Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


DigitalOcean quietly enabled 2FA behind your back: lose a domain? lose your DO account - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

DigitalOcean quietly enabled 2FA behind your back: lose a domain? lose your DO account

13567

Comments

  • jarjar Patron Provider, Top Host, Veteran
    edited February 2018

    @rm_ said:

    jarland said: Mandrill halts outbound emails to addresses that fail.

    You... what? So it's not just "lose a domain", but even have some brief mailserver glitch, and also lose your account? These are not some advertising mails, you made these a requirement for people to login -- and you just "disable" them like that? In effect disabling the entire account, over some temporary E-Mail issues?

    Mandrill automatically halts outbound mail to addresses that fail. Mandrill customers have to remove that block at Mandrill to allow their system to continue to send emails to that address. How you arrive at "lose your account" from that is a mental leap that I'm afraid I can't make with you. There is no logical interpretation of my words that lead there.

    The reason you'll lose your account is because you don't care if we can reach you, you won't contact support, and you won't give me the email address to look it up and remove the block for you. I know you won't, because of two reasons:

    1. You don't trust me, you never have.
    2. If it's fixed, you can't continue complaining.

    We have a long history Roman, your methods are not new to me. My consistent bluntness with you, however, is a bit new. Here's to hoping it works as a method of reaching you. Insanity is doing the same thing and expecting different results, being overly nice to you has gotten me nowhere over the years.

  • rm_rm_ IPv6 Advocate, Veteran

    Way to take this personal and present everything as somehow my fault. I still have my login and correct password, yet I can't login, and you blame me. Should be simple enough in any other case, but not with DO.

    Thanked by 1jiggawatt
  • jarjar Patron Provider, Top Host, Veteran
    edited February 2018

    rm_ said: Way to take this personal and present everything as somehow my fault

    Roman, you've been doing this to me for years. You find something to complain about, you blow it out of proportion, and then refuse to accept help. Yes it's personal that you hate me and don't trust me. Why wouldn't it be?

    I'm offering you help, but the complaint is of more value to you than the help. This has been your modus operandi for as long as I've known you. You don't actually want the things you say you want, you want things to complain about. You're welcome to, I'm not going to stand in your way, but I want to make myself very clear that I am able to help you and you are refusing.

    rm_ said: and you blame me

    The moment I'm standing here and offering you assistance and you refuse it, I do gain logical ground for blaming you for your situation. Want to take that away from me? Reach out to me at jdonnell @ digitalocean.com.

    I don't talk to other people this way, me and you go way back Roman. There is historical context for it. I've always liked you and wanted to be helpful, and you've always been rude to me for it. Treat people how you want to be treated, you seem to not like it when people treat you the same way you treat them.

    Thanked by 1Lee
  • rm_ said: Still cannot login, btw. My domains have 10 minute TTL for all MX records, just for how long do you cache them in violation of that -- a week?

    Maybe the MX record was not present at the very beginning, so that the negative cache interval in SOA record was used?

    @rm_ said:

    jarland said: Mandrill halts outbound emails to addresses that fail.

    You... what? So it's not just "lose a domain", but even have some brief mailserver glitch, and also lose your account?

    Couldn't the verification code be resent later, or does it lock down your account if the first code got lost?

  • rm_rm_ IPv6 Advocate, Veteran
    edited February 2018

    jarland said: Roman, you've been doing this to me for years.

    You're not my wife and I have not stopped beating you, I see.

    jarland said: I'm offering you help, but the complaint is of more value to you than the help.

    Because the issue is not so much about my particular account, but more globally with the practice that we observe here: locking out legitimate users out of their accounts for ridiculous reasons, and changing policies to introduce arbitrary requirements without user consent. If you want to help, work on improving in those areas -- not solve it as a one-off for "someone you know", and continue doing that to others.

  • Doesn’t half the internet do this sort of thing these days? It’s a mild inconvenience, but it’s also alerted me to an attempted breach a couple of times.

  • rm_rm_ IPv6 Advocate, Veteran
    edited February 2018

    psb777 said: Maybe the MX record was not present at the very beginning, so that the negative cache interval in SOA record was used?

    It had a bogus MX record with TTL of 10 minutes, then I changed it to a set of good MX records also with TTL of 10 minutes. Yet some 12 hours later it still doesn't work. But as Jarland already clarified, their system doesn't give second chances, and on a failure it won't retry anymore.

    psb777 said: Couldn't the verification code be resent later, or does it lock down your account if the first code got lost?

    It now says "we sent you a code", but in reality they don't even send it anymore, as Jarland confirmed. As a third-party unbiased person, would you agree this is even ...normal?

  • LeeLee Veteran

    I think we need the fluffy rabbit over here @bsdguy

  • ClouviderClouvider Member, Patron Provider

    It is normal. As you said yourself, you’ve been careless and had your details not updated with the provider. Provider tries to help you, you refuse to cooperate. It’s on you.

  • jarjar Patron Provider, Top Host, Veteran
    edited February 2018

    rm_ said: Because the issue is not so much about my particular account, but more globally with the practice that we observe here

    You're welcome to share that feedback, but this has helped a great number of people and the only reason it's causing a problem for you is because you refuse the path to resolution. You are the roadblock, not the change.

    rm_ said: locking out legitimate users out of their accounts for ridiculous reasons, and changing policies to introduce arbitrary requirements without user consent

    Your consent is not required to make the platform more secure. You can argue whether or not it does, but I know first hand that it did based on actual results, and I don't need to discuss theory.

    rm_ said: If you want to help, work on improving in those areas -- not solve it as a one-off for "someone you know", and keep mistreating others

    Why do you think this is a one-off solution because you know me? Contact form, support email, twitter, facebook, message me, same result everywhere. I may be faster because I know you, but those are all valid options to resolve the issue. If you want to resolve issues without contacting support, you should keep your contact information up to date. You've willfully introduced a problem and you're willfully refusing the solution.

    I'll rescind the offer to contact me personally via email to resolve it. Today is Amelia's first birthday party and I've got a lot to do. I'll be around on my phone, but I'm not going to sit by my computer and watch my email for someone who doesn't want my assistance.

    Love you bro, maybe one day you'll treat me like a human being and let me be one for you as well.

  • rm_rm_ IPv6 Advocate, Veteran
    edited February 2018

    Nekki said: Doesn’t half the internet do this sort of thing these days?

    Funnily enough I have never had such situation before, neither with a VPS provider, nor with any other service.

    As for if we take a more constructive look to what should be done, it is basically an insanity to send login verification E-Mails via the same channel used for promotional and newsletter E-Mails -- and with the same non-retry policy on failures.

    Verifications should be sent independently via their own separate channel and always retried on each user request.

  • LeeLee Veteran

    jarland said: Amelia's first birthday party

    Happy birthday Amelia.

    Thanked by 2jar Clouvider
  • DamianDamian Member
    edited February 2018

    Nekki said: Doesn’t half the internet do this sort of thing these days?

    Yes, it seems to be quite common nowadays. However, similar to the Incero non-issue earlier this week, it wouldn't be LET if something trivial were turned into a 10-page "discussion".

    Surely you weren't expecting actual content!

    Thanked by 2jar file
  • @rm_ said:

    Nekki said: Doesn’t half the internet do this sort of thing these days?

    Funnily enough I have never had such situation before, neither with a VPS provider, nor with any other service.

    Not a complete list, but off the top of my head:

    • Steam
    • Tresorit
    • Coinbase
    • Dashlane
    Thanked by 1jar
  • dynamodynamo Member
    edited February 2018

    @rm_ said: It had a bogus MX record with TTL of 10 minutes, then I changed it to a set of good MX records also with TTL of 10 minutes. Yet some 12 hours later it still doesn't work. But as Jarland already clarified, their system doesn't give second chances, and on a failure it won't retry anymore.

    If you are just making a point that DO arbitrarily applied this email re-verification policy w/o consent then I feel that they just followed the trend and are not alone in this. Now a days every other service seems to be doing it and they never ask me before. Depending on the change in parameters which vary from service to service (inactivity, device change, IP, location), they ask for this re-verification.

    One the other hand, if you want access to your account restored then you are kinda stuck if you do not supply them your email address. Its out of DO's or Jarland's hands if you do not do that. Not just Mandrill, every other transactional email provider does blacklist failed email addresses which has to be cleared manually then.

    Thanked by 2jar Clouvider
  • LeeLee Veteran

    Take a stand, never visit DO again.

  • rm_rm_ IPv6 Advocate, Veteran

    dynamo said: Not just Mandrill, every other transactional email provider does blacklist failed email addresses which has to be cleared manually then.

    Repeating so it doesn't get lost:

    rm_ said: Verifications should be sent independently via their own separate channel and always retried on each user request.

    @jarland would you agree? Can you help getting that implemented? Or is it too complex / too expensive to have a separate sending mechanism for important mailings, and easier to just keep using the non-critical bulk one for that too.

    Thanked by 1jar
  • I have to say that the inability of the user to get a retry sounds unusual to me. Usually I see something like "we have just emailed you an access token. If you don't see it within 2 minutes, make sure to check your spam folder. If you still don't see it, click here to have us send another one". Email is unreliable and sometimes has to be retried.

    Thanked by 1rm_
  • jarjar Patron Provider, Top Host, Veteran
    edited February 2018

    @rm_ said:

    dynamo said: Not just Mandrill, every other transactional email provider does blacklist failed email addresses which has to be cleared manually then.

    Repeating so it doesn't get lost:

    rm_ said: Verifications should be sent independently via their own separate channel and always retried on each user request.

    @jarland would you agree? Can you help getting that implemented? Or is it too complex / too expensive to have a separate sending mechanism for important mailings, and easier to just keep using the non-critical bulk one for that too.

    I'm afraid it's not that simple. We'd have to ditch transactional email providers, build our own mail cluster just for this, and then add it to an already growing SPF record. The overhead here for an outlier situation is greater than the overhead of having the support team simply click one button on our internal tooling that clears the block with Mandrill over the API. Especially if you consider how much a popular unnamed provider tends to hate receiving email from our IP space.

    It makes sense on the surface but there's a lot more that goes into making changes like that and justifying their overhead. We have a support team because you can't address every outlier scenario with automation.

    And keep in mind this is all stated only to address someone who has refused to enable 2FA as well, which is a bit of an odd thing to focus so many resources on workarounds for. It's a hard conversation to have in that respect, and a better one that comes out of it is "How could we instead make 2FA more attractive?"

  • @rm_ said:

    psb777 said: Couldn't the verification code be resent later, or does it lock down your account if the first code got lost?

    It now says "we sent you a code", but in reality they don't even send it anymore, as Jarland confirmed. As a third-party unbiased person, would you agree this is even ...normal?

    Can't really say I am unbiased. But I do agree that retry is a must.

    Clouvider said: It is normal. As you said yourself, you’ve been careless and had your details not updated with the provider.

    Say a customer was careless enough to make a login attempt when his email servers is temporarily out of order (which is usually unbeknownst to him). It is not his fault that he failed to update the details.

    Not giving another chance to retry and forcing the customer to contact support is okay (for me), but what a hassle.

    Thanked by 2rm_ Bogdacutuu
  • @rm_ said: Repeating so it doesn't get lost:

    always retried

    That is not possible even if they use their own mailing system. How can they retry infinitely to a 550 address and end up getting their mail server blacklisted by the remote server?

    Thanked by 2jar Aidan
  • rm_rm_ IPv6 Advocate, Veteran
    edited February 2018

    willie said: Usually I see something like "we have just emailed you an access token"

    I see that too, and continue seeing that every time on further attempts. But the point is that "under the hood" they don't actually send it anymore after the first time.

    dynamo said: How can they retry infinitely to a 550 address and end up getting their mail server blacklisted by the remote server?

    At least give feedback to user rather than lying every time that "we have just emailed you..."

  • jarjar Patron Provider, Top Host, Veteran
    edited February 2018

    I edited above but I'd like to reiterate, I think the direction on this is the wrong one. The right question here, I think, is "What would make 2FA more attractive?"

    Spending so much time discussing the workarounds and how to do them systematically is basically acceptance of a lack of adoption of the actual, proper security mechanism. Using 2FA prevents this secondary measure entirely. How do I get you to want to use 2FA?

  • @dynamo said:

    @rm_ said: Repeating so it doesn't get lost:

    always retried

    That is not possible even if they use their own mailing system. How can they retry infinitely to a 550 address and end up getting their mail server blacklisted by the remote server?

    It should retry at least upon user's request. There must already be pretty tight rate-limiting on systems as "secure" as digital ocean.

  • jarjar Patron Provider, Top Host, Veteran

    @psb777 said:

    @dynamo said:

    @rm_ said: Repeating so it doesn't get lost:

    always retried

    That is not possible even if they use their own mailing system. How can they retry infinitely to a 550 address and end up getting their mail server blacklisted by the remote server?

    It should retry at least upon user's request. There must already be pretty tight rate-limiting on systems as "secure" as digital ocean.

    Should it? Or should people use 2FA in the first place and not even see this? ;)

  • williewillie Member
    edited February 2018

    If DO is displaying a message saying it re-sent the token but it didn't actually do so, that sounds buggy. My post was about what other sites do. I get the idea that DO did this lockdown in response to an incident and couldn't wait around dealing with quirks of its email confirmation system, but the confirmation system's inability to retry does seem out of step with general industry practice and ought to be treated as a bug in its own right. If it displays a message saying that it retried when it didn't, that's a separate and simpler bug that should be easier to fix.

    Thanked by 1rm_
  • @jarland said: Or should people use 2FA in the first place and not even see this? ;)

    2FA and privacy don't go hand in hand :P

  • jarjar Patron Provider, Top Host, Veteran

    Who says it doesn't retry? We're talking about someone who intentionally disabled their email. How many retries is that going to take? ;)

  • jarjar Patron Provider, Top Host, Veteran

    @dynamo said:

    @jarland said: Or should people use 2FA in the first place and not even see this? ;)

    2FA and privacy don't go hand in hand :P

    No, but "password only" and security also don't fit in the same hand ;)

  • rm_rm_ IPv6 Advocate, Veteran
    edited February 2018

    jarland said: Who says it doesn't retry?

    You did:

    jarland said: Mandrill halts outbound emails to addresses that fail.

    ^

    jarland said: We're talking about someone who intentionally disabled their email.

    And now you're trying to muddle things up. I've re-enabled it shortly after realizing why the verification doesn't come. In effect it tried maybe 1 or 2 times over a period of 10 minutes with a bogus MX, then the real one was back in place. Yet almost a day later there's still not a single retry to that one.

Sign In or Register to comment.