NinerNet Communications™
System Status

Server and System Status

SSL/TLS certificate renewed

21 August 2015 12:05:08 +0000

The *.niner.net wildcard SSL/TLS certificate has been renewed and has been installed for all services on all servers, except NC026 as it will be shut down any day now.

If you receive any SSL/TLS warnings, please try restarting the application (program) in question — e.g., web browser or email client. If that doesn’t work, try rebooting. If you’re still running into issues, please contact NinerNet support with the exact text of any error messages.

Thank-you.

Migration of remaining email accounts on server NC018

14 August 2015 14:20:09 +0000

Over the weekend of 22-23 August 2015 we will be migrating all email accounts still on server NC018 to server NC027. Server NC027 has been our “new” mail server for the last two years, and all new domains have been hosted on it since it was set up in 2013. Server NC018 has outlived its useful life and needs to be replaced. The new server is an improvement over the old server in every respect.

We will be posting additional details here over the next week before the migration. However, you should be aware of the following initial details:

  • From the start of the migration, which we anticipate will take several hours, existing email accounts on server NC018 will no longer be accessible.
  • All new incoming email will be directed to the new server. Accounts on the old server will no longer be accessible after the start of the migration.
  • No incoming email will be lost during the migration, although it may be delayed briefly.
  • We will attempt to migrate the contents of mail boxes to the new server, with the exception of any accounts that are already over quota. However, we strongly recommend that you use your email program to create “local” folders (i.e., folders on your own computer) and drag and drop any messages stored on the server into your local folders, from where you can easily create back-ups.
  • As has always been our webmail policy, any data stored in the webmail other than email will not be migrated. This includes address books, notes, calendars and any other features of the Horde suite that you may be using. Please ensure that you save on your own computer copies of any data you have saved in the webmail application.
  • Except in rare cases, passwords will remain the same. However, there will be a requirement to make a small change to the configuration of your email program for sending email. We will be providing those details.
  • If you are downloading your email using POP, there will be no changes required for your incoming settings. If you are using IMAP, you may need to adjust your setting for folder structure. We will provide details if necessary closer to the migration date.
  • We ask that you do not make any changes through the control panel to email accounts as of the close of business on Friday 21 August. If you do, those changes — e.g., the addition or removal of email accounts or password changes — may not be reflected on the new server.

If you have any questions, please reply to the email you will receive from us with details. Thanks for your patience as we work to improve the service that we provide to you.

NC018: March network maintenance postponed

27 February 2015 22:31:29 +0000

The company running the data centres in which servers NC018 and NC020 are located has again postponed the network maintenance described earlier, and they have again not provided a new date.

We sincerely apologise yet again for this embarrassing false alarm, and we have voiced our significant annoyance to our supplier. When they pick a new date out of the lucky packet, we’ll let you know.

NC018: Network maintenance in March

27 February 2015 09:13:53 +0000

There will be network maintenance this weekend in the data centre where server NC018 is located. During this maintenance the server will be inaccessible for about five minutes. This is necessary maintenance that cannot be rescheduled.

The maintenance will happen between 06:00 and 12:00 on 2 March (UTC), but the server will only be inaccessible for five minutes during that six-hour window.

No work is occurring on the server itself.

This will affect about half of our email clients (including our own email). Very broadly speaking, if you have a web and email hosting account, this will affect your access to email for a few minutes, as well as your website. Most WordPress-based websites will not be affected, as will those running various other content-management systems. Incoming email will not be lost, only delayed for a few minutes.

If you would like confirmation of whether or not you will be affected, or if you have any other questions or concerns, please contact support and we will respond.

Thank-you for your patience during this maintenance to keep our systems running securely and reliably.

POODLE maintenance: Complete

23 October 2014 22:54:04 +0000

We have completed the maintenance to mitigate against exploitation of the POODLE vulnerability.

Because the effects of this maintenance could potentially be wide-ranging, please contact support if you have any issues with connecting over a secure connection to any of our servers. We don’t believe there will be any issues with web (HTTPS) connections, but there may be with some email (SMTP, IMAP and POP) connections by older email programs. That said, an exploit against this vulnerability has only been demonstrated using JavaScript and a web browser, so email connections (even if using SSLv3) are not generally considered to be at risk.

Thanks for your patience during this maintenance.

UPDATE, 2014-10-24: Please read some details on this maintenance, and learn more about SSL and TLS and email security, on our corporate blog.

POODLE maintenance: Update 1

19 October 2014 00:33:28 +0000

The maintenance described in our last post is under way, but we are running into some issues that are delaying completion. While there may be sudden and unexpected interruptions in some services for some clients, we are aware of them and are working on them. If necessary, we will revert to old configurations while we re-evaluate the new configurations recommended to defend clients against the POODLE vulnerability.

Thank-you for your patience.

SSL version 3 “POODLE” vulnerability, system-wide maintenance

17 October 2014 05:25:59 +0000

We will be conducting maintenance this weekend to address the above noted vulnerability. Please read more details about this on our corporate blog.

NC018 web server up

14 August 2014 18:41:09 +0000

An automated alert was issued at 14:04 UTC today that the web server on NC018 was down. Unfortunately no immediate action was taken by the data centre where the server is located, and the server was not restarted until 17:03 UTC.

We apologise for this significant delay. We have taken this issue up with the data centre to determine the cause of the delay and to ensure that it doesn’t happen again.

Other services on the server — email, nameservers, FTP and databases — were not affected by the outage.

NinerNet SSL certificate fully installed

21 July 2014 12:10:11 +0000

We have solved the issue with the new NinerNet SSL certificate not fully propagating to all servers. All SSL web and email connections should now be using the new SSL certificate, which expires in 2015.

If you are having any issues, please restart your computer to ensure that all software on the computer uses the new SSL certificate. If you still have problems, please contact NinerNet support with a full description of the error message you are seeing.

Thank-you for your patience.

NinerNet SSL certificate

21 July 2014 07:41:35 +0000

We are aware that the new NinerNet SSL certificate has not properly propagated to all servers. We are working to fix this and will post an update here as soon as we believe the issue has been resolved.

In the meantime it is usually possible to override any warnings and continue with whatever you are doing.

NinerNet home page

Systems at a Glance:


Loc.SystemStatusPing
Server NC023, London, United Kingdom (Relay server), INTERNAL.NC023InternalUp?
Server NC028, Vancouver, Canada (Monitoring server), INTERNAL.NC028InternalUp?
Server NC031, New York, United States of America (Web server), INTERNAL.NC031InternalUp?
Server NC033, Toronto, Canada (Primary nameserver), OPERATIONAL.NC033OperationalUp?
Server NC034, Lusaka, Zambia (Phone server), INTERNAL.NC034InternalUp?
Server NC035, Sydney, Australia (Secondary nameserver), OPERATIONAL.NC035OperationalUp?
Server NC036, Amsterdam, Netherlands (Mail server), OPERATIONAL.NC036OperationalUp?
Server NC040, Toronto, Canada (Web server), INTERNAL.NC040InternalUp?
Server NC041, New York, United States of America (Web server), OPERATIONAL.NC041OperationalUp?
Server NC042, Seattle, United States of America (Status website), OPERATIONAL.NC042OperationalUp?

Subscriptions:

RSS icon. RSS

Twitter icon. Twitter

Search:

 

Recent Posts:

Archives:

Categories:

Links

Tags:

.co.zm domains .com.zm domains .zam.co domains back-up bounce messages browser warnings connection issues control panel database dns dos attack dot-zm domains down time email email delivery error messages ftp hardware imap mail mailing lists mail relay mail server microsoft migration nameservers network networking performance php phplist pop reboot shaw shaw communications inc. smtp spam spamassassin ssl ssl certificate tls tls certificate viruses webmail web server

Resources:

On NinerNet: