Views:

Trend Micro is actively looking into reported issues where UCEPROTECT is blocklisting IP addresses that Trend Micro uses for sending out email messages on behalf of our customers. UCEPROTECT claims that this is an anti-spam measure and publicly suggests our customers change service provider if the issue is not resolved quickly.

Currently these blocking issues cannot be resolved permanently by Trend Micro because of the following reasons:

·       The criteria for customer IP’s being placed on UCEPROTECT block lists are not publicly available and appear to be overly aggressive in nature (entire IP ranges can be blocked based on a single ‘suspicious’ IP).

·       UCEPROTECT refuses to interact with vendors (including Trend Micro) to help assist in understanding the criteria behind the blocking whereas other more reputable blocklists will engage with customers so that customers can proactively correct behaviour.

·       Unlike other reputable blocklists UCEPROTECT also charges a fee for delisting which Trend Micro recommends our customers NOT to pay. Paying the fee will not prevent UCEPROTECT from again blocking the same IP in 1 day, 1 week etc. leading to further blocklisting and payment requests in the future.

As always, Trend Micro takes necessary measures to avoid having our IPs identified as a spam source. At the same time, we are advising our customers and their email recipients to avoid using UCEPROTECT’s blocklist.

 

Actionable steps against UCEPROTECT ASN blocking:

1.     Check the status of the IP on the site, UCEPROTECT Network - Spam Database Query.

2.     Under Test, select ASN from the drop down list. Enter the ASN Value found from the MTA Logs. As an example, AS16509. Click Start Testing.

3.     Let the recipient server know that the issue is with UCEPROTECT and that they should allow our IPs. Trend Micro server IP addresses can be found on the following articles under the Inbound Servers section:

Email Security (EMS)
Hosted Email Security (HES)

4.     Inform your affected recipient(s) to stop using UCEPROTECT if possible, because it blocks the entire AWS ASN (16509), which will accidentally injure the emails from HES/EMS and all other services hosted in AWS.

5.     At least, inform your affected recipients(s) to disable UCEPROTECT Level 3 check because Level 3 is overly aggressive and will cause collateral damages.