AOL and AIM mail

Earlier this week a question came up on a mailing list. The questioner recently started seeing an increase in rejections to @aol.com addresses. These rejections said

<redacted@aol.com>: host mailin-03.mx.aol.com[205.188.109.56] said: 550 We would love to have gotten this email to redacted@aim.com. But, your recipient never logged onto their free AIM Mail account. Please contact them and let them know that they’re missing out on all the super features offered by AIM Mail. And by the way, they’re also missing out on your email. Thanks. (in reply to RCPT TO command)<redacted@aol.com>

The poster was confused because the addresses were aol.com addresses that had successfully delivered in the past. He was unsure why AOL would be rejecting good aol.com addresses with the aim.com.
After some investigation and some discussion with a friendly AOL representative, the underlying reason for this sudden increase in rejections became clear. The mailer was seeing an increase for two interacting reasons.

  1. When an AOL user abandons their account, AOL converts the account to a free aim.com address. That is why the aol.com addresses were getting the aim.com rejection.
  2. The marketing group at the company who saw the rejections “dug deep into their database” and sent mail to a number of addresses that had not received email in a while.

The increase in bounces is the result of pulling older addresses and the @aol.com addresses getting @aim.com bounces is the result of AOL’s policy of converting abandoned aol addresses to aim addresses.

Related Posts

Changes at AOL Postmaster desk

The recent layoffs at AOL did affect the AOL Postmaster desk, and information I have received is that there was significant loss. As a result of the staff decrease, some changes have been made to the whitelisting and FBL processes. In order for a FBL to be approved it must meet the new FBL guidelines. In a nutshell, anyone wanting to get a FBL from AOL must meet ONE of the following criteria.

Read More

Changes at RoadRunner

I’ve been hearing rumors that some *.rr.com domains have been bouncing all mail sent to them. Those domains belong to customers that were moved to Comcast as part of the RoadRunner / Comcast / Adelphia purchase and customer swap. As a courtesy, RoadRunner forwarded mail to comcast for those former RoadRunner customers, but have ceased to do so.
Mail to any address in the following *.rr.com domains will no longer be delivered.
jam.rr.com
midsouth.rr.com
mn.rr.com
se.rr.com
sport.rr.com
swfla.rr.com
ucwphilly.rr.com
houston.rr.com
These addresses should be removed from your lists. These users now have Comcast addresses. You cannot just substitute the Comcast domain for the RoadRunner domain as users were required to choose new localparts. That means bobjones@houston.rr.com may not be, and probably is not, bobjones@comcast.

Read More

Yahoo and Spamhaus

Yahoo has updated and modified their postmaster pages. They have also put a lot of work into clarifying their response codes. The changes should help senders identify and troubleshoot problems without relying on individual help from Yahoo.
There is one major change that deserves its own discussion. Yahoo is now using the SBL, XBL and PBL to block connections from listed IP addresses. These are public blocklists run by Spamhaus. Each of them targets a different type of spam source.
The SBL is the blocklist that addresses fixed spam sources. To get listed on the SBL, a sender is sending email to people who have never requested it. Typically, this involves email sent to an address that has not opted in to the email. These addresses, known as spamtraps, are used as sentinel addresses. Any mail sent to them is, by definition, not opt-in. These addresses are never signed up to any email address lists by the person who owns the email address. Spamtraps can get onto a mailing list in a number of different ways, but none of them involve the owner of the address giving the sender permission to email them.
Additionally, the SBL will list spam gangs and spam supporters. Spam supporters include networks that provide services to spammers and do not take prompt action to remove the spammers from their services.
The XBL is a list of IP addresses which appear to be infected with trojans or spamware or can be used by hackers to send spam (open proxies or open relays). This list includes both the CBL and the NJABL open proxy list. The CBL list machines which appear to be infected with spamware or trojans. The CBL works passively, looking only at those machines which actively make connections to CBL detectors. NJABL lists machines that are open proxies and open relays.
The Policy Block List (PBL) is Spamhaus’ newest list. Spamhaus describes this list as

Read More