Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Managed Server 10: OpenSSH Security Configuration

For several years, we have followed the OpenSSH recommendations published by Mozilla to ensure a secure and reliable SSH environment. As Mozilla has discontinued updates to these guidelines, we have decided to align our configuration with the latest recommendations from OpenSSH and Debian. This change brings our setup in line with current best practices and ensures continued security and compatibility. The update affects the Ciphers, MACs, and KexAlgorithms used in our OpenSSH server configuration.

We do not expect any issues for our customers. However, if you experience any unexpected behavior, please let us know. We are happy to adjust the configuration for individual servers as needed.

Start maintenance window: 24/11/2025 09:00
Stop maintenance window: 24/11/2025 12:00

Update Collabora 25.04.7.2.1

We will update Collabora to version 25.04.7.2.1.

Reference: #1599

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Sentry 25.11.0

We will update Sentry to version 25.11.0.

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Update Nextcloud

We will update Nextcloud to version 31.0.11.

Reference: #841

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Update GitLab Runner 18.6.0

We will update GitLab Runner to version 18.6.0.

Reference: #79

Start maintenance window: 24/11/2025 23:00
Stop maintenance window: 25/11/2025 02:00

Past Incidents

Saturday 28th October 2017

No incidents reported

Friday 27th October 2017

No incidents reported

Thursday 26th October 2017

No incidents reported

Wednesday 25th October 2017

Update Debian 8 / Version 5, scheduled 8 years ago

On Debian 8, PHP 7 was updated to 7.0.25

Update Debian 7 Wheezy, scheduled 8 years ago

Package : curl Version : 7.26.0-1+wheezy22 CVE ID : CVE-2017-1000257

Brian Carpenter, Geeknik Labs, 0xd34db347, and independently reported by the OSS-Fuzz project, detected a out of bounds read during IMAP FETCH response.

For Debian 7 "Wheezy", this problem has been fixed in version 7.26.0-1+wheezy22.

Tuesday 24th October 2017

No incidents reported

Monday 23rd October 2017

No incidents reported

Sunday 22nd October 2017

No incidents reported