Feeds

BT 'security upgrade' causes email headaches

If your domain's not down, you're not sending mail

Gartner critical capabilities for enterprise endpoint backup

BT broadband customers who don't use an @btinternet.com address are being forced to jump through hoops to send email, as the national telco says it is tightening its anti-spam policies.

A change in BT's rules means individuals and businesses who use a desktop SMTP program such as Outlook or Thunderbird with their own domain name are being confronted with error number 553 when they try to send mail. SMTP error 553 is raised when a remote server rejects the mail because the sender's domain is not on its approved list.

Users started noticing the problem earlier this month, but the policy change seems to have really bitten over the Easter weekend. One frustrated Reg reader who asked to remain anonymous said today: "I use it for social and business purposes and have spent all Easter weekend trying to sort it out - I've had enough and am changing email supplier."

BT did announce the change on one of its help sites. It tells non-@btinternet email users that they need to "validate" their domain. Nevertheless, many people have been caught unawares and the process seem unnecessarily bureaucratic.

A BT spokesman said the change had not been made in response to a particular increase in spam, but that it was part of an "ongoing programme of security improvements".

He said customers who are having problems should visit this page. Confusingly, the advice on how to get your BT email working again is provided by Yahoo!, a BT consumer broadband partner.

In trying to sort the validation process for his mum, blogger Phil Gyford aimed his frustrations at BT's various branding efforts. He had to log in to several sites before he could make the changes BT are demanding. He wrote: "If I'm paying for your service, a service whose helpline costs even more money, I don’t expect to be sent to a help page that requires me to guess which of your brands I have to visit, then which service I have to log in to, and then travel through three different brands before I reach a destination that bears a passing resemblance to the first instructions.

"Never mind forcing people into this tortuous branded hell purely for having the temerity of wanting to use their own email address, rather than your own branded one, in the first place." ®

5 things you didn’t know about cloud backup

More from The Register

next story
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Speak your brains on SIGNAL-FREE mobile comms
Readers chat to the pair who flog the tech
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?