So I have been doing some testing with the gadget I have installed on the desktop, that works for IMAP receiving and has the "new" APP password in it and on the account where the actual email address is not used to login, but an unrelated non VM one
Results.....
IMAP as we know works, all standard there as far as settings goes and SSL.... IMAP v4, SSL: yes, Port: 993
Outgoing...
SMTP, SSL no, Port 25 Authentication YES user iD: full actual email address, Password is the new APP one, and this works ONCE and then on confirmation test it fails to send, although looks like it has worked! (this could be a gadget related issue, but i doubt it) sending a 3rd email 5 minutes later with no changes in settings or anything, and it works.... so who knows, but....
Switch the SMTP back to SSL and Port 465 and it fails every time and gets stuck in the outbox, I can't test the Port 587 thing in the gadget, as it only has SSL option not TLS
This exact scenario is also repeated in WLM.
So, bottom line VM servers for POP3 and SMTP no longer accept SSL connections, but still require authentication with email address and password (for app access not account access) but will ONLY accept them in plain text format and in NON-SSL mode.... so basically insecure
and it's our fault/problem not their's and they're implementing all of these changes for "our security".... Perhaps someone from VM would like to answer this..... exactly where do you think scammers get email addresses and passwords from ?? oh yes, that's right, careless transmission of INSECURE data
EDIT:
in addition to the tests above, in WLM i set everything to non-ssl and then changed the incoming server login to use APOP (authenticated POP) and set outgoing server to requires authentication then set use same as incoming, closed and opened the app and all seemed good, could send emails, but, when trying to receive it threw errors.
So, insecure is the ONLY way to use VM/ntlworld remote mail access (except of IMAP for incoming)