... And why it is necessary to open a ticket to help us to process your request.
Several phishing scams are currently in progress. They are targeting thousands of domain name owners who have registered domains through registrars around the world (including GANDI).
These emails claim that your domain name has been suspended, and asks you to click on a link to download a copy of the complaints.
DO NOT CLICK on the the link or download the document: it contains a virus!
It seems that those responsible for sending these emails use the information obtained from the public WHOIS domain name database, where they recover the name, email address, and name of the registrar associated with the domain.
The fraudulent emails can even appear to come directly from GANDI. Here is one example:
Subject: Domain Name exemple.com have been suspended
From: GANDI SAS
Message: Dear First Lastname,
The Domain Name example.com have been suspended for violation of the
GANDI SAS Abuse Policy.
Multiple warnings were sent by GANDI SAS Spam and Abuse Department to give
you an opportunity to address the complaints we have received.
We did not receive a reply from you to these email warnings so we then
attempted to contact you via telephone.
We had no choice but to suspend your domain name when you did not respond to
our attempts to contact you.
Click here and
download a copy of complaints we have received.
Please contact us for additional information regarding this notification.
Spam and Abuse Department
You should ignore this email. It is not necessary to send it to us: we have recieved dozens over the past few days and our teams are already on it.
Thank you for your attention.
We will reboot the VMs of affected customers (those which were not rebooted by their owner) from Thursday, October 22 until Wednesday, October 28. An outage of 30 minutes maximum is expected for each impacted VM.
Maintenance status page: http://status.gandi.net/timeline/events/226
WordPress 4.3.1 is available. With 26 bugs and 3 vulnerabilities fixed, it's time to update your WordPress!
We recommend making sure that automatic updates are enabled for your WordPress installation, or running a manual update. There's a lot to gain, and a lot to lose if you don't, since this release is mainly focused on security fixes.
Two of the corrected vulnerabilities are XSS (Cross Site Scripting), related to the processing of "shortcode" tags in versions 4.3 and earlier, and the user list page.
The other problem is a privilege escalation which in some cases allows an unauthorized user to post private items and mark them as "sticky".
Although this version does not add any new features, it corrects a total of 26 bugs that exist in version 4.3.
In all, 64 files have been modified, with improvements to various aspects of the web interface of the world's most popular CMS, as well as its backend functions.
So, log in to your admin console and get started!
Visit the official changelog for more details: https://codex.wordpress.org/Version_4.3.1
We have updated Linux kernel 3.12 (now 3.12.45) and published a new version (3.18) on our HVM platform. These new versions no longer support AUFS and might force some clients to take corrective measures for their services.
Starting today, every server that is created or rebooted on our HVM platform will automatically use version 3.12.45 of the Linux kernel, unless configured to use version 3.18 or a custom kernel.
Please note that these kernel versions do not include AUFS support. Docker users should take special notice, because AUFS has been the default storage driver for quite some time.
To continue to use Docker with this new kernel version, users must upgrade their docker client and images to use a different storage driver, such as btrfs or overlayfs (available for kernel version 3.18 only).
To use version 3.18, you can execute following Gandi CLI  command:
$ gandi disk update
--kernel "3.18-x86_64 (hvm)"
You can also change the kernel from the web interface by following these instructions .
After the operation is completed, make sure you reboot your server and update your software packages and kernel modules .
Clients wishing to use a custom kernel can access more information on our Wiki page . You can also access more information
about kernel update history on our Changelog 
Our Gandi Site platform will be temporarily unavailable this week starting Tuesday July 21 at 1:00 AM PDT until 5:00 AM PDT (approximately), due to scheduled maintenance and improvements on the platform being made by our partner, BaseKit.
UPDATE: The maintenance has been extended by our partner, who has been unable to tell us when the maintenance should be over. We will keep you informed of all this in this news alert as soon as we have more information.
Additionally, it will not be possible to create a new Gandi Site until early morning Thursday July 23 (we will update this post with the exact time once we have it).
The reason for this downtime is to give us a window to upgrade our Gandi Site tool. Please excuse any inconvenience this may cause. This downtime will allow us to make the necessary changes to provide a more up-to-date and higher-quality site-building platform, that should be as exciting for you as it is for us. Stay tuned ...
Following the launch of Gandi's Asia office in July 2014, Gandi.net is now expanding into the Asian market.
We have hired and trained a local Taiwan customer service team, who immediately got to work and translated the entire Gandi.net web site to Traditional and Simplified Chinese. This team is multi-lingual, and offers support for all our customers, worldwide, from the Taiwan time zone, extending our support hours to 24x6+.
Gandi now has direct timely support and services for our customers in China, Hong Kong, Japan, Singapore, Taiwan and Thailand. Anyone needing localized support services for domain name portfolios from the Asian zone can use Gandi, and pay for the services in New Taiwan Dollars (TWD), in Taiwan and Chinese Yuan (CNY) in China.
We are also expanding our technical footprint, with a mini-pop (a network Point-of-Presence) installed in Tokyo since February of this year. Using anycast technology, this enhancement keeps DNS traffic in Asia, and boosts performance of DNS queries by 30% in the region.
We are adding domains to the new organization too. The TLDs .TW and .CN, which Gandi was only able to offer via an intermediary, are now offered direct to all our customers, thanks to our presence in Asia and our direct accreditation.
You can also find Gandi Asia on Twitter:
As usual, the customer care team is available to your questions, comments and suggestions. You can reach us at email@example.com
A new security vulnerability, CVE-2015-3456, was announced last week. The flaw is found in the QEMU virtualization software, and permits an attacker to gain access to a vulnerable host from a virtual machine located on that host.
Immediately following this announcement, we applied the necessary patches, thus reinforcing the existing security measures we had previously implemented. Over the past week, we have continued to study the vulnerability. As a preventative measure, we have decided that a reboot of certain VMs is required in order to ensure that all possible attack vectors have been mitigated.
This preventive reboot will only affect a small proportion of our customers. We will contact affected customers directly via email to provide instructions on performing the reboot on their own.
We will reboot the VMs of affected customers (who have not rebooted on their own) on Monday, May 25 at 11:59 p.m. PDT (that is: Tuesday, May 26, 2015 at 07:59 UTC).
For more information, see the following resources:
- RedHat's announcement: VENOM: QEMU vulnerability (CVE-2015-3456)
- Ubuntu's announcement: USN-2608-1: QEMU vulnerabilities
If you have questions or encounter any problems regarding this issue, our support team is available to assist you.
We have updated mirrors.gandi.net following today's announcement of the GHOST vulnerability. This newly-discovered flaw is in the popular glibc library, which is used in many Linux distributions and different flavors of Unix. The newly-discovered flaw, which has been present since November 2000, enables an attacker to execute code remotely on a vulnerable system.
We recommend that you upgrade your servers immediately. The following patches have already been made available by the distribution teams:
- Debian: https://security-tracker.debian.org/tracker/CVE-2015-0235
- RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0235
- Ubuntu: http://www.ubuntu.com/usn/usn-2485-1/
We will keep this list and our mirrors up-to-date as more affected distributions release their fixes.
If you are a Simple Hosting customer, we recommend that you restart your instance.