Maintenance: Antwerp area

Dear customers,

We have planned a maintenance in 03 zone, causing a brief interruption in the traffic flow on some access lines. Please find the details below.

Description:
Start: 
2015-03-26 06:00 AM*
End: 2015-03-26 07:00 AM*
Duration: 1 minute
Impacted services: All edpnet services (Internet, telephony, e-mail…) for the areas below.

Affected Areas:  03

We apologize for the inconvenience

The edpnet team

*All times are listed in CET, Central European Time


Maintenance: Brussels and Antwerp Area

Dear customers,

We have planned a maintenance in 02 and 03 zone, only a brief interruption in the traffic flow should occur. Please find the details below.

Description:
Start:
2015-03-23 06:00 AM*
End: 2015-03-23 08:00 AM*
Duration: 1 minute
Impacted services: All edpnet services (Internet, telephony, e-mail…) for the areas below.

Affected Areas: 02, 03

We apologize for the inconvenience

The edpnet team

*All times are listed in CET, Central European Time


Maintenance: Proximus – Brussels Area

Dear customers,

Proximus has planned a maintenance in one of its data centers. Please find the details below.

Description:
Start:
2015-03-16 02:00 AM*
End: 2015-03-16 04:00 AM*
Duration: 15 minutes
Impacted services: All edpnet services (Internet, telephony, e-mail…) for the areas below.

Affected Areas: 02

We apologize for the inconvenience

The edpnet team

*All times are listed in CET, Central European Time


Maintenance: Proximus – Liege Area

Dear customers,

Proximus has planned a maintenance in one of its data centers. Please find the details below.

Description: Maintenance data center Liege
Start: 2015-02-23 02:00 AM*
End: 2015-02-23 04:00 AM*
Duration: 00:15
Impacted services: All edpnet services (Internet, telephony, e-mail…) for the areas below.

Affected Areas: 019, 041, 061, 063, 080, 081, 082, 083, 084, 085, 086, 087

We apologize for the inconvenience

The edpnet team

*All times are listed in CET, Central European Time


Problemen Mailservers

Beste klanten,

Er werd een storing gemeld met onze mailservers. Na onderzoek bleek dit een probleem te zijn met de verbinding naar de opslagruimte.

Alle services werken nu terug normaal.

Met vriendelijke groeten,
Het edpnet Team


Issue mailserver

Dear customers,

We are currently investigating issues with our mailservers. These are estimated to be resolved in 5-10 minutes.

Update 10:40 AM: There was an issue with the connection between the storage servers and the mailservers. Everything is back in service now.

We apologize for the inconvenience

The edpnet team

*All times are listed in CET, Central European Time


Planned Maintenance Proximus – Charlerloi and Ghent

Dear customers,

Proximus has planned a maintenance in 2 of its data centers.
This maintenance may affect your data services. Please find the info below.

Description: Maintenance Charleroi
Start: 2015-09-02 02:00 AM*
End: 2015-09-02 04:00 AM*
Duration:15 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: Area code: 010, 060, 064, 065, 067, 068, 069, 071

Description: Maintenance Ghent
Start: 2015-09-02 02:00 AM*
End: 2015-09-02 04:00 AM*
Duration:15 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: Area code: 050, 051, 052, 053, 054, 055, 056, 057, 058, 059, 091

We apologize for the inconveniences.

The edpnet team

*All times are listed in CET, Central European Time


Veiligheidswaarschuwing: “Ghost” lek in Linux distributies

Beste klanten,

Recent werd er een lek gevonden in bijna alle Linux distributies via de “Name Service Switch (nss) library”. Deze bug staat mensen toe om toegang te krijgen tot deze systemen en hierop code uit te voeren.

U kan onderaan dit bericht verdere informatie terugvinden, alsook de uitleg hoe u dit lek kan sluiten. Edpnet heeft haar systemen reeds geüpdatet, we raden onze klanten aan om hetzelfde te doen.

A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.

Bron en info: http://ma.ttias.be

Met vriendelijke groeten, Het edpnet team


Security bulletin: “Ghost” vulnerability on Linux devices

Dear customers,

Recently a critical security bug has been found with the Name Service Switch (nss) library in almost all Linux distributions. This bug can allow attackers to gain access to affected systems remotely by possibility to remotely execute arbitrary machine code without permissions.

Information on this bug and how it can be resolved can be found below. Edpnet has already patched this vulnerability on all of its servers, and we strongly advice our customers to do the same.

A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.

Source and info: http://ma.ttias.be

Best regards,The edpnet team

*All times are listed in CET, Central European Time


Info: Phishing report

Dear customers,Some customers have received the phishing e-mail below.
We would like to inform you that this message can be disregarded and is not coming from edpnet.

What is Phishing? Phishing emails are fraudulent messages made to look like they were sent by reputable companies in an attempt to gather your personal and financial details.

Example:


From: INFO SERVICE TELENET [mailto:<removed>]
Sent: woensdag 3 december 2014 16:30
Subject: *Chers (es) clients (es) de EDPNET,*
*Chers (es) clients (es) de EDPNET,*
Le service technique chargé de la maintenance des comptes de messagerie a détecté des accès illégaux à votre messagerie à travers différentes adresses IP. Au risque que votre compte ne soit suspendu dans les prochains jours, notre service de maintenance vous demande de confirmer vos accès de connexion. Au cas où les informations ne seront pas fournies, votre accès à la messagerie serait suspendu définitivement. Pour des raisons de sécurité, veuillez fournir l’intégralité des informations demandées.
Complétez les informations suivantes pour la confirmation à votre accès

* Nom d’utilisateur:………………………………….
* Mot de passe:………………………………………. 
* Adresse e-mail :…………………………………… 
* Mot de passe :………………………………………
* E-mail secondaire :………………………………… 
* Mot de passe :………………………………………. 
* Date de naissance:………………………………… 
* Pays ou territoire:…………………………………..
* Profession:………………………………………………
* Tel:…………………………………………………………
Dès la réception de ces informations, votre messagerie serait suivie contre les accès illégaux. Merci de votre collaboration. 

Webmail EDPNET*

*Cordialement,*

*L’équipe EDPNET*