WARNING: AOL is hosed (again)

Mark Borchers markb at infi.net
Fri Oct 16 18:46:38 UTC 1998


Yep, somebody modified the delegation via a forged domain 
modification email.  An emergency root server update has been done to 
correct the problem.

Meanwhile, DNS1 and DNS2.AUTONET.NET are going to temporarily act 
authoritatively for AOL.COM until the ttl expires.


On 16 Oct 98, at 13:01, Stephen Sprunk wrote:

> Just for those who aren't aware yet, all your mail to aol.com is about
> to bounce.
> 
> sprunk at pegasus:~> host -t ns aol.com c.root-servers.net
> Using domain server:
> Name: c.root-servers.net
> Address: 192.33.4.12
> Aliases:
> 
> aol.com name server DNS2.AUTONET.NET
> aol.com name server DNS1.AUTONET.NET
> 
> sprunk at pegasus:~> host -t mx aol.com dns.autonet.net
> Error in looking up server name:
> Host not found.
> 
> -- 
>      |          |         Stephen Sprunk, KD5DWP, CCIE #3723
>     :|:        :|:        NSA, Network Consulting Engineer 
>    :|||:      :|||:       14875 Landmark Blvd #400; Dallas, TX
> .:|||||||:..:|||||||:.    Pager: 800-365-4578 / 800-901-6078
> C I S C O S Y S T E M S   Email: ssprunk at cisco.com
> 



Mark Borchers
Network Engineering Dept.
Network Two Communications Group



More information about the NANOG mailing list