NinerNet Communications™
System Status

Server and System Status

SSL certificate update 2

20 September 2016 11:57:43 +0000

The SSL certificate has been replaced on all servers. If you still get errors, please restart the program in question or, if necessary, restart the machine or device.

If you need any assistance, please contact NinerNet support. Thank-you.

SSL certificate update 1

20 September 2016 10:19:12 +0000

The SSL certificate was upgraded on server NC027 at 10:09 UTC. This covers email services. We’ll be replacing the expired certificates on other server and control panels shortly too.

You may need to restart email programs and web browsers for the new certificate to be recognised. Again, we apologise for the inconvenience.

NinerNet SSL certificate

20 September 2016 09:05:00 +0000

Our wildcard SSL certificate for *.niner.net has expired in some time zones. It will be updated within the hour and an update posted here.

Our apologies for the delay.

POODLE maintenance: Complete

23 October 2014 22:54:04 +0000

We have completed the maintenance to mitigate against exploitation of the POODLE vulnerability.

Because the effects of this maintenance could potentially be wide-ranging, please contact support if you have any issues with connecting over a secure connection to any of our servers. We don’t believe there will be any issues with web (HTTPS) connections, but there may be with some email (SMTP, IMAP and POP) connections by older email programs. That said, an exploit against this vulnerability has only been demonstrated using JavaScript and a web browser, so email connections (even if using SSLv3) are not generally considered to be at risk.

Thanks for your patience during this maintenance.

UPDATE, 2014-10-24: Please read some details on this maintenance, and learn more about SSL and TLS and email security, on our corporate blog.

POODLE maintenance: Update 1

19 October 2014 00:33:28 +0000

The maintenance described in our last post is under way, but we are running into some issues that are delaying completion. While there may be sudden and unexpected interruptions in some services for some clients, we are aware of them and are working on them. If necessary, we will revert to old configurations while we re-evaluate the new configurations recommended to defend clients against the POODLE vulnerability.

Thank-you for your patience.

SSL version 3 “POODLE” vulnerability, system-wide maintenance

17 October 2014 05:25:59 +0000

We will be conducting maintenance this weekend to address the above noted vulnerability. Please read more details about this on our corporate blog.

NinerNet SSL certificate fully installed

21 July 2014 12:10:11 +0000

We have solved the issue with the new NinerNet SSL certificate not fully propagating to all servers. All SSL web and email connections should now be using the new SSL certificate, which expires in 2015.

If you are having any issues, please restart your computer to ensure that all software on the computer uses the new SSL certificate. If you still have problems, please contact NinerNet support with a full description of the error message you are seeing.

Thank-you for your patience.

NinerNet SSL certificate

21 July 2014 07:41:35 +0000

We are aware that the new NinerNet SSL certificate has not properly propagated to all servers. We are working to fix this and will post an update here as soon as we believe the issue has been resolved.

In the meantime it is usually possible to override any warnings and continue with whatever you are doing.

NC027: SSL case closed

24 March 2014 09:10:02 +0000

We are closing this issue, although we have not found a cause. As far as we can tell, everything related to authentication on the server is working. Research on similar occurrences also shows the problem apparently resolving itself after a short time, and also points to a number of possible causes, including faulty operating system and software updates on client machines. However, in this case we saw the problem on different operating systems (Windows, Mac and Android) and different email programs. We also suspected anti-virus software, but again we heard of problems on computers running different anti-virus software.

Oddly, we could not reproduce the problem on any machines in our office, and so we had no primary references on which we could do research.

About the only commonality we could find — other than the server itself, of course — is that we believe all of the reporting clients are on VSATs. However, even that doesn’t fully explain the problem as if, for some reason, VSATs were the issue we should theoretically have seen the same problem on other servers. That said, the problem reported to us was only with downloading email, and the other mail server on which the bulk of our clients are hosted uses slightly different SSL technology; additionally our default instructions for that server do not mention using SSL. We saw a similar issue with VSAT connections several years ago, so if this is related it’s not unprecedented.

Another possibility that can’t be ruled out is network issues that may have interfered with encryption on the connection. Given the number of reports, such an issue (if it existed) would likely have been closer to the server than the client. If this issue reoccurs we will contact our upstream providers to see what they have to say.

While it is unsatisfactory to close an issue without having a smoking gun to identify it, we are going to do so at this time. If you do see this issue again, please contact support and we will again look at the issue.

Thank-you for your patience while we looked at this issue.

NC027: SSL issue update

24 March 2014 06:29:06 +0000

We’re now getting emails from clients telling us that the issue has apparently resolved itself. We’re continuing to investigate, but we have not done anything to the server, either before this issue started or since it was reported to us.

Updates will continue to be posted here.

NinerNet home page

Systems at a Glance:


Loc.SystemStatusPing
Server NC023, London, United Kingdom (Relay server), INTERNAL.NC023InternalUp?
Server NC028, Vancouver, Canada (Monitoring server), INTERNAL.NC028InternalUp?
Server NC031, New York, United States of America (Web server), INTERNAL.NC031InternalUp?
Server NC033, Toronto, Canada (Primary nameserver), OPERATIONAL.NC033OperationalUp?
Server NC034, Lusaka, Zambia (Phone server), INTERNAL.NC034InternalUp?
Server NC035, Sydney, Australia (Secondary nameserver), OPERATIONAL.NC035OperationalUp?
Server NC036, Amsterdam, Netherlands (Mail server), OPERATIONAL.NC036OperationalUp?
Server NC040, Toronto, Canada (Web server), INTERNAL.NC040InternalUp?
Server NC041, New York, United States of America (Web server), OPERATIONAL.NC041OperationalUp?
Server NC042, Seattle, United States of America (Status website), OPERATIONAL.NC042OperationalUp?

Subscriptions:

RSS icon. RSS

Twitter icon. Twitter

Search:

 

Recent Posts:

Archives:

Categories:

Links

Tags:

.co.zm domains .com.zm domains .zam.co domains back-up bounce messages browser warnings connection issues control panel database dns dos attack dot-zm domains down time email email delivery error messages ftp hardware imap mail mailing lists mail relay mail server microsoft migration nameservers network networking performance php phplist pop reboot shaw shaw communications inc. smtp spam spamassassin ssl ssl certificate tls tls certificate viruses webmail web server

Resources:

On NinerNet: