Tip: All changes are tracked in the Gateway documentation, see the information in the last row of the documentation agreement.

13.0.15 Bugfix release


Admin

Import certificates with keys failed

Due to a bug, the import of certificates with keys failed. This is fixed now.


Clustering

clusterd does not execute cluster commands

An error in a daemon process meant that commands sent by one cluster member to another cluster member were not executed. This also prevented new cluster members from being added. This is fixed now.


Large Files

fsck of the LFT partition

Several problems have been fixed with this bugfix, e.g. not all data was synchronised in cache mode.


Rule Engine

ARC Sealing should use ExO authres header in parallel mode

With 13.0.14 SEPPmail has included the result of the SPF check in the ARC seal. However, if Exchange Online is connected in parallel, there is the problem that the mail no longer comes from the original sender but from Microsoft and therefore the SPF check will fail. In this case (an incoming mail coming from Exchange Online) SEPPmail now uses the result, i.e. the Authentication-Results header from Exchange Online, to generate the ARC seal. This should also solve the problems with invalid or missing SPF results in the ARC seal in the case of a parallel connection.

New option "Domain is parallel connected" in the Managed Domain Settings

Checkbox "Domain is parallel connected"


Uninterrupted reload upon reconfiguration

Previously, when the RuleEngine received a new ruleset, it was completely restarted. This led to mails being rejected due to the unavailability of the RuleEngine, especially under high load. With the new uninterruptible reload, there are no more interruptions in mail processing.


Change content type for attached PG keys to application/pgp-keys

In the past, PGP keys were attached to a mail as content type "text/plain". From now on, "application/pgp-keys" is used.


Webmail

Better criteria to decide if a GINA user is registered or not

The problem was that under very specific circumstances the two recognition features that were used during the password reset to recognise whether a user was already fully registered were not set, but the user was already registered. As a result, the user was processed as unregistered. The query as to whether the user is registered has been improved.


Interpret SMS feedback from Clickatell

With this issue, Clickatell has been added to the list of supported SMS services.


Mobile number can not be saved when "Authenticate local users as GINA users" is selected

There was an error where the phone number for a user was not saved. This has now been corrected.


GINA "download all" is not able to properly handle UTF8

When downloading all attachment of a GINA mail at once, an incorrect encoding was used during ZIP file creation, so file names with e.g. umlauts were displayed incorrectly in the archive. This is fixed now.


13.0.14 Bugfix release


Addin

Safari on Apple: cannot upload a ZIP when importing x509 certificates - ZIP is not allowed as file type

When importing a ZIP file with X.509 certificates in the Admin GUI, it was not possible to select ZIP files in the browser selection dialogue. In most browsers you can override this by specifying that all files should be displayed, but not on Apple. This is why ZIP is now also in the list of formats for the import.


Cfgserver

CfgServer children also should change the logfile if the logfile gets rotated

Detailed Description:

Until now, the SEPPmail Gateway has not paid attention to the fact that if the CfgServer log file rotates and a new log file is opened, an asynchronous task, i.e. one that is executed in the background, would also have to reopen the log file. This is done now.


Directory services

Extension of the GINA user LDAP query

Detailed Description:

It is now possible to allow local users, that is those who belong to a managed domain, to log in to the Webmail GUI. To do this, you must activate "Internal authentication" in the managed domain. If you use the mail processing groups, only users who belong to one of the selected mail processing groups are allowed to do so. If no mail processing group is selected, all users of the managed domain may authenticate themselves.

Internal webmail authentication

Allow internal authentication

In the GINA accounts, you can now see which type of authentication was used to create the account.

Show users created by authentication

Show users created by authentication

Available values:

This information is not yet available for existing accounts, so they are displayed as unknown.


Large files

Expiration of LFT and GINA Cache mode are confusing users

Both the cache mode and LFT have expiry dates. To prevent confusion regarding these dates, the link for the cache mode in an LFT message now expires at the same time as the LFT message itself.


Mail transport

Sort backend UUIDs to prevent balancer restart in connector.pl

Detailed Description:

The problem here was that there were at least 3 cluster members in a cluster and our load balancer was switched on at the same time. As the entries in the queries to the DB were not always in the same order (unless requested, which we only do if necessary), the command we generated for the load balancer changed from time to time. As we used this command to find out whether something had changed on the load balancer and the command was always different, the load balancer was restarted again and again. However, as the mails are transferred to the RuleEngine via the load balancer and the RuleEngine therefore also communicates the successful processing of the sending page via the balancer, problems arose when the balancer was restarted and the RuleEngine was currently processing a mail. The result were always so-called "queue file write error" messages. Now SEPPmail Gateway sorts the response of the DB and the load balancer command only changes if something has really been changed.


MPKI

MPKI integration with Microsoft PKI - certificates converted to PEM

Detailed Description:

This bugfix is a correction in the SCEP MPKI Connector. The certificates are now always converted to PEM so that the SCEP MPKI Connector can process them.


MPKI integration with Microsoft PKI - configuration data

Detailed Description:

The SCEP MPKI connection did not work because the wrong data was used in the code. Now the correct configuration data is used.


Improve the error message in case a SwissSign Cert cannot be issued; currently always only "Bad Request"

Detailed Description:

In the past, SEPPmail only correctly decoded the status messages in the response from SwissSign if the HTTP response had a 200 code. However, in the event of an error when issuing a new certificate, SwissSign issues a 400 code, which was not decoded. This is now fixed and the status messages are correctly decoded.


Detailed Description:

DigiCert and CertCentral actually allow you to use the name of the user for the CN of a certificate to be issued. Unfortunately, this always leads to problems because it is not entirely clear in which encoding the other party wants to have the name. To avoid the whole problem, SEPPmail Gateway now always sets the CN to the e-mail address.


DigiCert CertCentral - Selection for S/MIME certificate type/contract possible

Detailed Description:

You can now select the certificate type or contract in the CertCentral MPKI connector. The API key and Org-ID are also verified.

Select DigiCert CertCentral type/contract

Select DigiCert CertCentral type/contract


Operating System

Creating a tmp partition when setting up a machine

Detailed Description:

During installation, a partition is now assigned to /tmp.


Rest API

Various errors with disclaimer - 13.0.13

Detailed Description:

A bug in the RestAPI prevented the -NONE- disclaimer from being saved in a managed domain. This is possible now.


Wrong value for initial password recipient

Detailed Description:

An error in the RestAPI caused data to be ignored and the information for "initial password recipient" not to be saved. This is fixed now.


GINA rest internal server error on PUT with languageSettings

Detailed Description:

An error in the RestAPI prevented the saving of language settings. This is possible now.


Rule Engine

ARC Sealing should also include SPF check

Detailed Description:

Before SEPPmail adds the ARC seal to the mail, it now performs an SPF check and adds the result to the Authentication-Results header so that the ARC seal contains the result of the SPF check.


Always add Job-ID to "ok, queued as ..." messages

Detailed Description:

Postfix has its own job ID for each mail with a queue ID and SEPPmail has a different, consecutive number. Normally a log line is output containing the Postfix queue ID and the SEPPmail job ID so that a connection can be established later. The error so far was that SEPPmail assumed a 6-digit job ID, i.e. the log line was only added from mail 100000 due to a faulty regex. Now the log line is available from mail 1.


SEPPmail does not recognise customer licence limit correctly

Detailed Description:

The LDAP filter to determine the licence limit for Customer was faulty and as a result, the limit was not calculated correctly. This has now been fixed.


SMTP Authentification on 13.0.9

Detailed Description:

Previously, a user who authenticated himself to SMTP via user/password was still prevented from relaying if the "originator orgs" setting was configured for his managed domain. When a user now has authenticated himself via SMTP, this is recognised as a sufficient characteristic for relaying.


Case ignore domain comparison in ARC module

Detailed Description:

A 3rd party module used by SEPPmail Gateway compares a lower-case domain name with a passed domain name. This led to problems if the passed domain name contained capital letters. SEPPmail now also passes lower-case, so that the comparison can be performed correctly.


Parsed address "" does not match literal address

Detailed Description:

Processing in the RuleEngine using a regular expression caused a problem if the mail address contained a special character that is relevant for regular expressions. In this case the '+', which corresponds to the quantifier "one or more times". Now the mail address is correctly escaped so that these special characters are no longer interpreted by the regex.


Creation of e-mail addresses with & fails

Detailed Description:

Until now, the RuleEngine prevented the automatic creation of users from containing an '&' in a mail address. From now on, we support all characters that may appear in a mail address, including '&'.


SMIME

SMIME 4 support (RFC 8550 & RFC 8551)

Detailed Description:

In order to use SMIME 4, a different cipher is required for the encryption, which also takes the integrity of the data into account. This way, the data is not only encrypted but any manipulation of this data is also noticeable. This is supported with the newly supported GCM ciphers.

List of supported ciphers for encryption

List of supported ciphers


DKIM signature problem of a customer

Detailed Description:

After the configuration of DKIM in the Admin GUI, a DNS lookup and comparison with the public DKIM key takes place. In the past, accidentially included line breaks in the entered DKIM key broke this comparison. The DNS lookup can now handle line breaks.


Webmail

Texts for cache mode

Detailed Description:

It was previously not possible to configure the texts for the cache mode for the carrier mail. This is now possible. The text is handled in the same way as normal GINA texts.


Missing subtitle with active cache mode

Detailed Description:

The subtitle was missing in the carrier mail in cache mode. This is fixed again now.


No GINA reply with attachment possible

Detailed Description:

This fixes a bug where a reply with a GINA message attachment was not possible in the GINA GUI.


CA signed S/MIME domain certificates have a faulty PEM structure after the download and cannot be imported

Detailed Description:

Previously, when a domain certificate was downloaded via the GINA GUI and this certificate was issued by the local CA, SEPPmail first wrote the local CA certificate to the resulting PEM file and then the domain certificate. This leads to problems with some systems, as they first (or sometimes only) regard the first certificate in the file as the relevant one and therefore use the CA certificate instead of the domain certificate. Now the order is reversed so that the domain certificate is written first.


Download all LFT attachments at once

Detailed Description:

In the GINA GUI it is now possible to download all attachments at once as a ZIP.

Download all attachments as ZIP

Download all attachments as ZIP via "Save as"


Missing Header Cache-control

Detailed Description:

The Cache-Control HTTP header was added for GINA.


Add webmail domain information to the SEPPCache folder information

Detailed Description:

In cache mode, it can be specified for each GINA domain how long the mails should be cached. Unfortunately, the mails in the cache lacked information about which GINA domain they belonged to and so the cached entries were deleted from GINA domains that were not actually allowed to do so, as these entries did not belong to them. The domain affiliation is now taken into consideration.


13.0.13 Bugfix release


Admin

Fix display issue of utf8Strings in certificate DirectoryStrings

Detailed Description:

There was a display issue, mainly for the detail view of certificates. The problem was that SEPPmail never handled UTF8 encoded DirectoryStrings properly after parsing the ASN1 structure of an X.509 certificate. This is fixed now.


Inlines and attachments in the disclaimer cannot be be removed

Detailed Description:

Due to a bug, it was temporarily not possible to delete attachments and inlines in configured disclaimers. This is now possible again.


Standardisation of logs in relation to the identification of certificates

Detailed Description:

In the log lines that list which mechanisms were used for encryption or signing, only the issuer and the serial number of the certificate used were output in the past. Now SEPPmail also searches for the certificate in the database and outputs the SHA256 fingerprint if available. This is done because the SHA256 fingerprint is used everywhere in the Admin GUI as an identification feature, making it easier and standardised to search for the certificates used.


Wrong certificates offered for download via GINA interface

Detailed Description:

If no CA has been configured on the SEPPmail Gateway and a domain certificate is created for a managed domain, the certificate is signed/created by an internal fallback CA. As this is not trustworthy, we prevent the download of a domain certificate created with this CA via the GINA GUI.


Background tasks

OCSP Proxy - Error

Detailed Description:

A slash '/' was probably erroneously appended to the end of the proxy URL for the OCSP proxy. This led to problems. Therefore the '/' has now been removed.


Rule engine

A message->dup inside deliver results in only processing not duplicated message

Detailed Description:

In the "deliver" function in the RuleEngine there was an error when

  1. it was an incoming mail
  2. this mail went to more than one recipient belonging to different domains
  3. this mail was DKIM-signed

If all these conditions were met, the mail was previously split into several mails (per domain) but only handled correctly for one domain. The others were simply processed further in the RuleEngine. With the correction, all mails are now processed.


Postfix:Inject.pm does not work (in version 13.0.12)

Detailed Description:

The vulnerability SMTP smuggling was fixed in one of the previous versions by an update and patch of Postfix, so that SEPPmail rejects corresponding mails. In the case of a "reprocessed" mail, however, SEPPmail itself didn't behave correctly and so Postfix rejected our own mails. With the fix, the "reprocess" works again because the line endings are correctly set to CRLF.


Managed domain is not recognised if the user has umlauts in their name (in version 13.0.12)

Detailed Description:

With 13.0.12 SEPPmail has introduced a new module for parsing mail addresses. However, this had problems with mail address details with display names and resulted in no mail address being recognised. This is fixed now and mail addresses are detected correctly again.


13.0.12 Bugfix release


Admin

Display Error with "Autopublish switched off"

Detailed Description:

If the setting "Create S/MIME domain keys for managed domain encryption and send public key to vendor pool: Use Domain Settings" (for new oder existing domains) was selected, the setting "Autopublish switched off" remained checked, although the function was actually active. This was a display error and is fixed now.


Database

Better maxsize value for MDB installations (fixing an SEPPmail 13.0.11 issue)

Detailed Description:

With 13.0.11, we have changed the behaviour of LDAP to make a checkpoint every minute. This causes, especially on some hardware appliances, a hiccup of up to 15-20 seconds which will influence the system's accessibility, its hardware clock (sometimes) and therefore the whole performance. This has to do with the maximum size of LDAP database or at least correlates with it. Some customers have only 200MB data in their DB but we allocated a 100GB database. Syncing this 100GB takes much longer than just a 2GB database. Therefore, SEPPmail Gateway now creates the maximum size value in a more differentiated way instead of allocating the entire partition.


MPKI

CertCentral issuing for sub domain fails

Detailed Description:

There was an error in SEPPmail Gateway so subdomains were not handled. Because of this is was not possible to issue new certificates for subdomains of validated domains. This is fixed now.


Rule Engine

Incoming E-mail was recognised as outgoing

Detailed Description:

The error was that some incoming E-mails with unusual but valid mail addresses were falsely categorized and processed as outgoing. The reason was that the E-mail addresses could not be parsed and therefore SEPPmail Gateway did not get the domain name and could not look up the managed domain. The E-mail address parsing has been improved now.


13.0.11 Bugfix release


CFGServer

Control/Ruleset has to send HUP to SMTPd.pl

Detailed Description:

There was an error in the restart behavior of the RuleEngine after a RuleSet change. This is fixed now.


MPKI

Error in PKCS7 parsing prevents adding of issued certificate

Detailed Description:

If a new certificate was obtained via the MPKI, it usually arrives in PKCS7 format. The parser which processed the certificates contained in the PKCS7 had an error and ignored the new certificate, so it was not imported. This is fixed now.


13.0.10 Bugfix release


Admin

Could not add managed domain xyzabc.dkfz.org: no smarthost specified

Detailed Description:

Due to an error in version 13.0.9, entering a smarthost was mandatory when creating a managed domain. Now the smarthost can be left empty as usual.


Detailed Description:

In the Logs screen, there was a wrong link to "Delete mail log archive cache". The link is now corrected to "Delete mail log archive index".


Display error with German Umlauts in the full name

Detailed Description:

There was a display error in the SEPPmail Gateway Admin GUI with German Umlauts in the user's full name. This is fixed now.


Mail System

Unexpected formatting behavior of IP addresses in 13.0.9

Detailed Description:

As of 13.0.9, the IP addresses in "Mail System" > "Relaying allowed" unexpectedly asked for a different formatting pattern. This is fixed now back to the original behavior as in 13.0.7.


Mail transport

GINA reading confirmation only arrived randomly

Detailed Description:

When connecting the SEPPmail Gateway to Microsoft 365/Exchange Online, signatures that have already been checked should always be truncated, because when Microsoft checks the content of the email, it may be changed and the signature would be destroyed. Furthermore, a possibly existing ARC seal could be damaged if an S/MIME signature is present. This in turn would result in an email being mistakenly placed in the Office 365 quarantine.


Pentest

Patch for SSH Security Risk "Terrapin"

Detailed Description:

There was an update for OpenSSH in December fixing a security issue. Since there were no patches for the OpenSSH version used in the old releases, SEPPmail had to update to version 9.5 and use the patches for this version.


Rule engine

Set default headers for ARC to default

Detailed Description:

To stay in sync with the default implementation, SEPPmail Gateway now will only use the following headers for the ARC signature: "content-transfer-encoding:subject:from:to:content-language:user-agent:mime-version:date:message-id". Even if the header does not exist in the mail, SEPPmail Gateway will add the header to the signature to detect if someone added it afterwards.


More intelligent generation of new message IDs when splitting in the Rule Engine

Detailed Description:

In the past, the SEPPmail Gateway used a random value to generate new Message ID header values from the old Message ID header, by appending the random value to the end of the old value. In the case of retransmissions/double deliveries, this caused the receiving mail server to process the retransmission as a separate new mail instead of ignoring it because there was already a message with this Message ID. As of 13.0.10, reproducible Message IDs are created when a new message is generated.


ARC Sealing with Master ARC Key sets incorrect header information

Detailed Description:

There was a bug with the usage of the master ARC key. Now, when using the master ARC key, the configured domain of the master ARC key is used.


Correction of character set encoding/decoding for user names during MPKI certificate creation

Detailed Description:

The bug "Display error with German Umlauts in the full name" described in the Admin section above also had effects on the automatic certificate creation in the RuleEngine. This is also fixed now.


Webmail

GINA reading confirmation only arrived randomly

Detailed Description:

Despite enforced reading confirmation in GINA, the confirmation was not always sent. This is fixed now.


13.0.9 Bugfix release


Admin

User statistics are also deleted when removing a user

Detailed Description:

When removing users, statistic data is also deleted from now on. This prevents the behavior that if you delete and recreate a user, the statistics data of the original user is shown. Now the statistics are reset and a new user has under no circumstances statistics of a deleted user.


Mail Transport

Outgoing mailserver not used

Detailed Description:

Under certain conditions, the configured outgoing server was not used anymore after an upgrade to 13.0.8.


Rule engine

Optimized exception handling for DKIM

Detailed Description:

DKIM checks require DNS lookups. As we have no control over the duration of the query, we adapted the Log message to understand this was a DNS query timeout.

DKIM error because of DNS lookup error

A log entry showing the issue we fixed


Webmail

Initial password is sent to GINA sender when GINA mail is read.

Detailed Description:

In situations when the delivery and the reading of a GINA mail has a broader time span, the information about the initial password may have been lost between sender and recipient. This can be avoided when the initial password email is sent in the moment when the GINA recipient opens the mail for the first time. This is when the password is needed and this is the moment it is generated.


13.0.8 Bugfix release


Admin

Possibility to input 0.0.0.0/0 as a relaying network

Detailed Description:

It is now possible to enter the network 0.0.0.0/0 as the relaying network in the managed domain settings to enable the sending of e-mails from an external web server, for example. Please use with care.


Standardisation of logs in relation to the identification of certificates

Detailed Description:

SHA256 fingerprint is now used everywhere as an identifier for S/MIME certificates, both in the Admin GUI lists and in the RuleEngine logs.


Show active, inactive or all users in the user list

Detailed Description:

You can now display only the active or inactive users in the user list. Three options are available: "all", "active", or "inactive". The default is "all".

17670.png

filter by user status


Mail transport

Separate certificate for each managed domain for encrypting SMTP traffic via TLS

Detailed description:

Optionally, a separate certificate can now be specified for each managed domain for encrypting SMTP traffic via TLS. This enables the use of Certificate Based Connectors (CBC), especially in MSP installations. This is a workaround for incorrect routing on the part of Microsoft, which causes emails to end up with the wrong client if the tenant of the sender and the tenant of the recipient are hosted in the same forest.

26368.png

add SSL per managed domain

When using CBCs, the CN of the certificate entered here must be manually transferred to the "[SEPPmail] Appliance -> Exchange Online" connector.


MPKI

Option "Automatically renew expiring certificates if validity days left less than" did appear disabled after saving

Detailed description:

When trying to activate the option "Automatically renew expiring certificates if validity days left less than", it appeared disabled in the GUI after saving, although the value was saved. This is fixed now.


Problems in CertCentral with UTF-8 encoded names or common names

Detailed description:

CertCentral could not cope with UTF-8 encoded names or common names. This is fixed now, they are no encoded correctly.


MPKI Sectigo - validation status "high" for user

Detailed description:

Under certain circumstances it is necessary to set the validation status to HIGH in the Sectigo MPKI Connector when a certificate is issued for the user for whom the certificate is stored in Sectigo. This is actually a setting in the Sectigo profile for the certificates to be issued.

32615.png

Validation "high" for Sectigo user


Removed static subject part settings from DigiCert and CertCentral

Detailed description:

Since DigiCert and CertCentral do not use the static subject part, the inputs are no longer used.


RestAPI

Custom command upload leads to encoding issues

Detailed description:

The RestAPI endpoint for uploading custom commands works with a different character encoding than was necessary for saving in LDAP. The old way of saving such values has been revised internally so that these coding errors can no longer occur.


Any user can be made admin of a customer

Detailed description:

It is now possible again to make any user the admin of a customer, even if this user is not a member of the customer.


Rule Engine

RuleEngine function logsubject() now also outputs attachment infos

Detailed description:

The RuleEngine function logsubject() now also outputs the list of attached attachments, their content type and their size. Example:

Message Subject is [confidential] test HTML mail with Attachment
Message Size is 161KB
Message has 1 attachment(s)
  1. attachment: name=autohack-768x768.jpg, mime-type=image/jpeg, size=136478
Message has 1 inline(s)
  1. inline: name=anker.png, mime-type=image/png, size=26740

Compatibility with LDAP queries refined

Detailed description:

Compatibility with LDAP queries has been refined and extended to cover special cases. One example is certain users in a group that need to be queried. Here, the new ldap_compare user can be filtered more specifically. No customer action is necessary.


ARC sealing / signing of emails possible

Detailed description:

ARC sealing/signing of emails is now possible. Especially in conjunction with Exchange Online connections, this can reduce/eliminate false positives in spam detection by Microsoft.

Special note for ExO tenants: In a MIME-structured mail, there might be some additional lines for non-MIME clients like "This is an S/MIME signed message" or "This is a multi-part message in MIME format." These lines are included in the ARC-Message-Signature. For reasons as yet unknown, ExO removes these lines which results in an invalid ARC-Message-Signature. The mail then consequently fails the Microsoft DMARC check. We are currently in contact with Microsoft to solve this issue.

24413.png

activate ARC seal

24413_2.png

configure master ARC key


Rule Template

Removal of spoof tags in subject lines was too broad

Detailed description:

Incoming emails from the sender with a spoof tag, e.g. [HIN secured], are checked by the appliance and this tag is removed. This function had an error that also deleted all subject text after the tag. This is fixed now.


System Services

TLS-secured DNS queries

Detailed description:

TLS-secured DNS queries (DNSSEC) have been implemented. Possible values for the validation are yes, no, or auto.

23767.png

Option "DNSSEC validation"


Webmail

Placeholder text for non-existing header/footer logos

Detailed description:

In the past, a placeholder text appeared in the GINA mails if the header and footer logos were not customised. This has been removed.

33184.png

former "footer.logo" text display


Adapted to OAuth changes on LinkedIn site

Detailed description:

The SEPPMail Gateway was adapted to the OAuth 2.0 changes implemented by LinkedIn.


Optionally hide SAML (OAuth) button in GINA login

Detailed description:

If, for example, SAML/OAuth authentication is to be used for the LFT bypass login in the Outlook add-in, but the button for the SAML login is not to be displayed in the GINA login of the web interface, this display can now be suppressed. The setting is available in the GINA settings per domain.

30539.png

Checkbox "Show SAML login button"


Detailed description:

The link to the GINA explanatory video was removed from the GINA carrier email Position was msgid "webmailtext_text" in GINA Translation File, msgstr paragraph: Please also consider watching our Youtube Explanation Video (German only).

This only affects the standard e-mail template. Already customized templates are unaffected. Furthermore, a new video is available under https://vimeo.com/847984884 and can be implemented optionally.


13.0.7 Bugfix release


Admin

TLS Level not shown correctly like configured

Detailed Description:

The problem was that whatever the user configured for the TLS level, when they switched to the Managed Domain configuration screen, the TLS level was shown as "Encrypt: Only send mail if TLS encryption is possible". This is fixed now.


Database

Store passwords in backend as SHA512

Detailed description:

SHA1 is no longer defined as secure, so beginning with 13.0.7, we store new passwords with SHA512 in the backend.


Infrastructure

Make current SEPPmail Image AWS-aware

Detailed description:

The way Amazon Web Services handles network connectivity, required a special configuration to receive a DHCP IP address. This is fixes now, so 13.0.7+ works on AWS (again).


Logging

Syslog field length extended to 63+ characters

Detailed description:

When using Syslog Server, the field-length for the syslog-settings was limited to 63 characters. This limitation has been dropped.


MPKI

DigiCert CertCentral - API connection

Detailed Description:

Due to the new requirements of the Browser CA Forum, the DigiCert certificate issuing API was changed. The SEPPmail Gateway now has a new DigiCert CertCentral MPKI connector to continue to allow automatic issuing via the DigiCert infrastructure. The configuration is identical to the previous DigiCert configuration.

Detailed Description:

This change reflects the updates of Quovadis Trustlinks to Digicert CertCentral. The new UI on SEPPmail appliance can be found below: Appliance Settings The settings at the CA looks like the screenshot below: CA-UI


Rule engine

OpenPGP signature does not use the key with the longest runtime

Detailed Description:

In the past, all PGP keys were fetched and the last one was taken into the array. However, this array was not sorted, so that just any key was used for the PGP signature. Now the result is sorted according to the expire date and the longest running key is used.


Webmail (GINA)

GINA cache mode did not work in the cluster

Detailed Description:

Due to a wrong search pattern, GINA cache mode did not work in the cluster. This is now fixed.

Security fixes in JQuery

Detailed Description:

Fix for CVE-2020-11022 CVE-2020-11023 CVE-2020-23064 CVE-2019-11358.


13.0.6 Bugfix release


Important information with update 13.0.6

Make sure to update to the newest Hypervisor drivers before updating to 13.0.6.


Admin

Default SSL Certificate could not be loaded (VM image for 13.0.4)

Detailed Description:

Bug fixed with release 13.0.6


13.0.5 Bugfix release


Admin

"Internal Server Error" when selecting "Customers" -> <any customer> -> "Assigned GINA accounts" -> "Manage Accounts"

Detailed Description:

Bug fixed with release 13.0.5


Typo in "Mail Processing" -> "Encryption" -> "Outgoing E-Mails"

Detailed Description:

Typo fixed.

29990.png

duplicate "are" removed


Error "No customer given" in customer edit page

Detailed Description:

In rare cases, it was not possible to change backup passwords in customers settings.


Background tasks

Wrong counting of encrypted and decrpted E-Mails in RRD statistics

Detailed Description:

With the change to a different format for the JobID, we had to adapt the script which reads current logfiles.


Cfgserver

TLS setting "May" usage if no TLS setting is set

Detailed Description:

When you create a new managed domain in "Mail System" -> "Add managed domain" and do not change the TLS settings, the SEPPmail Gateway didn't use the setting "May" as default. This is fixed now (see screenshot).

30303.png

setting "May" is applied as default


SEPPmail created thousands of domain certificates for a managed domain

Detailed Description:

Due to a bug in the config-server, some SEPPmail Gateways created thousands of certificates for a single managed domain. This was caused by a unclear response for certain domain names.


Some process IDs were not found

Detailed Description:

The error resulted in certain process IDs not being found and thus it was always assumed that the process being searched for was not running.


Clustering

Ability for every cluster member (frontend or backend) to inject mails on every other cluster member (frontend or backend)

Detailed Description:

So far, only cluster members with a running LDAP (not frontends) had the ability to inject a mail on another cluster member (not frontend). This has been changed now. With the new setting "Cluster" > "Allow mail injection", you can allow this cluster member to inject mails on the selected cluster members (frontend or backend). This is mainly important for bypass LFT systems and for the "System" > "SMTP Loadbalancer". The synchronisation of stored LFT attachments will only be done to the selected members.


Large Files (LFT)

file.app had problems with simultaneously uploaded bypass attachments

Detailed Description:

file.app had problems with several uploads finishing in parallel and thus lost a few. There was a problem with the way the DB environment of the session was handled.


Attempted LFM Cache Sync via RSYNC between backends and frontends despite missing LFT licence causes system log errors

Detailed Description:

LFM attachments and the GINA cache are now only synchronised to the "inject cluster members" configured under "Cluster". LFM only if LFM is licensed and activated for at least one GINA domain, and the cache only if at least one GINA domain has activated it.


Mail transport

SMTP Authentication did not work after upgrade from 12.1.8 to 13

Detailed Description:

With release 13 we changed the way to read credentials from the database, which caused SMTP-Authentication to fail.


Support for special characters in E-Mail addresses (postfix smtputf8=yes)

Detailed Description:

With the broader acceptance of special characters in e-mail addresses, customers complained about bounced e-mails from the SEPPmail Gateway caused by missing UTF8 support. This fix adds UTF8 for postfix, which can be configured in "Extended MTA Settings".

22068.png

enhanced UTF8 support


MPKI

Error issuing "Sectigo" certificate

Detailed Description:

Sectigo changed its handling of GN, CN and SN for special characters, which required a change in our Sectigo MPKI interface.


"Could not issue certificate" (SCEP/Dtrust)

Detailed Description:

On SEPPmail Gateways with a SCEP MKPI interface (i.e. for DTRUST), issuing a certificate failed after the upgrade to 13.x. The reason was a wrong key format for the LDAP import.


SwissSign MPKI settings are not shown

Detailed Description:

There was a small bug in the display of the SwissSign MPKI Settings page when no domain-specific data was previously saved. This is fixed now.


RestAPI

Managed domain selection for tenant import added

Detailed Description:

When importing customer/tenant data, it is now first analysed and then you can select which managed domains and GINA domains you want to import based on the analysis. However, this also means that only users belonging to one of the selected managed domains are imported. Also, only the GINA domains are imported which are assigned to one of the selected managed domains.

26295a.png 26295b.png

sections to import


Rule engine

Maillog error: Fatal error in Runtime Error (XD: Can't locate object method "define" via package

Detailed Description:

Signing of PGP E-Mails failed due to a bug (typo) in 13.0.4. This is fixed with 13.0.5.


Webmail (GINA)

SMS cannot be sent, please contact support. (User does not exist.)

Detailed Description:

The update to release 13 caused an issue in sending SMS passwords to GINA users, due to a wrong search method for the users key, which was fixed with this release.


Close attack surface for LDAP injection

Detailed Description:

During a security audit we fixed a possible hole for LDAP injection. This injection would have only been possible from the internal network, still in larger environments it is a risk.


13.0.4 Bugfix release

Important information with update 13.0.4

General info

With the release of version 13.0.0, we introduced a change in e-mail routing behavior for internal mails, mainly due to requests from MSP partners (Managed Service Provider, customers consuming SEPPmail from a partner running SEPPmail for multiple tenants).

With the change in 13.0.0, e-mails between Exchange Online (ExO) connected Managed Domains have been delivered back to the configured forwarding server and no longer directly to the recipients MX domain, as it was up to 12.1.19.

This change caused some inconvenient e-mail routing behavior and unwanted effects for some other customers, mainly running their own appliance (not MSP). We found situations, that e-mails have been domain-encrypted and directly delivered and thus could not be read by the user.

This bugfix release 13.0.4 introduces a configuration option, which allows it to define this internal mail routing behavior according to customers needs.

By default, after update to 13.0.4, the formerly known routing behavior, up to version 12.1.19 is back in place. Internal mails will be routed directly to the recipients MX domain.

Performing the update to 13.0.4 directly from version 12.1.19, there is no impact or change on routing behavior. Updating from 13.0.0/1/2/3 will change the e-mail routing as described above.

MSP customers with ExO connected Managed Domains can enable the new routing globally or per managed domain. Read the documentation below for details.

How to configure the new mail-routing option

Mail System

The default value after update to 13.0.4 is „off for all domains“

Default value

Customers can change this according to the desired routing behavior.

Options

Mail System -> [Managed Domain]

For a specific Managed Domain you can change the setting, if the global setting from above is set to „Use domain setting“

Managed Domain Setting

Final note on the change

Workarounds provided by SEPPmail support so far, using custom commands or introducing further IPs in allowed sending server setting, can be removed by then.

If you still have open questions and and you are unsure, please do not hesitate to contact support@seppmail.ch, mentioning „update 13.0.4 question“ as subject.


Admin

Users from customers cannot login to Admin-UI

Detailed Description:

none

DHCP IP Address on startup

Detailed Description:

This is especially for Azure-VM´s. On system startup, SEPPmail Gateways now retreive a DHCP address and can be administered immediately.


Config Server

Backup errors in version 13.0.1/2/3

Detailed Description:

Customers trying to backup a SEPPmail Gateway received the error: "Backup failed: Could not encrypt backup: Internal error: E05"


Mail transport

Domain encryption errors

Detailed Description:

Customers reported that after the upgrade to 13.0.1, e-mail arrived encrypted at target mailboxes. This was due to an issue with changed routing mode in 13.0.x, see header-message of the 13.0.4 extended release notes.


Webmail

GINA Account starts even with login via IDP (i.e. M365)

Detailed Description:

Customers expected that a GINA user, which logs in with an external identity provider (Microsoft, Google, ...) needs no registration process and can directly access the e-mail

Any references to the old Reader-APP are removed

Detailed Description:

SEPPmail released a new APP for Apple iOS and iPadOS, the Viewer-APP. Any reference to the old "Reader" APP have been removed.


13.0.3 Bugfix release

Underlying infrastructure updates

Administration

Display error in user settings for "may not sign mails"

Detailed Description:

Disabling the "May not Sign" settings of users wasnt correctly shown in the users property, but was correct in the overview.

Syntax error in DNS section while saving system settings

Detailed Description:

When changing DNS settings in the system configuration, an error occured in the UI.

27994 & 27961 - fix issue with setting DNS server in the console

Detailed Description:

Setting IP via console forces the user to enter DNS settings, but settings have not been saved correctly.

Internal Server error when logging in to Admin-UI

Detailed Description:

The error appeared if users from tenants in multi-customer-environments wanted to login.

Filter in users screen didnt work

Detailed Description:

The filter in the Admin-UI didnt work anymore.

Editing admin-users didnt work

Detailed Description:

When trying to edit the admin-user, saving changes failed.


Background Tasks

ClamAV did not start up

Detailed Description:

ClamAV did not start in version 13.0.2. Error message in MaillLog was: WARNING: ClamAV is not enabled in Mail System, AV scan skipped

Sending initial GINA passwords via SMS failed

Detailed Description:

With upgrading to 13.0.0/1/2, the initial GINA-password-send didnt work anymore.


Config Server

After Update to 13.0.2, SEPPmail Gateway was not available on SMTP and also HTTPS

Detailed Description:

Additional to smtp and HTTPS unavailability, larger clusters showed instable behavior in syncing.

Creation of two domain keys on newly created managed domains

Detailed Description:

In version 13.0.2 - when creating a managed domain, 2 domain keys have been created wrongly by default. This fix changes the behaviour to one domain keys.

SEPPmail Gateway lost SMTP authentication data

Detailed Description:

After upgrading from 12.1.x to 13.0.x SMTP authentication data was lost on some appliances


Licensing

Licensing limit on manually created users failed

Detailed Description:

Gateway-admins with multi-tenancy enabled SEPPmail Gateway could create users manually. Those users have not been included in the license count limit of the tenant(customer).

Mail Transport

New internal routing between Exchange Online (ExO) Tenants

Detailed Description:

Routing between Exo tenants did depend on the tenant-id before. This has been changed to use the X-Originator-Org from microsoft now, as this is a supported header.


MPKI

Weird characters on ORG-field on Sectigo MPKI connector

Detailed Description:

There was an issue getting data from the Sectigo MPKI connector

DigiCert MPKI connector not being able to obtain certificates

Detailed Description:

After the update from 12.1.18 to 13.0.2, the Digicert MPKI connector could not get new certificates. Error message was MPKI: error issuing 'DigiCert' certificate for xxx.com': error while posting OrganizationID-JSON: Can't connect to www.digicert.com:443http://www.digicert.com:443 (certificate verify failed) (500)

WebMail

Users could not answer to emails

Detailed Description:

Users could not reply to emails (neither to external recipients nor to themself)

public key search in GINA GUI

Detailed Description:

Users could not search for public keys in the GINA interface


13.0.2 Bugfix release

Admin

Show cluster info on non-clustered infos too

Detailed Description:

Customers requested that non-clustered appliances shall also show the cluster-information as single-node cluster.

"Save" ruleset settings deleted keyserver settings

Detailed Description:

When saving ruleset settings the settings for external keyservers have been removed.

Admin-UI text changed to reflect explanaition in documentation

Detailed Description:

Old text: "Always use S/MIME or OpenPGP if user keys are available" New text: "Always use S/MIME or OpenPGP if recipient keys or certificates are available"


Background tasks

Collect clusterinfo even on non clustered devices (BE/FE systems)

Detailed Description:

A background job for cluster did not run with the new cluster-setup. It now runs also for single node-instances and Backend/FrontEnd Systems.

Admin-UI not available on frontend systems

Detailed Description:

Due to the new cluster-config, a fix was required in certain for frontend/backend situations.

Maillog cache was not correctly refreshed

Detailed Description:

A cronjob was called in the wrong context and failed to refresh the maillog cache.


Config Server

Importing a backup created "migrate_db:error"

Detailed Description:

A backup, which was created and immediately reimported raised an error, but showed up as correctly restored.

27783.png

error message after restore


Mail transport

Admin-console not available - fetchmal restart caused wrong PID parsing file

Detailed Description:

In some customer situations, the admin console on port 8443 was not available anymore, mailtraffic partly worked. This was caused by wrong parsing of the pid file.


Webmail

PGP upload failed in GINA Web interface

Detailed Description:

PGP upload in the GINA web interface failed due to an error with the key information.


13.0.1 Bugfix release

Admin


SNMP-daemon stopped working

After upgrading from 12.x to 13.0 the SNMP daemon stopped working. This happened due to an update in the default configuration in the underlying OS.


System


Crontab jobs stopped working

A newline was missing at the end of the crontab file, which prevented the jobs from working.


Webmail


internal server error when configuring Microsoft as IDP for GINA domains

Fix of the Microsoft module in the SEPPmail Gateway.


13.0 Major Release SEPPmail Extended Release Notes

This feature-release contains updates around requirements from the market and from the SEPPmail.cloud.

!IMPORTANT: 13.0 works only with a new backend (MDB) for the LDAP database. The change improves opertions and backup performance, requires a reboot and a backup in advance. Consult your SEPPmail partner for help if you are unsure about the change.

Major changes are in networking, clustering, multitenancy with extended fields, GINA updates, and massive enhancements in the REST API to manage the appliance remotely. We furthermore allow now Microsoft (Personal and M365) and Google Accounts to authenticate in GINA without a user registration process.

This document is intended to support SEPPmail customers and partners to understand the new functionality quick, without reading the documentation in the first hand. For deeper understanding, please go to the documentation and read the details.

The ERN are separated into sections, (Admin, Backup, WebMail (GINA), ...) for categorizations. In the sections we sort the issues chronologically as they appeared inside SEPPmail the first time.

Each issue has an internal reference which points to our internal ticket number, an issue type, and some issues also have a more detailed description, if the issue header does not provide sufficient information.

The issue types are:

This document is written in markdown, so formattig is not perfect but markdown is cool ;-)


1.1. Admin


The "Admin" section contains everything which belongs to system administration, key and certificate management.

1.1.1. X509 Root certificate revocation inheritence was only based on name

Detailed Description:

When revoking a X509 Root certificates, the revokation was applied to all certificates of the same name downwards (e.g. a demo and a production certificate). The revocation now also checks the fingerprint.


1.1.2. Option "Server requires authentication" could not be deactivated

Detailed Description:

The option "Server requires authentication" could not be deactivated as long as the option "Use the following SMTP server" was set. This is now fixed.

26367

"Server requires authentication" option in settings


Enhanced network settings (MTU) available

Detailed Description:

The size of the network adapter (maximum transmission unit (MTU), see also https://en.wikipedia.org/wiki/Maximum_transmission_unit) can now be defined under "Systems" > "Advanced view" > "IP Addresses".

23768

MTU setting


Default gateway outside the own networks

Detailed Description:

It is now possible to specify a default gateway outside the own networks under "Systems" > "Advanced view" > "Routing".

20394

Default gateway outside the own networks


Active routes definable

Detailed Description:

It is now possible to specify active routes networks under "Systems" > "Advanced view" > "Routing". This is e.g. necessary for special network environments like Hetzner and others.

20226

Active routes


Virtualization Tools displayed depending on the host system

Detailed Description:

Under "System" > "Advanced view" > "Virtualization Tools", the existing environment is now auto-detected and the corresponding options are set.

13278

Virtualization Tools with detected environment


TLS versions and Cipher Suites configurable for IMAP and POP3 (Dovecot)

Detailed Description:

Under "Mail System" > "Dovecot Settings", it is now possible to configure the allowed ciphers, out of a list of currently 30 available ones.

25409

Dovecot ciphers configuration


Import of domain and mail keys in PKCS#S12 format

Detailed Description:

In the past, only PEM format was supported. Now, PKCS#12 keys are expected.

19958

Import keys in PKCS#12 format


Backup


Enforce a certain password strength for backup passwords

Detailed Description:

A backup is usually the only way key material can leave the SEPPmail Gateway. Therefore the backup password now has to meet certain password criteria (16 characters, lowercase, uppercase, number, specials).


Config server


Asynchronous execution of "applyMailconfig=True" via REST API

Detailed Description:

If administrators make changes to a managed domain, these must be activated with "applyMailconfig=True". In the past, this happened synchronously, which could lead to waiting times in the user interface. Now, the REST API gives a return value (if possible) and then executes the restarts of services asynchronously in the background.


"apply_mailconfig" temporarily created wrong main.cf / disturbed mail processing

Detailed Description:

A bug was fixed that could lead to Postfix processing mails based on the wrong main.cf file.


Clustering


New Device UUID independently from hardware

Detailed Description:

Instead of the formerly used Device ID which was based on hardware information and could e.g. result in duplicate MAC addresses in virtualised environments, a Device UUID is created upon a first image start or the update of a device after an update to 13.x from 12.x. The Device UUID is currently only visible in the cluster configuration under "Cluster" as it is for now only used for cluster functionality. (Clustering, cloning and licensing processes do not create a UUID.)

19360

Display of Device UUID


Cluster Identifier protection

Detailed Description:

By design, a cluster identifier can be used to access any cluster member from any system with network access to one cluster member. To mitigate this security risk, the cluster identifier(s) to be protected can be entered manually under "Cluster" > "Protect cluster identifier".

23166

Protect cluster identifier


Database


Database backend changed to MDB

Detailed Description:

The database backend changed from BDB to MDB, which improves the performance of many processes. MDB is mandatory for the upgrade to 13.x. You will get prompted to create a backup before the change to MDB !


LFT (Large File Transfer)


LFM attachment encryption with aes-256-cbc with SHA512

Detailed Description:

LFM attachments are now symmetrically encrypted with aes-256-cbc with SHA512.


Logging


PID of SMTPd.pl in mail log

Detailed Description:

The PID of the SMTPd.pl is now logged in the mail log, written in brackets.

25174

Mail log excerpt with SMTPd.pl[PID]


Mail transport


Postfix "mynetworks" uses CIDR map

Detailed Description:

The Postfix configuration file "mynetworks" now uses the CIDR map as input for the relaying IPs.


User-defined DKIM per managed domain

Detailed Description:

It is now possible to have a user-defined DKIM key pair per managed domain. The standard name (selector) is "default".

24238

User-defined DKIM selector


Limited number of hops to prevent mail loop

Detailed Description:

Misconfigured M365 customers may overload the rule engine and cause large numbers of "too many hops" rejects (mail loop). To prevent this, the maximum number of hops is limited to 50. Higher numbers are reduced in /etc/postfix/master.cf before the mail is passed to the rule engine.


Use relaying settings of managed domains in global relay settings

Detailed Description:

With the new option "Mail System" > "Managed domain relaying", it is now possible to activate all IPs of a managed domain (as given under "Allowed sending servers for this domain") as relaying IPs. This saves having to enter the IPs twice. Also, when a managed domain is deleted, the relaying is now automatically removed.

22036

Globally activate all IPs of a managed domain as relaying IPs


Multi-tenancy


Introduction of a Tenant UUID

Detailed Description:

In the past, tenants (customers) were identified by name. This could lead to conflicts, as typos may happen. Now, every tenant receives a Tenant UUID which is visible in the "Customer Management". The Tenant UUID can also be adressed via the REST API.

19452

Tenant UUID in the list of customers


"Extended Fields" for Managed Domains and Tenants

Detailed Description:

The "Extended fields" can be used to easily configure tenant, managed domain or user-specific settings by means of custom commands, especially in client-separated systems. They can be defined under "Mail Processing" > "Edit extended fields". Extended fields add a powerful tool for complex customer environments and MSPs that have to deal with different mail-routing requirements on different hierarchy levels.

21070

Extended fields for more granular mail processing


REST API


Granular rights for get/add/modify/delete

Detailed Description:

For the REST API tokens you can now not only specify for which module the access is allowed but also which operation is allowed: GET, ADD, MODIFY, DELETE.

23859

Granular allowed operations per module


get/add/modify/delete for all TLS domains

Detailed Description:

The TLS domains under "Mail System" can now be displayed, added, edited and deleted via the REST API.


users/email/GET certificate information

Detailed Description:

Certificate information can now be retrieved via REST API.


Managed PKI (MPKI) via REST API

Detailed Description:

The MPKI can now be managed via REST API. This corresponds to the manual settings under "MPKI".


GINA domain get/set settings via REST API

Detailed Description:

The general settings under "Gina Domains" can now be set via REST API.


Mail system settings via REST API

Detailed Description:

The Mail system settings can now be managed via REST API. This corresponds to the manual settings under "Mail System".


RestAPI no longer allows invalid CIDR in sendingServers

Detailed Description:

If domain settings were changed via endpoint /mailsystem/manageddomain, it was possible to enter invalid CIDR range definitions, e.g. "195.48.84.97/27" (which has host bits set instead of specifying the network address). This is now fixed.


Cleanup token information before dispatch

Detailed Description:

The cleanup of token information now takes place before dispatch (not after).


REST API starts faster after logrotate

Detailed Description:

In the past, the REST API occasionally did not start directly after a logrotate but ten minutes later. To improve this, the kill_timeout signal has been changed from 1 second to a 10 seconds delay between re-starts.


Rule engine


Mailprocessing groups with extended fields for user and managed domain groups and comment field

Detailed Description:

The managed domain groups, called mailprocessing groups in the GUI, are a new feature. Their (currently only) purpose is to hold extended fields for a group of users. Only users which belong to the managed domain can be members of such a group. The feature can be accessed via "Mail System" > "Edit managed domain" > "Edit mailprocessing groups".

24991

New button "Edit mailprocessing groups"


Updater


Signing firmware updates to prevent/detect manipulations

Detailed Description:

Firmware updates are signed with a code-signing certificate. The public key must be available on the SEPPmail Gateway.


WebMail (GINA)


Allowing further external IDPs (Google, Microsoft) for WebMail GINA login

Detailed Description:

Recipients of GINA mails sent to mailboxes linked to a publicly accessible Identity Provider / IDPs are able to authenticate themselves to GINA using this IDP. Currently available IDPs are "Google", "Facebook", "LinkedIn", "Microsoft" and "Fideas IAM". The allowed IPD must be defined per GINA domain under "GINA Domain" > "IDP settings".

21173

IDP settings


Server side caching for GINA

Detailed Description:

The new GINA cache mode allows for caching the encrypted secure attachment "secure-email.html" on the server. (It is still always attached to the GINA email.) The feature is configured under "Gina Domain" > "Change GINA settings for [domain] > "Server side caching". It is only available if an LFT device exists.

24097

Server side caching for GINA


GINA Setting for password criteria

Detailed Description:

The Password settings are now embedded in the web-code to be read by HTML browsers or apps.


No registration process for externally authenticated GINA users at first login

Detailed Description:

Internal GINA users, that is GINA users that are authenticated via LDAP/SAML/oAuth, no longer have to register themselves upon first login / start email.


GINA logo upload now suppports GIF, PNG, JPG, SVG and ICO image file types

Detailed Description:

In the past, only gif images were possible as logos. This list has been vastly extended. It is now possible to upload GIF, PNG, JPG, SVG images, and for the favicon also ICO.

9978

Available image types for upload in the Layout


Detailed Description:

So far, a GINA sender could provide their key to a recipient in the GINA portal only via search. Now, a direct download button for keys is available.


GINA maximum password length

Detailed Description:

The maximum GINA password length is set to 2048.


GINA password check improved

Detailed Description:

A password is only on the level of "excellent security" if all set password requirements are met.


GINA CSS syntax check when saving

Detailed Description:

Syntax errors in the custom CSS file under "GINA Domains" > [GINA domain] > "Edit GINA Layout" > "GINA CSS" could cause errors when sending the GINA carrier mail. Now the internal check "CSS::Minifier::minify" is run before the CSS is saved.


Error "420 an encryption key for your account will be available shortly" now includes account in Reject message

Detailed Description:

The error message is now "420 An encryption key for your account '$senderemail' will be available shortly".


--- end of document ---