newspaper

News

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

This page serves as informational purpose for any news related to
Paranoid Secure Hosting. All updates on this page are signed with the
 Paranoid Secure Hosting OpenPGP key.

The OpenPGP public key can be imported from:
https://hosting.d9ping.nl/mail/7637487CEB21CFBF21AA448B4267880693D1329E.asc
Fingerprint: 7637487CEB21CFBF21AA448B4267880693D1329E
Algorithm: RSA 4096 bits
Long Key-ID: 4267880693D1329E
Valid till:  2024-01-01(YYYY-MM-DD)
Previous valid till: 2023-01-01(YYYY-MM-DD)
And previous valid till: 2021-01-01(YYYY-MM-DD)

Any message before before 2018-01-01(YYYY-MM-DD) 12:00(UTC) are signed with our old
OpenPGP key. Import from:
https://hosting.d9ping.nl/mail/C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2_expired.asc
Algorithm: RSA 3072 bits
Fingerprint: C7570F0C16D6ED56C4D5E9C240F7B86E9A1ECAD2
Valid till: 2018-01-01(YYYY-MM-DD) 12:00(UTC).
-----BEGIN PGP SIGNATURE-----
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=D7te
-----END PGP SIGNATURE-----

Recent news

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

There has been a DNS resolve issue for the paranoidsecurehosting.tk zone.
The problem starting 
from 2015-02-02 13:28 (UTC)
till 2015-02-02 13:33 (UTC).
The problem is caused by a DDoS attacks against the DNS nameservers.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=a/rA
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

There will be scheduled maintenance by the upstream provider 
from 2014-12-09 23:59 (UTC) 
till 2014-12-10 5:00 (UTC).
During this time window connection distributions can occur or connection may be slower than usually.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=YDnz
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Paranoid Secure Hosting has fixed security issue CVE-2014-8350 that is caused by the use of Smarty template engine.
This security issue could be abused for PHP commandline execution from an internal threat.
We have patched the issue and exploiting CVE-2014-8350 should now not work.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22
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=uI4O
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Paranoid Secure Hosting is aware of a critical new issue with SSL 3.0.(CVE-2014-3566)
Paranoid Secure Hosting want to clarify that Paranoid Secure Hosting does not and have not supported SSL 3.0.
This is because we need use TLS instead of SSL for supporting multiple secure sites 
on the same public ip and SSL 3.0 cannot do that.

We recommend all web users to enable TLS 1.1 and TLS 1.2 and make sure you 
always try to use the latest TLS version 1.2 due to other major issues 
with TLS version 1.0. Paranoid Secure Hosting does still supports TLS 1.0 but this is only 
 because so many web users still do not have TLS 1.1 or 1.2 enabled in their webbrowsers.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22
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=Qcfa
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

There will be scheduled maintenance by the upstream provider 
from 2014-09-24 23:00 (UTC) 
till 2014-09-25 5:00 (UTC).
During this time window connection distributions can occur or the connection is slower than usually.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=RC3j
-----END PGP SIGNATURE-----