Service Notices
Important updates, security alerts, and operational announcements for CodaMail users.
Current Service Updates
Please note that payments are applied to expire date, not payment date. So if you let your account remain locked until just before we remove it (90 days) and then renew it, the payment still gets applied to the original expire date.
We pulled the IP data for 50 VPN providers and traced every network block back to the registered company and the datacenter buildings they use.
The short version: 41 of 50 providers rent servers from the same two UK-based hosting companies (M247 and Datacamp). Those companies rent their rack space from Equinix and Digital Realty -- two US companies. So "Foreign VPN" might mean your traffic goes through UK hardware in a US-owned building.
Also found that 73% of VPN server IPs are geolocated to a different country than where the network is registered. That "Nepal" or "Qatar" server might physically be in London.
VPN Infrastructure - Exposed
If you're receiving spam on an alias, it means the company or organization you gave that address to has leaked it, whether through a data breach, by selling your information, or by sharing it with third parties. The fix is simple: delete (kill) the alias and create a new one. That's exactly what they're for and why we recommend not using main aliases, but instead using categorized catch-alls (see How to use CodaMail aliases).
However, if you're using a single address for everything, you're not using the service as it was designed. Aliases exist so you can give a unique address to each company or service you interact with. When one gets compromised, you kill it and move on. If all your mail flows through one address, you lose that ability, and you'll be stuck with the never-ending attempts to block the spam.
One address per company. When it goes bad, cut it loose, no more spam and no need for never-ending attempts to block it.
When viewing a message, the Block menu now shows a Sending Server section with options to block:
- The specific sending server
- All servers from that domain
- All servers with that top-level domain (e.g. .ar, .ru .website, .cloud)
You can also manually add server blocking rules in Settings > Block List using the server: prefix:
- server:mail.spammer.com - block a specific server
- server:spammer.com - block all servers under that domain
- server:ru - block all servers with that TLD
- server:*.spammer.com - wildcard patterns work too
Blocking is applied at the connection level, mail from blocked servers or From addresses is rejected as User Unknown, without the server even accepting it. To senders, it looks exactly like a non-existant address. This causes most bulk senders to remove the address from their lists in order to keep their "bounce rate" low, a metric that affects them with the service they use.
DO NOT CHANGE YOUR EXISTING SERVER NAMES OR SERVER SETTINGS when making this change! Doing so will make this much harder than it has to be.
Go to Settings -> App Passwords in the new webmail. Click create Create App Password. Give it a name and enter any other restrictions you want or just leave it all as is and click Save. Leave this next dialog open. Copy the generated password with the copy button. Go to your mail app, check mail, when prompted for password paste in the generated password (if there is any checkbox about saving this password, click it). Then send mail, when prompted for password, paste in new one. That is it.
If you do go and change servers or anything but just the password, then you will be essentially setting up your mail from scratch and you will need to go to the Support section to the bottom of the page and follow instructions for setting up your e-mail app.
DO NOT CHANGE YOUR EXISTING SERVER NAMES OR SERVER SETTINGS when making this change! Doing so will make this much harder than it has to be.
Go to Settings -> App Passwords in the new webmail. Click create Create App Password. Give it a name and enter any other restrictions you want or just leave it all as is and click Save. Leave this next dialog open. Copy the generated password with the copy button. Go to your mail app, check mail, when prompted for password paste in the generated password (if there is any checkbox about saving this password, click it). Then send mail, when prompted for password, paste in new one. That is it.
If you do go and change servers or anything but just the password, then you will be essentially setting up your mail from scratch and you will need to go to the Support section to the bottom of the page and follow instructions for setting up your e-mail app.
*** You should not create any app passwords if you only use the webmail ***
1. Go to ⚙ Settings -> App Passwords in the CodaMail web interface
(you can also log in using the web browser on your phone, it makes it easier to copy and paste the password on a phone).
2. Click Create App Password button.
3. Give it a name and set whatever restrictions you want or just leave them all as they are.
4. Click the Save button (leave the next dialog open so you can copy and paste, the password has already been saved by this point)
5. Click the copy buttton to copy the new password
6. Next, check email with your email app, it should prompt you for a new password. Paste it in, also click the save password checkbox if there is one (thunderbird has one, iPhone just automatcially saves on successful login).
7. Then send a mail to yourself, you should be prompted again for the SMTP password. Paste it again, click the save password checkbox if there is one (thunderbird has one, iPhone just automatcially saves on successful login).
That's it. Your mail app should work as normal again. Nothing else needs to be changed, not servers, not username, not email addresses, not ports, only the password changes.
So, those who could not set up app passwords before, now have a way. To enable the hidden mode of vanilla html without script, css, or even frames, use this url: https://codamail.com/mail/?text. To shut text mode off, click the link in the footer or use this url: https://codamail.com/mail/?notext.
...and yes, TOTP 2fa works in the hidden text mode, even with lynx.
We will switch completely to app passwords for third party mail clients this coming weekend Dec 27 or Dec 28. those who have not set up app passwords by then will need to do so for third party email apps to work.
We've added new features to Settings → Manage Catch-alls that provide more granular control over your domains and aliases.
Previously, blocklist and whitelist modes applied to all of your domains equally. If you wanted one domain to operate in whitelist mode while keeping another domain as a catch-all, it wasn't possible. All were in whitelist mode or all were in blocklist mode.
Now it is possible. Two new exception formats are supported:
- @example.com — Create a domain exception
- ! prefix — Create an alias exception
Examples:
Blocking an alias across all domains with an alias exception for one domain:
When in block mode, enter sales to block sales@anything, across all your domains. Then, additionally, you add !sales@example.com (or !sales@alias.example.com) to allow delivery to just that one domain while keeping the block in place everywhere else.
Operating in whitelist mode while keeping catch-all domain(s) with a domain exception:
When in whitelist mode, add @example.com (or @alias.example.com) to exclude that domain/catch-all from the whitelist. Everything else remains in whitelist mode, but that domain continues to accept all mail as a catch-all. Then, if you further want to block one alias in @example.com, enter another exception, for example !sales@example.com. This then leaves the catch-all domain exception @example.com accepting everything but sales@example.com.
These two exceptions now let you mix blocklist and whitelist catch-all behavior across your domains as needed.
Both Manage Catch-Alls (this controls To addresses) and Block List (this controls From addresses) features will cause mail to be rejected prior to being accepted by our servers. In other words, blocking happens during the SMTP handshake, instead of just silently accepting the mail and deleting it, which causes the sender to believe it is still active.
Anyone who sends mail to anything blocked by either of these two features receives a User Unknown response, indistinguishable from an address that does not exist. This does decrease future unwanted mail because many bulk mail senders will automatically remove "User Unknown" rejections from their mailing lists (they call this list cleaning). They do this so they don't get terminated by their bulk mail service for too many bounces (most bulk sending services terminate when bounce rate is too high).
Those with Cotse addresses can use either webmail. Both display the exact same email, when you log into the new webmail you will see the same email you see in the old interface in the same folders. It is no different than using the webmail sometimes and other times using something like Thunderbird, Apple Mail, or other to read your mail. The new webmail is nothing but a different client (a much improved client) for the same mail.
You also don't have to keep using it, you can continue using the old webmail once you have created your new password for your third party mail clients (you just won't see all the new added features in the old webmail). The old webmail client doesn't support the new features and so some of them can only be accessed through the new webmail client, like app passwords.
This only affects third party e-mail clients (like Thunderbird, Apple Mail, Outlook, etc.). If you only use the webmail then no changes are needed.
We have enabled app passwords in a bridge mode. During this transition period, your regular password will continue to work with third-party email clients (Outlook, Thunderbird, Apple Mail, etc.) until you create an app password.
Once you create an app password for IMAP, POP, and SMTP, your webmail password will no longer work for third-party email clients and you don't have to do anything more, you'll be all set when we switch December 21.
Sunday, December 21 app passwords will be required for all third-party email clients. After that date, your regular password will only work through the webmail interfaces and will no longer work for your third party email client.
How to Create an App Password:
1. Log into the CodaMail web interface. (the legacy webmail does not support this feature)
2. Go to Settings → App Passwords
3. Click Create App Password
4. Select your protocols (IMAP or POP, plus SMTP for sending)
5. Optionally set IP or network restrictions (CIDR format) and/or an expiration date
6. Click Save
7. Copy the displayed password immediately, it is not stored by us and it will not be shown again
8. Paste this password into your email client (your username and server settings remain the same)
9. Click Done
Typically, once you do this and try to check mail, your email client will prompt you for the password and you can just paste in the new one (and don't forget to try to send mail, too, so the SMTP also prompts for new password).
If you lose an app password, simply delete it and create a new one. As always, send any questions you have to Helpdesk.
This is only for existing third party email setups, if you are setting up your email client for the first time prior to Dec 21, you must contact helpdesk first. This is because new setups will require helpdesk support during this period.
The "application passwords" will be nothing more than a separate password for imap/pop/smtp access. You will log into the CodaMail web interface, generate a password for pop/imap/smtp, set whatever permissions you want it to have, then copy and paste it into your email application as the new password.
This separates your full account from the email client in the event your email client is ever compromised by password stealing malware. If this was to happen, the attacker will not be able to log into your webmail account. It will also help protect against bot attacks on our services, which are getting smarter with AI.
When you generate a password you will be able to assign priviledges to it and also be able to set a date when that password will stop working (if you desire). You will also be able to restrict which IP addresses or network ranges are allowed, again, if you desire to restrict it even further. You will be able to delete and create them at will. You will have more control and it is a much safer way for us to allow pop/imap, and smtp.
Again, this is not active yet. We are just providing early notice. We will be sending out more mail regarding the change before implementation.
Express1 is back up
This change will require everyone (Cotse and CodaMail users) to log into the CodaMail web interface to create their app passwords for regular email clients to work. No changes will be necessary for webmail only use. This is not active yet, this is just early notice. Please check here for further updates.
Please note, that these are developed, tested, and ready to implement. The delay is to give people a chance to see the Notices and for us to send out some e-mail informing people to read the notice.
Follow-up Blog Post: How to Use CodaMail in the Most Secure Fashion Possible
FYI: We do take requests for color combinations to be able to be selected within webmail. Unfortunately, due to the static nature of these, we are currently unable to just provide color pickers. Instead they must be individually compiled. However, we do take requests.
We will soon be disabling accounts that expired last month or before that have not yet been renewed. Please note that we do not auto-rebill any service but month-to-month billing as our goal is to be both easy to onboard and off-board with us. This means any subscription that is not month-to-moth must be manually renewed each time at the end of it.
We resolved an issue some were having where attempting to display the tasklists caused an internal server error message.
Note: Calendar, Contacts, and Tasklist syncing via CalDAV/CardDAV is only available in the new webmail. It is not available in our legacy webmail.
I don't speak tech, in layman's terms please:
You can sync your calendars and contacts with all of your favorite devices like your phone, tablet, watch, or favorite email app. You can also share with your family, friends, business contacts, or groups, all privately.
I want the tech:
Our proprietary WebDAV server, built from the ground up for privacy, now supports (updated 11/2):
RFC 3253 WebDAV Versioning (expand-property REPORT, protected properties)
RFC 3744 WebDAV ACL (Access control, privileges, owner, acl properties)
RFC 4791 CalDAV (Calendar properties, REPORT, calendar-query, free-busy)
RFC 4918 WebDAV (Core properties, PROPFIND, PROPPATCH, collections, COPY, MOVE, Class 1/2/3 compliance)
RFC 5397 WebDAV Current Principal (current-user-principal discovery)
RFC 5545 iCalendar (ICS/VCS format for events/tasks, ORGANIZER/ATTENDEE, CATEGORIES)
RFC 5689 Extended MKCOL for WebDAV (creating collections with properties in single request)
RFC 5842 WebDAV Bindings (resource-id for unique resource identification)
RFC 6350 vCard Format (VERSION property ordering, REV property injection, property preservation)
RFC 6352 CardDAV (Addressbook properties, vCard handling, addressbook-query, addressbook-multiget)
RFC 6578 WebDAV Sync (sync-token, sync-collection REPORT with allprop compatibility)
RFC 6638 CalDAV Scheduling (calendar-user-address-set, schedule-inbox-URL, schedule-outbox-URL)
RFC 7617 HTTP Basic Authentication (proper realm and credential caching)
RFC 7809 CalDAV Time Zones by Reference (calendar-timezone property with UTC default)
RFC 8144 Use of the Prefer Header Field in WebDAV (return-minimal for PROPPATCH optimization)
RFC 9110 HTTP Semantics (ETag, If-None-Match, 304 Not Modified, conditional requests)
CalendarServer Extensions (calendar-proxy, notification-URL, dropbox-home-set, email-address-set, getctag)
Apple Extensions (calendar-color with 8-char ARGB alpha channel preservation, calendar-order, calendar-enabled, calendar-transparency with PROPPATCH support)
The above properties which would normally contain identifying information are returned with privatized data. Randomized principals properly map. ACLs also properly map to our own unique method level dynamic permissions.
This ensures out-of-the-box compatibility with clients such as Apple Calendar, iOS, macOS Contacts, Thunderbird, DAVx5 with Android, Outlook with DAV plugins, and others, all without requiring protocol extensions or proprietary modifications.
We also retired our Denver site this week and in doing so moved our Denver VPN and Socks5 servers to Chicago.
Please note: Our support section is well fleshed out, please take a moment (if you have not already done so) and check out https://codamail.com/support.html. You just might find that the service is capable of a lot more than you are aware.
Important Information
Phishing Alert
We are a constant target of phishing e-mail. We will never send you formatted e-mail, we only send plain text. We do not send links for you to click. Do not follow links or click things in emails. Manually come to our website and check notices, to make a payment, etc. As always, email helpdesk if you have questions.
Backups
Because we are a privacy service, we do not back up your personal e-mail (though we do maintain a delayed 24 hr warm mirror to cover in case of a failure). This means that when you delete it, it is irretrievably gone. It is not floating around in some backup that can be retrieved from us against your will. However, it also means you must download and save your important mail. If you delete it, or we suffer a data failure to both the main spool and warm mirror, you could lose wanted mail. We give you many ways to back up and export your mail.
Recommended Best Practices
For optimum privacy with the service use automatic PGP encryption and a pop3s mail app and set it to delete the mail from the server after retrieval. We also recommend that your local mail store be an encrypted volume. Once your mail is removed from the server by your mail app, we no longer have a copy. No mail backups, and we are deliberately not with a large cloud service, instead opting to keep everything in-house, for the same reason. This puts you in full control of your mail and its privacy. When you delete it, it can’t be retrieved and there is no record of it being there.
