NOTE: Please bookmark this page for system status information.
This server is not located in the main data center.

Server time: Thu Sep 29, 15:12:40 UTC +0000

2016-04-09: 18:16 UTC     New *.mxes.net certificate

*.mxes.net

MD5 Fingerprint:
4D:C8:D4:6E:B4:4F:EE:5E:57:F4:80:C6:1B:74:0D:B1

SHA1 Fingerprint:
21:A5:D7:31:E8:EC:A1:57:BB:8E:0D:F3:A0:02:31:FA:36:13:C9:83

SHA256 Fingerprint:
E1:9E:3D:5C:8D:39:AD:08:A0:3B:47:B7:E3:09:77:01:89:E3:61:D5:2F:F0:6F:13:BF:EB:53:09:8E:F5:37:63

2016-04-09: 15:17 UTC     *.mxes.net certificate problem

Please bear with us as we work to resolve a certificate security issue that may be causing "invalid certificate" warnings when trying to receive or send email. ETA for a fix is about two hours as of this message. Note that incoming email is not affected.

In the meantime, you can use https://webmail.tuffmail.net/ to access your email via webmail.

You may also accept the old certificate and continue to connect to the server as per normal if your client software is reporting this certificate fingerprint:
6F:F0:30:B6:31:6B:61:8E:2B:5F:F7:8F:B6:3F:73:D5:B8:5B:18:B3

UPDATE 2016-04-09 1:30 EDT (17:30 UTC)
Problem has been resolved.

2015-12-16: 06:18 UTC     Service disruption on 2015-12-15 due to Level3 Outage

A router failure on Level3's network yesterday (2015-12-15) caused intermittent service outages for some Tuffmail users, especially those on the East coast of the United States. The outage period lasted from between 18:18 GMT and 19:20 GMT (1:18pm EST and 2:20pm EST). Some Tuffmail users report having lost connectivity to the IMAP/POP and SMTP servers, as well as to webmail and the Account Manager, for 15-20 minutes within that outage window.

More information here: http://downdetector.com/status/level3/news/15450-problems-at-level3

2015-12-12: 04:23 UTC     Network congestion/service interruptions

We're investigating a networking-related problem that is causing intermittent service interruptions. We're working to resolve the situation and will post updates.

UPDATE 2015-12-12 2:46AM EST

The problem has been resolved - all services are back to normal.

2015-01-20: 10:47 UTC     Network congestion/service interruptions

Our upstream network provider is experiencing extremely high network loads, causing intermittent interruptions to all Tuffmail services. The issue is under active investigation and we expect a resolution within 1-2 hours. We thank you for your patience.

UPDATE 2014-01-20 8:15AM EST

The situation has been resolved. The duration of the service interruption lasted from approximately 5:25AM EST to 7:25AM EST.

UPDATE 2014-01-20 10:00AM EST

The problem has returned. One of our network providers is currently experiencing a major denial of service attack that is overwhelming their routers. Some customers will experience intermittent service disruptions in the form of slow or broken connections. Please stand by while we address the issue.

UPDATE 2014-01-20 1:25PM EST

All services should now be accessible and connections should be stable, however data transfer rates might be slower than normal, which would appear as slow email loading times and messages remaining in your outbox longer than usual.

2014-09-26: 19:26 UTC     Statement on Shellshock

Shellshock is the name given to a security vulnerability in the bash (Bourne-again shell) command-line interepreter that provides a simple pathway for a remote attacker to execute arbitrary commands on an affected machine.

None of the servers in our primary data center have the bash interpreter installed and as such they aren't vulnerable to this exploit. These are the systems that handle inbound email, IMAP/POP, SMTP, LDAP, ManageSieve, and webmail.

The VPS instances that we do use (for the main website and for this status page) don't have bash as the default shell and we're certain that they weren't exploitable. Regardless, these instances were immediately patched when we learned of the vulnerability on Wednesday.

2014-05-17: 19:09 UTC     Tuffmail website / webmail clients

The main tuffmail.com website and the webmail.tuffmail.com webmail clients are offline due to a hardware failure. Please use https://webmail.tuffmail.net/ while we work to resolve the situation.

2014-04-10: 20:37 UTC     Statement on Heartbleed

The older OpenSSL version we use for our production services isn't vulnerable to the Heartbleed bug, and so no customer data could have been captured from our systems using this exploit.

You can test our vulnerability to Heartbleed by using this tool:

http://filippo.io/Heartbleed/ (Try mail.mxes.net, smtp.mxes.net webmail.tuffmail.net)

2014-04-09: 05:00 UTC     New *.mxes.net Certificate

A new RapidSSL certificate was installed for mxes.net websites and SMTP/IMAP/POP3/LDAP/MANAGESIEVE services.

Certificate fingerprints:
SHA1: 6F:F0:30:B6:31:6B:61:8E:2B:5F:F7:8F:B6:3F:73:D5:B8:5B:18:B3
MD5: 84:12:EF:B3:22:C1:A4:B0:1C:B3:3C:EA:CA:CE:33:CE

2013-12-11: 20:23 UTC     Performance problems affecting mail access

A hardware issue is causing very slow mail loading times for some of our users. We will be swapping out the faulty hardware shortly. We expect the situation to be resolved within an hour. Thank you for your patience.

2013-04-10: 23:02 UTC     Network Maintenance

We will be switching our core networking equipment back to the primary power circuit at 1:00 a.m. EDT (5:00 a.m. GMT) on Thursday morning (April 11th). All services will be unavailable for 10-15 minutes..

This maintenance is the final phase of the power system upgrades at our data center.

UPDATE 2013-04-11 12:35 a.m. EDT
Maintenance is postponed until 2:00 a.m. EDT (approx 1.5 hours from now)

UPDATE 2013-04-11 2:30 a.m. EDT
The second phase of the power cutover has been successfully completed, with 10 minutes of downtime. Maintenance is complete.

2013-04-09: 23:05 UTC     Possible service outages

Our hosting facility wil be upgrading its main power systems on Wednesday, April 10th from 12:30 a.m. EDT (4:30 a.m. GMT) to 4:30 a.m. EDT (8:30 a.m. GMT).

During this time, there's a small possibility of temporary disruptions to all email services. Please check this page for updates.



Page delivered in 0.043568 seconds, 54 files included