Mail and Calendars at the MPI/CBS

Permanent Link: topicbacklinks

Overview

Central IT provides a Groupware service (email, calendars,...) that is accessible to all institute users. In addition to simple sending/receiving emails, there are several advanced features available:
  • Multi-layer calendars with integrated access to the institute's room planning.
  • Easy to use Web GUI for browser access.
  • Excellent backup and undelete functions
  • Export feature—very useful, when you leave the institute and you want a copy of either the whole account or of specific parts.
  • Two-Factor-Authentication is mandatory for this service.

Getting started

FAQ - Awareness

Expand all Collapse all

What is important to know about email in general?


Permanent Link: topicbacklinks

  • Email is being used by people with malicious intend to cause damage to users and the infrastructure. It's imperative to know a thing or two about attack types.
  • Email sender and receiver addresses look like this: "John Doe" <johndoe@mailserver.domain.de>
    • (B1) Only the second part is actually an address. The first part is an arbitrary text . These addresses might be able to trick you:
      • "Prof. Dr. John Doe" <intern1@cbs.mpg.de> is still just an intern although he calls himself "Prof."
      • "administration@cbs.mpg.de" <intern1@cbs.mpg.de> (still an intern).
  • (B2) You cannot be sure that the sender address is valid and was sent by the respective email account.
    • An email server could make sure that all sender addresses ending with its domain ( @cbs.mpg.de in our case) are valid.
      This is currently not possible on our email server because IT was mandated to support a specific service for one of the departments which requires the sender address to be forgeable.
    • (B3) Even if the email was actually sent from the expected mail account, you cannot be sure, the mail was sent by the person you're expecting.
      • It is common that users are tricked by bad people into sharing their passwords. Their email accounts are then abused to send spam or Phishing emails.
      • Try not to look for clues of validity in metadata but in the emails content itself. Example:
        • No legit invoice comes in form of a .exe -File.
        • A director is not in urgent need of Google gift cards.
        • A user having to "validate" an email account doesn't make sense. Account validity is tied to contract data and a user management system would not trust a user to update this by themself.
        • A quota increase will not require you to login somewhere.
      • If in doubt, use a second way of communication to authenticate the email (Phone, Whatsapp, Mivervamessenger,...).
  • (B4) Transport Encryption: While email is send through the internet using encrypted connections, all parties involved (esp. email server administrators) are still able to access them in the clear. To prevent that, end-to-end encryption must be used. Get the necessary digital identity here: CertificateManagement .
  • (B5) Signatures: Having a digital identity enables you to digitally sign emails. Signed emails are the only reliable way for a receiver to spot forged sender addresses.
  • (B6) An email can take up to three days to arrive.
  • (B7) To send end-to-end encrypted mails, the receiver must have a digital identity—the sender does not need one. For signatures, it's the other way around.
  • (B8) Receiving an encrypted email should in no way increase your trust in it. It just ensures that nobody can read it during transit. It doesn't tell you anything about the person who sent it. That's what signatures are for.
  • Nearly all attacks on IT infrastructure occur through email, particularly through harmful attachments.

What is important to know about email in the institute?


  • The institute operates an on-premise email server. Emails to other institute users never leave the institute's domain of control—if the receiver doesn't have a forward defined.
  • To mitigate attacks on IT infrastructure, several types of email attachments are blocked, see the list here. Emails carrying them are not delivered. Sender and receiver are notified immediately about each single blocking event.
  • There is a size limit for receiving text emails on the institute's mail server: 25,6 MB (24.4 MiB). Attachments are not sent as text but have to be recoded for transport. The effective limit of an email containing attachments is around 18 MB (17 MiB).
  • There is spam classification system being used on the server which will try to sort out unwanted mails. If you think an email for you was lost in transit, have a look in the "Spam" folder.
  • There are no filtering mechanisms exceeding the ones mentioned here. If you think, an email was lost, please contact IT. Every single incident will be investigated!


Back to FAQ start


I want to be extra careful. Which attack types should I look out for?


Permanent Link: topicbacklinks

There are different ways of harming you when it comes to your email account. You'll need a certain amount of understanding of the matter to be able to withstand these attacks which there are several different types of:

Malware

Malware attacks are attempts to get control over the computer of an email's receiver. There are simple cases like .exe files being sent as an attachment and more complex ones like specifically crafted emails that trigger bugs in the email software without user interaction. IT has measures in place to make both types of of malware attacks less likely.

To reduce the risk as a user, the best method is to handle emails only es text which means:
  • Do not enable "HTML mail view" in your email program.
  • Do not send rich text email (or "HTML" email). This will reduce the pressure on others to enable HTML mail view.

Spam

Spam is commercial or political advertisements being sent to your mailbox. Spam is usually just annoying and only an attack on your scarce time. IT has measures in place which reduce spam dramatically by exploiting the fact, that spam is against the law and the sender cannot use official mail servers to send it.

You as a user can do little against spam.

Phishing

Phishing emails try to get you to reveal secrets which are later abused to take control of our infrastructure without authorization, e.g. email account. These emails are not attacks on a technical level but they try to deceive you.

This type of attack is not a problem as long as you
  • do not send any credentials via email and
  • you adhere to Rule#1 ("Don't enter your passwords into websites not on servers ending with .cbs.mpg.de ").
An additional countermeasure introduced by IT is 2-factor-authentication.

Scam

Some bad people may try to trick you into certain actions by pretending to be someone else. Most prominent these days is the gift card scam: Someone claiming to be an authority figure, like your boss or a director, ask you to buy gift cards (e.g. from Google) and send the card details to them through email.

Nothing can be done by IT to protect you against this type of attack.

Back to FAQ start


2FA - What is Two-Factor-Authentication? And why is it necessary?


Two-Factor-Authentication is a concept taking into account that it's less likely to compromise two kinds of credentials (like an ATM card plus its PIN) than compromising just one of them (stealing the card; sneaking up to you and watching you type the PIN on the ATM).

For the Groupware service, a method called OATH-TOTP is being used. You require the app Google Authenticator on your phone plus an additional password that you don't have to (and should not) remember. The app will create TANs (transaction numbers) once every 30s. The transaction numbers are made of the password and the current time—no internet connection is necessary on your phone. The algorithm is widely known. Alternative OATH-TOTP apps are available—although it's recommended to use Google Authenticator for support reasons.

Back to FAQ start


Which software do you recommend for email/calendar?


Permanent Link: topicbacklinks

Platform/OS Situation Software Reasons Comments
Anywhere Mail access on a regular computer or Laptop The Web GUI No setup is required
IT takes care of updates/security patches
By far the best email Web GUI.
No encryption and digital signatures can be used.
On mobile devices, the regular Web GUI doesn't perform well. A special "mobile" Web GUI with a reduced feature set can be selected.
Android Email access on Android phone or tablet Fairmail Very feature rich open source email client software from an author known for his strong pro-privacy attitude. One time pay: EUR 5,99 (for all devices)
Android Calendar/Contacts access on phone or tablet Dav5X One time pay: EUR 5,99 (for all devices) Dav5X is not a calendar software but a sync plugin. A calendar software is included in Android, various other ones can be installed/bought.
Linux, Windows, macOS Email access on a regular computer or laptop, offline use required. Thunderbird Thunderbird is freely available, incl. its source code and behaves identically on all platforms. Thunderbird's certificate store (used during email signing and encryption) is independent of the OS and therefore not prone to OS-specific quirks.  

Do not use Outlook because there's a high risk of institute credential compromise.

Back to FAQ start


FAQ - Access, Security

How do I access the institute email account?


Permanent Link: topicbacklinks

Every institute user is assigned a mail account which includes an address and a calendar management system. The address is

[loginname]@cbs.mpg.de (i.e. mueller@cbs.mpg.de )

There are several way to access your account:
Method Pros Cons
Web browser No setup necessary - just visit the website. Internet connection is mandatory. There is an offline-mode available but it's not useful, if there's a lot of content in the mailbox. 2-factor authentication is required for that.
Client software Handling multiple email accounts in one place is easier.
Mails are stored locally and can be managed without an Internet connection.
Local program is necessary.

Web browser

The email account is accessible via any browser at this address:

https://mail.cbs.mpg.de

Have your smartphone ready since you might have to enter a TAN as a second authentication factor.

IMAP client software

Permanent Link: topicbacklinks

IMAP is the language, most email applications and email servers are able to speak. Most email applications will auto detect necessary parameters. You'll just have to enter your full name, your email address and a newly created application password. Unfortunately, this doesn't work for macOS's email app which requires special treatment.

You'll most likely want this connection type for
  • Thunderbird (officially supported email client of the MPI CBS).
    • Unfortunately it's not able to auto-detect calendars, yet. IT is in contact with Mozilla to fix that.
    • To access your calendar(s), add a new calendar "On the network" at the location https://mail.cbs.mpg.de . Username is your email address, password is the application password, you just created for email access.
  • Fairmail (Android email client with very strong focus on privacy)
  • TheBat!, Pegasus Mail, Eudora, ...

Manual email client configuration

If your email app doesn't automatically detect the necessary parameters, here they are:
  • Protocol for accessing mails: IMAP4 or IMAP (more precisly: IMAP4s ).
  • IMAP4-Server: mail.cbs.mpg.de
    • Security type: TLS (sometimes called SSL or implicit TLS; "Starttls" is always the wrong choice!)
    • Port number: 993
    • Username: Your institute login name (e.g. schmidt )
    • Password: You're going to have to create an application password.
  • Server for sending mails mail.cbs.mpg.de
    • Security type: TLS (sometimes called SSL or implicit TLS; "Starttls" is always the wrong choice!)
    • Port number: 465
    • Username, password: Same as for IMAP4
  • Calendar-Server: https://mail.cbs.mpg.de
    • Username, password: Same es for IMAP4

macOS email app and calendar

Permanent Link: topicbacklinks

To simplify macOS PIM setup with a configuration profile:
  1. Remove any existing account connections from macOS, if you have any.
  2. Create an application password via the email server's Web GUI.
    You'll need to copy and paste the password later. Do not store it anywhere! It is a feature of application passwords that they are only remembered by applications but not by users!
  3. Open Safari and go to https://ac.cbs.mpg.de/apple/$username, replacing $username with your institute username (the part before @ in your email address) to download the profile file.
  4. In System Preferences, under Security, install the profile using the application password (enter it twice) and forget the password!
  5. Log into the email server's and create an for this macOS computer.
  6. Wait for your mailbox to sync with your computer.


Back to FAQ start


How do I use encryption or digital signatures?


You'll need a digital identity for digital signatures and to receive encrypted emails.

Back to FAQ start


Application passwords - How do I use 2FA with email/calendar software?


Permanent Link: topicbacklinks

Regular email software is unable to handle two-factor authentication. The Solution is to create a random longish password in the Zimbra GUI—one per email client instance. You can later remove access for certain email clients or add new ones at will.

The process is explained here.

Back to FAQ start


Why am I sometimes logged out of the Web GUI without explanation?


Permanent Link: topicbacklinks

When logging into the Web GUI, your browser receives a secret number (an "auth token") which is then used to identify your browser when communicating with the Web GUI. This token is time limited. It will survive restarting the browser or even your computer after which you can continue working in the Web GUI. However, after 22 hours it's invalidated and you have to re-login. This is common practice when it comes to Web sessions.

Back to FAQ start


My account is suddenly inaccessible and I cannot re-login.


Permanent Link: topicbacklinks

Possible reason 1 - Temporary lockout (Very likely. Our email server blocks around 5 accounts per day.)

When the email server detects too many failed login attempts for a given account—more than 10 failed logins in 10 minutes—the account is blocked for 15 minutes. All sessions (graphical ones and data connections i.e. from mobile phones) are terminated.

There are multiple possible reasons for a temporary lockout:
  1. You changed your password and one of your programs or devices is still using the old one. Solution: Make sure, all of your programs and devices have the correct password.
  2. You re-activated an old device (e.g. a phone or laptop) you didn't use for a long time. The solution is the same as in (1).
  3. An evil person tried to guess your password with a high frequency. In this case, the temporary block is protecting your password. Solution: You'll have to wait 15 minutes.

Possible reason 2 - Phishing success (Very unlikely since 2FA was introduced)

You might have noticed these emails insisting on you entering your credentials on some server to
  • "update your account"
  • "increase your quota"
  • "unblock your account"
  • ...
Some users can't resist and share their account password. Usually, the sender of the phishing email then tries to access the compromised account to send spam or other phishing emails.

There's a sensor in the email server which will block these compromised accounts.

Solution: Come to IT and bring your passport or "Personalausweis" to have your account re-activated.

Possible reason 3 - Account timeout (Likely)

When your institutional account expires, you will retain access to your email account for an additional three months. You will receive an email detailing this information. After the three-month extension, your account will be deactivated, and your login credentials will no longer be valid.

Solution: You have to get your account renewed by Administration. IT can't help in this case.

Back to FAQ start


I have two or more phones. Can I use either one for 2FA?


Permanent Link: topicbacklinks

Absolutely. Google Authenticator has an Import/Export function. You can export your 2FA credentials from one into a QR code and import it via camera into the other. This is perfectly safe. Just make sure to:
  • Not have the credentials (e.g. QR code) as a file somewhere.
  • Come to IT to reset 2FA if your phone is lost so no one else owns valid credentials of yours.


Back to FAQ start


The generated TANs don't work (anymore). What's wrong?


The 2FA-TANs are calculated from two pieces of data:
  1. the secret password you entered into Google Authenticator and
  2. the current time.

If the phone doesn't have correct time, Google Authenticator will create TANs that are not accepted.

Solution: Set the correct time on your phone. Make sure to have selected the time zone correctly.

Quick solution for Google Authenticator: Putting the app into a "bubble of correct time" but not changing the rest of the phone (requires internet connection):
  • Click on the three dots in the upper right corner in Google Authenticator.
  • Select "preferences".
  • Select "time correction".
  • Select "synchronize now".
  • Google Authenticator will now fetch the correct time from the network and use it for generated TANs. This doesn't affect other apps.


Back to FAQ start


What if I loose access to my TANs?


Permanent Link: topicbacklinks

If your phone is lost, broken or you accidentally removed Google Authenticator, you cannot create TANs anymore - which will prevent you from logging into the email server's Web GUI. However, email applications equipped with application passwords will continue to work.

If you do not have your seed code, please contact IT. You'll need to
  • call a core IT member that knows you personally and is able to identify you. IT staff may refuse this method if there is any doubt about your identity.
  • or come to IT physically and present a valid passport, Personalausweis or Aufenthaltstitel.
We'll then reset 2FA for you and you can re-enable it by yourself.

Back to FAQ start


Why do I have to use Password and/or 2FA every time I login? (How to save some time)


Permanent Link: topicbacklinks

By default the Web GUI expects a 2FA TAN being entered every time you log in. However, there are two check boxes in the login process:

checked Stay signed in : This will keep you logged into the email server even when closing the browser and re-opening it later.

checked Trust this computer : Instructs the server to remember this successful 2FA authentication for 30 days. During that time, you'll not have to enter a TAN anymore.

Hints:
  • Do not check these check boxes on public computers (e.g. in a public library) or on other people's devices, like a friend's laptop!
  • You can safely use both check boxes on your personal laptops and whenever you have a personal account on a computer—e.g. in the institute when logging in using your credentials. Don't worry, it's not actually the computer that's being trusted but your user account. The next person using the computer will not be able to impersonate you.
  • The trust can be revoked in the "Preferences"/"Accounts" section of the Web GUI.
  • Persistent cookies are being used for both trust functions. If you have privacy options enabled which clear cookies in your browser, you might want to add an exception for the email server's Web GUI.


Back to FAQ start


FAQ - Misc

Why is there so little storage in my mailbox?


Read about that here.

Back to FAQ start


How do I free up space in a mailbox?


Space in a mailbox is almost exclusively used by big attachments and by mails containing large images. It's good practice to save important attachments to your computer's file system and removing them from the mail server. The mail itself will remain on the mail server, requiring less storage.
  • Find big mails
    • Go to the search field on top of the web interface and type larger:100KB to find all mails that are larger than that value.
      1_search_big_mails.png
  • Prepare a sorted list
    • Make sure the right listing mode (one that shows a mail's size) is selected. This only has to be done once.
      2_pane_mode_selection.png
    • Sort the list by size descending. This way you can start with the biggest ones and work your way to to smaller ones.
      3_sort.png.png
  • Remove things
    • Now you can either directly remove big mails or download/remove their attachments (either single ones or all at once). There are remove-links for each attachment and there's one link to quickly remove all of them.
      4_remove_attachments.png


Back to FAQ start


I (accidently) deleted an email. What should I do?


Permanent Link: topicbacklinks

The email server is the best backed-up system in the institute. If you're unable to restore an email, please contact IT.

There are several levels of "being deleted" an email has to go through to actually be removed. Find them below.

Trash bin

Deleted emails go to the Trash folder first and can be retrieved easily from there. Just drag and drop them to a folder of your choice. Emails in the Trash folder are automatically deleted 30 days after they are moved there.

Hint: Trash is for items you delete; Junk is for spam automatically filtered by the email service.

Dumpster

Emails removed from Trash stay in the "dumpster" for some days. The dumpster is not a folder but an area visibly in the Web GUI by selecting "Restore deleted Items" from the Trash folder's context menu. There's no way for you to remove emails from this area. The email server will permanently delete emails from the dumpster 30 days after they were moved there.

Hint: This function works as a safety net against rouge email software. Email software is able to circumvent the Trash folder but not the dumpster.

Backup

Institute emails are stored on the server for weeks. To recover an email:
  1. Create a ticket containing the desired restoration time.
    • For example, if an email was deleted at 10:30 on 01.05.2015, request restoration from 10:15 on that date.
    • IT can only restore the entire account at a specific time, not individual emails.
  2. IT will restore a backup, adding it to your account as a folder.
  3. Find and retrieve your email(s).
  4. Inform IT when done to remove the backup folder.


Back to FAQ start


I'm leaving the institute. What happens to my emails?


Permanent Link: topicbacklinks

  • Your email account will remain active for three months after your contract ended.
  • You'll be notified of the deactivation date via email before your contract expires.
  • Consider setting up email forwarding to another address (e.g. to your new research facility or to a colleague remaining at the institute).
  • Backup your emails using an email client software or the Web GUI's Import/Export feature under Preferences to get a downloadable archive file.
  • After three months, your emails will be deleted:
    • Any established email forwards will continue for an additional 21 months.
    • You won't receive emails from internal mailing lists.
    • Post-deletion, setting or changing forwards requires an in-person visit to IT with identification.


Back to FAQ start


How can I forward emails to another email address?


Permanent Link: topicbacklinks

Warning: German law applies to the institute's mailserver. If there's a chance that you receive mails from test subjects or patients, you have to make sure, not to send these mails outside of german jurisdiction since this would violate german privacy law . Examples of mail services in other jurisdictions are:
  • Googlemail
  • Hotmail

Steps:
  • Got to the Webgui
  • Select the "Preferences" tab
  • Select the "Mail" configuration block on the left
  • In the paragraph "Receiving Messages" ...
  • ... enter the target address of your choice and select the "Don't keep a local of messages" checkbox.

My account is already locked so I cannot create the forward myself.

You have to come to IT with a passport or a Personalausweis since we cannot be certain of your identity any other way.

We have to be very strict here. IT will not accept forwards request via phone or an email from a non-institute email account.

Back to FAQ start


Can I get a mailing list?


Absolutely. Follow these steps:
  1. There are 3 types of managing the members of a MailingLists. Choose one.
  2. Think about a name. It must contain a Dash sign ( - ) to clearly distinguish it from user accounts that exist in the same name space.
  3. Please write a ticket to request the mailing list.
  4. IT might have technical objections about the name. Those would then be communicated via the ticket system.

This topic: EDV/FuerUser > WebHome > Groupware
Topic revision: 15 Oct 2024, Burk2
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding Foswiki? Send feedback