Ops One AG

You can subscribe via email or RSS

All systems are operational
Scheduled Maintenance
Mailserver Update

We perform software updates on our mail servers. We expect a downtime of ~5 minutes.

Start maintenance window: 19/02/2019 00:00 CEST
Stop maintenance window: 19/02/2019 02:00 CEST

New features / Changes:

  • [Dovecot] Enable quota notifications at 80% and 95%
  • [Web] Add quota notification tools
  • [Web] Fix AutoDiscover issue with Outlook 2019
  • [Compose] New images: dockerapi, watchdog, netfilter, acme, dovecot, php, unbound
  • [Rspamd] Set history lines to 10000
  • [Web] Update languages
  • [Web] Various session fixes
Managed Server Version 5, 6 and k8s: Docker Update

We will update Docker to the latest version. Please make sure your containers are starting automatically, as we have to restart the Docker daemon to complete this update.

Start maintenance window: 19/02/2019 00:00 CEST
Stop maintenance window: 19/02/2019 02:00 CEST

  • 5-0-stable: docker-ce/jessie 18.06.2~ce~3-0~debian amd64 [upgradable from: 18.06.1~ce~3-0~debian]
  • 6-0-stable: docker-ce/stretch 5:18.09.2~3-0~debian-stretch amd64 [upgradable from: 5:18.09.1~3-0~debian-stretch]
.CH/.LI: Maintenance

SWITCH, the registry for .ch/.li domains, performs maintenance work on the EPP API.

Domain actions (registrations, modifications, transfers) are not possible during this downtime.

Start maintenance window: Stop maintenance window:

.CH/.LI: Maintenance

SWITCH, the registry for .ch/.li domains, performs maintenance work on the EPP API.

Domain actions (registrations, modifications, transfers) are not possible during this downtime.

Start maintenance window: Stop maintenance window:

.CH/.LI: Maintenance

SWITCH, the registry for .ch/.li domains, performs maintenance work on the EPP API.

Domain actions (registrations, modifications, transfers) are not possible during this downtime.

Start maintenance window: Stop maintenance window:

Past Incidents

Saturday 8th September 2018

No incidents reported

Friday 7th September 2018

No incidents reported

Thursday 6th September 2018

No incidents reported

Wednesday 5th September 2018

No incidents reported

Tuesday 4th September 2018

Managed Server Version 5: Add global nginx configuration options

We introduced options to define global nginx configurations on server and http level. See the documentation for details.

Closes #385

Monday 3rd September 2018

Nextcloud v13.0.6, scheduled 5 months ago

We have updated Nextcloud to the latest version.

Managed Server Version 5: mariadb, scheduled 5 months ago

Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.36. Please see the MariaDB 10.0 Release Notes for further details: https://mariadb.com/kb/en/mariadb/mariadb-10036-release-notes/

We have updated mariadb to the latest version.

  • mariadb-client/oldstable 10.0.36-0+deb8u1 all [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-client-10.0/oldstable 10.0.36-0+deb8u1 amd64 [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-client-core-10.0/oldstable 10.0.36-0+deb8u1 amd64 [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-common/oldstable 10.0.36-0+deb8u1 all [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-server/oldstable 10.0.36-0+deb8u1 all [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-server-10.0/oldstable 10.0.36-0+deb8u1 amd64 [upgradable from: 10.0.35-0+deb8u1]
  • mariadb-server-core-10.0/oldstable 10.0.36-0+deb8u1 amd64 [upgradable from: 10.0.35-0+deb8u1]
Managed Server Version 5: tomcat8 update, scheduled 5 months ago

Two security issues have been discovered in the Tomcat servlet and JSP engine. [DLA 1491-1]

We have updated tomcat8 to the latest version.

  • libtomcat8-java/oldstable 8.0.14-1+deb8u13 all [upgradable from: 8.0.14-1+deb8u12]
  • tomcat8/oldstable 8.0.14-1+deb8u13 all [upgradable from: 8.0.14-1+deb8u12]
  • tomcat8-admin/oldstable 8.0.14-1+deb8u13 all [upgradable from: 8.0.14-1+deb8u12]
  • tomcat8-common/oldstable 8.0.14-1+deb8u13 all [upgradable from: 8.0.14-1+deb8u12]
Matomo 3.6.0, scheduled 5 months ago

We have updated Matomo to the latest version.

Managed Server Version 5: php5 update, scheduled 5 months ago

Two vulnerabilities have been discovered in php5 [DLA 1490-1]

We have updated php5 to the latest version.

  • php5-cli/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-common/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-curl/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-fpm/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-gd/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-imap/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-mysql/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
  • php5-readline/oldstable 5.6.37+dfsg-0+deb8u1 amd64 [upgradable from: 5.6.36+dfsg-0+deb8u1]
New Cockpit Version: New website types and a more clarified monthly invoice

Features

  • Added new website types for generation 6 Servers
  • Display IPv6 address in the servers network interfaces tab
  • Remove ssh key from all servers and websites of a customer when user is removed from that customer
  • Display Balance on the monthly invoice

Bugs

  • ID's in HTML can not start with a number
  • Different structure of the network interfaces for hiera
  • Forbid test as website name
  • Better parsing of EPP messages
Managed Server Version 5: move global security settings into dedicated configuration file

To deny access to certain private files and directories like .git, we used some custom locations defined on each website. Those locations where defined directly within the vhost configuration, but after the custom configuration include to allow overrides for certain setups.

Due to the predefined nginx location block selection order, it is possible to override our security locations by mistake, especially when defining a own location for everything (like location ~* ^/), which will disable processing of any following regex locations used in our security configuration.

To avoid misconfigurations leading to open access to private files, we took the following precautions:

  • security locations moved into their own file /etc/nginx/custom/security.conf, which can be included in custom locations as well
  • warning to the corresponding documentation
  • automatic check to find custom locations without included security configuration
  • automatic check to scan for secret files over HTTP

Please include the new security configuration within affected locations like described within our updated documentation. Additionally, we will contact all customer with affected configurations over the next few days.

Closes #386

Sunday 2nd September 2018

No incidents reported