Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Mailcow important changes for update from legacy to master

We will update Mailcow from legacy to the newest master version, which contains the following breaking changes:

  1. Login With the update, the login screens for users, domain administrators, and administrators are now separate:

Users log in as usual at the following URL: https://mail.example.com/

Domain administrators now use https://mail.example.com/domainadmin

Administrators use https://mail.example.com/admin

The SOGo web interface is now only accessible via the user login at https://mail.example.com/; after a standard direct redirect to SOGo, the Mailcow settings are still accessible via the link (wrench icon, top right). The Login URL for Roundcube User does not change.

  1. Two-factor authentication (2FA) Users/mail accounts that have 2FA enabled must now use app passwords to log in via mail protocols such as SMTP/IMAP, etc., for example when using a local email client or the Roundcube web interface. Each user can create these after logging into their Mailcow account under "App Passwords".

Take a close look at the changes, update your documentation accordingly, and feel free to contact us at any time if you have any questions or concerns.

Start maintenance window: 29/09/2025 23:00
Stop maintenance window: 30/09/2025 02:00

Past Incidents

Tuesday 11th June 2019

No incidents reported

Monday 10th June 2019

No incidents reported

Sunday 9th June 2019

No incidents reported

Saturday 8th June 2019

No incidents reported

Friday 7th June 2019

No incidents reported

Thursday 6th June 2019

phpMyAdmin 4.9.0.1, scheduled 6 years ago

The central phpMyAdmin installation was updated to version 4.9.0.1.

For details, please consult the phpMyAdmin release notes.

Wednesday 5th June 2019

No incidents reported

Tuesday 4th June 2019

Managed Server Version 5: php5 security update, scheduled 6 years ago

Two vulnerabilities were found in PHP, a widely-used open source general purpose scripting language.

CVE-2019-11039

An integer underflow in the iconv module could be exploited to trigger
an out of bounds read.

CVE-2019-11040

A heap buffer overflow was discovered in the EXIF parsing code.

For Debian 8 "Jessie", these problems have been fixed in version 5.6.40+dfsg-0+deb8u4.