WARNING: AOL is hosed (again)
Mark Borchers
markb at infi.net
Fri Oct 16 18:46:38 UTC 1998
Yep, somebody modified the delegation via a forged domain
modification email. An emergency root server update has been done to
correct the problem.
Meanwhile, DNS1 and DNS2.AUTONET.NET are going to temporarily act
authoritatively for AOL.COM until the ttl expires.
On 16 Oct 98, at 13:01, Stephen Sprunk wrote:
> Just for those who aren't aware yet, all your mail to aol.com is about
> to bounce.
>
> sprunk at pegasus:~> host -t ns aol.com c.root-servers.net
> Using domain server:
> Name: c.root-servers.net
> Address: 192.33.4.12
> Aliases:
>
> aol.com name server DNS2.AUTONET.NET
> aol.com name server DNS1.AUTONET.NET
>
> sprunk at pegasus:~> host -t mx aol.com dns.autonet.net
> Error in looking up server name:
> Host not found.
>
> --
> | | Stephen Sprunk, KD5DWP, CCIE #3723
> :|: :|: NSA, Network Consulting Engineer
> :|||: :|||: 14875 Landmark Blvd #400; Dallas, TX
> .:|||||||:..:|||||||:. Pager: 800-365-4578 / 800-901-6078
> C I S C O S Y S T E M S Email: ssprunk at cisco.com
>
Mark Borchers
Network Engineering Dept.
Network Two Communications Group
More information about the NANOG
mailing list