<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Management Archives - SurgeMail</title>
	<atom:link href="https://surgemail.com/article-categories/management/feed/" rel="self" type="application/rss+xml" />
	<link>https://surgemail.com/article-categories/management/</link>
	<description>Windows/Linux Mail Server Software</description>
	<lastBuildDate>Mon, 10 Jun 2024 03:46:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://surgemail.com/wp-content/uploads/2019/11/cropped-robot_80-32x32.png</url>
	<title>Management Archives - SurgeMail</title>
	<link>https://surgemail.com/article-categories/management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>News Letter January 2024</title>
		<link>https://surgemail.com/knowledge-base/news-letter-january-2024/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Tue, 16 Jan 2024 23:38:08 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=10304</guid>

					<description><![CDATA[<p>We've decided it's important to keep you all informed with an occasional/quarterly news letter to cover some of the new features and important changes that might affect your systems. You can unsubscribe by sending an email to newsletter-leave@netwin.co.nz or via https://netwinsite.com:7025/list/newsletter@netwin.co.nz As per usual much of our focus has been on stability and reliability, and<br /><a class="moretag" href="https://surgemail.com/knowledge-base/news-letter-january-2024/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/news-letter-january-2024/">News Letter January 2024</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We've decided it's important to keep you all informed with an occasional/quarterly news letter to cover some of the new features and important changes that might affect your systems.</p>



<p class="has-text-align-center"><strong>You can unsubscribe by sending an email to <a href="mailto:newsletter-leave@netwin.co.nz">newsletter-leave@netwin.co.nz</a> or via <a href="https://netwinsite.com:7025/list/newsletter@netwin.co.nz">https://netwinsite.com:7025/list/newsletter@netwin.co.nz</a></strong></p>



<p>As per usual much of our focus has been on stability and reliability, and fullfilling customer requests, however most of these you don't need to know about as you get the improvements simply by updating. </p>



<p>Be sure to check the config checker page to see new features that can be enabled as new features are rarely enabled automatically (since we insist on 100% forward/backward compatibility).  Lets hilight some important/useful items:</p>



<h2 class="wp-block-heading">g_phish_block</h2>



<p>Basically this keeps track of links in email messages and any that it doesn't recognize as 'safe' it replaces with a link that goes 'through' your website, to first warn the user that they are following a link which may or may not be safe.  It's a simple feature to greatly reduce the risk of users falling for phishing or other scams.  (Please update to the latest release before using this!)</p>



<h2 class="wp-block-heading">DKIM &amp; SPF</h2>



<p>Many major email providers are now requiring DKIM/SPF so if you have not yet added your own DKIM/SPF settings you should.  Essentially you need to turn on dkim signing, and add the DNS entries that surgemail then tells you to add (on the dkim config page).  See: <a href="https://surgemail.com/knowledge-base/sending-email-to-avoid-spam-filters-best-practices">https://surgemail.com/knowledge-base/sending-email-to-avoid-spam-filters-best-practices</a>/</p>



<h2 class="wp-block-heading">Config Checker tests</h2>



<p>On the main web page, and on the config test page you will now find some links to test your server for various common config issues. This helps you quickly assess if  you have your PORTS/DKIM/SPF/DNS entries setup reasonably well or not.  </p>



<h2 class="wp-block-heading">Smtp Smuggling - Security issue</h2>



<p>A new type of SMTP attack was recently discovered whereby a message can be hidden at the end of a normal email message, and the hidden message will be injected into the destination email server as if it was sent by the sending email server.  SurgeMail was also open to this type of attack (because we implemented the same extension to line endings followed by other major systems for compatibility).</p>



<p><br>The end result of this attack is generally not particularly significant, as it only really allows an already trusted sender to send a slightly more hidden message that may be hard to trace.  It's well worth closing this loophole so please update to version 77m currently in beta release: <a href="https://surgemail.com/beta-downloads/">https://surgemail.com/beta-downloads/</a> when it's convenient.</p>



<h2 class="wp-block-heading">SSL Updates</h2>



<p>SurgeMail includes a version of OpenSSL, and we update it in our build once every year or two, if you are running a version of surgemail more than 12 months old then it's wise to consider upgrading to fix this.</p>



<h2 class="wp-block-heading">Lets Encrypt</h2>



<p>note: If you are still paying for SSL certificates, please be aware that you really don't need to, the built in LetsEncrypt code in SurgeMail can create genuine SSL certificates for all your domains at no cost.  The only requirement is that the url in question does point to  the SurgeMail server and is accessable on port 80.  </p>



<h2 class="wp-block-heading">Unsubscribe</h2>



<p>You can unsubscribe by sending an email to <a href="mailto:newsletter-leave@netwin.co.nz">newsletter-leave@netwin.co.nz</a> or via <a href="https://netwinsite.com:7025/list/newsletter@netwin.co.nz">https://netwinsite.com:7025/list/newsletter@netwin.co.nz</a></p>



<p>You were added to this list as a customer who has installed SurgeMail at some point in the last few years. We appologize if you are not currently interested and encourage you to unsubscribe.</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/news-letter-january-2024/">News Letter January 2024</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SMTP Injection issue (crlf line termination)</title>
		<link>https://surgemail.com/knowledge-base/smtp-smuggling/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Sun, 14 Jan 2024 23:40:26 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=10283</guid>

					<description><![CDATA[<p>Case VU#302671: SMTP Smuggling This issue relates to "End of data sequence handling" or SMTP Injection. Traditionally SMTP servers have been 'flexible' with line termination, however, it was recently (2024) discovered that this leads to a possible injection exploit whereby users could possibly send messages with forged content/origin by exploiting the fact that some servers<br /><a class="moretag" href="https://surgemail.com/knowledge-base/smtp-smuggling/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/smtp-smuggling/">SMTP Injection issue (crlf line termination)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Case VU#302671: SMTP Smuggling </h2>



<p>This issue relates to "End of data sequence handling" or SMTP Injection.  </p>



<p>Traditionally SMTP servers have been 'flexible' with line termination, however, it was recently (2024) discovered that this leads to a possible injection exploit whereby users could possibly send messages with forged content/origin by exploiting the fact that some servers will see the end of message and others wont.  </p>



<p><strong>To fix this problem UPGRADE TO 7.8</strong></p>



<p>If a legacy client/fax system is sending LF characters, you need to whitelist them individually like this:</p>



<pre class="wp-block-code"><code><strong> g_lf_fix_list "1.2.3.4"</strong></code></pre>



<p>Legacy devices that rely on this behaviour should be exceedingly rare, and should normally be patched rather than relying on this exception setting.</p>



<p>This is a relatively low level security risk (so don't panic) but do upgrade at your earliest convenience.  </p>



<p>Other references:  CVE-2023-51764 postfix, CVE-2023-51765 sendmail, CVE-2023-51766 exim</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/smtp-smuggling/">SMTP Injection issue (crlf line termination)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Z-Push (ActiveSync)</title>
		<link>https://surgemail.com/knowledge-base/z-push-patch/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 22:46:06 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=7828</guid>

					<description><![CDATA[<p>z-push is an ActiveSync clone used to provide push notificiations for some Microsoft Email clients. It should never be used, always choose 'imap' instead, it is much much faster and better and more reliable. Z-Push's implementation of imap is not good, and on large email accounts it is not reliable. It gets into a 'loop'<br /><a class="moretag" href="https://surgemail.com/knowledge-base/z-push-patch/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/z-push-patch/">Z-Push (ActiveSync)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>z-push is an ActiveSync clone used to provide push notificiations for some Microsoft Email clients.</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained">
<p class="has-vivid-red-color has-text-color"><strong>It should never be used,</strong> always choose 'imap' instead, it is much much faster and better and more reliable.</p>



<p class="has-vivid-red-color has-text-color"> <strong>Z-Push's implementation of imap is not good, and on large email accounts it is not reliable. It gets into a 'loop' state and then bails completely in some situations.  We do NOT support this protocol. Even microsoft don't support activesync anymore <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></strong>. </p>
</div></div>



<p>If you have no choice, then you should use this patched version which fixes some serious performance issues.  Specifically it's more efficient and has some better defaults. </p>



<p>note: Z-Push is not actively supported, neither is ActiveSync, these are obsolete and should be avoided.</p>



<h2 class="wp-block-heading">What did we fix? (cough improve)</h2>



<ul class="wp-block-list">
<li>Most of these faults relate to 'real' systems, with many folders, each containing thousands of messages of various sizes.  On test systems these issues would not show up. On real systems it was simply broken. </li>



<li>Memory setting added to override random default on the system.</li>



<li>Memory headroom increased so it won't run out of memory when reading a single large message</li>



<li>Setting added to define the max size message that can be safely processed.</li>



<li>Messages above max size are not fetched!</li>



<li>When trying to find the list of existing messages in a folder, the original implementation would scan the headers of every message in the folder. When no headers are needed!  </li>



<li>Built in 'incredibly inefficient' overview imap command replaced with efficient one that just lists flags and uid's. </li>



<li>When updating folders the original implemenation would scan every folder on the system, (and scan the headers of every message in every folder).  And then repeat that step for each block of 100 messages.  Now it remembers which folder it was updating. </li>



<li>Enforced more conservative timeout limits.  This helps reduce the chance of multiple duplicate updates being initiated by an impatient client.  </li>



<li>Actual imap 'idle' command implemented so it can detect new messages in the INBOX efficiently.</li>



<li>While updating once a limit is reached the next update of all folders will continue at the one it was on rather than scanning all other folders 'again' first <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </li>



<li>We added the following php library to handle imap more efficiently:  https://github.com/petewarden/handmadeimap</li>
</ul>



<h2 class="wp-block-heading">How to install over an existing z-push installation</h2>



<p>wget https://github.com/chrispugmire/Z-Push/archive/refs/heads/develop.zip<br>unzip develop.zip<br>cd Z-Push</p>



<p>php install.php</p>



<p></p>



<h1 class="wp-block-heading">How to install this version of z-push from scratch</h1>



<p>mkdir /var/share/z-push<br>mkdir /var/lib/z-push<br>mkdir /var/log/z-push<br>wget https://github.com/chrispugmire/Z-Push/archive/refs/heads/develop.zip<br>unzip develop.zip<br></p>



<p>cd Z-Push<br>php install.php  # this coppies the files to /usr/share/z-push, it doesn't overwrite existing config.php files! </p>



<p># repace www-data with the account that apache runs as! <br>chown -R <strong>www-data</strong> /var/lib/z-push /var/share/z-push /var/log/z-push</p>



<h1 class="wp-block-heading"># apache2 config ubuntu...</h1>



<p>cp Z-Push/config/apache2/z-push.conf /etc/apache2/conf-available<br>cp Z-Push/config/apache2/z-push-autodiscover.conf /etc/apache2/conf-available</p>



<p>a2enconf z-push.conf<br>a2enconf z-push-autodiscover.conf<br>systemctl reload apache2</p>



<p></p>



<h2 class="wp-block-heading">Adjust the config files.</h2>



<pre class="wp-block-preformatted">cd /usr/share/z-push
edit config.php
     # add new settings
     ini_set("memory_limit","256M"); 
     define('MAX_MSG_SIZE',20); //  Units=MB

     # set backend provider inf config.php if not already set correctly...
     define('BACKEND_PROVIDER', 'BackendIMAP');

# set imap settings if not already set correct! 
edit backend/imap/config.php
     define('IMAP_SERVER', 'YOUR.MAIL.SERVER');
 </pre>



<h1 class="wp-block-heading">Surgemail Settings you should check</h1>



<p>This significantly improves performance: </p>



<p><strong>g_imap_status_stored "true"</strong></p>



<p></p>



<h2 class="wp-block-heading">Test APACHE config is working</h2>



<p>https://[your-server-name]/Microsoft-Server-ActiveSync</p>



<h2 class="wp-block-heading">Now configure Outlook to use ActiveSync</h2>



<p>This is hard to do because it's not in the normal outlook account setup, to get to the active sync option you do this:</p>



<p>Control Panel/ search for Mail / choose "Email Accounts" / choose "New" / Manual / Exchange ActiveSync...</p>



<h2 class="wp-block-heading">Now check the logs</h2>



<p>cd /var/log/z-push</p>



<p>tail -1000 z-push.log</p>



<p>tail z-push-error.log</p>



<h1 class="wp-block-heading">Run the monitor to see what z-push is doing</h1>



<p>/usr/share/z-push/z-push-top.php</p>



<h1 class="wp-block-heading">Commands that 'might' unjam a stuck z-push</h1>



<pre class="wp-block-preformatted"># These two seem fairly safe and are a reasonable first thing to try...
/usr/share/z-push/z-push-admin.php -a clearloop

# commands that would reset zpush completely, (not recommended)
/usr/share/z-push/z-push-admin.php -a remove -u user@domain.name

# manually fix states (causes refetch of all messages)
/usr/share/z-push/z-push-admin -a fixstates

# completely WIPE the zpush state folders...
rm -r /var/lib/z-push/*

# If all else fails delete the account from exchange and recreate it! This often gets rid of a whole bunch of errors. </pre>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/z-push-patch/">Z-Push (ActiveSync)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Back Scatter (Backscatter)</title>
		<link>https://surgemail.com/knowledge-base/back-scatter/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Sun, 04 Jul 2021 23:53:12 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=4586</guid>

					<description><![CDATA[<p>There are many situations where apparently harmless back scatter (bounces from incoming email) can cause your server to be blacklisted. To minimize the chances of this please do the following Use the config checker and apply the recommended settings Make sure you have g_friends_safer "true" Make sure you ahve g_responder_safer "true" In addition you should<br /><a class="moretag" href="https://surgemail.com/knowledge-base/back-scatter/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/back-scatter/">Back Scatter (Backscatter)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>There are many situations where apparently harmless back scatter (bounces from incoming email) can cause your server to be blacklisted. To minimize the chances of this please do the following</p>



<ol class="wp-block-list" id="block-7e4615d9-ad21-4d34-8bfe-1fb9705c31d3"><li>Use the config checker and apply the recommended settings</li><li>Make sure you have g_friends_safer "true"</li><li>Make sure you ahve g_responder_safer "true"</li></ol>



<p id="block-f2d99052-f204-4149-9c79-9ed46468c722">In addition you should consider banning forwarding settings to problem domains, e.g.<br>forward_illegal to="*@gmail.com" apply="user"</p>



<p id="block-11d07494-830e-429f-a1cf-502a04b67611">This rule prevents users adding a forwarding rule to a gmail account. You might do this if gmail is seeing incoming forwarded spam from your server and blacklisting it.</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/back-scatter/">Back Scatter (Backscatter)</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Domain defaults</title>
		<link>https://surgemail.com/knowledge-base/domain-defaults/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Mon, 17 May 2021 21:55:02 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=4272</guid>

					<description><![CDATA[<p>When you create a new domain the defaults are taken from a config file domain_defaults.txt which must be in the 'web' folder. This file contains only basic settings in the form: &#60;setting_name>&#60;space>&#60;setting_value> e.g. quota_default 100mbssl_require_login true</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/domain-defaults/">Domain defaults</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When you create a new domain the defaults are taken from a config file domain_defaults.txt which must be in the 'web' folder.</p>



<p>This file contains only basic settings in the form:</p>



<p>&lt;setting_name>&lt;space>&lt;setting_value></p>



<p>e.g.</p>



<p>quota_default 100mb<br>ssl_require_login true</p>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/domain-defaults/">Domain defaults</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Oauth 2.0 support</title>
		<link>https://surgemail.com/knowledge-base/oauth/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Thu, 13 May 2021 22:18:12 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=4265</guid>

					<description><![CDATA[<p>You will need the following settings: g_oauth_client_id "idcode" g_oauth_client_secret "secretcode" g_oauth_trim "true" - Trim @domain.name from user before lookup g_oauth_url "http://your.oauth.endpoint/oauth.php" g_authent_lookup "true" - If set then oauth is used as password check as well as account existence. With the above settings surgemail will use nwauth to store most details about user accounts, but will<br /><a class="moretag" href="https://surgemail.com/knowledge-base/oauth/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/oauth/">Oauth 2.0 support</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You will need the following settings: </p>



<p>g_oauth_client_id "idcode" </p>



<p>g_oauth_client_secret "secretcode" </p>



<p>g_oauth_trim "true"  - Trim @domain.name from user before lookup</p>



<p>g_oauth_url "http://your.oauth.endpoint/oauth.php" 
</p>



<p>g_authent_lookup "true"  - If set then oauth is used as password check as well as account existence.  </p>



<p>With the above settings surgemail will use nwauth to store most details about user accounts, but will check for existence, and passwords with the oauth server.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/oauth/">Oauth 2.0 support</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SMS Twilio Gateway</title>
		<link>https://surgemail.com/knowledge-base/sms/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 01:55:56 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=4094</guid>

					<description><![CDATA[<p>By simply creating a Twilio account and adding the necessary details into surgemail.ini you can instantly get SMS Notification and Password recovery features. This lets users send themselves notification's based on incoming email messages that match certain criteria. And use SMS for password recovery if they forget their login details. A free Twilio trial account<br /><a class="moretag" href="https://surgemail.com/knowledge-base/sms/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/sms/">SMS Twilio Gateway</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>By simply creating a Twilio account and adding the necessary details into surgemail.ini you can instantly get SMS Notification and Password recovery features. This lets users send themselves notification's based on incoming email messages that match certain criteria.  And use SMS for password recovery if they forget their login details. A free Twilio trial account can even be used to test this with.  </p>



<h3 class="wp-block-heading">Create a Twilio account</h3>



<p class="has-text-align-center"><a href="http://www.twilio.com/referral/IyV7Sz" data-type="URL" data-id="www.twilio.com/referral/IyV7Sz">https://www.twilio.com/try-twilio</a></p>



<p>(Note the above link is a referral link).</p>



<h3 class="wp-block-heading">Copy your SID, Token and Phone number.</h3>



<p>Login to your Twilio console, on the dashboard you will find:</p>



<div class="wp-block-group has-pale-cyan-blue-background-color has-background"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<p>Account SID:  xxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p>



<p>Auth Token: xxxxxxxxxxxxxxxxxxxxxxxxxx</p>
</div></div>



<p>And if you go to the phone numbers tab, you should have a phone number, if not you will need to add one:</p>



<div class="wp-block-group has-pale-cyan-blue-background-color has-background"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<p>Phone Number +1xxxxxxxxxx</p>
</div></div>



<p>Copy these three things into your surgemail.ini settings:</p>



<div class="wp-block-group has-vivid-green-cyan-background-color has-background"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<pre class="wp-block-preformatted"><code>g_twilio_from "+13xxxxxxx"</code>
<code>g_twilio_sid "ACxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"</code>
<code>g_twilio_token "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"</code></pre>



<p></p>
</div></div>



<h3 class="wp-block-heading">Test the SMS gateway is working</h3>



<p>tellmail sms_test +1nnnnnnnnn (your cell phone number)</p>



<p>Within 30 seconds you should get a test message.  </p>



<h3 class="wp-block-heading">Configure your personal phone number</h3>



<p>Lookup your account, click on 'password' and configure your SMS number, or in the admin console just fill in the 'sms_to' setting, be sure to specify your full phone number including + and international code, e.g. for U.S. numbers +1.... for New Zealand it would be +64....</p>



<p class="has-text-align-center">https//your.server/cgi/user.cgi</p>



<h3 class="wp-block-heading">Test the SurgeWeb forgot link</h3>



<p>Now if you go to surgeweb login and press 'forgot' you should be able to use an SMS confirmation to reset your password:</p>



<p class="has-text-align-center">http://your.server/surgeweb</p>



<h3 class="wp-block-heading">Add SMS notification rules</h3>



<p>First add user_sms "true" to each domain:</p>



<p class="has-text-align-center"><strong>user_sms "true"</strong></p>



<p>Lookup your account, go to the 'sms' config page, and add a rule.</p>



<p class="has-text-align-center"><strong>if Subject contains Urgent </strong></p>



<p>Now send yourself an email with the subject "Urgent issue". It should arrive on your phone. </p>



<h3 class="wp-block-heading">Configure a quota rule</h3>



<p>Add a default number of messages per user per day, this is a domain level setting so will need to be added to each domain:</p>



<p class="has-text-align-center"><strong>user_sms_quota initial="10" period="24"</strong></p>



<p>Typically SMS messages cost about 1 cent, so factor this into your cost structure to decide what sort of limits you need.  This limit only applies to the notify feature.  Password resets do not count against the users SMS quota.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/sms/">SMS Twilio Gateway</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>g_url_redirect</title>
		<link>https://surgemail.com/knowledge-base/g_url_redirect/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Fri, 26 Mar 2021 01:48:11 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=3879</guid>

					<description><![CDATA[<p>g_url_redirect – Sends http 301 redirect to tell browser resource has moved Typical usage to move users from http to https automatically, e.g. g_url_redirect from=”http://*/surgeweb” to=”https://%1:7443/surgeweb” ports=”80,7080″ Or you may wish to change the default page to webmail, e.g. g_url_redirect from=”/” to=”/surgeweb” ports=”443,80″ Syntax: g_url_redirect from=string to=string ports=string</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/g_url_redirect/">g_url_redirect</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading" id="g-url-redirect-sends-http-301-redirect-to-tell-browser-resource-has-moved">g_url_redirect – Sends http 301 redirect to tell browser resource has moved</h3>



<p>Typical usage to move users from http to https automatically, e.g. g_url_redirect from=”http://*/surgeweb” to=”https://%1:7443/surgeweb” ports=”80,7080″</p>



<p>Or you may wish to change the default page to webmail, e.g.</p>



<p>g_url_redirect from=”/” to=”/surgeweb” ports=”443,80″</p>



<p>Syntax: g_url_redirect from=string to=string ports=string</p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/g_url_redirect/">g_url_redirect</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MTA-STS support</title>
		<link>https://surgemail.com/knowledge-base/mta-sts-support/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Thu, 25 Mar 2021 22:15:30 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=3876</guid>

					<description><![CDATA[<p>(MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a signed certificate. G_MTASTS "True" Enable MTA-STS ssl/tls rules. This uses DNS entries<br /><a class="moretag" href="https://surgemail.com/knowledge-base/mta-sts-support/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/mta-sts-support/">MTA-STS support</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>(<strong>MTA</strong>-<strong>STS</strong>) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a signed certificate.</p>



<p>G_MTASTS "True" </p>



<p>Enable MTA-STS ssl/tls rules. This uses DNS entries to discover if receiving server should have a signed SSL certificate" </p>



<p>G_MTASTS_WHITE "xyz.com,fred.com"</p>



<p>Domains to ignore MTA-STS rules, Whitelist for destination domains we should just send to anyway even if MTA-STS suggests otherwise.</p>



<p>G_MTASTS_REPORT "true" </p>



<p>Alert manager on MTASTS failures. Most failures will be due to something other than real hackers, so this alert helps you resolve issues, and add whitelist rules g_mtasts_white settings for problem domains</p>



<p>In addition you may wish to add your own MTA-STS file to your domain to enforce your own policy.  </p>



<p>The url you need to create should be:</p>



<pre class="wp-block-preformatted"><a href="https://mta-sts.user.example/.well-known/mta-sts.txt">https://mta-sts.YOUR.DOMAIN/.well-known/mta-sts.txt</a>" </pre>



<p>And in that file you should have something like:</p>



<pre class="wp-block-code"><code>version: STSv1
mode: enforce
mx: mail1.your.domain.com
mx: mail2.your.domain.com
max_age: 604800</code></pre>



<p>If mta-sts.your.domain points to your surgemail server!, then you could place this file in the folder:  (surgemail home)/www/.well-known</p>



<p>You must also add a dns 'txt' record for your domain:</p>



<p><code>_mta-sts.</code>your.domain.com  "v=STSv1; id=20240610T010101;"</p>



<p>If your policy changes you must update the id FIELD.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/mta-sts-support/">MTA-STS support</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Twofactor Authentication 2fa</title>
		<link>https://surgemail.com/knowledge-base/twofactor-authentication/</link>
		
		<dc:creator><![CDATA[chrisp]]></dc:creator>
		<pubDate>Wed, 24 Mar 2021 20:51:04 +0000</pubDate>
				<guid isPermaLink="false">https://surgemail.com/?post_type=ht_kb&#038;p=3865</guid>

					<description><![CDATA[<p>To enable two factor authentication set &#160;g_pass_twofactor “true”&#160;then the users can enable two factor authentication in their user self admin interface: https://your.mail.server/cgi/user.cgi The user can then specify what level of two factor authentication they wish, as imap smtp and pop were never intended to use this type of authentication it only works really well for<br /><a class="moretag" href="https://surgemail.com/knowledge-base/twofactor-authentication/">+ Read More</a></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/twofactor-authentication/">Twofactor Authentication 2fa</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>To enable two factor authentication set &nbsp;g_pass_twofactor “true”&nbsp;then the users can enable two factor authentication in their user self admin interface:</p>



<p>https://your.mail.server/cgi/user.cgi</p>



<p>The user can then specify what level of two factor authentication they wish, as imap smtp and pop were never intended to use this type of authentication it only works really well for surgeweb logins.  But it can still add a layer of security for the others as well. </p>



<p>The user.cgi page allows users to also create or delete application passwords for legacy applications (normal desktop email clients).  </p>



<p>Alternatively the setting g_pass_twofactor_merged "true", can be used, then the user logs into legacy applications with their regular password+twofactorcode. So lets say your password is 'secret' and your 2fa app was showing code '1232", you would enter "secret+1232" as your password, it would then work as normal for a few hours, and then it would require the password to be entered again.</p>



<p>Lets be blunt, legacy applications (all normal email clients) are not designed to be used with two factor authentication, so it's a question of 'which cludge do you wish to use'.  Both are much more secure than not having 2 factor authentication, but not nearly as secure as true 2fa.  And both add a level of inconvenience. </p>



<p></p>



<p></p>
<p>The post <a rel="nofollow" href="https://surgemail.com/knowledge-base/twofactor-authentication/">Twofactor Authentication 2fa</a> appeared first on <a rel="nofollow" href="https://surgemail.com">SurgeMail</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
