NinerNet‘s offices will be closed for the week of 23-27 March. Emergency support will continue to be available 24/7, but routine emails and enquiries will be dealt with on Monday 30 March. Thank-you.
NinerNet‘s offices will be closed for the week of 23-27 March. Emergency support will continue to be available 24/7, but routine emails and enquiries will be dealt with on Monday 30 March. Thank-you.
I’m taking this opportunity to thank you for your business in 2014 and to say that I look forward to continuing to earn your business in 2015.
We wish you and your families and employees a very happy Christmas, and all the best for the New Year.
Our office will be closed until Monday 5 January, but our systems will be monitored 24/7 (as always) and support will continue to be available 24/7 for emergent requests.
The maintenance to protect against the “POODLE” exploit has been finished, as we’ve noted on our status blog. While I’d like this to be a short post stating just that, like the maintenance itself, there is more to it than meets the eye.
What was anticipated to take about an hour during a scheduled weekend maintenance window ended up taking much longer as we waded through the pros and cons of configuring some or all services to disable SSL version 3. (Of course, very few people know about and can prepare for these things in advance.) First, there was some debate in information security circles about just how serious this issue was/is, how quickly it needed to be addressed, and by whom. In short, some took it more seriously than others, but there was general agreement that other issues (Heartbleed and Shellshock, for example) were much bigger. Those that didn’t feel it was that serious had their reasons, but we’re not in business to gamble with your security.
While this is a vulnerability in a protocol (SSL version 3) that is (or has been) used to secure different types of connections, the main area of concern was with HTTPS connections — i.e., web browsing. To my knowledge, the only known exploit of this protocol vulnerability uses JavaScript, and only over HTTPS connections. In other words, there is currently no known issue with using SSLv3 to secure non-HTTPS connections — e.g., email.
To that end SSLv3 will still work on some of our mail servers. How this is handled — if your email program can’t use TLS — differs between email programs, with some email clients failing silently and establishing a non-secure connection instead, and some failing completely to connect. We expect that most email programs using our existing suggested configurations will continue to work across all of our servers. However, while we have not had any reports of issues from clients, one of the reasons this took longer than anticipated was the surprising number of current or recent email clients that stopped working when we disabled SSLv3 on the mail servers. Connections by email clients configured to use SSLv3 still work on server NC018, while on NC027 they will fail silently as described above. This is related to the differing behaviour of the software running these two mail servers.
All web servers (including control panels) were configured to deny SSLv3 connections by Monday this week. Web browser developers seem to have kept up with and done a better job implementing TLS in current versions than some email client developers. As we’ve stated several times previously, Outlook 2003 should be relegated to the past, along with Microsoft Internet Explorer version 6. The latter uses only SSL (and has TLS disabled) by default. Microsoft, of all people, have actually had an active campaign to discourage the use of MSIE 6 since 2009 with their ie6countdown.com website; according to that website, only 3.3% of users worldwide are still using MSIE 6, and about three quarters of them are in China. Put it this way, using MSIE 6 today is like trying to drive a Model T Ford on modern roads among modern cars, expecting to go as fast as modern cars and to be serviced by modern mechanics. In short, using certain software today is simply a bad idea, even if it still appears to some people to work.
Another thing I’d like to address here is the difference between SSL (secure sockets layer) and TLS (transport layer security) … or, more correctly, the perceived difference. There is no difference. They are essentially the same thing. For all intents and purposes, the lay person can consider TLS version 1.0 to be SSL version 4.0. That’s not true from a technical standpoint, but as someone who deals every day with clients who just want their computers to work and are more concerned about the intricacies of their trucking business (for example), they do the same thing: encrypt your Internet connections. TLS, as the successor to SSL, is newer and better (as the “SSL version 4.0” comparison above makes clear), and you should use TLS in preference to SSL any time you have a choice.
Finally, a word about email security. It has become more and more clear to me over the years that the trend in software development is to hide things from the average user. There is a point to which this is good; after all, if you had to type in all of the commands that your email program (for example) uses to connect to the mail server to download or send your email, you might as well write a letter with a quill and ink and send it via carrier pigeon. However, if your email program is going to fail silently and send your message in the clear — i.e., over an unencrypted connection — that’s something you probably want to know about if you thought you were using an encrypted connection. But this is not something you will read about in glossy brochures extolling the virtues of this email program or that. The fact is, most people will never be aware of such an issue, and those that have the most to fear — for example, people living in or reporting on dictatorships — will only realise they have a problem when there is that ominous knock at the door that reveals their communications have been compromised.
For this reason it is not enough to rely on your email service provider — not even NinerNet Communications — to secure your communications if you are, for example, an activist in a police state or a reporter with confidential sources. No, you have to take that responsibility on yourself by encrypting the actual messages you send before you send them. How to do this is certainly beyond the scope of this post, and even if you were to do it it may not be necessary for all of your communications. But going to this extent to protect yourself in this way takes extra time and effort and may require additional software on your computer, but at the end of the day you need to determine for yourself the pros and cons in your own cost-benefit analysis.
The latest in a series of recent vulnerabilities discovered in software commonly used on servers hosting websites and email (among other services) has reared its head. “POODLE” (conveniently discovered by the clever rhymers at Google) is a catchy name for a vulnerability found in a two-decade-old cryptographic protocol used to encrypt network connections. SSL — the secure sockets layer protocol — has become a household word over the years, and those three letters are still now used by many to refer generically to secure connections, even though SSL version 3.0 (published in 1996) was superseded by TLS (transport layer security) version 1.0 fifteen years ago (in 1999).
All of this introductory information is not intended to trivialise the problem, of course, but to give some background and illustrate how it can take a long time for new standards to be adopted, and old ones to be abandoned. Often, old standards live on simply because “if it ain’t broke, don’t fix it” … and now (well, three days ago) we find that the last version of SSL — version 3.0 — is indeed “broke”.
As such we will be re-configuring all of our servers still configured to allow SSL 3.0 connections to use TLS exclusively. This will require reconfiguring and restarting web servers, FTP servers and various email services. While we anticipate the work on all servers taking about an hour, interruptions in service — if there are any — should be brief and last only a few seconds at a time as services are restarted.
Of particular interest — due to a couple of recent support requests related to our newer mail server on NC027 — is that Microsoft Outlook 2003 users will likely no longer be able to connect securely to the mail servers on NC018 and NC023 (the relay server), as Outlook 2003 does not have support for TLS. Apparently a 2004 “hotfix” available from Microsoft will add TLS support to Outlook 2003, but we cannot vouch for this personally, nor are we aware of any clients who have used this. It should be noted that Microsoft stopped supporting Outlook 2003 earlier this year. It is obsolete software.
It is of interest to me personally that my favourite email program of all time — Eudora — will weather this storm and continue to flourish, as it does support TLS. However, sadly, even Eudora will eventually succumb to the ravages of time and the march of technology. In fact, I strongly suspect it only supports TLS version 1.0, and I have noticed that Google actively discourages connections from old email clients such as Eudora, probably because they likely suggest using an email client that supports at least TLS version 1.1. The latest version of TLS is 1.2, already six years old itself.
So, we will be using our weekend maintenance window to perform this maintenance. However, instead of starting at the usual time, this maintenance will begin at 21:00 UTC on Saturday, 18 October and, as stated above, should take roughly one hour. Please consult our status blog for updates on this maintenance, and please contact support if you have any questions or concerns.
You may have heard in the media about the so-called Shellshock security issue that affects a software package present on most Internet servers worldwide called “bash”. All of our servers run bash; it is a very basic building block on almost all UNIX- and Linux-based servers, which run most services on the Internet that you access every day. Bash can be loosely compared to the “command line” available on Windows-based computers.
Upon checking, we determined that the version of bash running on all of our servers was vulnerable to exploits aimed at the bug. All were immediately patched, and are no longer vulnerable. We continue to monitor security bulletins from the vendors of the operating systems we use for possible further patches related to newly-discovered vulnerabilities, should they materialise.
NinerNet takes keeping our servers updated and secure seriously. If you have any questions about this in general or this bug in particular, please contact us. Thank-you.
You may have read or heard reports in the media about a software bug in a widely-used program called OpenSSL used to secure SSL connections with and between servers.
While our servers do use OpenSSL, we have checked all of our systems and none of them are vulnerable to this bug.
If you have any questions or concerns, please let us know by contacting support.
ICANN (the Internet Corporation for Assigned Names and Numbers) — the organisation in charge of all generic top-level domains (e.g., dot-com, dot-net, dot-org, etc., and the upcoming new gTLDs) — has introduced new rules that came into effect on 1 January.
The rule most likely to affect you at some point is the requirement for a valid email address associated with your domain. People generally register a new domain with a working email address, but over time that address may stop working for one reason or another. ICANN have taken steps to ensure that such a situation is not perpetuated.
Effective 1 January, if one of our automated emails to a contact address for your domain bounces, we are required to send you a verification email asking you to click a link in the email to confirm that your address does actually work. Of course, you’ll only receive that email if your email address has started working again in the meantime. Unfortunately, if you do not receive and act on the instructions in the verification email, we will have no choice but to suspend your domain, which will automatically happen fifteen (15) days after the first verification email is sent. If your domain is suspended, any services (email, websites, etc.) that rely on it will stop working until you respond and update the email address in your domain account. This is an ICANN rule applicable to all registrars and domain registrants, and we are contractually obligated to comply with it.
You may receive the same verification email when you register a new domain, when you transfer an existing domain into your domain account with NinerNet from another domain registrar, or when you change the contact information for your domain.
Please take this opportunity to log into your domain account (if your domain is registered with us) to check the contact information we have on record for your domain(s). If the contact email address you see there no longer works, exists or is no longer controlled by you, please update it immediately. (You will then receive a verification email, and you must follow the instructions in that email to complete the change to your contact details.) If you have multiple domains, you can update all of them at the same time. If you need the log-in information for your domain account sent to you, please advise us of that. Please note that your domain account is different and separate from your hosting account, and needs to be maintained separately by you. Thank-you for your understanding and cooperation.
If you have any questions, please contact support. Thank-you.
Not satisfied with having deleted 37 per cent of domains earlier this week, it appears that Zamnet continue to delete even more domains! Today we find out that domains that were still working on Tuesday have now been deleted, causing more clients to scramble because their email and websites have suddenly stopped working. This brings the percentage of domains deleted without warning due to Zamnet’s incompetence to 42 per cent … almost half! When will this stop?!
We encourage clients affected by these arbitrary and unannounced interruptions to their business to file a complaint with the Zambia Information and Communication Technology Authority. (UPDATE, 2013-06-28: The complaint form disappeared shortly after we posted this. Try their “Complaint Handling” page instead.)
Over the last few days it has become apparent to us that Zamnet’s accounting department — just as Coppernet’s did almost three years ago — awoke from a long hibernation and realised that a chunk of active domains hadn’t been paid for. As a result, 37 per cent of the dot-zm domains hosted by NinerNet that are (or were) registered with Zamnet — which includes .co.zm, .org.zm and .sch.zm domains — were deleted by Zamnet, taking them off the Internet completely. One client tells us that Zamnet informed them, when they enquired, that they were supposedly four years behind! (UPDATE, 2013-06-28: Another client tells us they had not been invoiced for their dot-co.zm domain in thirteen years! They’ve since switched to a dot-com with “zambia” tacked onto their name, as so many people do to avoid the hassle and expense of registering a dot-zm domain.)
It seems unlikely to us that so many Zamnet customers had simply ignored their invoices for several years. It’s more likely that they were never invoiced. In fact, our own domain (ninernet.co.zm) came up for renewal over a month ago, and we still have not received an invoice. Perhaps Zamnet are too busy disabling over a third of the country’s Internet infrastructure to send out invoices! (CORRECTION, 2013-06-28: Oops, seems we hadn’t updated our records correctly. Zamnet [when they do invoice] bills for domains every two years. Ours does not expire until next year. Our apologies for the incorrect statement, although it doesn’t really change much!)
Other countries take the management of their ccTLD (country code top-level domain) far more seriously than this. They have published rules and procedures governing what exactly happens after a domain expires. They also operate a WHOIS service so that the public can look up “who is” the owner of a domain and the dates that it was registered and will expire. Zamnet and Coppernet, as co-stewards of the dot-zm ccTLD — an odd arrangement that we are not aware of in any other country — do not provide any such information, at least to the public. In fact, judging by these arbitrary and cavalier mass deletions carried out by both companies, they don’t even have any such policies! They just seem to make this up as they go along.
You would think that — given that deleting 37 per cent of the country’s domains has all of the appearance of a planned and concerted effort — Zamnet would, at the very least, post a prominent notice on the home page of their website. However, there is no such notice as of posting this. (Click on the thumbnail at left to see.) I’m also not aware of any notices posted in newspapers. So much for their laughable slogan: “Nobody delivers IT better.” Right now, more than a third of their customers are not getting anything delivered, and it’s clear that their slogan doesn’t apply to the delivery of invoices.
And where is ZICTA in all of this? You’d think they’d be interested in the disabling of 37 per cent of the country’s domains, but there’s nothing posted on the home page of their website either! Maybe a few complaints via their complaint form might get their attention. (UPDATE, 2013-06-28: Hmm, the complaint form disappeared shortly after we posted this. Try their “Complaint Handling” page instead.)
Please note that, if you did not register your dot-zm domain through NinerNet, we do not know when it is scheduled to expire and we cannot help you in dealing with Zamnet. We don’t know how effective it would be to request an update to the contact information for your domain so that we can monitor it, from an administrative (not technical) point of view, but if you’d like to try we’re certainly game to assist and cooperate. Let us know if you’d like to try.
Issues such as these mass and arbitrary deletions, as well as the entire dot-zm ccTLD going down occasionally, are the two main reason we discourage clients from registering dot-zm domains. This is unfortunate, of course, but clients expect their online services to actually be … online! It is also the reason that we created the alternative ccTLD for Zambia: dot-zam.co. They’re only K66 per year (as opposed to hundreds for a dot-co.zm and hundreds more for a dot-com.zm) and don’t require paperwork.
The dot-co.za registry has announced a price increase of 50% for registration and renewal of dot-co.za domains, effective 1 March 2013. As a result, we too must increase our prices, and this will be effective immediately.
The new prices are live on our rates pages. Please check there for the new rates in your currency.
We appreciate your understanding.
Subscriptions:
General Information:
Search:
Recent Posts:
Archives:
Categories:
Tags:
Resources:
On NinerNet: