Service Alert: SSL Issue With iPhones

Following the disruption yesterday with the expiry of the * SSL certificate, we renewed the certificate last night.

However, for partners who are using their own domain but don’t have their own SSL certificate set up, this appears to be causing problems for iPhone users. Because the domain of the certificate does not match the domain the users are connecting to, the iPhone is complaining.

In the past, iPhones allowed you to accept this, but it would appear that Apple have removed this functionality and they are now complaining.

The simplest route around this is for the users to change their server settings to point at – this works for POP3, IMAP and SMTP.

EDIT: An update on this. It can be fixed by deleting the account on the iPhone/iPad etc, and re-adding it. That will keep things running for approx 3 years – at which time we’ll need to renew the certificate again and it’ll all break once more – unless Apple have fixed something by then.

Please accept our apologies for the inconvenience caused by all of this!

Service Alert: Password Security

Password Security

We are seeing a significant rise in customers’ email accounts being used to distribute spam, having had their account credentials compromised.

In many cases this has been purely down to simple, fairly obvious, passwords being used. Would you believe that we have 276 mailboxes that use ‘password’ as their password? Or 73 with the password 123456?

It’s important for all our customers that we minimise the potential of our mail servers becoming blacklisted, so where patterns of outbound sending indicate a compromised mailbox and the distribution of spam, we will block the account from sending out any further email until the password is changed and a virus scan on the end users equipment performed if required.

This helps mitigate against blacklisting, but isn’t perfect by any means as it’s reactive in nature.

Whilst we can’t improve on the way we identify compromised mailboxes, we can improve the tools we give Partners to re-enable outbound SMTP immediately following a block.

Currently we send out an alert when an account is locked and rely on you contacting us to re-enable. Add to that, any blocking we’ve done has been at account level, rather than individual mailboxes, so one compromised mailbox can lead to outbound emails being blocked for the whole account.

As of Tuesday 27th June we are implementing a new process for dealing with compromised accounts:

  • Blocks can now be applied at individual mailbox level, rather than account level. This means that only the affected mailbox will be restricted from sending, rather than all users on that account.
  • Our systems will now automatically unlock any affected mailboxes once the user, or administrator, has changed the password.
  • Next Tuesday all mailboxes with passwords we deem to be easily compromised (for example, using part of the email address) will be blocked from sending outbound email until their password has been changed. This will only affect a relatively small proportion of our overall customer base, but needs to be implemented as the issue of compromised email boxes is on the rise.

We very much hope you’ll welcome the changes we’ve made which, as well as giving more control to customers in the event their email credentials are compromised, it also encourages everyone to think a little more seriously about the security of their email!

Service Alert: WannaCrypt

I’m sure you’ve all heard the news over the weekend about this ransomware and the damage it has done to the NHS.

You’ll be pleased to know that both our AV engines were updated pretty promptly to block this virus. However, no-one seems entirely sure whether it was spread via email in the first place, or simply over the internet via SMB connections.

We also expect other people to get hold of this virus and start modifying it, so there may be some variants appearing over the coming days, and our AV engines will both be trying to update themselves as soon as new variants appear.

The best advice we can pass on is for users to continue to be vigilant, and if in doubt, don’t attempt to open an attachment. Also, get those Windows boxes updated asap. Please note this doesn’t affect Windows 10 or Mac users.