INFRASTRUCTURE REFERENCE · JANUARY 2026

Email Delivery Architecture

Email delivery architecture refers to the design of the technical systems that move email messages from a sender's application to recipients' inboxes. For organizations sending at volume, this architecture determines deliverability performance, reputation resilience, operational control, and the ability to scale without degrading delivery quality. Understanding the components of production email delivery architecture — and how they interact — is prerequisite to making sound infrastructure decisions.

This reference covers the complete email delivery stack from sending application to recipient inbox: the MTA layer, IP address architecture, authentication configuration, ISP-side reception, and the monitoring systems that keep it all operational.

The Complete Email Delivery Stack

A production email delivery stack has six distinct layers, each of which contributes to or limits deliverability outcomes. Problems at any layer can degrade performance even when all other layers are correctly configured.

LayerComponentFunctionPrimary Failure Mode
1. ApplicationCampaign platform (MailWizz, custom app)Message composition, list management, scheduling, bounce processingPoor list quality, missing authentication headers, slow bounce processing
2. MTAPowerMTASMTP delivery, throttling, retry logic, DKIM signing, accountingMisconfigured throttle limits, incorrect bounce handling, wrong retry intervals
3. NetworkSending IP addresses, PTR recordsPacket routing, source IP reputationIP reputation degradation, blacklist listings, missing PTR records
4. AuthenticationSPF, DKIM, DMARC, BIMISender identity verification and policy enforcementDMARC misalignment, expired DKIM keys, SPF lookup limit exceeded
5. ISP ReceptionReceiving MTA, spam filters, reputation systemsMessage acceptance, filtering, inbox placement decisionsISP policy changes, reputation scoring, content filtering
6. MonitoringPostmaster Tools, SNDS, FBL, accounting logsVisibility into performance, reputation, and complaintsUndetected reputation degradation, delayed incident response

The MTA Layer: PowerMTA Architecture

The Mail Transfer Agent (MTA) is the software that takes messages from the sending application, manages the delivery queue, connects to recipient MTAs, handles responses, and logs all delivery events. PowerMTA is the production-grade MTA used by high-volume senders who require per-ISP configuration control, detailed accounting logs, and the connection management capabilities needed at millions of messages per day.

How PowerMTA Handles the Delivery Queue

When a message is injected into PowerMTA (via SMTP from the sending application), it enters the delivery queue associated with the virtual MTA pool configured for its destination. The queue processor evaluates per-domain configuration (throttle limits, connection counts, retry intervals) and opens SMTP connections to the destination ISP's MX hosts.

# PowerMTA delivery flow — simplified:
# 1. Application injects message via SMTP → PowerMTA accepts
# 2. Message enters queue for destination domain (e.g., gmail.com)
# 3. Queue processor checks domain block config: max-smtp-out, max-msg-rate
# 4. Opens SMTP connection from configured virtual-mta source IP
# 5. Delivers message → records accounting event (delivered/deferred/bounced)
# 6. On deferral (4xx): schedules retry per retry-after interval
# 7. On permanent failure (5xx): bounces message, notifies application

# Per-ISP domain block (simplified):
domain gmail.com {
    virtual-mta-pool    gmail-pool      # Which IPs to send from
    max-smtp-out        8               # Max concurrent connections
    max-msg-rate        300/h           # Max messages per hour
    retry-after         15m             # Retry interval on deferral
    mx-rollup           gmail.com       # Treat all Gmail MX as one destination
}

Virtual MTA Pools: IP Allocation Architecture

The virtual MTA (vMTA) architecture in PowerMTA maps sending traffic to specific IP addresses. Each virtual-mta block defines one source IP. Virtual-mta-pools group IPs for load distribution and ISP-specific routing. This architecture is the mechanism for traffic type isolation — the foundational principle of production IP pool design.

Traffic type isolation means: transactional email (2FA codes, receipts, account notifications) never shares IP addresses with marketing campaigns or cold outreach. When a campaign generates complaints or elevated deferral rates, those signals affect only the marketing pool — transactional delivery continues from its dedicated pool with no reputation impact.

# IP pool architecture for traffic type isolation:

# Pool 1: Transactional — highest protection, never paused
virtual-mta-pool transactional-pool {
    virtual-mta trans-ip-1    # 185.x.x.40
    virtual-mta trans-ip-2    # 185.x.x.41
}

# Pool 2: Marketing campaigns — standard operations
virtual-mta-pool marketing-pool {
    virtual-mta mkt-ip-1      # 185.x.x.50
    virtual-mta mkt-ip-2      # 185.x.x.51
    virtual-mta mkt-ip-3      # 185.x.x.52
}

# Pool 3: Cold/prospecting — most isolated, separate domain
virtual-mta-pool cold-pool {
    virtual-mta cold-ip-1     # 185.x.x.60
}

# Each pool uses different From: domain and DKIM keys
# Trans: notifications@yourdomain.com → trans1._domainkey.yourdomain.com
# Mkt:   newsletter@yourdomain.com  → mkt1._domainkey.yourdomain.com

Authentication Architecture: SPF, DKIM, DMARC, PTR

Authentication is not a single component but a stack of four interrelated systems, each of which contributes a different signal to receiving ISPs. All four must be correctly configured for full authentication coverage. Partial authentication — three out of four correct — produces worse outcomes than expected because the missing component creates ambiguity that ISPs resolve conservatively.

SPF: Authorized Sending IP Enumeration

SPF (Sender Policy Framework) is a DNS TXT record that lists the IP addresses authorized to send email as your domain. When a receiving MTA accepts a connection from an IP, it checks whether that IP is listed in the SPF record for the envelope sender's domain. SPF passes when the sending IP is in the authorized list; SPF fails when it is not.

# SPF record for yourdomain.com
yourdomain.com TXT "v=spf1 ip4:185.x.x.0/24 ip4:185.y.y.0/28 -all"

# Critical constraints:
# - Maximum 10 DNS lookups allowed during SPF evaluation
# - Use ip4:/ip6: (no DNS lookup) instead of include: where possible
# - -all (hard fail) is correct; ~all (soft fail) provides no real protection
# - New sending IPs must be added to SPF BEFORE first send from that IP

DKIM: Cryptographic Message Signing

DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every message. The private key signs a hash of specified headers and the message body at PowerMTA. The receiving MTA retrieves the corresponding public key from DNS and verifies the signature. A passing DKIM signature proves: (1) the message was signed by someone with access to the private key for your domain, and (2) the signed headers were not modified in transit.

# DKIM configuration in PowerMTA virtual-mta block:
virtual-mta mkt-ip-1 {
    smtp-source-host 185.x.x.50 mail1.yourdomain.com
    dkim-sign domain="yourdomain.com"
              key-file="/etc/pmta/dkim/yourdomain.private"
              selector="mkt1"
              header-list="From:To:Subject:Date:Message-ID:Content-Type"
}

# DNS public key record:
# mkt1._domainkey.yourdomain.com TXT "v=DKIM1; k=rsa; p=[PUBLIC_KEY]"

# Key management requirements:
# - Minimum 2048-bit RSA keys (1024-bit insufficient per Gmail 2024 requirements)
# - Annual minimum key rotation (quarterly for security-conscious environments)
# - Zero-downtime rotation: publish new key under new selector before switching

DMARC: Policy Enforcement and Alignment

DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM to the From: header domain and specifies a policy for handling authentication failures. DMARC is the component that makes authentication meaningful for recipients — without DMARC, an attacker can use your domain in the From: header even with passing SPF and DKIM on a different domain.

# DMARC progression — start monitoring, progress to enforcement
# Phase 1 (weeks 1-4): Monitoring — collect data, no enforcement
_dmarc.yourdomain.com TXT "v=DMARC1; p=none; rua=mailto:dmarc@yourdomain.com"

# Phase 2 (weeks 5-12): Partial quarantine — begin enforcement
_dmarc.yourdomain.com TXT "v=DMARC1; p=quarantine; pct=25; rua=mailto:dmarc@yourdomain.com"

# Phase 3 (weeks 13+): Full enforcement — reject failing messages  
_dmarc.yourdomain.com TXT "v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com"

# DMARC alignment in PowerMTA:
# The dkim-sign domain= parameter must match the From: header domain
# From: newsletter@yourdomain.com → domain="yourdomain.com" ✓
# From: newsletter@yourdomain.com → domain="sendingplatform.com" ✗ (DMARC fails)

PTR Records: Reverse DNS for Every Sending IP

PTR (pointer) records provide reverse DNS for IP addresses — mapping an IP to a hostname. Every sending IP must have a PTR record that resolves to a hostname associated with your sending domain. Receiving MTAs — particularly Microsoft's Outlook infrastructure — check PTR records as part of connection acceptance. IPs without PTR records or with generic datacenter hostnames receive lower trust scores and are more likely to be filtered.

# Correct PTR configuration:
# Forward: mail1.yourdomain.com A 185.x.x.10
# Reverse: 185.x.x.10 → mail1.yourdomain.com (PTR record, set at IP provider)

# Verify PTR is set correctly:
dig -x 185.x.x.10
# Should return: mail1.yourdomain.com.

# Verify forward confirmation (A record must match PTR):
dig A mail1.yourdomain.com
# Should return: 185.x.x.10

# For 10 IPs in a pool: each IP needs its own PTR
# 185.x.x.10 → mail1.yourdomain.com
# 185.x.x.11 → mail2.yourdomain.com
# ...continuing per IP

ISP Reception: How Major Mailbox Providers Filter Email

Understanding how major ISPs receive, evaluate, and route messages is essential for infrastructure design decisions. Each major ISP uses different signals weighted differently — an infrastructure tuned for Gmail without consideration for Outlook will produce inconsistent results across your recipient base.

Gmail: Domain Reputation and Engagement Signals

Gmail's filtering system is primarily reputation-based, with domain reputation being the dominant signal. Gmail builds a reputation score for each sending domain based on: the proportion of messages marked as spam by Gmail users, engagement signals (messages read, replied to, or moved from spam to inbox), authentication quality, and the consistency of sending behavior over time. The spam rate visible in Google Postmaster Tools (which lags 24-72 hours) is the primary surface signal, but Gmail's internal scoring is significantly more complex.

Gmail's 2024 bulk sender requirements added mandatory authentication standards for all senders above 5,000 daily messages: SPF, DKIM with 1024-bit minimum key, DMARC policy published, List-Unsubscribe with RFC 8058 one-click compliance, and spam rate below 0.1%. These requirements are enforced, not advisory.

Microsoft Outlook: IP Reputation and SNDS

Microsoft's filtering for Outlook.com, Hotmail, and Live.com is more IP-focused than Gmail's domain-centric model. Microsoft SNDS (Smart Network Data Services) tracks per-IP complaint rates and spam trap hits, classifying each IP with a GREEN/YELLOW/RED status that directly affects delivery. Microsoft JMRP (Junk Mail Reporting Program) provides individual complaint reports when Outlook users mark messages as junk.

Yahoo: FBL and Domain Reputation

Yahoo operates a feedback loop (FBL) that sends individual complaint reports when Yahoo users mark messages as junk. Yahoo FBL enrollment is required for all high-volume senders to Yahoo and AOL addresses. Without FBL enrollment, complaint data from Yahoo recipients is invisible — you cannot suppress complainers, complaint rate rises, and Yahoo reputation degrades without any operational signal triggering investigation.

Monitoring Architecture: Visibility Into Delivery Performance

A production email delivery infrastructure without comprehensive monitoring is not a production infrastructure — it is infrastructure waiting for an undetected incident to become a visible crisis. The monitoring stack must cover: real-time delivery signals (accounting log deferral rates), daily reputation signals (Postmaster Tools, SNDS), and reactive complaint signals (FBL processing).

PowerMTA Accounting Log: The Primary Operational Signal

Every delivery event — accepted, deferred, bounced, expired — is logged in PowerMTA's accounting CSV log with the SMTP response code, diagnostic text, source IP, destination domain, and timing. This log is the most complete and timely delivery data source available. Postmaster Tools and SNDS data lags 24-72 hours; the accounting log is real-time.

# Monitoring deferral rate by ISP (run hourly):
awk -F, 'NR>1 {
    split($6,a,"@"); domain=a[2]
    if($1=="t") def[domain]++
    if($1=="d") del[domain]++
} END {
    for(d in del) {
        total=del[d]+def[d]
        if(total>100) printf "%s: %.1f%% deferral\n", d, def[d]/total*100
    }
}' /var/log/pmta/accounting.csv | sort -t: -k2 -rn | head -10

# Alert thresholds:
# Gmail deferral rate > 5% → investigate
# Outlook deferral rate > 5% → check SNDS
# Any ISP deferral rate > 15% → immediate action required
The infrastructure monitoring principle Monitor deferral rate from the accounting log hourly as your leading indicator. Postmaster Tools and SNDS confirm what the accounting log predicts 24-72 hours later. Operators who wait for reputation tool data to detect problems are always responding to yesterday's situation. Operators who monitor accounting log trends detect problems before they become incidents.

Scaling Email Delivery Architecture

Email delivery architecture scales differently than most web infrastructure. Adding more servers does not automatically increase throughput — ISP connection limits and per-IP reputation constraints determine effective throughput. The scaling mechanism for email delivery is IP pool expansion: each additional warmed IP adds proportional throughput capacity at the per-IP connection limit for each ISP.

The warming requirement is the most significant constraint on scaling timelines. A new IP cannot be added to full production volume immediately — it requires 8-12 weeks of warming before it can carry production traffic without producing elevated deferral rates. Infrastructure scaling plans must account for this lead time.

# Throughput calculation for IP pool scaling:
# Gmail: 8 connections × 150 msgs/session × 60s cycle = ~720 msgs/min per IP
# = ~1,040,000 msgs/day per warmed IP at Gmail
#
# To scale to 10M msgs/day at Gmail:
# 10,000,000 / 1,040,000 ≈ 10 IPs required
# New IPs need 10 weeks warming → start warming 10 weeks before needed
#
# Total infrastructure cost for 10M msgs/day:
# - 10+ sending IPs (dedicated, with PTR records)
# - PowerMTA license (enterprise tier)
# - Dedicated Linux server (8+ cores, 16GB+ RAM, NVMe SSD)
# - Monitoring infrastructure
# - Operational management (daily monitoring, incident response)

Operational Oversight: What Production Management Requires

The infrastructure described in this reference requires ongoing operational management to sustain its performance. ISP policies change, IP reputation evolves, list composition shifts, and authentication requirements tighten. An infrastructure configured correctly today requires active maintenance to remain correctly configured in six months.

Production email infrastructure management at Cloud Server for Email covers: daily reputation monitoring (Postmaster Tools, SNDS), hourly deferral rate analysis from PowerMTA accounting logs, real-time FBL complaint processing with suppression integration, blacklist monitoring for all sending IPs, monthly ISP-specific configuration review and adjustment, DKIM key rotation on scheduled cadence, and incident response for delivery events requiring same-day action.

Frequently Asked Questions

What is the difference between shared and dedicated email infrastructure? +
Shared infrastructure means multiple organizations send through the same IP addresses. One sender's complaint rate affects all other senders on the same IP. Dedicated infrastructure means you own specific IP addresses — your reputation is determined entirely by your own sending behavior, not your neighbors'. Dedicated infrastructure requires IP warming and active management, but provides complete control over your reputation and sending capacity.
How many IPs do I need for my sending volume? +
The number of IPs required depends on your target ISP mix, message size, and sending volume. For Gmail, a fully warmed IP can typically handle 700,000–1,200,000 messages per day. For Outlook, 400,000–700,000 per day. These figures assume HIGH reputation status and appropriate connection configuration. For a 10 million message per day program, 8-12 IPs across major ISPs is a reasonable starting estimate.
What is IP warming and how long does it take? +
IP warming is the process of gradually increasing sending volume from a new IP address to build reputation history at ISPs. New IPs start at 500–1,000 messages per day to major ISPs and double volume each week, reaching production capacity in 8–12 weeks. During warming, only the highest-engagement subscribers should be used — ISPs evaluate engagement signals during the warming window when building their initial reputation assessment of the new IP.
Do I need DMARC at p=reject for deliverability? +
Gmail gives inbox placement advantage to senders with enforced DMARC (p=quarantine or p=reject). Gmail's 2024 bulk sender requirements mandate a DMARC record (p=none minimum). Microsoft enforces DMARC at p=reject for Outlook.com, meaning messages that fail DMARC with p=reject will be rejected or silently dropped. DMARC at p=reject is not just a security measure — it is a deliverability requirement for sustained inbox placement at major ISPs.
What is the role of the campaign platform (MailWizz) vs the MTA (PowerMTA)? +
MailWizz handles campaign management: list management, subscriber segmentation, campaign scheduling, tracking (opens, clicks), unsubscribe processing, and reporting. PowerMTA handles delivery: accepting injected messages, managing the delivery queue, throttling per ISP, signing with DKIM, processing bounce responses, and logging every delivery event. MailWizz injects messages into PowerMTA via SMTP; PowerMTA handles everything from that point to the recipient's inbox.

Infrastructure assessment

We design and operate dedicated email infrastructure for high-volume senders. Contact us to discuss your architecture requirements.