Ops One AG platform status and maintenance announcements. Times are indicated in local Swiss time. https://opsone.ch/.
All systems are operational
Scheduled Maintenance
Managed Server Version 8: Debian Updates

We will update the following packages to the latest version.

  • openjdk-11-jre-headless=11.0.26+4-1~deb11u1
  • openjdk-11-jre=11.0.26+4-1~deb11u1

Start maintenance window: 05/02/2025 23:00
Stop maintenance window: 06/02/2025 02:00

Managed Server Version 9: Debian Updates

We will update the following packages to the latest version.

  • openjdk-17-jre-headless=17.0.14+7-1~deb12u1
  • openjdk-17-jre=17.0.14+7-1~deb12u1

Start maintenance window: 05/02/2025 23:00
Stop maintenance window: 06/02/2025 02:00

LimeSurvey 6.10.2+250127

We will update LimeSurvey to version 6.10.2+250127.

Start maintenance window: 10/02/2025 23:00
Stop maintenance window: 11/02/2025 02:00

Imaginary 20250204_102259

We will update Imaginary to version 20250204_102259.

Start maintenance window: 10/02/2025 23:00
Stop maintenance window: 11/02/2025 02:00

Discourse v3.4.0

We will update Discourse to version v3.4.0.

Start maintenance window: 10/02/2025 23:00
Stop maintenance window: 11/02/2025 02:00

Keycloak 26.1.1

We will update Keycloak to version 26.1.1.

Start maintenance window: 10/02/2025 23:00
Stop maintenance window: 11/02/2025 02:00

Past Incidents

Monday 29th January 2024

Collabora 23.05.7.5.1, scheduled 1 year ago

We will update Collabora to version 23.05.7.5.1.

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

Managed Server Version 9: Debian Updates, scheduled 1 year ago

We will update the following packages to the latest version.

  • docker-ce/bookworm 5:25.0.1-1~debian.12~bookworm amd64 [upgradable from: 5:25.0.0-1~debian.12~bookworm]
  • docker-ce-cli/bookworm 5:25.0.1-1~debian.12~bookworm amd64 [upgradable from: 5:25.0.0-1~debian.12~bookworm]
  • docker-ce-rootless-extras/bookworm 5:25.0.1-1~debian.12~bookworm amd64 [upgradable from: 5:25.0.0-1~debian.12~bookworm]
  • docker-compose-plugin/bookworm 2.24.2-1~debian.12~bookworm amd64 [upgradable from: 2.24.1-1~debian.12~bookworm]

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

MongoDB 4.4.28, scheduled 1 year ago

We will update MongoDB to version 4.4.28.

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

Kibana 8.12.0, scheduled 1 year ago

We will update Kibana to version 8.12.0.

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

Elasticsearch 8.12.0, scheduled 1 year ago

We will update Elasticsearch to version 8.12.0.

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

Mailcow 2024-01b, scheduled 1 year ago

We will update Mailcow to version 2024-01b.

Start maintenance window: 29/01/2024 23:00
Stop maintenance window: 30/01/2024 02:00

Friday 26th January 2024

GitLab 16.7.4, scheduled 1 year ago

We will update GitLab to version 16.7.4

Start maintenance window: 26/01/2024 00:00
Stop maintenance window: 26/01/2024 02:00

Thursday 25th January 2024

No incidents reported

Wednesday 24th January 2024

Managed Server Version 8: Debian Updates, scheduled 1 year ago

We will update the following packages to the latest version.

  • openjdk-11-jre-headless/oldstable-security 11.0.22+7-1~deb11u1 amd64 [upgradable from: 11.0.21+9-1~deb11u1]
  • openjdk-11-jre/oldstable-security 11.0.22+7-1~deb11u1 amd64 [upgradable from: 11.0.21+9-1~deb11u1]

Start maintenance window: 24/01/2024 23:00
Stop maintenance window: 25/01/2024 02:00

Tuesday 23rd January 2024

No incidents reported

Monday 22nd January 2024

Sentry 24.1.0, scheduled 1 year ago

We will update Sentry to version 24.1.0.

Start maintenance window: 22/01/2024 23:00
Stop maintenance window: 23/01/2024 01:00

Roundcube 1.6.6, scheduled 1 year ago

We will update Roundcube to version 1.6.6.

Start maintenance window: 22/01/2024 23:00
Stop maintenance window: 23/01/2024 01:00

Managed Server Version 7/8/9: Debian Updates, scheduled 1 year ago

We will update the following packages to the latest version.

Managed Server Version 9

  • containerd.io/bookworm 1.6.27-1 amd64 [upgradable from: 1.6.26-1]
  • docker-buildx-plugin/bookworm 0.12.1-1~debian.10~bookworm amd64 [upgradable from: 0.11.2-1~debian.10~bookworm]
  • docker-ce/bookworm 5:25.0.0-1~debian.10~bookworm amd64 [upgradable from: 5:24.0.7-1~debian.10~bookworm]
  • docker-ce-cli/bookworm 5:25.0.0-1~debian.10~bookworm amd64 [upgradable from: 5:24.0.7-1~debian.10~bookworm]
  • docker-ce-rootless-extras/bookworm 5:25.0.0-1~debian.10~bookworm amd64 [upgradable from: 5:24.0.7-1~debian.10~bookworm]
  • docker-compose-plugin/bookworm 2.24.1-1~debian.10~bookworm amd64 [upgradable from: 2.21.0-1~debian.10~bookworm]

Managed Server Version 8

  • blackfire/any 2:2.24.4 amd64 [upgradable from: 2:2.24.3]
  • containerd.io/bullseye 1.6.27-1 amd64 [upgradable from: 1.6.26-1]
  • tzdata/oldstable-updates 2021a-1+deb11u11 all [upgradable from: 2021a-1+deb11u10]
  • docker-buildx-plugin/bullseye 0.12.1-1~debian.10~bullseye amd64 [upgradable from: 0.11.2-1~debian.10~bullseye]
  • docker-ce/bullseye 5:25.0.0-1~debian.10~bullseye amd64 [upgradable from: 5:24.0.7-1~debian.10~bullseye]
  • docker-ce-cli/bullseye 5:25.0.0-1~debian.10~bullseye amd64 [upgradable from: 5:24.0.7-1~debian.10~bullseye]
  • docker-ce-rootless-extras/bullseye 5:25.0.0-1~debian.10~bullseye amd64 [upgradable from: 5:24.0.7-1~debian.10~bullseye]
  • docker-compose-plugin/bullseye 2.24.1-1~debian.10~bullseye amd64 [upgradable from: 2.21.0-1~debian.10~bullseye]

Managed Server Version 7

  • blackfire/any 2:2.24.4 amd64 [upgradable from: 2:2.24.3]
  • containerd.io/buster 1.6.27-1 amd64 [upgradable from: 1.6.26-1]
  • docker-buildx-plugin/buster 0.12.1-1~debian.10~buster amd64 [upgradable from: 0.11.2-1~debian.10~buster]
  • docker-ce/buster 5:25.0.0-1~debian.10~buster amd64 [upgradable from: 5:24.0.7-1~debian.10~buster]
  • docker-ce-cli/buster 5:25.0.0-1~debian.10~buster amd64 [upgradable from: 5:24.0.7-1~debian.10~buster]
  • docker-ce-rootless-extras/buster 5:25.0.0-1~debian.10~buster amd64 [upgradable from: 5:24.0.7-1~debian.10~buster]
  • docker-compose-plugin/buster 2.24.1-1~debian.10~buster amd64 [upgradable from: 2.21.0-1~debian.10~buster]

Start maintenance window: 22/01/2024 23:00
Stop maintenance window: 22/01/2024 02:00

Managed Server Version 8/9: Update PHP 8.3.2/8.2.15, scheduled 1 year ago

We will update PHP 8.2 to version 8.2.15. (Managed Server v8 / Managed Server v9)

We will update PHP 8.3 to version 8.3.2. (Managed Server v9)

ops-php82/unknown 8.2.15-ops-56477 amd64 [upgradable from: 8.2.14-ops-55703] ops-php83/unknown 8.3.2-ops-56459 amd64 [upgradable from: 8.3.1-ops-00003]

Start maintenance window: 22/01/2024 23:00 CEST Stop maintenance window: 22/01/2024 24:00 CEST

GitLab 16.7.3, scheduled 1 year ago

We will update GitLab to version 16.7.3.

Start maintenance window: 22/01/2024 23:00
Stop maintenance window: 23/01/2024 02:00

Managed Server Version 8: Postfix Configuration: Forbid Bare Newlines to Prevent SMTP Smuggling

To deliver mails sent locally through sendmail or SMTP, our web servers do use a local Postfix installation each. This is used to deliver mails sent through web applications running on those servers. Under certain circumstances, it might be possible to inject a second email into the delivery process (details) through an application, for example by using a tailored message within an unsecured contact form.

Therefore, we changed the configuration to forbid bare newlines to close this loophole under all circumstances. Standard SMTP implementations will not be affected, so we do not expect any drawbacks. Nevertheless, should you run into a problem with your application, please contact us to decide the proper proceedings.

Reference #1480

Managed Server Version 9: Postfix Configuration: Forbid Bare Newlines to Prevent SMTP Smuggling

To deliver mails sent locally through sendmail or SMTP, our web servers do use a local Postfix installation each. This is used to deliver mails sent through web applications running on those servers. Under certain circumstances, it might be possible to inject a second email into the delivery process (details) through an application, for example by using a tailored message within an unsecured contact form.

Therefore, we changed the configuration to forbid bare newlines to close this loophole under all circumstances. Standard SMTP implementations will not be affected, so we do not expect any drawbacks. Nevertheless, should you run into a problem with your application, please contact us to decide the proper proceedings.

Reference #1480

Sunday 21st January 2024

No incidents reported

Saturday 20th January 2024

No incidents reported

Friday 19th January 2024

No incidents reported