7.1 violation codes. In 2025, bounces related to recipient accounts have increased due to privacy laws mandating periodic purges of inactive or unverified accounts, significantly impacting long-term lists. Google's inactive account deletion policy, which began enforcing removals in early 2025, has led to higher rates of hard bounces as dormant addresses are purged to comply with regulations. Similar requirements under laws like GDPR and emerging U.S. state privacy acts have prompted providers to deactivate accounts without recent activity, resulting in widespread invalidations and delivery failures for outdated contact lists.

Server and Network Causes

Server unavailability is a primary cause of bounce messages at the infrastructure level, often resulting in soft bounces due to temporary conditions on the receiving . This can occur when the experiences overload from high volumes, scheduled , or unexpected crashes, preventing it from accepting incoming . According to SMTP standards, such scenarios typically trigger a 421 reply code, indicating "Service not available, closing transmission channel," which signals the sending to queue the message for later retry. Similarly, a 450 may be returned for temporary rejections during overload or , as the is unable to the request at that moment but may succeed upon subsequent attempts. Network issues contribute to bounces by disrupting the path to the recipient's server, leading to unreachable destinations and soft bounce notifications. DNS resolution failures, where the sending server cannot locate the recipient's MX records due to temporary query errors or propagation delays, result in connection timeouts and queued retries rather than immediate delivery. Routing problems, such as misconfigured paths or intermittent connectivity disruptions, can also cause similar failures, often manifesting as 450 or 451 SMTP errors indicating temporary network-related unavailability. Firewall blocks on the receiving end may temporarily reject connections, generating soft bounces if the block is policy-based and transient, though persistent blocks can escalate to hard failures. Resource constraints on the receiving server, particularly insufficient disk space or processing capacity, lead to bounces when the system cannot store or handle the incoming message. The SMTP 452 error code specifically denotes "Requested action not taken: insufficient system storage," a temporary condition that prompts senders to retry after a delay, as the issue may resolve with resource cleanup. Repeated failures due to ongoing constraints can harden into permanent rejections, but initial instances are treated as soft bounces to allow for recovery. In modern email ecosystems as of 2025, transitions to and cloud provider outages have introduced additional server and network challenges. adoption issues, such as incomplete dual-stack implementations, can cause delivery failures when IPv4 senders encounter incompatible IPv6-only receivers, resulting in connection errors and soft bounces. Cloud outages, like the Google Cloud incident on June 12, 2025, which disrupted multiple services including infrastructure, led to widespread server unavailability and increased bounce rates due to temporary inaccessibility. Similarly, Microsoft's July 2025 outage affected and related mail services, causing delivery halts and bounce messages across global networks. These events highlight the temporary nature of such failures, often resolvable through retries once services recover. Sender-related causes of bounce messages primarily arise from issues in the sender's configuration, setup, or message composition that lead receiving servers to reject or fail delivery. One common issue is the use of forged or invalid sender addresses, often seen in campaigns where attackers spoof the "From" field to mask their origin. When such messages are undeliverable, receiving servers generate bounce messages—known as —that are sent to the forged address, potentially overwhelming innocent recipients with unwanted notifications. Authentication failures represent another significant sender-side problem, where mismatches in protocols like (SPF), (DKIM), or (DMARC) result in block bounces. For instance, if a sender's domain lacks proper SPF records authorizing the sending IP, or if DKIM signatures fail verification due to incorrect key configuration, receiving servers may reject the email outright to prevent spoofing. DMARC policies exacerbate this by instructing servers to quarantine or reject misaligned messages, with failures often stemming from unaligned "From" domains or syntax errors in DNS records. Message-related issues, such as oversized attachments or malformed content, can also trigger bounces when they violate receiving policies or exceed technical limits. Attachments exceeding typical thresholds—often around 25 for major providers—prompt immediate rejections to conserve resources, while malformed structures, like improperly encoded headers or broken multipart boundaries, cause errors that halt delivery. Repeated sender-related bounces can degrade the sender's reputation with email service providers, potentially leading to temporary throttling or blacklisting.

Generation and Handling

Delivery Process

The delivery process of an email message via the Simple Mail Transfer Protocol (SMTP) begins when the sender's Mail Transfer Agent (MTA) establishes a connection to the recipient's MX record server, typically identified through DNS resolution. The sender MTA initiates the session by issuing an EHLO (Extended HELO) or HELO command to introduce itself and negotiate capabilities, followed by the MAIL FROM command, which specifies the envelope sender address (also known as the reverse-path or Return-Path) for error reporting. Next, the RCPT TO command designates the recipient's forward-path address; this step verifies basic deliverability, and a failure here—such as a 5xx permanent error code indicating an invalid or unreachable host—prompts the receiving server to generate a bounce message immediately without proceeding further. If the RCPT TO succeeds, the sender MTA transmits the message content using the DATA command, which includes headers and body terminated by a single period on a line. Failures during or after DATA acceptance, such as resource issues or post-acceptance delivery problems to the final mailbox, trigger the receiving server to create a non-delivery report (NDR), also known as a Delivery Status Notification (DSN) or bounce message. The receiving MTA constructs this NDR using a null reverse-path (MAIL FROM:<>) to avoid loops and sends it back to the original envelope sender address via SMTP, incorporating details like the original message headers and an explanation of the failure. In cases like unreachable hosts encountered during RCPT TO validation, this process ensures prompt notification without unnecessary resource expenditure. For temporary failures signaled by 4xx codes (e.g., temporary overload), the receiving does not immediately generate a bounce but instead queues the message for , employing to space attempts—starting with a minimum of 30 minutes and increasing to every 2-3 hours after initial tries. This process continues for at least 4-5 days or until successful delivery, permanent failure, or administrative intervention, as per SMTP queuing requirements. If retries exhaust without success, an NDR is then issued to the envelope sender. In modern MTAs such as Postfix, the bounce generation integrates with a queue manager (qmgr) that handles asynchronous delivery attempts, maintaining per-message logs in queue subdirectories and enqueuing DSNs via the daemon only after final failure determination. Similarly, and Exchange Online employ queue-based asynchronous processing compliant with RFC 5321, where transport rules and recipient resolution trigger NDRs upon persistent delivery issues, with enhanced logging for diagnostics in recent updates. These implementations ensure efficient handling without blocking the primary SMTP transaction.

Response Mechanisms

In email systems, bouncing represents one of several response mechanisms employed by servers to handle undeliverable s, distinct from outright rejection during the SMTP transaction. When a rejects a , it typically issues a permanent code (5xx series) at stages such as the RCPT TO command or during DATA transmission, preventing the sender's from completing and notifying it immediately via the SMTP protocol without generating a separate non-delivery report (NDR). This approach avoids storing the and minimizes resource use, as the rejection propagates back synchronously. In contrast, bouncing occurs after the receiving has accepted the with a 250 OK response but later encounters a , prompting the generation and dispatch of an NDR containing the original (or parts thereof) to the sender's address. Another common mechanism is silently dropping the message, where the server accepts it during the SMTP session but discards it internally without any notification to the sender, thereby avoiding the creation of —unwanted bounce messages sent to forged addresses in spam campaigns. This practice, recommended by RFC 5321 only for cases of high-confidence fraud to prevent undermining reliability, became prevalent in anti-spam configurations during the as a way to curb the flood of from misconfigured or malicious senders. By 2025, silent dropping remains a standard feature in major policies, such as those in Exchange and other providers, to enhance spam mitigation without alerting spammers to valid targets. Greylisting serves as a specialized temporary rejection mechanism, where an unfamiliar sender receives a transient code (4xx series, such as ) during the initial SMTP attempt, prompting a retry after a delay; compliant senders then succeed on subsequent tries, while many spambots do not retry. This can manifest as a soft bounce on the first attempt but ultimately allows delivery without a full NDR, aligning with SMTP standards for retry behavior.

Impact on Sender Reputation

High bounce rates, particularly for hard bounces exceeding 2% or total bounces surpassing 5%, signal poor list to internet service providers (ISPs) such as and , often resulting in throttling of email volumes or placement on blacklists that restrict future deliveries. Hard bounces, which indicate permanently invalid addresses, contribute most significantly to these thresholds, as they demonstrate a sender's to maintain accurate contact lists. Sender is quantitatively assessed by services like Validity's Sender Score (formerly from Return Path), where elevated bounce rates directly deduct points from a 100-point scale, potentially dropping scores below 80 and triggering stricter ISP scrutiny. In 2025, emphasis has grown on real-time feedback loops, such as those provided by major ISPs, which enable senders to receive immediate notifications of bounces and complaints to proactively adjust practices and mitigate damage. The primary consequences of sustained high bounce rates include diminished overall deliverability, with emails increasingly routed to folders or outright blocked, thereby reducing engagement metrics like open and click-through rates. Additionally, under the U.S. CAN-SPAM Act, maintaining lists with excessive invalid addresses can expose senders to legal risks, including fines up to $53,088 per email for violations related to deceptive practices or failure to honor opt-outs, as poor hygiene may be interpreted as non-compliance. To counteract these impacts, best practices focus on regular list cleaning through email validation tools, such as ZeroBounce, which verify addresses in bulk to identify and remove invalid or risky entries before campaigns launch, ideally every three months given annual list decay rates of about 23%. Integrating automated suppression lists and monitoring tools further ensures bounces remain below critical thresholds, preserving long-term sender credibility.

Format and Standards

Structure of a Bounce Message

A bounce message, also known as a non-delivery report (NDR) or delivery status notification (DSN) for failures, follows a standardized format defined in 3462 to ensure both human readability and machine parsability. This format uses the content type multipart/report with the parameter report-type=delivery-status, consisting of at least two parts and optionally a third. The first part is a human-readable explanation, typically in text/plain or text/html, providing a clear description of the delivery failure, such as "The message cannot be delivered because the recipient's is full." The second part is the machine-readable DSN in the message/delivery-status format per 3464, which includes structured fields for automated processing. The optional third part contains the original message or an excerpt, often limited to headers using text/rfc822-headers to reduce size and potential privacy risks. The machine-readable DSN portion is divided into per-message fields (applicable to the entire report) and per-recipient fields (specific to each failed address). Key per-message fields include the Reporting-MTA field, which identifies the mail transfer agent (MTA) generating the report, formatted as dns; example.mta.domain to indicate the domain name service resolution. The Original-Message-ID field references the of the bounced message for tracking. Per-recipient fields detail the failure: the Action field specifies the outcome, such as failed for permanent delivery abandonment; the Status field provides a transport-independent code like 5.1.1 (bad destination address); and the Diagnostic-Code field offers transport-specific details, e.g., smtp;550 5.1.1 User unknown. Other fields like Final-Recipient (the actual address attempted) and Last-Attempt-Date-Time (timestamp of the final try) aid in diagnostics. At the level, messages use a null Return-Path (<>) to prevent loops, while the header Return-Path reflects the original envelope sender for the notification back. Common headers include From: [email protected] (indicating automated generation) and Subject: Undelivered Mail Returned to Sender, with MTA-specific indicators like X-Postfix in Postfix-generated bounces to denote the originating system. The body often appends the original message's headers and a portion of its content, though implementations like Postfix use configurable templates to format error descriptions consistently. Variations exist between simple bounces and enhanced DSNs. Simple bounces are non-standard, consisting of a plain-text body with a basic and minimal structure, lacking machine-readable elements and often including the full original , which can expose sensitive . Enhanced DSNs adhere to 3462 and 3464, providing structured diagnostics while optionally limiting returned content to headers only for .

SMTP Error Codes

SMTP error codes, defined in the (SMTP), provide standardized responses from mail servers indicating the outcome of message delivery attempts, with specific codes triggering bounce messages when delivery fails. These codes are categorized into temporary (4xx) and permanent (5xx) failures, helping distinguish between issues that may resolve on retry (soft bounces) and those requiring immediate sender action (hard bounces).

4xx Codes (Transient Failures)

The 4xx series represents temporary negative completion replies, signaling that the server could not process the message at that time but may succeed later. These often result in soft bounces, where the sending system is encouraged to retry delivery after a delay. Key examples include:
  • 421 Service not available, closing transmission channel: Issued when the server is shutting down or unable to accept messages temporarily, such as during maintenance.
  • 450 Requested mail action not taken: mailbox unavailable: Indicates the recipient's mailbox is temporarily inaccessible, possibly due to being busy or under policy restrictions.
  • 452 Requested action not taken: insufficient system storage: Returned when the server lacks space to store the message, a condition that may resolve as resources free up.
In bounce messages, these codes appear in the diagnostic section to inform the sender of the retry-eligible failure.

5xx Codes (Permanent Failures)

The 5xx series denotes permanent negative completion replies, meaning the delivery attempt has definitively failed and no further retries to the same destination are warranted. These correspond to hard bounces, prompting the immediate generation of a non-delivery report to the sender. Notable codes are:
  • 550 Requested action not taken: mailbox unavailable: Commonly used for invalid or non-existent recipients, such as an unknown user.
  • 551 User not local; try : Signals that the recipient is not hosted on the , with an optional forwarding path provided.
  • 552 Requested action aborted: exceeded storage allocation: Indicates the recipient's quota has been surpassed, preventing acceptance.
These codes ensure efficient error signaling, reducing unnecessary network load from repeated attempts.

Enhanced Status Codes

For more granular diagnostics, enhanced status codes extend the basic SMTP replies as specified in RFC 3463, using a three-part format: class (e.g., 5 for permanent failure), subject (e.g., 7 for ), and detail (e.g., 1 for specific condition). These are incorporated into delivery status notifications (DSNs), including bounce messages, to provide detailed failure reasons beyond simple 4xx or 5xx indicators. An example is 5.7.1 Delivery not authorized, message refused: A permanent rejection, often due to rules or filtering, commonly seen in block bounces. This structure aids in automated by tools for and . As of 2025, these codes remain standardized under RFC 5321, with modern systems and monitoring tools routinely them to classify and handle bounces programmatically.

Relevant Protocols and RFCs

The (SMTP), as defined in RFC 5321 published in 2008, establishes the foundational framework for transmission, including mechanisms for error replies that form the basis of bounce messages when delivery fails. This standard specifies how receiving servers respond to undeliverable messages by sending a negative back to the sender's address, ensuring reliable error reporting during the SMTP transaction. RFC 821, issued in 1982 and now obsolete, laid the initial groundwork for SMTP procedures, including basic reply codes that influenced modern bounce handling, though it has been superseded by RFC 5321 for current implementations. The Status Notification (DSN) framework enhances SMTP's error reporting through a series of RFCs that standardize detailed notifications for message outcomes. RFC 3461, from 2003, extends SMTP to allow clients to request DSNs, specifying parameters for success, failure, delay, or partial reports to improve sender awareness of causes. Complementing this, RFC 3463 defines enhanced status codes for use in DSNs, providing granular diagnostics beyond basic SMTP replies to track issues more precisely. RFC 3464 outlines the MIME content-type for DSN messages, ensuring structured, extensible formats that include original message details and action recommendations, thereby reducing ambiguity in interpretations. Email authentication protocols integrate with bounce mechanisms to mitigate forged or unauthorized bounces, often termed backscatter. RFC 7208, published in 2014, describes the Sender Policy Framework (SPF), which validates the sending server's IP against domain DNS records, helping receiving systems discard invalid bounce attempts from spoofed sources. RFC 6376, from 2011, specifies DomainKeys Identified Mail (DKIM) signatures, allowing cryptographic verification of bounce message integrity to prevent tampering or forgery during transit. Building on these, RFC 7489, issued in 2015, defines Domain-based Message Authentication, Reporting, and Conformance (DMARC), which aggregates SPF and DKIM results to enforce domain-level policies, enabling receivers to suppress bounces from unauthenticated origins and report abuse. Addressing limitations in legacy bounce handling, 8617 from 2019 introduces the (ARC) protocol, which preserves metadata across forwarding intermediaries, thereby reducing erroneous by maintaining verifiable chains of custody for legitimate notifications. As of November 2025, no major new RFCs have emerged specifically for bounce messages, but ongoing IETF drafts such as those related to DKIM enhancements discuss improvements to DSN handling in authenticated contexts; guidelines emphasize combining DSN with standards to align with evolving practices, such as stricter enforcement in high-volume sending environments.

References

  1. [1]
    RFC 3464 - An Extensible Message Format for Delivery Status ...
    This memo defines a Multipurpose Internet Mail Extensions (MIME) content-type that may be used by a message transfer agent (MTA) or electronic mail gateway.
  2. [2]
    Email non-delivery report (NDR) and SMTP errors in Exchange Online
    Admins can learn about SMTP errors and non-delivery reports (also known as NDRs or bounce messages) that are generated in Exchange Online.Directory-Based Edge Blocking · Microsoft Ignite · Training<|control11|><|separator|>
  3. [3]
  4. [4]
    RFC 3463: Enhanced Mail System Status Codes
    This document defines a set of extended status codes for use within the mail system for delivery status reports, tracking, and improved diagnostics.
  5. [5]
    RFC 7208 - Sender Policy Framework (SPF) for Authorizing Use of ...
    Generating non-delivery notifications to forged identities that have failed the authorization check often constitutes backscatter, i.e., nuisance rejection ...
  6. [6]
    RFC 5321 - Simple Mail Transfer Protocol - IETF Datatracker
    This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous ...
  7. [7]
  8. [8]
  9. [9]
  10. [10]
  11. [11]
    RFC 3463 - Enhanced Mail System Status Codes - IETF Datatracker
    This document defines a set of extended status codes for use within the mail system for delivery status reports, tracking, and improved diagnostics.Missing: NDR | Show results with:NDR<|control11|><|separator|>
  12. [12]
    The Origins of E-mail - Stanford Computer Science
    Sep 17, 1999 · Ray Tomlinson created early email programs, later attached to ARPANET's file transfer protocol, and Stephen Lukasik encouraged its use.
  13. [13]
    RFC 821 - Simple Mail Transfer Protocol - IETF Datatracker
    The objective of Simple Mail Transfer Protocol (SMTP) is to transfer mail reliably and efficiently. SMTP is independent of the particular transmission ...
  14. [14]
  15. [15]
    RFC 1894: An Extensible Message Format for Delivery Status Notifications
    **Summary of RFC 1894: Delivery Status Notifications (DSN)**
  16. [16]
    RFC 3461 - Simple Mail Transfer Protocol (SMTP) Service Extension ...
    The format of a DSN is defined in [3]. 2. Framework for the Delivery Status ... RFC 3461 SMTP DSN Extension January 2003 10.6 "Delivered" DSN for Bob ...
  17. [17]
    Email bounces: why they happen & how to handle them | Postmark
    Dec 14, 2023 · Bounce error codes generally start with the number 4.X.X for temporary failures (soft bounces) and 5.X.X for permanent errors (hard bounces). We ...Missing: 5xx implications
  18. [18]
    What do different SMTP bounce codes mean for email deliverability ...
    May 22, 2025 · Hard bounces and their impact on reputation. Hard bounces are permanent delivery failures, indicated by 5xx SMTP codes. These emails will ...
  19. [19]
    Email Bounce and Error Codes: A Complete Guide - Smartlead
    May 13, 2025 · Traditional SMTP Bounce Codes​​ For example, a code 550 indicates that the mailbox is unavailable. A 501 error shows that the user is unknown. ...<|control11|><|separator|>
  20. [20]
    Hard Bounce vs. Soft Bounce Emails (and How To Fix Them)
    May 1, 2024 · Hard bounce emails are those that have been permanently rejected by the receiving mail server. This means you will need to take action before the email can be ...
  21. [21]
    Deliverability | How to handle bounced emails - Spamhaus
    A hard bounce occurs when the email server rejects the email due to permanent conditions. This typically results when 'user unknown' or 'domain not found' ...Missing: implications | Show results with:implications
  22. [22]
    The Ultimate Guide to Email Deliverability in 2025
    Sep 17, 2025 · Any email addresses that lead to a hard bounce should be removed. Too many hard bounces will damage your sender reputation and can get you ...
  23. [23]
    7 Common Hard Bounce vs Soft Bounce Mistakes and How to Avoid ...
    Aug 15, 2025 · Perhaps the most damaging consequence of high bounce rates is the risk of blacklisting. If ISPs or anti-spam organizations determine you're ...Missing: implications | Show results with:implications
  24. [24]
  25. [25]
  26. [26]
    Email bounce types - HubSpot Knowledge Base
    A bounced email is one which cannot be delivered to the recipient's email server. When this occurs, the recipient's email server will send an automated ...
  27. [27]
    Hard bounce vs soft bounce: Key differences | Braze
    May 12, 2025 · A soft bounce happens when an email temporarily can't reach the recipient. Soft bounces offer valuable clues about temporary delivery issues, ...
  28. [28]
    Email Soft Bounces: What They Are & How To Fix Them - Mailgun
    May 2, 2022 · You've had too many hard bounces. · You've had too many spam complaints. · Your server is blocklisted. · You have low user engagement. · Your ...
  29. [29]
    What Is a Soft Bounce in Email Marketing? - Campaign Monitor
    There are many causes for a soft bounce, some of which include: The recipient's inbox is full. Email file size may be too large. The server may be down. An ...
  30. [30]
  31. [31]
    Salesforce Email Bounce Management: Complete Guide for 2025
    Rating 4.9 (154) Sep 22, 2025 · Salesforce email bounce management explained: enable bounce tracking, spot issues, and apply fixes to protect your reputation and campaigns.Common Bounce Types In... · Block Bounces... · How To Verify Emails With...
  32. [32]
  33. [33]
    Understanding Delayed Bounces - SendGrid Support
    A delayed bounce occurs when an email is initially accepted for delivery but is later rejected after the SMTP conversation has ended.
  34. [34]
  35. [35]
    How to fix DMARC Policy Bounces? | Postmark Support Center
    A “DMARC Policy” bounce means that the sending domain (Your or your client's domain) has made a rule that any messages sent on their behalf must use DKIM and/or ...
  36. [36]
    Troubleshoot DMARC issues - Google Workspace Admin Help
    When an outgoing message sent from your domain fails DMARC authentication, the person who sent the message might get this error in a bounce message: "5.7.26" ...
  37. [37]
    12 Top Reasons Emails Bounce (and How to Fix Them) - Verifalia
    Sep 12, 2024 · Suspicious links or attachments: links to blacklisted websites or attachments containing harmful files may cause your email to bounce. ...
  38. [38]
    Why do emails get bounced in 2025? Understanding new delivery ...
    They may result from a full recipient mailbox, a server outage, or a temporary technical problem. Multiple soft bounces over time can eventually escalate to a ...
  39. [39]
    Why Your Emails Are Being Blocked & What to Do About It - Validity
    Jan 16, 2025 · A blocked email happens when a Mailbox Provider (MBP), or client email server prevents your email from reaching a subscriber's inbox.
  40. [40]
    Fix NDR error 550 5.1.1 through 5.1.20 in Exchange Online
    Jun 25, 2025 · I got this bounce message. How do I fix it? · Solution 1: Confirm the recipient's email address · Solution 2: Remove the recipient's email address ...
  41. [41]
    Why are emails bouncing with 'domain does not exist' or 'invalid ...
    Jul 31, 2025 · Monitor domain expiration dates diligently to prevent unexpected service interruptions and bounces. Use an email verification service to clean ...
  42. [42]
    Troubleshooting the '552 Quota Exceeded' Error: How to Fix and ...
    Oct 28, 2024 · This error can lead to email bounces, frustrating delays, and delivery failures. So, let's break down why it happens and how you can handle it like a pro!
  43. [43]
    Email Bounces: Why do they happen and how to handle them?
    Oct 13, 2024 · An email may bounce when the recipient's account has been deactivated because of some policy infringement, an age limit, or prolonged inactivity ...
  44. [44]
    Understanding email bounces | Attio Help Center
    Check spam filters and policies: For 5.7.1 errors (policy rejections), check whether your emails are being flagged as spam. Make sure your content follows ...<|separator|>
  45. [45]
    Google Warns My Old Gmail And Photos To Be Deleted April 3 ...
    Mar 2, 2025 · Google is sending out emails warning some users their accounts will be deleted soon—here's what you need to do to save yours.
  46. [46]
    Gmail Account Deletion Warning—Act Now To Save Your Email In ...
    Dec 16, 2024 · Google is still warning Gmail users that their accounts will be deleted unless action is taken—here's why and what you need to do in ...
  47. [47]
  48. [48]
    What is Email Error 450 and How Do I Fix It? - InMotion Hosting
    Aug 9, 2021 · A 450 email error is typically a temporary routing issue on the receiving mail server's end. Sometimes these are also Greylisting responses.
  49. [49]
  50. [50]
    SMTP Email Error 451 4.4.4- How to Resolve [SOLVED] - Warmy.io
    Apr 9, 2024 · Misconfigured routers, broken network routes, or overzealous firewall rules blocking DNS queries or email traffic may cause this error.
  51. [51]
    SMTP error codes: full list and how to troubleshoot them - Mailgun
    May 1, 2025 · This guide explains what SMTP error codes mean, how to fix common problems, and how Mailgun helps make sense of it all.
  52. [52]
    Troubleshooting SMTP Response 452 (Temporary Error)
    SMTP code 452 is used to indicate that the recipient's email server is unable to accept the message due to a lack of storage space, too many recipients, or ...Missing: bounce | Show results with:bounce
  53. [53]
    The Challenges of SMTP over IPv6 | Everything you need to know
    Feb 24, 2025 · Moving directly to an IPv6-only SMTP operation can cause deliverability problems, so a dual-stack (IPv4 and IPv6) support of your operation is ...
  54. [54]
    Google Cloud Outage Analysis: June 12, 2025 - ThousandEyes
    Jun 12, 2025 · On June 12, Google Cloud experienced an outage that impacted applications that use Google Cloud services, including Spotify and Fitbit, among many others.
  55. [55]
    Microsoft's July 2025 Outage: A 19-Hour Disruption That Exposed ...
    Jul 15, 2025 · Microsoft's 19-hour Outlook and Teams outage in July 2025 disrupted millions globally. What happened, and how did Microsoft respond?
  56. [56]
    Backscatter in Microsoft 365 - Microsoft Defender for Office 365
    Jul 28, 2025 · Backscatter is non-delivery reports (also known as NDRs or bounce messages) that you receive for messages you didn't send.
  57. [57]
    Understanding email spoofing and backscatter - Paubox
    Jan 16, 2024 · On the other hand, email backscatter occurs when email servers mistakenly send bounce messages to the forged return addresses in spoofed emails.
  58. [58]
    Email authentication - Microsoft Defender for Office 365
    Jul 7, 2025 · How to avoid email authentication failures when sending mail to Microsoft 365 · Configure SPF, DKIM, and DMARC records for your domains: Use the ...
  59. [59]
    Why Does DMARC Fail? Troubleshooting Email Authentication Issues
    Jul 28, 2025 · The most common reason your message might have failed DMARC is that your SPF or DKIM isn't correctly aligned with your email's “From” domain.
  60. [60]
    Attachment size exceeds the allowable limit error - Outlook
    Jun 25, 2025 · Describes the circumstances surrounding an error that occurs when you add a large attachment to an email message in Outlook.Missing: malformed | Show results with:malformed
  61. [61]
    Half the spam in your inbox is generated by AI – its use in advanced ...
    Jun 18, 2025 · By April 2025, most spam emails (51%) were generated by AI rather than a human. The majority of the emails currently sitting in the average junk/spam folder ...Missing: bounces filters 2024
  62. [62]
    Common Challenges in Email Authentication and How to Solve Them
    Jul 24, 2025 · Common email authentication challenges include SPF misconfigurations, DKIM errors, and DMARC policy issues. SPF problems often arise from ...Spf (sender Policy... · Dmarc (domain-Based Message... · Solution: Use Dmarc...
  63. [63]
  64. [64]
  65. [65]
  66. [66]
    bounce(8) - Postfix manual
    ... delivery status record to a per-message log file. o Enqueue a delivery status notification message, with a copy of a per-message log file and of the ...
  67. [67]
  68. [68]
    Hard/Soft Bounces & Rejected Emails - SMTP2GO
    Nov 29, 2022 · SMTP2GO categorizes all bounces into hard bounces and soft bounces. A rejected email is an email that SMTP2GO blocks due to the recipient being on your ...
  69. [69]
    Mail flow rule actions in Exchange Server - Microsoft Learn
    Apr 30, 2025 · Summary: Learn about the actions that are available for mail flow rules (transport rules) in Exchange Server 2016 and Exchange Server 2019.Missing: process | Show results with:process
  70. [70]
    RFC 6647 - Email Greylisting: An Applicability Statement for SMTP
    RFC 6647. Proposed Standard. Title, Email Greylisting: An Applicability Statement for SMTP. Document, Document type, RFC - Proposed Standard June 2012. Report ...
  71. [71]
    What is the Difference Between Hard and Soft Bounces? - ZeroBounce
    Rating 4.7 (6,099) You can overcome many soft bounces by simply reattempting the email send. For example, greylisting only initially blocks emails from unknown domains but will ...
  72. [72]
    Ultimate Guide to Email Bounce Rate Management - Infraforge
    ISPs monitor bounce rates as a measure of sender quality. A bounce rate over 2% raises red flags, and anything above 5% is a serious issue. When your rates ...
  73. [73]
    Email Bounce Rate: Definition, Benchmark, Best Practices - Mailtrap
    Hard bounces have a greater impact on sender reputation and email deliverability. Common causes include invalid email addresses, improperly configured (or not ...
  74. [74]
    Email Sender Reputation: How to Check & Improve Sender Score
    An organization's bounce rate: Whether your emails are facing hard or soft bounces can indicate your trustworthiness and honest list-building practices to MBPs.Email Sender Reputation · Sender Score Is Between... · Sender Score Is Over 80<|separator|>
  75. [75]
    How to Improve Email Deliverability in 2025 | Braze
    May 26, 2025 · With Gmail and Yahoo's 2024 changes now fully in effect, the pressure to improve email deliverability is higher than ever.
  76. [76]
    How Sender Score Impacts Email Delivery in 2025 - Instantly.ai
    Jul 2, 2025 · Bounce rates: Invalid or non-existent addresses tell providers your list hygiene needs work. Too many bounces—especially hard bounces—signal ...
  77. [77]
    Email bounces: What to do about them - Mailgun
    Common reasons for hard bounces are invalid email addresses, the receiving server no longer exists, misspelled domain names or recipient addresses, etc. Most ...
  78. [78]
    Email Deliverability Best Practices for Email Studio - Salesforce Help
    CAN-SPAM is the popular name for the U.S. law regulating commercial email ... bounce rate over 10% can dramatically harm your deliverability and ISP reputation.
  79. [79]
    Tips for Improving Email Deliverability - ZeroBounce
    Rating 4.7 (6,099) Use an email verification service, at minimum, every three months. Email lists decay on average at roughly 23% annually. Therefore, regularly cleaning your list ...Tip 1 - Use Email... · Tip 3 - Use Email... · Tip 5 - Test And Update...
  80. [80]
    The Ultimate Guide to Email Scrubbing: How to Clean Email Lists
    Rating 4.8 (2,565) Feb 6, 2025 · Regularly scrubbing your email list removes risky contacts, lowers bounce rates, and demonstrates to ISPs that your emails are credible and ...Why Email List Cleaningi... · 3. Email Service Providers... · Strategies To Elevate Your...
  81. [81]
    RFC 3462 - The Multipart/Report Content Type - IETF Datatracker
    RFC 3462 defines the Multipart/Report MIME content-type, a container for electronic mail reports of any kind, especially delivery status reports.
  82. [82]
  83. [83]
  84. [84]
  85. [85]
  86. [86]
  87. [87]
    bounce(5) - Postfix manual
    bounce - Postfix bounce message template format ... By default, these notifications are generated from built-in templates with message headers and message text.Missing: SMTP process
  88. [88]
    Redacting Email Content - DataCove Email Archiving
    Mar 25, 2025 · Need to withhold content for privacy, intellectual property or state secret reasons? DataCove's redaction feature is here to help!
  89. [89]
  90. [90]
  91. [91]
  92. [92]
  93. [93]
  94. [94]
  95. [95]
    RFC 5321: Simple Mail Transfer Protocol
    Server SMTP systems SHOULD NOT reject messages based on perceived defects in the RFC 822 or MIME (RFC 2045 [21]) message header section or message body. In ...<|separator|>
  96. [96]
    RFC 8617: The Authenticated Received Chain (ARC) Protocol
    The Authenticated Received Chain (ARC) protocol provides an authenticated "chain of custody" for a message, allowing each entity that handles the message to ...Missing: backscatter | Show results with:backscatter