Service News


Maintenance Notification

Dear Customers,


This is to inform you of scheduled maintenance coming up next week on our network.

Date: Wednesday, 6 November 2019
Maintenance Window: Between 10pm and midnight

We don’t foresee any impact on your services. However, there will be a short interval where our redundancy / failover network routing will be unavailable and when the devices are rebooted post upgrade. Any potential outage would involve short 3 minute drop offs during this routing process.

We appreciate your patience while we perform this upgrade. This will allow us to provide a more robust service going forward.

The Support Team


General Server Maintenance Notification

Dear Customers,

We are writing to advise that we are running a patch cycle on our servers over four hours during the following period:

Start Time: Thursday 23 May 2019 at 10:00 pm NZST
End Time: Friday 24 May 2019 at 1:00 am NZST

This work is being undertaken to ensure our servers are protected against vulnerabilities. We expect very little impact on our customers but there may be rolling restarts of services required during this period.

Thank you for your understanding and we apologise for any inconvenience caused.

Kind Regards,
The Support Team


Customer Support Update

Dear Customers,

Due to an internal staff event being held today, Friday 5 April, please note that support response may be slightly delayed due to a lighter roster of staff on duty. Thank you for your understanding.

The Umbrellar Online Support Team


Email issue

Update: 31/12/18 1:55pm

We believe this issue is now resolve.

Please let us know if you are still facing issues.
Update: 28/12/18 5:30pm

We are still working on this issue.

We thank you for your patience.
Dear Customers,

We have identified an email issue with the error message:

(0x800CCC1A) Your server does not support the connection encryption type you have specified.

We do not currently have an ETA for this issue.

Please be aware, we currently have skeleton support staff for the Christmas period, so wait times on calls to us may be higher than usual.

We are working to resolve this issue as soon as possible.

Kind regards,
The Support team


Linux server maintenance

Dear Customers,

We are writing to advise that we have scheduled maintenance on our servers for three hours during the following period:

Start Time: Thursday 23 August 2018 at 10:00 pm NZST
End Time: Friday 24 August 2018 at 2:00 am NZST

Thank you for your understanding and we apologise for any inconvenience caused.

Kind Regards,

The Support Team


Customer Notification

Dear Customers,

We note that some customers incorrectly received an email from us earlier today notifying them that their domain had been transferred to another registrar. Unfortunately our system auto-generated this email in error and we apologise for any confusion caused.

Please disregard the email you received, it was triggered by an internal process of moving domains from one server to another.

We are working hard to address and resolve this issue and apologise that customers were disturbed.

Thank you for your understanding.

Kind Regards,
The Support Team


Linux server maintenance

Dear Customers,

We are writing to advise that we have scheduled maintenance on our servers for three hours during the following period:

Start Time: Thursday 16 August 2018 at 11:00 pm NZST
End Time: Friday 17 August 2018 at 2:00 am NZST

Thank you for your understanding and we apologise for any inconvenience caused.

Kind Regards,

The Support Team


Customer Notification

Dear Customers,

Please note all phone support systems are currently down, we are urgently working to restore the service. We have spoken with our upstream provider who have confirmed it as an issue at their end. We have no ETA at this stage but will update as soon as possible.

In the meantime for any urgent support requirements please lodge a support ticket through the website.

We apologise for any inconvenience.

The Support Team


Customer Maintenance Update

Dear Customers,

We are writing to advise that we have scheduled maintenance on our servers for one hour during the following period:

Start Time: Saturday 28 April 2018 at 11:00pm NZST
End Time: Sunday 29 April 2018 at 12:00am NZST

Thank you for your understanding and apologise for any inconvenience caused.

Kind Regards,

The Support Team


Spectre / Meltdown Update

Our engineers have successfully applied all the relevant operating system patches across our Microsoft hosts.
Linux servers are approximately 50% done, and completion will progress during the course of the week.
Unfortunately hardware firmware updates are constantly being released and revoked due to stability issues they are presenting.
As per recommendation from Intel, its advisable to not apply their current release. We subsequently took the decision to hold back on any firmware updates until the “fixes” have matured in stability.


UPDATE: Spectre/Meltdown Kernel Memory Issue

In response to the global Kernel Memory Leakage vulnerability issues that have circulated throughout the last week, we have worked closely with our hardware and operating system vendors to initiate remedial actions.
As there is no single fix to cover all the variants of Meltdown and Spectre, we are completing our patching in a phased approach, as outlined below.

Virtualization Platform
• Our virtualization platform has been patched up to the current vendor issued baseline.
• There are 2 remaining specific patches which are pending. These depend on the availability of a vendor firmware patch, which we expect to be released in the coming days.

Infrastructure Hardware
• The majority of our vendors have already released firmware patches, and patching is in progress.
• For the few still outstanding we are actively tracking availability with the vendor.
• For hardware that does not have applicable firmware patches, we are also patching the overlying Operating Systems for additional mitigation.

Operating System Patches
• Microsoft have released patches for Windows Operating Systems. Over 50% of our systems are already patched, with the remaining systems being completed next week.
• The majority of Linux distributions have already released their OS patches, but there are a few who we are still waiting on. We plan to address these patches in our next patch cycle at the beginning of February, so we can include all outstanding patches.
• We are investigating the possibility of bringing the patch cycle forward, depending on the availability of the Linux patches.


Meltdown / Spectre Kernal Memory Issue UPDATE

Vendors have started to classify the risk impact on their products and are slowly releasing patches remediating some of the vulnerabilities. We will be patching our virtualisation environment with the recommended baseline versions for protection. Once the final fixes are made available, we will be deploying them accordingly.

If you see browser updates, we strongly recommend that you run these and as per usual, we strongly recommend checking, and applying operating system security updates as they become available.

Browser patch references from respective software houses are below:

Firefox statement release to media: Click here to view

Google chrome statement release: Click here to view

Opera browser statement release: Click here to view

Microsoft Edge / Internet Explorer: Patches were made available Wednesday last week, but automatic updates will run from next patch cycle. (Wednesday 10th Jan NZ time).


KERNEL MEMORY ISSUE : aka Meltdown / Spectre

You may be aware of the global Kernel Memory Leakage vulnerability issues relating to CPU vendors which was announced to the public yesterday by international media.
We have outlined all you need to know below and are actively working with our hardware vendors and operating system vendors to assess impact and remedial action.
We will be updating you as further information becomes available via our Umbrellar Status Page however, please be assured that we are doing everything possible to remediate any potential impacts immediately.


What is the issue?

On Jan 4th, it was announced in the media ( that numerous industry wide vulnerabilities in Intel, ARM and AMD (alleged) CPU's had been identified in relationship to Kernel Memory Leakage, known as Meltdown and Spectre. These vulnerabilities impact all compute running Windows, Linux, macOS (including server OS) and operating systems will require a patch to resolve the vulnerabilities. These vulnerabilities allow for side channel exploits in rogue malicious applications to be able to read data stored on a computers system memory. It is yet unknown the impact of the operating systems patch on operating system performance, however we will continue to monitor our platforms and make the necessary adjustments where needed.

Am I affected by the vulnerability?

Yes. This is a global issue with CPU chip sets. The full extent of the impact is yet to be established and we will communicate further as more information is received. Right now, we are doing everything possible by working with our vendors to rectify and remedy the known vulnerabilities.

What could be leaked?

If your system is affected by a malicious application, an exploit could read the memory content of the host server. This may include passwords and sensitive data stored on the system.
An attacker able to execute code with user privileges, can gain access to data in memory space, thus bypassing KASLR: (kernel address space layout randomization). This is a defence mechanism used by various operating systems to place components of the kernel in randomized locations in virtual memory.

Which systems are affected?

Desktop, Laptop, and Cloud computers may be affected by Meltdown/Spectre. More technically, every Intel (and potentially ARM and AMD) processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013).

What is the difference between Meltdown and Spectre?

Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. Consequently, applications can access system memory. Spectre tricks other applications into accessing arbitrary locations in their memory. Both attacks use side channels to obtain the information from the accessed memory location. For a more technical discussion we refer to the papers (Meltdown and Spectre).

• Meltdown is Intel-only and takes advantage of a privilege escalation flaw allowing kernel memory access from user space, meaning any secret a computer is protecting (even in the kernel) is available to any user able to execute code on the system.
• Spectre applies to Intel, ARM, and AMD processors and works by tricking processors into executing instructions they should not have been able to, granting access to sensitive information in other applications’ memory space

Is there more technical information about Meltdown and Spectre?

Yes, there is an academic paper and a blog post about Meltdown, and an academic paper about Spectre. Furthermore, there is a Google Project Zero blog entry about both vulnerabilities.


Buying an SSL certificate just got easier!

In an exciting update to our customer portal, from tomorrow onwards, you will have the ability to purchase and manage SSL certificates entirely online.

Whilst previously purchasing an SSL required submitting a request through to our sales team, the latest software update will allow customers to complete the full process of an SSL through the Umbrellar customer portal. Adding an extra layer of security to your website now couldn’t be easier!

Two different SSL certificates will be available, depending on the level of protection you need. Select to either protect one website, or multiple domains and add your SSL to your cart. Once you have completed your order, and it has been provisioned, you’ll be able to find the SSL under your ‘Security’ menu. Here is where you can manage and activate the SSL certificate.

SAN and EV SSL’s are of course still available, simply contact our support team on and they will guide you through the process.

These changes will take affect after our software update tonight between 2200 and 2300. The customer portal will be unavailable whilst we perform these updates. Our sincere apologies for any inconvenience caused.