NinerNet Communications™
System Status

Server and System Status

NC033: Data centre maintenance

22 March 2022 09:31:57 +0000

The data centre at which server NC033 (our primary nameserver, ns1.niner.net) is housed will be undergoing some maintenance tomorrow, 23 March, between 05:00 and 08:00 UTC. The work is on the data centre’s network infrastructure, and not on this server itself. The data centre released this statement:

These upgrades are designed and tested to be seamless and we do not expect any impact to customer traffic due to this maintenance. Should an unexpected issue arise, a possible outcome would be temporary loss of connectivity …. We will endeavour to keep any such impact to a minimum.

The data centre managers have had a good reputation for reliability in the six years we have been using them, so we do not anticipate any issues. However, if there are, we expect they will be very brief.

If you have any questions or concerns, please contact NinerNet support. Thank-you.

All servers: Company SSL/TLS certificates on all servers renewed and updated

14 January 2022 12:26:04 +0000

The *.niner.net wildcard SSL/TLS certificate has been renewed and updated across our entire infrastructure. This should be seamless for all our clients. However, should you run into a situation in the next 24 hours where you’re told that the certificate has expired, please log out and reload whatever it is you’re trying to do. You may need to reboot, but this would be very unusual. Simply forcing a reload should clear things up. Via FTPS you may need to re-trust our certificate depending on your FTP client.

This doesn’t affect certificates on your own domain on your website, just NinerNet services such as control panels and connecting to the mail and FTP servers.

If you have any questions or concerns, please do contact NinerNet support with any error messages you may be seeing. Thank-you.

All servers: SSL certificates updated

14 January 2021 11:30:33 +0000

The *.niner.net SSL certificate was renewed today and updated on all servers.

If you get any certificate errors in either your web browser or email program, please close down all programs, restart your computer, and try again. This should clear the cache of the programs in question and force them to download the new certificate information.

If you have any problems, please contact support. Thank-you.

All servers: SSL certificates updated

16 December 2019 12:18:04 +0000

The *.niner.net SSL certificate was renewed today and updated on all servers.

If you get any certificate errors in either your web browser or email program, please close down all programs, restart your computer, and try again. This should clear the cache of the programs in question and force them to download the new certificate information.

If you have any problems, please contact support. Thank-you.

NC033: Incident with primary nameserver resolved

15 November 2019 03:10:35 +0000

Following an operating system update that was applied at 00:37 UTC on 15 November the primary nameserver failed to restart. This was noticed immediately upon completion of the update, and we started troubleshooting.

After extensive research on the likely cause and resolution of the problem we determined that the quickest way to get the nameserver back online was to roll back the update and restore from a back-up. There were some issues with this, however, that necessitated implementing a back-up plan for company email in order for us to gain access to our account at the data centre where the nameserver is hosted. Once this was accomplished the restore was initiated.

The nameserver was back online at 02:28 UTC.

During the time the server was down domain information would have been cached by DNS resolvers that already had a cached copy of the DNS information for your domain. However, it is possible that some incoming email may have been delayed or possibly bounced, or people trying to browse your website would not have been able to see it. For this we apologise.

If you have any questions or concerns, please contact NinerNet support. Thank-you for your patience.

NC033: Maintenance complete

11 June 2018 00:45:06 +0000

Server NC033 is back online. It was down between 00:37 and 00:43 UTC.

NC033: Maintenance

11 June 2018 00:35:57 +0000

Server NC033 (the primary nameserver) is going down for maintenance in a few minutes for maintenance related to solving the mail server migration issue.

NC033: Maintenance complete

28 February 2018 05:51:11 +0000

Server NC033 was down for maintenance between 19:08 and 19:15 on 27 February, and has been successfully updated with current patches. This phase of the maintenance protects against Meltdown; further maintenance for protection against Spectre will take place when patches for it have been developed.

Updates will be posted here.

NC033: Emergency server maintenance

26 February 2018 10:17:51 +0000

Per our previous blog post, the next of our servers to undergo updating is NC033, on which the vast majority of our clients’ (and our own) nameservers (DNS) are hosted. The maintenance window is one hour long, but we expect that the server will be down for much less than that.

The maintenance window starts at:

Please click the link above to determine when this will be in your time zone.

The DNS (domain name system) has redundancy built into it, and we have multiple nameservers distributed in Canada, the US and the UK. This means that while this one server is down the others will take up the slack and this maintenance won’t affect the rest of your services in any way.

If you have any questions or concerns, please feel free to contact us. Thank-you for your patience.

Meltdown and Spectre hardware vulnerabilities

17 January 2018 13:58:43 +0000

As you may have heard and read in the news since the beginning of January, major vulnerabilities in very widely used computer hardware (not software) were discovered in mid-2017 by security researchers in Austria, Germany, the United States and Australia, and were publicised on 3 January. Fixes to mitigate some of the vulnerabilities are now being released, and further mitigating measures are under active development where such mitigation is possible.

To this end we will be applying patches to our servers starting tomorrow (18 January) that will necessitate some down time. Due to the nature and scale of this problem — illustrated by the answer to the question, “Am I affected by the vulnerability?” being a simple, “Most certainly, yes” — these patches cannot be delayed or scheduled for a more convenient time. Also, as work continues on ways to mitigate some of the vulnerabilities, there are some updates to the operating systems on our servers that are yet to be developed that will need to be applied in the future. As further related maintenance takes place we will link back to this post.

Following this blog post we will post the details of the first server to undergo patching.

Further details on these vulnerabilities can be read at the following links:

If you have any questions or concerns, please feel free to contact us. Thank-you for your patience.

NinerNet home page

Systems at a Glance:


Loc.SystemStatusPing
Server NC023, London, United Kingdom (Relay server), INTERNAL.NC023InternalUp?
Server NC028, Vancouver, Canada (Monitoring server), INTERNAL.NC028InternalUp?
Server NC031, New York, United States of America (Web server), INTERNAL.NC031InternalUp?
Server NC033, Toronto, Canada (Primary nameserver), OPERATIONAL.NC033OperationalUp?
Server NC034, Lusaka, Zambia (Phone server), INTERNAL.NC034InternalUp?
Server NC035, Sydney, Australia (Secondary nameserver), OPERATIONAL.NC035OperationalUp?
Server NC036, Amsterdam, Netherlands (Mail server), OPERATIONAL.NC036OperationalUp?
Server NC040, Toronto, Canada (Web server), INTERNAL.NC040InternalUp?
Server NC041, New York, United States of America (Web server), OPERATIONAL.NC041OperationalUp?
Server NC042, Seattle, United States of America (Status website), OPERATIONAL.NC042OperationalUp?

Subscriptions:

RSS icon. RSS

Twitter icon. Twitter

Search:

 

Recent Posts:

Archives:

Categories:

Links

Tags:

.co.zm domains .com.zm domains .zam.co domains back-up bounce messages browser warnings configuration connection issues control panel database dns dos attack dot-zm domains down time email email delivery error messages ftp hardware imap mail mailing lists mail relay mail server microsoft migration nameservers network performance php phplist pop reboot shaw shaw communications inc. smtp spam spamassassin ssl ssl certificate tls tls certificate viruses webmail web server

Resources:

On NinerNet: