29 April 2014 - Interruptions DSL Brussels

Dear customers,

We noticed 2 interruptions for all DSL customers region Brussels.

Down: Tue Apr 29 19:24:03
Up: Tue Apr 29 19:32:03

Down: Tue Apr 29 20:35:47
Up: Tue Apr 29 20:37:48 

We are investigating the cause and apologize for the inconvenience.

No heartbleed impact


As you may already know, a bug called ‘Heartbleed’ was recently detected in the ‘OpenSSL’ protocol.
This bug is an error in the OpenSSL software. OpenSSL is security software that protects your confidential data when it travels on the internet. OpenSSL is used in application worldwide (e.g. webmail, home banking social media, ...).
Because of this bug it was possible for cybercriminals to access your confidential data. The heartbleed bug made it possible to intercept data that should be encrypted. 
Not all sites are/were affected, however some major sites you use probably are (it depends on which OpenSSL version was installed).

Our My edpnet/e-mail/hostings and other applications were not impacted.

If you want to know more about Heartbleed you can read more about it on :

It is important to note that this bug has nothing to do with edpnet. The Open SSL protocol is being used by lots of companies and organizations worldwide.

However, we encourage all our customers to change and reinforce their passwords for all their accounts (social media, webmail, etc.) preemptively.

To create a strong password, pay attention to the following:
  • Change your password on a regular basis
  • The length of your password: the longer, the better.
  • The variety of characters: the more variety the better. Mix lowercase, uppercase, numbers and symbols.
  • Practical tip: use a pass phrase instead of a single password.
  • Use a password manager (like LastPass, KeePass, Roboform, 1Password and more. More info on http://www.cnet.com/news/beyond-heartbleed-why-you-need-a-password-manager/)

15 April 2014 - Issue with DNS servers


We experienced issues on our DNS servers, namely 212.71.8.10 & 212.71.0.33.

It was possible that you couldn't reach some websites.

We apologize for any inconvenience.

Global DNS and NTP amplification attacks

Dear customer

Recently there seems to be a significant increase of cyber-incidents. According to Cert, the federal cyber emergency team, the number of cyber-incidents in Belgium doubled in 2013 (https://www.cert.be/docs/number-cyber-incidents-belgium-doubled-2013).

More often cyber criminals use so-called amplification attacks that specifically abuse NTP (Network Time Protocol) and DNS (Domain Name Systems) servers: http://www.us-cert.gov/ncas/alerts/TA14-017A (for Belgium: https://www.cert.be/docs/dns-amplification-attacks-and-open-dns-resolvers). Cyber criminals search for vulnerable devices in a network which are used to initiate such attacks. We can confirm that we see a huge increase of such attacks on our network as well.

Edpnet has always been a provider reluctant to block ports on its network. But because of the increase of these attacks, we are now forced to start blocking certain protocols in order to protect the quality of our network, the internet and your surfing experience as a customer.

Therefore ports 53 (DNS) and 123 (NTP) will be blocked as from today. If you are using a fixed IP-address and you would like these ports to remain open, please contact us. We are able to make exceptions for fixed IP customers.

Do not hesitate to contact us on following number 03 265 67 00 if you should have questions left.

Customer-friendly regards
The edpnet helpdesk team

4 April 2014

Dear customers,

Our DNS servers are currently being used in a DNS amplification attack. Our NOC is currently doing its best to block off as much as possible.

You may have issues reaching some websites during this attack. It's best to retry again when a lookup fails.

We apologize for the inconvenience.