News about the SCC offer: Service News
Report malfunction: via ITB or the SCC ticketing system.
 In case of failure of this website:
Stand: 13.07.2024 15:32:28


 2024-03-20 00:00

Sporadic connection problems in the wired KIT network access possible - UPDATE (09.04.24)

Description- Update 09.04.2014 10:00 a.m. -
On Friday, April 5, we took short-term measures that became effective the following Monday morning by reloading the affected network components. This alleviated the problem and, from our point of view, there are currently no disruptions. However, as these can still occur, we are monitoring the situation and working on a sustainable solution to the problem, which will take some time for KITnet to fully implement.

- Announcement -
There may currently be connection problems with wired network access via IPv6 in buildings on Campus South.
Connections via IPv6 may not be established by individual devices or may have a high packet loss rate.
The underlying cause of the problem has already been identified and a sustainable solution is being worked on.
Affected users
WorkaroundIf possible, affected devices can switch to WLAN to avoid the problem.
Exists since2024-03-20 00:00


Stand: 13.07.2024 15:32:29


 2024-07-12 16:22

bwSync&Share: Changing the online editor: 'Nextcloud Office (Collabora)' instead of 'OnlyOffice' - short interruption

Instead of the online editor "OnlyOffice", the online editor "Nextcloud Office (Collabora)" will be made available in bwSync&Share from this point onwards.

Service bwSync&Share -

The changeover and the associated downtime should only take a few minutes.

From the evening of 11 July 2024, bwSync&Share will provide "Nextcloud Office (Collabora)" as an online editor for editing documents in the web browser. Users will be able to switch seamlessly from OnlyOffice, which was previously available in bwSync&Share.

For all users, switching to the new Office solution means switching to a new interface when editing documents online in the browser.
The changeover will take place on Thursday, July 11, 2024, at 18:00.

Until this time, documents will open in the familiar OnlyOffice; after the changeover, "Nextcloud Office (Collabora)" will start automatically when a user opens a file in a web browser.
If there are any questions in the course of the changeover, please ask them via the respective ticket system of your home institution.

The integration of "Nextcloud Office (Collabora)" does not change the basic operation on site at KIT. This solution for web editing will also continue to be operated completely on site in our SCC infrastructure, just like OnlyOffice. By using "Nextcloud Office (Collabora)", no data is transferred to external systems. Therefore, the conversion of the local office solution does not change the existing operating and data protection model of the bwSync&Share service.

 2024-07-12 09:43

UP: Implementation: Digital form for requesting authorizations

The requesting of authorizations in the User Portal (UP) via PDF forms in paper form will be discontinued. In future, requests for authorizations in the SAP environment will be made using a digital form.

Employees and OU managers who wish to apply for and approve authorizations in the SAP system.

PDF forms for applying for authorizations will no longer be accepted/processed from 22.7.24.
Instead, from 10.7.24, authorizations must be requested directly in the User Portal (UP) using the digital form "Request authorizations".

You will receive further information by e-mail or you can read it in the Service News.

 2024-07-09 15:30

M365: Change of default setting when sharing documents - Teams, OneDrive, SharePoint Online affected

For the M365 services MS Teams, SharePoint Online and OneDrive, the default settings for sharing documents have been changed.

New default setting: Sharing documents for selected persons with viewing authorization

Previous default setting: Sharing documents for all users in the organization (KIT) with edit permission

Affected are people who use MS Teams to share documents or people who have already received a license for OneDrive or SharePoint Online at KIT.

IMPACT after implementation
Existing approvals / shared documents remain in place.
Only the default setting for new document sharing changes.

Check the settings of existing releases and adjust them if necessary.

Further information can be found at:

 2024-07-01 17:14

Critical Vulnerability in OpenSSH

Today a critical vulnerability was published in OpenSSH that allows remote code execution as root. The researchers that discovered the vulnerability, Qualys, describe the vulnerability in detail in their blog post [1]. All versions of OpenSSH from 8.5p1 to exclusive 9.8p1 that use glibc are susceptible to the vulnerability, which basically means that most Linux-based systems are affected. Exploitability for remote code execution has so far only been demonstrated for i386-based (32-bit) versions, but exploitability on 64-bit systems is considered likely and the availability of an exploit will only be a matter of time. Depending on the version and configuration, successful exploitation requires hours to days and around 10,000 connections. Although this may be noticeable, it can quickly be lost in the noise of constant SSH scans if OpenSSH is open to the Internet. Therefore, patches must be applied immediately to all systems with OpenSSH, especially those that have an OpenSSH server open to the Internet, as soon as they are available. Please do not forget to restart the OpenSSH server after applying the update. Please also remember to update any base images for virtualization systems so that newly created VMs are also protected. If you are still running a 32-bit system with a vulnerable distribution and OpenSSH open to the Internet, we strongly recommend that you consider the system to be compromised.
Here is a list of currently known information on some Linux and BSD distributions:
* Debian: Bookworm (Debian 12) is affected, there is a patch available via Bookworm Security [2]. Bullseye (Debian 11) comes with an OpenSSH version older than 8.5p1, which means that Bullseye is not affected. * Ubuntu: Currently there is no advisory from the developers, but patches have recently become available. All versions from Jammy (22.04) onwards are affected [3,4,5]. Previous versions are not affected. * RHEL: Only RHEL 9 is affected, previous versions use an older OpenSSH version [6] * OpenBSD: Not affected according to the Qualys post [1] * FreeBSD: All currently supported versions affected, patches are available [7]
If no patch is yet available for your Linux distribution, a mitigation can be applied. This consists of setting the `LoginGraceTime` option to 0 in `sshd_config`. Excerpt from the Qualys blog post on this workaround:
"Finally, if sshd cannot be updated or recompiled, this signal handler race condition can be fixed by simply setting LoginGraceTime to 0 in the configuration file. This makes sshd vulnerable to a denial of service (the exhaustion of all MaxStartups connections), but it makes it safe from the remote code execution presented in this advisory."
[1] [2] [3] [4] [5] [6] [7]

 2024-02-12 14:43

KIT mail “Google mail tightens reception rules”

Service: KIT mails to Google addresses ( /
Persons: Everybody sending or forwarding mails to google addresses

Mail to Google addresses detected by the KIT spam filter will be rejected more aggressively
Details see

 2023-05-03 10:06

Note: Misbehavior between Windows 11 Update 22H2 in conjunction with specific network switch type

A misbehavior has been detected between a network switch type used at KIT South Campus and a Windows 11 update (version 22H2). Due to this misbehavior, the network port on the switch is automatically switched off.
As a result, the network connection or network access for the connected device is no longer available.
To enable network access, the data socket used must be communicated to the IT representative / IT admin of the OU so that he can apply for enabling via the SCC network team.

To prevent the network port from being switched off, the LLDP service can be disabled under Windows. This can be done manually (computer-specific) under "Network adapter properties". Furthermore, the SCC provides the group policy "SCC-FMC-LLDP_disable", which can be linked to the computer accounts and automatically disables LLDP under Windows. Unlocking of already blocked ports can be requested from the network team via the IT representative/IT admin of the OU.

Windows 11 Nutzer mit Updatestand 22H2 (und voraussichtlich höher) in Verbindung mit spezifischem Netzwerk-Switchtyp

As of Windows 11 update level 22H2, sending Link Layer Discovery Protocol (LLDP for short) packets on a specific type of switching causes a network loop detection service to trigger on the switch, automatically blocking the network port.

(translated with