Some time early on May 31st I received a page telling me that this site was down. This has happened occasionally in the past and was almost always the result to something that I had done. That was not the case this time.
While I could not reach the domain I found that I could reach the server via its IP address. I was able to shell into the VPS and verify its status. It was in fact alive and healthy. By adding a hosts file entry in my desktop PC I was able to provide a local DNS solution, confirming that the server itself was completely happy.
It turns out that the company that handles DNS for this domain, which is not the hosting provider, was hit by what they characterize as a “larger than normal DDOS attack.” They tell me that the attack focused specifically on the DNS servers. They had been working to thwart the attack, and also adding additional servers to help handle the load.
The bill is being promoted by Big Media in all it’s facets. I would have thought that a decade’s worth of debacles with digital rights management (DRM) would have taught the industry something. There is no technological solution that cannot be overcome. This I understand to be a universal truth.
It appears that Dan Kaminsky’s DNS vulnerability is now out in the open. Or maybe it isn’t. Who knows. There was a lot of noise about vendors and ISPs dealing with patches, etc.
Happily, it appears that m0n0wall is not significantly affected. Manuel Kasper made a post on the user mailing list some time ago announcing v1.3b13-pre with an update to Dnsmasq. I installed this today without incident.
Words cannot express how much I appreciate m0n0wall. It’s simply fantastic for SOHO situations like my office.