NinerNet Communications™
System Status

Server and System Status

NC020: Network Maintenance in February

22 January 2015 00:16:09 +0000

There will be network maintenance next month in the data centre where server NC020 is located. During this maintenance the server will be inaccessible for about five minutes. This is necessary maintenance that cannot be rescheduled.

The maintenance will happen between 06:00 and 12:00 on 11 February (UTC), but the server will only be inaccessible for five minutes during that six-hour window.

No work is occurring on the server itself.

This will only affect some websites, mostly those that use WordPress (but not all of them) and some other custom or recent web applications. It will also result in the brief delay of email to aliased domains and rotating email addresses. If you would like confirmation of whether or not you will be affected, or if you have any other questions or concerns, please contact support and we will respond.

Thank-you for your patience during this maintenance to keep our systems running securely and reliably.

NC020: Web server restarted

10 November 2014 13:24:48 +0000

The web server on NC020 was down between approximately 11:21 and 12:33 UTC today. We are investigating and will post a report here later today.

POODLE maintenance: Complete

23 October 2014 22:54:04 +0000

We have completed the maintenance to mitigate against exploitation of the POODLE vulnerability.

Because the effects of this maintenance could potentially be wide-ranging, please contact support if you have any issues with connecting over a secure connection to any of our servers. We don’t believe there will be any issues with web (HTTPS) connections, but there may be with some email (SMTP, IMAP and POP) connections by older email programs. That said, an exploit against this vulnerability has only been demonstrated using JavaScript and a web browser, so email connections (even if using SSLv3) are not generally considered to be at risk.

Thanks for your patience during this maintenance.

UPDATE, 2014-10-24: Please read some details on this maintenance, and learn more about SSL and TLS and email security, on our corporate blog.

POODLE maintenance: Update 1

19 October 2014 00:33:28 +0000

The maintenance described in our last post is under way, but we are running into some issues that are delaying completion. While there may be sudden and unexpected interruptions in some services for some clients, we are aware of them and are working on them. If necessary, we will revert to old configurations while we re-evaluate the new configurations recommended to defend clients against the POODLE vulnerability.

Thank-you for your patience.

SSL version 3 “POODLE” vulnerability, system-wide maintenance

17 October 2014 05:25:59 +0000

We will be conducting maintenance this weekend to address the above noted vulnerability. Please read more details about this on our corporate blog.

NC026 emergency maintenance complete

2 October 2014 12:14:12 +0000

The emergency maintenance on server NC026 described earlier has been completed successfully. Thank-you for your patience.

NC026 emergency maintenance

1 October 2014 04:40:48 +0000

To deal with an as-yet unpublished security vulnerability, server NC026 will undergo emergency maintenance today (1 October) starting shortly after 15:00 UTC. Down time should be brief, but will be noticeable for websites hosted on this server during the maintenance. Most of the websites hosted on this server are newer ones using more recent versions of WordPress. If you are not sure whether or not your website is hosted on this server, you can contact support to find out.

No email is hosted on NC026, so this maintenance will not affect email flow at all.

NC020 outage report

25 August 2014 00:05:53 +0000

The problem with server NC020 actually started before the outage on Friday, about midday UTC. A client’s website was compromised, and the cracker downloaded scripts to cause the sending of spam. This took place over the course of a day or so, and eventually the spammer consumed all of the resources of the server. Although the server was still up, it was unresponsive.

Most websites are authorised to use the mail server on a hosting server, so we can’t block that ability completely. However, we will make a concerted effort to improve the monitoring of abuse (intended by the client or not) of this function.

In this case, we cleaned up all of the generated spam, removed the offending scripts, and will work with the client on the issues with their website security.

For the record, there are two levels of compromises: at the root level or the user level. At the root level is very bad, and requires a brand new server to be provisioned. This was a user-level compromise which, while bad, is easier to fix and recover from.

We again apologise for the downtime. We will be contacting and crediting affected accounts. We are always working to prevent security issues like this, but it’s an ongoing task. Thank-you for your patience and continued business. If you have any questions, please feel free to contact support.

NC018 web server up

14 August 2014 18:41:09 +0000

An automated alert was issued at 14:04 UTC today that the web server on NC018 was down. Unfortunately no immediate action was taken by the data centre where the server is located, and the server was not restarted until 17:03 UTC.

We apologise for this significant delay. We have taken this issue up with the data centre to determine the cause of the delay and to ensure that it doesn’t happen again.

Other services on the server — email, nameservers, FTP and databases — were not affected by the outage.

NC018: Web server restarted

19 June 2014 07:08:10 +0000

We have restarted the web server and are keeping an eye on it, specifically the sources of traffic to it.

NinerNet home page

Systems at a Glance:


Loc.SystemStatusPing
Server NC023, London, United Kingdom (Relay server), INTERNAL.NC023InternalUp?
Server NC028, Vancouver, Canada (Monitoring server), INTERNAL.NC028InternalUp?
Server NC031, New York, United States of America (Web server), INTERNAL.NC031InternalUp?
Server NC033, Toronto, Canada (Primary nameserver), OPERATIONAL.NC033OperationalUp?
Server NC034, Lusaka, Zambia (Phone server), INTERNAL.NC034InternalUp?
Server NC035, Sydney, Australia (Secondary nameserver), OPERATIONAL.NC035OperationalUp?
Server NC036, Amsterdam, Netherlands (Mail server), OPERATIONAL.NC036OperationalUp?
Server NC040, Toronto, Canada (Web server), INTERNAL.NC040InternalUp?
Server NC041, New York, United States of America (Web server), OPERATIONAL.NC041OperationalUp?
Server NC042, Seattle, United States of America (Status website), OPERATIONAL.NC042OperationalUp?

Subscriptions:

RSS icon. RSS

Twitter icon. Twitter

Search:

 

Recent Posts:

Archives:

Categories:

Links

Tags:

.co.zm domains .com.zm domains .zam.co domains back-up bounce messages browser warnings connection issues control panel database dns dos attack dot-zm domains down time email email delivery error messages ftp hardware imap mail mailing lists mail relay mail server microsoft migration nameservers network networking performance php phplist pop reboot shaw shaw communications inc. smtp spam spamassassin ssl ssl certificate tls tls certificate viruses webmail web server

Resources:

On NinerNet: