Field interventions in the Brussels region

UPDATE 25/11/2015:

Dear customer

We would like to inform you that Proximus has decided to restart executing provisioning field interventions for all products in all 19 Brussels communities and Vilvoorde, as from Wednesday 25/11/2015.

Pending orders of previous days remain under close monitoring by the Provisioning teams.

We apologise for the inconvenience the measures of the previous days might have caused and thank you for your understanding.

 

Dear customer

Due to exceptional security measures advised by the Belgian authorities, we were informed this morning that Proximus has decided that no field interventions will be executed until further notice in the Brussels region. This applies to all 19 Brussels communities and Vilvoorde.

However Proximus repair activities will be executed as usual.

Meanwhile the edpnet installation team will continue with field interventions in the Brussels region.

We will keep you informed when all activities will be resumed.

We apologize for the caused inconveniences.

 


Maintenance planned on 03/11 for Flemish region

Update 03/11 – The maintenance has been successfully completed

Dear customers,

To ensure that your data solution continues to function flawlessly, Proximus will shortly be carrying out works on its network. This work may have an impact on your data communications.

This maintenance may affect your services.

Please find all details below:

Start: 2015-11-03 05:50 AM*
End: 2015-11-03 06:10 AM*
Duration: 5 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: West and East Flanders: 050, 051, 052, 053, 054, 055, 056, 057, 058, 059, 09

We apologize for the inconveniences.

Best regards
The edpnet team

*All times are listed in CET, Central European Time


Maintenance planned on 04/11 for Flemish region

Update 04/11 – The maintenance has been successfully completed

Dear customers,

Edpnet has planned a maintenance in order to perform a software upgrade on the equipment.

This maintenance may affect your services.

Please find all details below:

Start: 2015-11-04 05:50 AM*
End: 2015-11-04 06:10 AM*
Duration: 5 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: West and East Flanders: 050, 051, 052, 053, 054, 055, 056, 057, 058, 059, 09

 

We apologize for the inconveniences.

Best regards
The edpnet team

*All times are listed in CET, Central European Time


Outage: VoIP telephony / SIP trunking

Dear customers,

We’ve experienced an outage with VoIP/SIP services due to a fault of one of our telephony switches. For this moment the outage is solved. All services are up and running.

Please find all details below:

Start: 2015-10-25 23:45
End: 2015-10-26 10:30
Duration: 11 hours
Impacted services: VoIP telephony / SIP trunking
Affected Areas: All VoIP/SIP trunking customers in Belgium

 

We apologize for the inconveniences.

Best regards
The edpnet team

*All times are listed in CET, Central European Time


Info: Migration of webserver lweb05

Dear customers,

We are currently in the process of migrating linux webserver lweb05 to our new webcluster to provide a better service. This also means that newer PHP versions will become available on request.

Please verify your database settings so they are on ‘localhost’.  Connecting to the FTP server is best done by using your domain name.

This migration should be mostly transparent and will be constantly monitored. Please contact our technical helpdesk in case of issues or questions.

If you have any questions left, please do not hesitate to contact us.

Best regards
The edpnet team


Partial Outage: Cloud PBX

Dear customers,

We are currently experiencing an outage with a server used for our Cloud PBX servers. The outage is currently under investigation by our NOC team. Further updates will be released as soon as possible.

Please find the info below.

Start: 2015-07-29 10:30 AM*
End: 2015-07-29 11:00 AM*
Duration: 30 minutes
Impacted services: Several Cloud PBX customers
Affected Areas:

Update 11:04 – The issue has been resolved, PBX systems are coming back online. RFO: Misbehaving failover mechanism.

We apologize for the inconveniences.

Best regards
The edpnet team

*All times are listed in CET, Central European Time


Info: Spam from “info@edpnet.net”

Dear customers,

We would like to inform you about a spamwave that identifies itself as info@edpnet.net aimed at both customers and non-customers. The source seems to be a botnet.

The mail contains the subject “Uw edpnet factuur 2015xxxxxx” and an attachment. We advice our customers to verify any open invoices via my.edpnet.be.

Please do not inform invoices in the .doc format. All of our invoices are sent using .pdf. We advice those that have opened the .doc file to scan their computer for malware.

Update: Our mailservers are running on a delay as the spam is being processed. It can take several hours for the processing time to normalize. No mail will be lost.

Update: Our mailservers have processed the last of the backlog and are returning to normal functionality.

If you have any questions left, please do not hesitate to contact us.

Best regards
The edpnet team


Planned Maintenance Proximus – Charlerloi and Ghent

Dear customers,

Proximus has planned a maintenance in 2 of its data centers.
This maintenance may affect your data services. Please find the info below.

Description: Maintenance Charleroi
Start: 2015-09-02 02:00 AM*
End: 2015-09-02 04:00 AM*
Duration:15 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: Area code: 010, 060, 064, 065, 067, 068, 069, 071

Description: Maintenance Ghent
Start: 2015-09-02 02:00 AM*
End: 2015-09-02 04:00 AM*
Duration:15 minutes
Impacted services: All data services (internet, telephony, …)
Affected Areas: Area code: 050, 051, 052, 053, 054, 055, 056, 057, 058, 059, 091

We apologize for the inconveniences.

The edpnet team

*All times are listed in CET, Central European Time


Veiligheidswaarschuwing: “Ghost” lek in Linux distributies

Beste klanten,

Recent werd er een lek gevonden in bijna alle Linux distributies via de “Name Service Switch (nss) library”. Deze bug staat mensen toe om toegang te krijgen tot deze systemen en hierop code uit te voeren.

U kan onderaan dit bericht verdere informatie terugvinden, alsook de uitleg hoe u dit lek kan sluiten. Edpnet heeft haar systemen reeds geüpdatet, we raden onze klanten aan om hetzelfde te doen.

A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.

Bron en info: http://ma.ttias.be

Met vriendelijke groeten, Het edpnet team


Security bulletin: “Ghost” vulnerability on Linux devices

Dear customers,

Recently a critical security bug has been found with the Name Service Switch (nss) library in almost all Linux distributions. This bug can allow attackers to gain access to affected systems remotely by possibility to remotely execute arbitrary machine code without permissions.

Information on this bug and how it can be resolved can be found below. Edpnet has already patched this vulnerability on all of its servers, and we strongly advice our customers to do the same.

A heap-based buffer overflow was found in glibc’s __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote attacker able to make an application call either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the application.

Source and info: http://ma.ttias.be

Best regards,The edpnet team

*All times are listed in CET, Central European Time