Categories
Changes

New Option: Allow Sender To Fail An RFC822 Check

We’ve added a new client validity check option called “Allow sender address to fail an RFC822 Address Check”. This option stemmed from an old feature request.

However, we are not supporting changing this option away from its’s “default” setting. The purpose of adding it as an option is to let customers that know why they would want to bypass this check (and understand the possible pitfalls) to have the option to do so. Rollernet does not recommend or support changing this setting. You’ll find it at the very bottom of the Client Validity Checks.

Categories
Announcements Status

DNSBL: AHBL Closing Down

The AHBL DNSBL is closing down and emptying its DNS zones. As such, we will be removing all *.ahbl.org configurations from customer DNSBL settings.

See the announcement at: http://www.ahbl.org/content/changes-ahbl

Categories
Announcements Status

OpenSSL “Heartbleed” Vulnerability Statement

The Heartbleed Bug is a major vulnerability in the OpenSSL library. OpenSSL is extremely popular and is used as the cryptography library behind the scenes for countless secure applications. By now you’ve probably heard about it and its widespread implications. We’re not going to rehash it here, see: heartbleed.com

Roller Network uses Debian Linux as the OS of choice for our servers. However, we do not generally stay on the “bleeding edge” of updates, and in this case that has served us well.

OpenSSL 0.9.8 is not, and has not been, vulnerable to “heartbleed”. Only the newer OpenSSL 1.0.1 through 1.0.1f is vulnerable.

So where does that leave us? The good news is that we were still Debian 6.0 “squeeze” at the time of this security fiasco because we don’t like to jump right into the latest release for the sake of updating. The Debian security team still provides security updates to the previous stable release (also known as “oldstable”) for a period of time, so we’re in no rush to upgrade. Specific software that we do want to have newer versions of are either obtained from Debian backports or compiled manually. We like to take a wait-and-see approach before upgrading Debian distributions.

Here’s a rundown of the major services:

  • Incoming mail servers (MX servers): Debian 6.0; not vulnerable, no risk.
  • Hosted mail services (POP3, IMAP, Sieve): Debian 6.0; not vulnerable, no risk.
  • Outbound mail services (SMTP AUTH, smarthost): Debian 6.0; not vulnerable, no risk.
  • Webmail clients (Squirrrelmail and Roundcube, EV cert): Debian 6.0; not vulnerable, no risk.
  • Primary and Secondary DNS Servers: Debian 6.0; not vulnerable, no risk.
  • Account Control Center (acc.rollernet.us, EV cert): Debian 6.0; not vulnerable, no risk.
  • LDAP, RADIUS, and SQL database servers: Debian 6.0; not vulnerable, no risk.

This is great news for our customers: at no time were any password-accepting Roller Network servers running a distribution that was affected by “heartbleed”. We did have an internal server in the office running Debian 7.0 and it’s been patched, SSH keys regnerated, and its SSL cert (signed by our internal CA) reissued.

Categories
Fun Stuff

Updated Facility Pictures

Did you know that the pictures we use on our website are real pictures from our facility, not stock photos? A couple of them were out of date so here’s the updated versions for the colocation services page.

Telco/MMR

telco2

STE1 UPS Room

upsroom2

 

Categories
Changes

Mail: “Foxhole” Third Party Databases

We’re going to start using the “Foxhole” third party databases on our mail services for those that are using the Anti-Virus filter and have third-party databases enabled. For more information see: sanesecurity.com/foxhole-databases/