Opalstack - Notice history

Notice history

Jan 2023

German IMAP/POP3 server offline for scheduled relocation
  • Resolved
    Resolved

    The backlog of incoming mail has been delivered and the relocation is complete.

  • Monitoring
    Monitoring

    The DE mail server is back online at this time and the backlog of incoming mail is now being processed. We're awaiting the final word from the data center that the relocation is complete.

  • Investigating
    Investigating

    As previously announced, our German IMAP/POP3 server will be offline for relocation to a new data center facility from 0800 to 1600 UTC on 24 January 2023: https://status.opalstack.com/schedules/38

German IMAP email server relocation downtime
  • Completed
    January 24, 2023 at 4:00 PM
    Completed
    January 24, 2023 at 4:00 PM
    The maintenance is complete.
  • In progress
    January 24, 2023 at 8:00 AM
    In progress
    January 24, 2023 at 8:00 AM

    Maintenance is now in progress

  • Planned
    January 24, 2023 at 8:00 AM
    Planned
    January 24, 2023 at 8:00 AM

    On 24 January 2023 at 0900 CET (UTC +1) our German IMAP/POP3 mail server will be physically relocated to a new data center facility in Frankfurt. The server will be offline during the relocation and the expected downtime is 8 hours.

    Customer mailboxes hosted on the server will not be available during the relocation. Mail that arrives while the server is offline will be deferred and delivered once the mail server is back online (no incoming mail will be lost).

    Mail forwarding addresses configured at https://my.opalstack.com/mail/ will continue to forward mail normally.

    Customers will still be able to send mail during the downtime under the following circumstances:

    • Web applications will be able to send mail via SMTP and sendmail
    • POP3 desktop email clients will be able to send mail via SMTP.
    • IMAP desktop email clients should be able to send mail via SMTP but will not be able to store a copy of the sent message because storing messages is a function of the IMAP server.
    • Webmail will not be available because it uses the IMAP server for authentication.

    We realize that the timing of this relocation is not ideal. If you have business-critical mailboxes and would like them to be available during the relocation then please email support@opalstack.com to make arrangements to migrate your mailbox in advance.

    We'll update the status page at the beginning of the relocation window. If you would like to be informed of system status updates automatically then please subscribe at https://status.opalstack.com/subscribe.

Dec 2022

Ongoing DNS DDOS Attack
  • Update
    Update

    Post-mortem: this was a DNS flood attack which targeted all 9 of our regional name servers. The attack originated from several cloud provider subnets, including Google and Cloudflare.

    To mitigate the attack we had to temporarily block the provider subnets. This had some unintended and undesirable side effects:

    • The subnets included public DNS resolver infrastructure run by Google and Cloudflare, so blocking them prevented those resolvers from looking up DNS records on Opalstack name servers. As a result, people who use those resolvers were temporarily unable to access opalstack.com (including this status page) and customer domains that use our name servers.
    • The block also prevented Google from looking up DNS records related to email such as SPF and DKIM. As a result, mail sent (or forwarded) to Gmail from Opalstack's mail system was rejected by Google while the block was in place.

    The block was lifted over 24 hours ago and there have been no further issues since that time.

    Going forward, we'll refine our mitigation techniques to avoid blocking major providers when possible. We'll also move this status page to an externally-hosted domain to ensure that system status updates will be available regardless of the state of our infrastructure.

  • Resolved
    Resolved

    We've seen no further issues in the past several hours and consider this to be resolved.

  • Monitoring
    Monitoring

    The attack has subsided, we'll continue to monitor.

  • Investigating
    Investigating

    Over the last few hours we've identified and mitigated an ongoing DDOS attack against our DNS infrastructure. This attack has also effected our Singapore and German DNS servers.

    We're continuing to monitor the attack.

Nov 2022 to Jan 2023

Next