2015-12-16: 06:18 UTC
Service disruption on 2015-12-15 due to Level3 Outage
A router failure on Level3's network yesterday (2015-12-15) caused intermittent service outages for some Tuffmail users, especially those on the East coast of the United States. The outage period lasted from between 18:18 GMT and 19:20 GMT (1:18pm EST and 2:20pm EST). Some Tuffmail users report having lost connectivity to the IMAP/POP and SMTP servers, as well as to webmail and the Account Manager, for 15-20 minutes within that outage window.
More information here:
2015-12-12: 04:23 UTC
Network congestion/service interruptions
We're investigating a networking-related problem that is causing intermittent service interruptions. We're working to resolve the situation and will post updates.
UPDATE 2015-12-12 2:46AM EST
The problem has been resolved - all services are back to normal.
2015-01-20: 10:47 UTC
Network congestion/service interruptions
Our upstream network provider is experiencing extremely high network loads, causing intermittent interruptions to all Tuffmail services. The issue is under active investigation and we expect a resolution within 1-2 hours. We thank you for your patience.
UPDATE 2014-01-20 8:15AM EST
The situation has been resolved. The duration of the service interruption lasted from approximately 5:25AM EST to 7:25AM EST.
UPDATE 2014-01-20 10:00AM EST
The problem has returned. One of our network providers is currently experiencing a major denial of service attack that is overwhelming their routers. Some customers will experience intermittent service disruptions in the form of slow or broken connections. Please stand by while we address the issue.
UPDATE 2014-01-20 1:25PM EST
All services should now be accessible and connections should be stable, however data transfer rates might be slower than normal, which would appear as slow email loading times and messages remaining in your outbox longer than usual.
2014-09-26: 19:26 UTC
Statement on Shellshock
is the name given to a security vulnerability in the bash (Bourne-again shell) command-line interepreter that provides a simple pathway for a remote attacker to execute arbitrary commands on an affected machine.
None of the servers in our primary data center have the bash interpreter installed and as such they aren't vulnerable to this exploit. These are the systems that handle inbound email, IMAP/POP, SMTP, LDAP, ManageSieve, and webmail.
The VPS instances that we do use (for the main website and for this status page) don't have bash as the default shell and we're certain that they weren't exploitable. Regardless, these instances were immediately patched when we learned of the vulnerability on Wednesday.
2014-05-17: 19:09 UTC
Tuffmail website / webmail clients
The main tuffmail.com website and the webmail.tuffmail.com webmail clients are offline due to a hardware failure. Please use https://webmail.tuffmail.net/
while we work to resolve the situation.
2014-04-10: 20:37 UTC
Statement on Heartbleed
The older OpenSSL version we use for our production services isn't vulnerable to the Heartbleed bug
, and so no customer data could have been captured from our systems using this exploit.
You can test our vulnerability to Heartbleed by using this tool:
(Try mail.mxes.net, smtp.mxes.net webmail.tuffmail.net)
2014-04-09: 05:00 UTC
New *.mxes.net Certificate
A new RapidSSL certificate was installed for mxes.net websites and SMTP/IMAP/POP3/LDAP/MANAGESIEVE services.
2013-12-11: 20:23 UTC
Performance problems affecting mail access
A hardware issue is causing very slow mail loading times for some of our users. We will be swapping out the faulty hardware shortly. We expect the situation to be resolved within an hour.
Thank you for your patience.
2013-04-10: 23:02 UTC
We will be switching our core networking equipment back to the primary power circuit at 1:00 a.m. EDT (5:00 a.m. GMT) on Thursday morning (April 11th). All services will be unavailable for 10-15 minutes..
This maintenance is the final phase of the power system upgrades at our data center.
UPDATE 2013-04-11 12:35 a.m. EDT
Maintenance is postponed until 2:00 a.m. EDT (approx 1.5 hours from now)
UPDATE 2013-04-11 2:30 a.m. EDT
The second phase of the power cutover has been successfully completed, with 10 minutes of downtime. Maintenance is complete.
2013-04-09: 23:05 UTC
Possible service outages
Our hosting facility wil be upgrading its main power systems on Wednesday, April 10th from 12:30 a.m. EDT (4:30 a.m. GMT) to 4:30 a.m. EDT (8:30 a.m. GMT).
During this time, there's a small possibility of temporary disruptions to all email services. Please check this page for updates.
2013-04-09: 21:12 UTC
Due to a hardware failure, the inbound delivery of some emails may be delayed for up to two hours.
2013-04-09: 19:31 UTC
Webmail and LDAP services are currently unavailable. ETA for restoration is approx 10 minutes.
UPDATE 2:52 p.m. EDT
ETA for webmail and LDAP restoration is 3:00 p.m. EDT