Current Path : /home/ncdcgo/mail/cur/ |
Current File : /home/ncdcgo/mail/cur/1606381779.M178844P83652.wh1.nita.go.ug,S=29889,W=30206:2,T |
Return-Path: <natcert@cert.ug> Delivered-To: ncdcgo@wh1.nita.go.ug Received: from wh1.nita.go.ug by wh1.nita.go.ug with LMTP id kHIqCtNwv1/ERgEAATiUCw (envelope-from <natcert@cert.ug>) for <ncdcgo@wh1.nita.go.ug>; Thu, 26 Nov 2020 12:09:39 +0300 Return-path: <natcert@cert.ug> Envelope-to: gilbert.siima@ncdc.go.ug, gilbert.siima@ncdc.go.ug Delivery-date: Thu, 26 Nov 2020 12:09:39 +0300 Received: from mta1.nita.go.ug ([154.72.194.36]:35172 helo=umcsprodmta1.umcs.go.ug) by wh1.nita.go.ug with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from <natcert@cert.ug>) id 1kiDHW-000N1M-CJ; Thu, 26 Nov 2020 12:09:38 +0300 Received: from localhost (localhost [127.0.0.1]) by umcsprodmta1.umcs.go.ug (Postfix) with ESMTP id 76AFB795B; Thu, 26 Nov 2020 12:09:14 +0300 (EAT) Received: from umcsprodmta1.umcs.go.ug ([127.0.0.1]) by localhost (umcsprodmta1.umcs.go.ug [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id 8HBnoPd9rgdH; Thu, 26 Nov 2020 12:09:13 +0300 (EAT) Received: from localhost (localhost [127.0.0.1]) by umcsprodmta1.umcs.go.ug (Postfix) with ESMTP id BAE6D57D3; Thu, 26 Nov 2020 12:09:12 +0300 (EAT) DKIM-Filter: OpenDKIM Filter v2.10.3 umcsprodmta1.umcs.go.ug BAE6D57D3 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.ug; s=B185C31A-D38C-11E8-9F15-44D3729BE56D; t=1606381752; bh=azNUpaFMAI4kTUpLwjFoA3mg9R5wxVZYBYzP81YcHTQ=; h=Date:From:Message-ID:MIME-Version; b=QrggH0hQDXq0iP6ddR5JCjVYfo3fl41jU5GlsWb+5YSbUr0U4g3pTegdzqmoKlzU8 UuQq6LcdW/68cbJYRO808Z43Blj4yesySdXmXaQUBJH9Hp3d0BL4PytmAUc6ozdQih wlIy4Je4/Y9MSCPMopysbzDp2iir8c/5GJt4dJlQCVMEzw3AAVnzQVpjZHjl1FLlJ7 p6kweS3gtEagUsLrs3q6d6Y4FapfeBA2VfnC5JfWZhSVHxnF2wcLD7AQqqICTiRmS8 eikJ/exEkRwEdIFdXbSUbOGKgV6E/xEa0zfMibacULoW5Ud2MfsRz4IJjJg+ifM7gY yUYuzDNP02eOA== X-Amavis-Modified: Mail body modified (using disclaimer) - umcsprodmta1.umcs.go.ug X-Virus-Scanned: amavisd-new at umcsprodmta1.umcs.go.ug Received: from umcsprodmta1.umcs.go.ug ([127.0.0.1]) by localhost (umcsprodmta1.umcs.go.ug [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id vwo5P6FAhCL6; Thu, 26 Nov 2020 12:09:12 +0300 (EAT) Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received-SPF: permerror (cert.ug: Maximum void DNS look-ups limit (2) exceeded) receiver=umcsprodmta1.umcs.go.ug; identity=mailfrom; envelope-from="natcert@cert.ug"; helo=umcsprodstore2.umcs.go.ug; client-ip=192.168.13.6 Received: from umcsprodstore2.umcs.go.ug (umcsprodstore2.umcs.go.ug [192.168.13.6]) by umcsprodmta1.umcs.go.ug (Postfix) with ESMTP id 7949C8353; Thu, 26 Nov 2020 12:09:02 +0300 (EAT) Date: Thu, 26 Nov 2020 12:09:02 +0300 (EAT) From: National CERT Administrator <natcert@cert.ug> Message-ID: <1050422500.1544633.1606381742406.JavaMail.zimbra@cert.ug> In-Reply-To: <1882329671.1542511.1606381415041.JavaMail.zimbra@cert.ug> References: <1882329671.1542511.1606381415041.JavaMail.zimbra@cert.ug> Subject: cPanel Security Update MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="=_6810d9b4-1b1b-443d-b2f2-2674aa243ee8" X-Mailer: Zimbra 8.8.15_GA_3968 (ZimbraWebClient - FF83 (Win)/8.8.15_GA_3968) Thread-Topic: cPanel Security Update Thread-Index: OuSV5gHxMuNnxbut/mBKtsLZwzNsCFHjFFcJ --=_6810d9b4-1b1b-443d-b2f2-2674aa243ee8 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Dear Stakeholder, Kindly note the brief below concerning the recent cPanel Update: * A two-factor authentication (2FA) bypass vulnerability now affects the popular cPanel & WHM software suite may allow attackers to access secured accounts. The two-factor authentication cPanel Security Policy did not prevent an attacker from repeatedly submitting two-factor authentication codes. This allowed an attacker to bypass the two-factor authentication check using brute force techniques. * The flaw is not deemed to be critical, mainly because exploiting it also requires that attackers have valid credentials for a targeted account. Still, attackers could overcome that hurdle with a convincing phishing email. Security researchers have published a POC where an attack can be accomplished in minutes. Call to action: The vulnerability has been fixed (along with two others) in cPanel & WHM versions 92.0.2, 90.0.17, and 86.0.32. Website administrators should contact their web hosting providers to upgrade their installations of sites that are managed through cPanel. Link: [ https://www.cert.ug/cpanel-update | https://www.cert.ug/cpanel-update ] #StaySafe, CERT Administrator Uganda National Computer Emergency Response Team/CC NITA-U, Palm Courts, Plot 7A, Rotary Avenue (Lugogo Bypass) P.O.Box 33151, Kampala - Uganda Website: [ http://www.cert.ug/ | www.cert.ug ] Twitter: @CERT_UG Attention The National CERT/CC is under the Directorate of Information Security at the National Information Technology Authority, Uganda (NITA-U). This e-mail and any attachments to it are confidential and are intended solely for the individual to whom it is addressed. If you are not the intended recipient of this email, you must neither take any action based upon its contents, or copy or show it to anyone. Please contact the sender if you believe you have received this email in error --=_6810d9b4-1b1b-443d-b2f2-2674aa243ee8 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable <html><body><div style=3D"font-family: arial, helvetica, sans-serif; font-s= ize: 12pt; color: #000000"><div><style>/*<![CDATA[*/p.MsoNormal, li.MsoNorm= al, div.MsoNormal { =09margin-top: 0.0cm; =09margin-right: 0.0cm; =09margin-bottom: 8.0pt; =09margin-left: 0.0cm; =09line-height: 107.0%; =09font-size: 11.0pt; =09font-family: Calibri , sans-serif; } a:link, span.MsoHyperlink { =09color: rgb(5,99,193); =09text-decoration: underline; } a:visited, span.MsoHyperlinkFollowed { =09color: rgb(149,79,114); =09text-decoration: underline; } *.zimbra1 { =09font-family: Calibri , sans-serif; } *.zimbra2 { =09margin-bottom: 8.0pt; =09line-height: 107.0%; } div.WordSection1 { =09page: WordSection1; } /*]]>*/</style></div><div><span style=3D"font-family: garamond, new york, t= imes, serif; font-size: 11pt;" data-mce-style=3D"font-family: garamond, new= york, times, serif; font-size: 11pt;">Dear Stakeholder,</span><br></div><d= iv data-marker=3D"__QUOTED_TEXT__"><div id=3D"zimbraEditorContainer" style= =3D"font-family:'arial' , 'helvetica' , sans-serif;font-size:12pt;color:#00= 0000" class=3D"2"><div><div><div style=3D"font-family:'arial' , 'helvetica'= , sans-serif;font-size:12pt;color:#000000"><div><p class=3D"MsoNormal" sty= le=3D"margin:0px"><span style=3D"font-family: garamond, new york, times, se= rif; font-size: 11pt;" data-mce-style=3D"font-family: garamond, new york, t= imes, serif; font-size: 11pt;"><br></span></p><p class=3D"MsoNormal" style= =3D"margin:0px"><span style=3D"font-family: garamond, new york, times, seri= f; font-size: 11pt;" data-mce-style=3D"font-family: garamond, new york, tim= es, serif; font-size: 11pt;"><strong>Kindly note the brief below concerning= the recent cPanel Update:<br></strong></span></p><ul><li class=3D"MsoNorma= l"><span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;fon= t-size:11pt">A two-factor authentication (2FA) bypass vulnerability now aff= ects the popular cPanel & WHM software suite may allow attackers to acc= ess secured accounts. The two-factor authentication cPanel Security Policy = did not prevent an attacker from repeatedly submitting two-factor authentic= ation codes. This allowed an attacker to bypass the two-factor authenticati= on check using brute force techniques.</span></li><li class=3D"MsoNormal"><= span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;font-si= ze:11pt">The flaw is not deemed to be critical, mainly because exploiting i= t also requires that attackers have valid credentials for a targeted accoun= t. Still, attackers could overcome that hurdle with a convincing phishing e= mail. Security researchers have published a POC where an attack can be acco= mplished in minutes.</span></li></ul><p class=3D"MsoNormal" style=3D"margin= :0px"><span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;= font-size:11pt"><br></span></p><p class=3D"MsoNormal" style=3D"margin:0px">= <strong><span style=3D"font-family:'garamond' , 'new york' , 'times' , seri= f;font-size:11pt">Call to action:<br></span></strong></p><p class=3D"MsoNor= mal" style=3D"margin:0px"><span style=3D"font-family:'garamond' , 'new york= ' , 'times' , serif;font-size:11pt">The vulnerability has been fixed (along= with two others) in cPanel & WHM versions 92.0.2, 90.0.17, and 86.0.32= . <strong>Website administrators should contact their web hosting pro= viders to upgrade their installations of sites that are managed through cPa= nel.</strong> <br></span></p><p class=3D"MsoNormal" style=3D"margin:0px"><s= pan style=3D"font-family:'garamond' , 'new york' , 'times' , serif;font-siz= e:11pt"><br></span></p><p class=3D"MsoNormal" style=3D"margin:0px"><strong>= <span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;font-s= ize:11pt">Link:</span></strong></p><p class=3D"MsoNormal" style=3D"margin:0= px"><span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;fo= nt-size:11pt"> <span style=3D"color:#1f497d"><a href=3D"https://www.cert.ug= /cpanel-update" target=3D"_blank" rel=3D"nofollow noopener noreferrer">http= s://www.cert.ug/cpanel-update</a></span></span><br data-mce-bogus=3D"1"></p= ><p class=3D"MsoNormal" style=3D"margin:0px"><span style=3D"font-family:'ga= ramond' , 'new york' , 'times' , serif;font-size:11pt"><br></span></p><p cl= ass=3D"MsoNormal" style=3D"margin:0px"><span style=3D"font-family:'garamond= ' , 'new york' , 'times' , serif;font-size:11pt"><br></span></p><span style= =3D"font-family:'garamond' , 'new york' , 'times' , serif;font-size:11pt"> = </span><span style=3D"font-family:'garamond' , 'new york' , 'times' , serif= ;font-size:11pt"></span><br><div><div><div><div style=3D"font-family:'arial= ' , 'helvetica' , sans-serif;font-size:12pt;color:#000000"><span style=3D"f= ont-family:'garamond' , 'new york' , 'times' , serif;font-size:11pt"><stron= g></strong><span class=3D"css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqee= o r-qvutc0"></span></span><div><div style=3D"font-family:'arial' , 'helveti= ca' , sans-serif;font-size:12pt;color:#000000"><div><div><div><div><div sty= le=3D"font-family:'arial' , 'helvetica' , sans-serif;font-size:12pt;color:#= 000000"><div><div><div><div style=3D"font-family:'arial' , 'helvetica' , sa= ns-serif;font-size:12pt;color:#000000"><div><span style=3D"font-family:'gar= amond' , 'new york' , 'times' , serif;font-size:11pt">#StaySafe,</span><br>= <br><span style=3D"font-family:'garamond' , 'new york' , 'times' , serif;fo= nt-size:11pt">CERT Administrator</span><br><span style=3D"font-family:'gara= mond' , 'new york' , 'times' , serif;font-size:11pt">Uganda National Comput= er Emergency Response Team/CC</span><br><span style=3D"font-family:'garamon= d' , 'new york' , 'times' , serif;font-size:11pt">NITA-U, Palm Courts, Plot= 7A,</span><br><span style=3D"font-family:'garamond' , 'new york' , 'times'= , serif;font-size:11pt">Rotary Avenue (Lugogo Bypass)</span><br><span styl= e=3D"font-family:'garamond' , 'new york' , 'times' , serif;font-size:11pt">= P.O.Box 33151,</span><br><span style=3D"font-family:'garamond' , 'new york'= , 'times' , serif;font-size:11pt">Kampala - Uganda</span><br><span style= =3D"font-family:'garamond' , 'new york' , 'times' , serif;font-size:11pt">W= ebsite: <span class=3D"Object" id=3D"OBJ_PREFIX_DWT679_com_zimbra_url= "><span class=3D"Object" id=3D"OBJ_PREFIX_DWT163_com_zimbra_url"><span clas= s=3D"Object" id=3D"OBJ_PREFIX_DWT84_com_zimbra_url"><span class=3D"Object" = id=3D"OBJ_PREFIX_DWT171_com_zimbra_url"><span class=3D"Object" id=3D"OBJ_PR= EFIX_DWT300_com_zimbra_url"><a href=3D"http://www.cert.ug" rel=3D"noopener = nofollow noopener noreferrer nofollow noopener noreferrer nofollow noopener= noreferrer nofollow noopener noreferrer nofollow noopener noreferrer nofol= low noopener noreferrer nofollow noopener noreferrer nofollow noopener nore= ferrer" target=3D"_blank">www.cert.ug</a></span></span></span></span></span= ></span><br><span style=3D"font-family:'garamond' , 'new york' , 'times' , = serif;font-size:11pt">Twitter: @CERT_UG</span><br><br><span sty= le=3D"font-family:'garamond' , 'new york' , 'times' , serif;font-size:11pt"= > Attention</span><br><span style=3D"font-family:'garamond' , 'new yor= k' , 'times' , serif;font-size:11pt">The National CERT/CC is under the Dire= ctorate of Information Security at the National Information Technology Auth= ority, Uganda (NITA-U). This e-mail and any attachments to it are confident= ial and are intended solely for the individual to whom it is addressed. If = you are not the intended recipient of this email, you must neither take any= action based upon its contents, or copy or show it to anyone. Please conta= ct the sender if you believe you have received this email in error</span></= div></div></div></div></div></div></div></div></div></div></div></div></div= ></div></div></div></div></div></div></div></div><br></div></div></body></h= tml> --=_6810d9b4-1b1b-443d-b2f2-2674aa243ee8--