Main Page: Difference between revisions

From UMIACS
Jump to navigation Jump to search
No edit summary
No edit summary
Line 7: Line 7:


'''When:  Thursday 9/23 8pm - Friday 9/24 12am'''
'''When:  Thursday 9/23 8pm - Friday 9/24 12am'''
Hi~


This past weekend a critical security vulnerability was revealed for Linux systems.  A patch is now available for this exploit, designated CVE-2010-3081.  To implement this fix we will need to reboot all affected Linux systems which will install a new, secure kernel version.  Due to the seriousness of this vulnerability, we need to apply this fix as soon as possible and have scheduled a restart of all affected systems this Thursday, 9/23/10 at 8:00PM.  We apologize for the limited notice but quick action is needed to ensure the security of our systems, users, and data.  UMIACS technical staff is able to identify any systems that may be compromised and we  have been diligently monitoring all UMIACS systems since the original announcement.
This past weekend a critical security vulnerability was revealed for Linux systems.  A patch is now available for this exploit, designated CVE-2010-3081.  To implement this fix we will need to reboot all affected Linux systems which will install a new, secure kernel version.  Due to the seriousness of this vulnerability, we need to apply this fix as soon as possible and have scheduled a restart of all affected systems this Thursday, 9/23/10 at 8:00PM.  We apologize for the limited notice but quick action is needed to ensure the security of our systems, users, and data.  UMIACS technical staff is able to identify any systems that may be compromised and we  have been diligently monitoring all UMIACS systems since the original announcement.

Revision as of 22:36, 21 September 2010

Anouncements

<startFeed />


UMIACS Linux Systems Reboot

When: Thursday 9/23 8pm - Friday 9/24 12am

This past weekend a critical security vulnerability was revealed for Linux systems. A patch is now available for this exploit, designated CVE-2010-3081. To implement this fix we will need to reboot all affected Linux systems which will install a new, secure kernel version. Due to the seriousness of this vulnerability, we need to apply this fix as soon as possible and have scheduled a restart of all affected systems this Thursday, 9/23/10 at 8:00PM. We apologize for the limited notice but quick action is needed to ensure the security of our systems, users, and data. UMIACS technical staff is able to identify any systems that may be compromised and we have been diligently monitoring all UMIACS systems since the original announcement.

The specific version of Linux affected is Red Hat Enterprise Linux, Version 5. Unfortunately, this list includes most of the Institute's clusters, web services, database services, computational nodes, and workstations. If you are unsure whether one of the systems you use is affected, please refer to the complete list on our wiki here: https://wiki.umiacs.umd.edu/umiacs/index.php/LinuxRebootList-2010_09_21 .

Please send any questions or comments to staff@umiacs.umd.edu.

UMIACS Web/FTP Filesystem migration

When: Tuesday 9/21 10pm - Wednesday 9/22 2am

We are going to be migrating the main UMIACS web and ftp file system to a new backend storage system which will require both the file systems to be read-only and then offline for a very short period. There will only be a 15 minute window at the tail end of the maintenance window where we will not be serving web and ftp content. No other services within UMIACS will be affected.

Please send any questions or comments to staff@umiacs.umd.edu.

Comcast DNS Issues

We are currently experiencing issues with Comcast home internet in PG county not correctly handling DNS resolution for UMIACS hostnames, that can seem to be affecting connectivity to UMIACS.

If you are having problems getting to UMIACS hosts you can use our name servers to resolve those specific host names then connect using the IP addresses you lookup. Our name servers are 128.8.120.19, 128.8.120.50, and 128.8.132.75 to use this information to get the ip address of the host somehost.umiacs.umd.edu you would use the command "nslookup somehost.umiacs.umd.edu 128.8.120.19", from a linux, windows or mac command prompt.

Unfortunately the problem seems to lie in an interaction of Comcast's name servers with those run by OIT, but we are looking into ways we can interact with those parties to get this issue resolved.

UMIACS Staff Jira

We have upgraded our request tracker to Jira. Please email staff@umiacs.umd.edu if you have questions or comments.

<endFeed />

Technical Reference

Welcome to UMIACS Wiki. This is the main place to find documentation and information about your account and the technical services that UMIACS offers. If this is your first time please start here Getting Started.

We provide many Core Services which include EMail, Backups and VPN.

We have lots of specific Lab Facilities that you may be interested in.

Please check here if you are interested in Ordering Equipment.