[UPDATED] Planned maintenance work on transit link 8th August 2015

Change of date:

We’ve been advised by Cogent Network, one of our transit suppliers of work to be undertaken on some of their core routers. This should not mean any loss of service to us or our end-users as we have multiple diverse routes into and out of our data centres — there may be a few moments of route instability until they re-converge and stabilise.

Maintenance window:

Date of work: 8.8.2015
Start time: 00:00 BST
End time: 02:30 BST
Place of work: London Telehouse North
Work description: Hardware upgrade on Core router controller cards

Planned Work – thn-gw2 05/06/15

We are seeing an issue with one of our Telehouse Gateway Routers. To resolve this we will need to reboot this later this evening to resolve the problem we are seeing

This should not cause an outage but may cause a routing blip as the routes transiting the router re-converge. We hope the router will not be down for more than 30 minutes – although we will will be monitoring this and will update here as needed.

[CLOSED]: Routing issues esp. affecting VOIP circuits

UPDATE 28th May: the link was re-enabled overnight and was monitored. It is now stable & we are confident that the problems it caused have now been fixed by LINX.
UPDATE: we have temporarily disabled this link and routes are now quickly recovering. We will update when this issue is fixed at LINX and we re-enable this connection.
We (and other ISPs) are seeing some instability at one of the LINX peering points today, which may cause slowness to some locations etc and strange routing paths. This is particularly affecting many VOIP circuits but other transits are also showing problems.
We are monitoring and waiting for an update from LINX – if the instability becomes too great we will disable our peering; however as other ISPs also connect there, this may not resolve all issues and we’re actively investigating alternatives.

SECURITY: possible consumer router vulnerabilities

If you have a domestic-grade router you should check by reference to this report, whether or not it may be affected by a recently notified vulnerability https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt

If you believe this may be the case you should contact the manufacturer direct or check their web-site to see if your model has been patched and proceed accordingly.