Mailman updated to avoid DMARC problem

In recent days, Yahoo and AOL made technical changes that prevented their own users from sending messages to most mailing lists. (That’s a simplified summary; your favorite search engine will show the gory details if you search for “Yahoo DMARC mailing lists”.)

If you use the Mailman software to run discussion lists, like many of our customers, this is a problem. To fix it, the authors of the Mailman software are making a new version to work around the Yahoo and AOL change.

That new version hasn’t been officially released yet, but we think this is so important that we’ve upgraded our installed copy of Mailman to a “pre-release” version of the fixed software.

Yahoo and AOL users should now be able to send to our customers’ Mailman lists without trouble.

Read the rest of this entry »

Perl scripting language upgraded to 5.14

We’ve upgraded the default version of the Perl scripting language on all our servers to the 5.14 series (specifically, to version 5.14.2 plus Debian security patches).

Most of our customers don’t use Perl, but those who do should not notice any problems. Don’t hesitate to contact us if you need assistance.

Python scripting language upgraded to 2.7

We’ve upgraded the default version of the Python scripting language on all our servers to the Python 2.7 series (specifically, to version 2.7.3 plus Debian security patches).

The older version 2.6 series of Python was also updated from 2.6.6 to 2.6.8 (plus Debian security patches).

Read the rest of this entry »

Seeing more bounces for yahoo.com addresses? It’s not just you.

Over the last couple of days, mail from yahoo.com addresses has been “bouncing” a lot more than usual, often with error messages about “policy” or “DMARC” problems. This is especially true for messages involving mailing lists or forwarding from other addresses.

If you see this happening, it isn’t because of anything wrong on your end, or our end. It’s happening all over the Internet.

Read the rest of this entry »

Our servers are not vulnerable to the “Heartbleed” SSL security bug

Yesterday, Internet security researchers announced discovery of the Heartbleed SSL security bug. This bug allows attackers to bypass SSL encryption on servers that use certain versions of software called “OpenSSL”.

Our servers are not, and never have been, vulnerable to this bug, because we’ve never used the affected versions of the OpenSSL software. Our customers are not affected by it in any way.

Read the rest of this entry »

Brief scheduled maintenance on web07 server April 5, 2014 (completed)

At approximately 10:00 PM Pacific time Saturday April 5, 2014, the “web07” server will be restarted. This will cause a short interruption of service for Web sites on that server lasting less than 8 minutes.

Other servers will not be affected. Mail for customers on this server will be queued and delivered after a short delay.

Read the rest of this entry »