The SSL certificate has been replaced on all servers. If you still get errors, please restart the program in question or, if necessary, restart the machine or device.
If you need any assistance, please contact NinerNet support. Thank-you.
The SSL certificate has been replaced on all servers. If you still get errors, please restart the program in question or, if necessary, restart the machine or device.
If you need any assistance, please contact NinerNet support. Thank-you.
The SSL certificate was upgraded on server NC027 at 10:09 UTC. This covers email services. We’ll be replacing the expired certificates on other server and control panels shortly too.
You may need to restart email programs and web browsers for the new certificate to be recognised. Again, we apologise for the inconvenience.
Our wildcard SSL certificate for *.niner.net has expired in some time zones. It will be updated within the hour and an update posted here.
Our apologies for the delay.
We have completed the maintenance to mitigate against exploitation of the POODLE vulnerability.
Because the effects of this maintenance could potentially be wide-ranging, please contact support if you have any issues with connecting over a secure connection to any of our servers. We don’t believe there will be any issues with web (HTTPS) connections, but there may be with some email (SMTP, IMAP and POP) connections by older email programs. That said, an exploit against this vulnerability has only been demonstrated using JavaScript and a web browser, so email connections (even if using SSLv3) are not generally considered to be at risk.
Thanks for your patience during this maintenance.
UPDATE, 2014-10-24: Please read some details on this maintenance, and learn more about SSL and TLS and email security, on our corporate blog.
The maintenance described in our last post is under way, but we are running into some issues that are delaying completion. While there may be sudden and unexpected interruptions in some services for some clients, we are aware of them and are working on them. If necessary, we will revert to old configurations while we re-evaluate the new configurations recommended to defend clients against the POODLE vulnerability.
Thank-you for your patience.
We will be conducting maintenance this weekend to address the above noted vulnerability. Please read more details about this on our corporate blog.
We have solved the issue with the new NinerNet SSL certificate not fully propagating to all servers. All SSL web and email connections should now be using the new SSL certificate, which expires in 2015.
If you are having any issues, please restart your computer to ensure that all software on the computer uses the new SSL certificate. If you still have problems, please contact NinerNet support with a full description of the error message you are seeing.
Thank-you for your patience.
We are aware that the new NinerNet SSL certificate has not properly propagated to all servers. We are working to fix this and will post an update here as soon as we believe the issue has been resolved.
In the meantime it is usually possible to override any warnings and continue with whatever you are doing.
We are closing this issue, although we have not found a cause. As far as we can tell, everything related to authentication on the server is working. Research on similar occurrences also shows the problem apparently resolving itself after a short time, and also points to a number of possible causes, including faulty operating system and software updates on client machines. However, in this case we saw the problem on different operating systems (Windows, Mac and Android) and different email programs. We also suspected anti-virus software, but again we heard of problems on computers running different anti-virus software.
Oddly, we could not reproduce the problem on any machines in our office, and so we had no primary references on which we could do research.
About the only commonality we could find — other than the server itself, of course — is that we believe all of the reporting clients are on VSATs. However, even that doesn’t fully explain the problem as if, for some reason, VSATs were the issue we should theoretically have seen the same problem on other servers. That said, the problem reported to us was only with downloading email, and the other mail server on which the bulk of our clients are hosted uses slightly different SSL technology; additionally our default instructions for that server do not mention using SSL. We saw a similar issue with VSAT connections several years ago, so if this is related it’s not unprecedented.
Another possibility that can’t be ruled out is network issues that may have interfered with encryption on the connection. Given the number of reports, such an issue (if it existed) would likely have been closer to the server than the client. If this issue reoccurs we will contact our upstream providers to see what they have to say.
While it is unsatisfactory to close an issue without having a smoking gun to identify it, we are going to do so at this time. If you do see this issue again, please contact support and we will again look at the issue.
Thank-you for your patience while we looked at this issue.
We’re now getting emails from clients telling us that the issue has apparently resolved itself. We’re continuing to investigate, but we have not done anything to the server, either before this issue started or since it was reported to us.
Updates will continue to be posted here.
Systems at a Glance:
Loc. | System | Status | Ping |
---|---|---|---|
NC023 | Internal | Up? | |
NC028 | Internal | Up? | |
NC031 | Internal | Up? | |
NC033 | Operational | Up? | |
NC034 | Internal | Up? | |
NC035 | Operational | Up? | |
NC036 | Operational | Up? | |
NC040 | Internal | Up? | |
NC041 | Operational | Up? | |
NC042 | Operational | Up? |
Subscriptions:
Search:
Recent Posts:
Archives:
Categories:
Links
Tags:
Resources:
On NinerNet: