NinerNet Communications™
System Status

Server and System Status

NC023: Maintenance complete

1 November 2015 03:34:56 +0000

The upgrades to server NC023 completed at 03:22 UTC. We will run some tests to ensure that everything is fine.

If you have any issues with server NC023, please let us know. Thank-you.

NC023: Maintenance underway

1 November 2015 02:21:27 +0000

Server NC023 went down for maintenance at 02:20 UTC. The server may be up and down a few times over the next hour.

NC023: Server maintenance

1 November 2015 02:03:11 +0000

Server NC023 will be going down within the next hour for up to an hour for some operating system upgrades and disk management. We’ll post updates here as necessary, but we don’t expect that this will affect many clients.

NC023: Emergency maintenance complete

22 October 2015 21:20:45 +0000

The emergency maintenance on server NC023 started at precisely 20:00 UTC and was completed successfully by 20:23 UTC.

There is actually a third server that needs the same work as the two that have already been attended to. We will post our plan for that later today.

Upcoming emergency server maintenance

19 October 2015 13:04:30 +0000

We have scheduled emergency maintenance this week for two of our servers to address a yet-to-be-published security vulnerability in the underlying virtualisation software these servers use.

The schedule is as follows:

Please click on the dates and times to convert the time of the maintenance into your local time zone. Server NC023 is commonly referred to by those that use it as the “relay server”, and server NC027 is our primary mail server.

The maintenance window will be approximately two hours long, but often ends up being much shorter. During the maintenance window the servers and everything hosted on them will be inaccessible. Any incoming mail for domains hosted on the mail server will be queued on the sending mail servers until our mail server is back online; email will be delayed during this time, but not lost. You will be unable to send email or access the webmail during the maintenance window. No websites will be affected.

While we are aware that this maintenance is scheduled during part of the work day for some of our clients, we are unable to change that due to the demands of this effort. We sincerely apologise for that.

We will post updates here and in alerts on our website before, during and after the maintenance.

We appreciate your patience with our efforts to keep our infrastructure and yours secure. If you have any questions, please let us know. Thank-you.

Xen security updates

8 March 2015 12:27:53 +0000

Some of our servers use a technology called Xen. Like all software, it is subject to the discovery of bugs and security vulnerabilities.

Over the last week, all of our servers that use Xen have undergone “patching” to address some newly-discovered — but not yet publicised — security vulnerabilities. This patching required servers to be rebooted, and finished this morning.

We thank you for your patience this week during these upgrades.

POODLE maintenance: Complete

23 October 2014 22:54:04 +0000

We have completed the maintenance to mitigate against exploitation of the POODLE vulnerability.

Because the effects of this maintenance could potentially be wide-ranging, please contact support if you have any issues with connecting over a secure connection to any of our servers. We don’t believe there will be any issues with web (HTTPS) connections, but there may be with some email (SMTP, IMAP and POP) connections by older email programs. That said, an exploit against this vulnerability has only been demonstrated using JavaScript and a web browser, so email connections (even if using SSLv3) are not generally considered to be at risk.

Thanks for your patience during this maintenance.

UPDATE, 2014-10-24: Please read some details on this maintenance, and learn more about SSL and TLS and email security, on our corporate blog.

POODLE maintenance: Update 1

19 October 2014 00:33:28 +0000

The maintenance described in our last post is under way, but we are running into some issues that are delaying completion. While there may be sudden and unexpected interruptions in some services for some clients, we are aware of them and are working on them. If necessary, we will revert to old configurations while we re-evaluate the new configurations recommended to defend clients against the POODLE vulnerability.

Thank-you for your patience.

SSL version 3 “POODLE” vulnerability, system-wide maintenance

17 October 2014 05:25:59 +0000

We will be conducting maintenance this weekend to address the above noted vulnerability. Please read more details about this on our corporate blog.

NinerNet SSL certificate fully installed

21 July 2014 12:10:11 +0000

We have solved the issue with the new NinerNet SSL certificate not fully propagating to all servers. All SSL web and email connections should now be using the new SSL certificate, which expires in 2015.

If you are having any issues, please restart your computer to ensure that all software on the computer uses the new SSL certificate. If you still have problems, please contact NinerNet support with a full description of the error message you are seeing.

Thank-you for your patience.

NinerNet home page

Systems at a Glance:



RSS icon. RSS

Twitter icon. Twitter

General Information:

This blog provides information about the status of NinerNet Communications systems. Dates and times of posts to this blog are in the UTC time zone, and dates and times given for events are also in the UTC time zone, although conversions may be offered for some time zones common to our clients. Please use the World Time Server to ensure accurate conversion of dates and times to your own time zone.



Recent Posts:




Tags: domains domains domains browser warnings connection issues database dns dos attack dot-zm domains down time email delivery ftp hardware mailing lists mail relay migration nameservers performance phplist reboot smtp spam spamassassin ssl ssl certificate tls tls certificate web server


On NinerNet: