Wikileaks Says Its Site Has Been 'Killed'

from the yeah-that'll-help dept

This is definitely a "developing" story, but apparently the entire Wikileaks.org site has gone down again and the Wikileaks folks are claiming that the domain was "killed by US everydns.net after claimed mass attacks." That's a bit cryptic and Wikileaks has not been above jumping to conclusions at times. It's unclear, for example, if it was just the company EveryDNS who did something on their own, or if the US government was involved. It could be as simple as the sort of pressure Senator Lieberman is applying on US companies. Update: The EveryDNS website says they made the decision because the DDoS attacks on Wikileaks violated their terms of service in that it could interfere with other websites. I understand the fear that it could cause problems with other websites, but it seems weird to say that getting attacked by a DDoS violates your terms of service. It's something totally out of the control of the website.

Either way, it is a bit silly to think that taking down Wikileaks' website would actually do anything in this situation. The data that they're releasing is out there and plenty of people can easily find it. It won't take long for them to set up another website if they want to -- and while it may be a bit harder for people to find them, to date, the organization hasn't exactly had any problems getting everyone else to promote what they release for them. Whatever the reason is for taking the domain name offline, it's difficult to think it would be effective in stopping Wikileaks in any way. If anything, it just calls that much more attention to the organization.


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    identicon
    Benjamin, Dec 2nd, 2010 @ 11:11pm

    Check EasyDNS.net's website Mike. They claim to have shut Wikileaks down because they violated ToS by getting DoSed.

     

    reply to this | link to this | view in thread ]

  2.  
    identicon
    Alexis, Dec 2nd, 2010 @ 11:13pm

    Wikileaks

    Taking down the site will not stop the leak. What a stupid idea.They will create a new site or some other organisation will take over.

     

    reply to this | link to this | view in thread ]

  3.  
    icon
    Jay (profile), Dec 2nd, 2010 @ 11:17pm

    Reverse Streisand Effect?

    Hmmm... More publicity for Wikileaks. Just what the US government wants.

     

    reply to this | link to this | view in thread ]

  4.  
    icon
    Mike Masnick (profile), Dec 2nd, 2010 @ 11:19pm

    Re:

    Check EasyDNS.net's website Mike. They claim to have shut Wikileaks down because they violated ToS by getting DoSed.

    Interesting. Had checked it before and didn't see anything, but now I do see it... Updating the post (and it's EveryDNS, not EasyDNS)

     

    reply to this | link to this | view in thread ]

  5.  
    identicon
    Adrian Lopez, Dec 2nd, 2010 @ 11:30pm

    Re:

    You mean it's possible to shut down any website run by an EveryDNS customer simply by engaging in a denial of service attack against them? That's pretty fucked up.

    Also, can a denial of service attack against a website really affect the DNS system to such a degree that EveryDNS would little choice but to shut them down? I thought DNS requests were cached by ISPs, thus limiting the registrar's exposure to excessive requests. Isn't that the case here?

    I suspect government pressure is involved and wonder how long until we see one of those Homeland Security notices on the Wikileaks domain.

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Anonymous Coward, Dec 2nd, 2010 @ 11:32pm

    Am I the only one trying to come up with how they must word letters like this?

    'Dear Customer;

    We have been alerted that your website has come under attack by a DDOS attack. We realize this is an illegal attack upon your site in order to remove you from the internet.

    As such, we are going to cancel your account, preventing your website from being accessed. This is to counter the crime of DDOS attacks.

    We WILL NOT stand for our members coming under attack by criminals, and WILL cancel your account permanently upon being attacked.

    Thank you for your support.'

    ... Actually that was kind of fun to write in a sort of sick and twisted way. I do get where they are coming from, the needs of the many and all, but it still seems like a sort of a... well, disgusting move. 'You violated the terms of services by being attacked.' And then of course, the effective 'it is your fault if you experience any downtime' there at the end.
    (None of the preceeding is accurately quoted, but paraphrased and come from the mind.)

     

    reply to this | link to this | view in thread ]

  7.  
    identicon
    SJ, Dec 2nd, 2010 @ 11:34pm

    Re: Re:

    You can DoS a dns provider by issuing dns-lookups for a given domain on that provider. It's not really different from other DoS attacks against a website itself only that dns queries are issued.

    Usually your system will cache the dns information according to the TTL specified in the domain - which is for "static ip addresses" usually in the range of 48h. By issuing a custom dns query you can circumvent that cache.

     

    reply to this | link to this | view in thread ]

  8.  
    icon
    Pierre Wolff (profile), Dec 2nd, 2010 @ 11:36pm

    Betting on the banks

    If I was a betting man, I'd put my money on a bank being behind this, under cover of all the noise over the latest release, so as not to draw any suspicion. Some large U.S. bank knows they're next on the Wikileaks release schedule in early 2011, so they're probably trying to thwart this early ;)

     

    reply to this | link to this | view in thread ]

  9.  
    identicon
    Benjamin, Dec 2nd, 2010 @ 11:44pm

    Re: Re:

    Slip of the keyboard, I suppose. It's hard to keep all the different but similarly named DNS companies straight.

     

    reply to this | link to this | view in thread ]

  10.  
    identicon
    Adrian Lopez, Dec 2nd, 2010 @ 11:51pm

    Re: Re: Re:

    Makes sense. In that case I can understand EveryDNS's desire to protect itself against such attacks, but I still think it sucks you can have somebody's domain name shut down by engaging in a DoS attack against the registrar.

    Assuming Wikileaks is able to recover its domain name and transfer it elsewhere, hopefully they can find a registrar who wouldn't break so easily under the pressure.

     

    reply to this | link to this | view in thread ]

  11.  
    identicon
    Anonymous Coward, Dec 2nd, 2010 @ 11:51pm

    Maybe we'll get to see the first big use of a .p2p domain, which might even help pave the way for further use.
    Of course, at the rate things are going, Lieberman might very well write an anti-P2PDNS bill.

     

    reply to this | link to this | view in thread ]

  12.  
    icon
    misterdoug (profile), Dec 2nd, 2010 @ 11:56pm

    Spoiler alert!

    The butler did it! In the hall, with the subpoena.

     

    reply to this | link to this | view in thread ]

  13.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:13am

    Hidden Services Wikileaks

    http://cx4vwijytopjvedi.onion/

    Now this is a bit strange maybe not all servers got synched yet but I can still access Wikileaks.

    http://wikileaks.org/

     

    reply to this | link to this | view in thread ]

  14.  
    identicon
    Drizzt, Dec 3rd, 2010 @ 12:27am

    Re: Hidden Services Wikileaks

    The hidden service shouldn't be affected, they work differently, see http://www.torproject.org/docs/tor-hidden-service.html for details on how a hidden service can be set up.

    If you still can resolve wikileaks.org, it just means you have a cached result somewhere in your resolve chain. because EveryDNS' DNS servers don't answer if you ask for "wikileaks.org", check it yourself with "dig @ns1.everydns.net wikileaks.org" (according to the WhoIs entry for wikileaks.org you can also try ns2, ns3 and ns4 but that doesn't change the result).

    Cheers,
    Drizzt

     

    reply to this | link to this | view in thread ]

  15.  
    icon
    ECA (profile), Dec 3rd, 2010 @ 12:28am

    Re: Re: Re:

    I would look up the past history For any corrections to the TOS.

     

    reply to this | link to this | view in thread ]

  16.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:30am

    as of 3:30am, no access period. i've been able to read a lot of the cables. some of the other commentator's on stories are right. maybe this will open a new way for governments to actual deal with each other.

    or our govt will get behind the 8ball by themselves o much, they'll fold.

     

    reply to this | link to this | view in thread ]

  17.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:33am

    Honestly though, I don't get it. What's the point of trying to kill WikiLeaks or any other whistleblower site? It's just convenience really. Once the leaker is able to extract the information from a classified network, there's pretty much a billion different ways he can leak it out to the world.

    Killing WikiLeaks doesn't do crap.

     

    reply to this | link to this | view in thread ]

  18.  
    identicon
    Trerro, Dec 3rd, 2010 @ 12:38am

    They need a better server company

    Taken down for GETTING DoSed, not launching one.

    "Sir, you're under arrest for being shot."

    Those 2 things make roughly the same amount of sense. :P

     

    reply to this | link to this | view in thread ]

  19.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:41am

    Re: They need a better server company

    The U.S. government is not trying to hide it anymore.

     

    reply to this | link to this | view in thread ]

  20.  
    icon
    Pierre Wolff (profile), Dec 3rd, 2010 @ 12:47am

    Wikileaks LIVES!

    And like the phoenix from the ashes, Wikileaks rises. It can now be found at the following addresses:

    Main site: http://46.59.1.2/
    Access to all releases: http://88.80.13.160

     

    reply to this | link to this | view in thread ]

  21.  
    icon
    BearGriz72 (profile), Dec 3rd, 2010 @ 12:55am

    Re: Wikileaks LIVES!

    Dammit You stole my idea...
    Lose the DNS and go straight to the IP address! http://46.59.1.2/

    Apparently the WikiLeaks domains are down too.
    (At lest the ones I know about.)

     

    reply to this | link to this | view in thread ]

  22.  
    icon
    BearGriz72 (profile), Dec 3rd, 2010 @ 12:56am

    Re: Re: Wikileaks LIVES!

    D'oh -- that was supposed to read 'WikiLeaks Cover Domains'

     

    reply to this | link to this | view in thread ]

  23.  
    icon
    Paradroid (profile), Dec 3rd, 2010 @ 1:04am

    So who is going to man up and offer them a new DNS hosting service?

     

    reply to this | link to this | view in thread ]

  24.  
    identicon
    Drizzt, Dec 3rd, 2010 @ 1:08am

    Re: Re: Wikileaks LIVES!

    collateralmurder.com was up a few minutes ago (didn't check again for this post).

    Cheers,
    Drizzt

     

    reply to this | link to this | view in thread ]

  25.  
    icon
    Pierre Wolff (profile), Dec 3rd, 2010 @ 1:16am

    Wikileaks moves to Switzerland

     

    reply to this | link to this | view in thread ]

  26.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 1:17am

    Re: Wikileaks LIVES!

    Thank you, know I will get the leak from the banks(when they come out)

     

    reply to this | link to this | view in thread ]

  27.  
    icon
    G Thompson (profile), Dec 3rd, 2010 @ 1:22am

    Re: Wikileaks moves to Switzerland

    or

    http://213.251.145.96/ The main home page
    http://213.251.145.96/cablegate.html The CableGate Transcripts
    http://213.251.145.96/support.html - SUPPORT THEM AND DONATE

     

    reply to this | link to this | view in thread ]

  28.  
    icon
    Lisae Boucher (profile), Dec 3rd, 2010 @ 1:35am

    WikiLeaks is still available through it's IP address:
    http://46.59.1.2/
    They might kill the domain name, but taking down that server is a completely different challenge...

     

    reply to this | link to this | view in thread ]

  29.  
    icon
    Blatant Coward (profile), Dec 3rd, 2010 @ 1:37am

    Re:

    The Swiss.

    Thank god it wasn't the French. That would be embarrassing.

     

    reply to this | link to this | view in thread ]

  30.  
    identicon
    SJ, Dec 3rd, 2010 @ 1:53am

    Re: Re: Re: Re:

    EveryDNS does not provide domain registration. All they do is host DNS information.

    Basically at your domain registrar you tell that the nameservers of EveryDNS are the master zone files pointing the IPs of your mail, web, what-ever servers.

    I actually like EveryDNS because up to a while ago (before they were bought by no-ip.com) the offered to host the DNS for free - also if you are on a dynamic ip. They offered clients to update your dns automagically.

    So don't worry about recovering the domain name.

     

    reply to this | link to this | view in thread ]

  31.  
    identicon
    Johnny, Dec 3rd, 2010 @ 2:05am

    Just wondering

    If someone DDosed EasyDNS.net's own site, would they take it out too in order to "protect their customers"?

    In a tweet on Friday, the owner of EveryDNS, Dynamic Network Services Inc., wrote that "trust is paramount: Our users and customers are our most important asset."


    Doesn't what these companies say just sound like the kind of propaganda you could have expected from the Soviet Union? I.e. saying exactly the opposite of the truth. In this case clearly EveryDNS's customers can't have any trust that EveryDNS will try keep their sites up.

     

    reply to this | link to this | view in thread ]

  32.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 2:23am

    DNS issues

    First, to all people who are posting IP addresses: the reason we have DNS is not that it is easier to type, it is that IP addresses *change*. As soon as the site is moved to a new network, the IP address will change, and given the current situation, this is probably going to happen often with Wikileaks. Posting IP addresses can be very useful for the moment, but they are not a permanent solution.

    Second, the root of their DNS is not EveryDNS, it is the .org registry, where they can simply point to another set of DNS servers. They can even host the DNS themselves (it is very easy to do, you just need a couple of servers). Thus, unless the .org registry is involved, that domain name is not permanently down.

    Third, to those posting tor addresses (.onion): you can use tor2web to view them without installing tor. However, the site given does not appear to be the official Wikileaks site, but a mirror by someone else, which is probably a bit outdated.

     

    reply to this | link to this | view in thread ]

  33.  
    identicon
    Anonymous, Dec 3rd, 2010 @ 3:02am

    Re: Re:

    Maybe Gene Simmons can offer some insight on DDOS...

     

    reply to this | link to this | view in thread ]

  34.  
    identicon
    Anonymous, Dec 3rd, 2010 @ 3:08am

    Don't agree with this at all.

    But maybe now you understand how the sleeping giant was awakened.

    And I hope you know that if you guys could have only kept your fingers out of the cookie jar, this sort of thing never would have been tolerated.

    You enabled this.

    It's on you.

     

    reply to this | link to this | view in thread ]

  35.  
    icon
    marak (profile), Dec 3rd, 2010 @ 3:12am

    Spooling up ye-old pc now. Time to get ze server running, ill host some files temporarily :)

    Next step, build torrents of all the latest backups *sigh* there go's my saturday haha.

     

    reply to this | link to this | view in thread ]

  36.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 3:19am

    Re: DNS issues

    http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

    The other onion addresses don't work here but maybe you have more luck.

     

    reply to this | link to this | view in thread ]

  37.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 3:20am

    Re:

    But maybe now you understand how the sleeping giant was awakened.


    The sleeping giant bureaucracy.

    Doesn't really matter, this helps keep the government on its toes and honest.

     

    reply to this | link to this | view in thread ]

  38.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 3:24am

    Re: Betting on the banks

    I'd put a quatloo or two on the bank myself. They had better get that one out as soon as possible.

     

    reply to this | link to this | view in thread ]

  39.  
    identicon
    FMHilton, Dec 3rd, 2010 @ 3:32am

    It's undoubtedly the government at it's best. There's probably a section at the NSA that's doing nothing but tracking where the domain and website pops up, and launches millions of hits on it to take it down.
    Not an easy job, but someone has to do it. Don't want the sheep to see how stupid our diplomacy has become.
    I'm not surprised at all, given that the TSA and Homeland Security have been hard at work taking down sights without notice on the pretext that they were counterfeiting merchandise.
    Remember one thing-the internet was based on the governments' backbone infrastructure. Still is, for the most part, even though we believe otherwise.
    The government for the most part owns all of the pipes, and if they don't like the stuff you give out, they can and will take a site down.

     

    reply to this | link to this | view in thread ]

  40.  
    icon
    mike allen (profile), Dec 3rd, 2010 @ 3:35am

    Re: Wikileaks LIVES!

    these work fine.

     

    reply to this | link to this | view in thread ]

  41.  
    icon
    techflaws.org (profile), Dec 3rd, 2010 @ 4:41am

    Who needs domains anyway?

    Yeah, right. So what does the sleeping giant do once he shut down all options of Wikileaks hosting their stuff which provokes them to upload their new stories under "Britney.Spears.naked.jpg" (or whoever is hip right now, I'm not up to date) to any hoster, forum, p2p net and so on?

     

    reply to this | link to this | view in thread ]

  42.  
    identicon
    Rhys, Dec 3rd, 2010 @ 4:50am

    Re:

    Wikileaks are with everyDNS.net NOT EasyDNS.net

     

    reply to this | link to this | view in thread ]

  43.  
    identicon
    vexorian, Dec 3rd, 2010 @ 5:06am

    DNS services shut down you for DDOS since when?

    This is pretty effy bizare.

     

    reply to this | link to this | view in thread ]

  44.  
    identicon
    abc gum, Dec 3rd, 2010 @ 5:09am

    Re:

    Say it - dont spray it.

     

    reply to this | link to this | view in thread ]

  45.  
    identicon
    abc gum, Dec 3rd, 2010 @ 5:12am

    Re: Just wondering

    This is probably being perpetrated by the
    Office of Open Internet Dept.

     

    reply to this | link to this | view in thread ]

  46.  
    identicon
    vexorian, Dec 3rd, 2010 @ 5:13am

    How to enter wikileaks

    BTW, since it is only a DNS thing, the site is still pretty accessible:

    http://213.251.145.96/reldate/2010-12-03_0.html

     

    reply to this | link to this | view in thread ]

  47.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 5:29am

    All of 6 hours later, wikileaks is now @ wikileaks.ch ...

     

    reply to this | link to this | view in thread ]

  48.  
    icon
    Proffer (profile), Dec 3rd, 2010 @ 6:28am

    script-kiddie hacker claims responsibility

    a script kiddie hacker called th3j35t3r has been claiming responsibility.

    http://twitter.com/th3j35t3r

     

    reply to this | link to this | view in thread ]

  49.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 6:39am

    does anyone know where we can access old releases? they seem to only have the big headline things on the sites i've seen.

     

    reply to this | link to this | view in thread ]

  50.  
    identicon
    Richard Kulawiec, Dec 3rd, 2010 @ 7:37am

    Make a (local) copy of the content at this URL

     

    reply to this | link to this | view in thread ]

  51.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 7:49am

    This story says Amazon.com is the host and they shut them down. Another reason to hate Amazon who is putting independent software developers out of work by patenting source code instead of copyrighting it like most of us do. Link here

     

    reply to this | link to this | view in thread ]

  52.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 8:40am

    Re: Re:

     

    reply to this | link to this | view in thread ]

  53.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 9:39am

    "Wikileaks Says Its Site Has Been 'Killed'"

    Notice this happened after they threatened to leak info on China and Russia?

     

    reply to this | link to this | view in thread ]

  54.  
    identicon
    Sakeneko, Dec 3rd, 2010 @ 10:50am

    New Domain is Down....

    The new Wikileaks domain wikileaks.ch is no longer resolving, so you can't get to Wikileaks via that any more either. Use the IPs.

     

    reply to this | link to this | view in thread ]

  55.  
    identicon
    Arnon, Dec 3rd, 2010 @ 10:58am

    Re: not easyDNS!

    It's actually easyDNS, it's everydns.net

     

    reply to this | link to this | view in thread ]

  56.  
    identicon
    Arnon, Dec 3rd, 2010 @ 10:59am

    Re: Re: not easyDNS!

    Wow...I have been typing too much today.

    My bad.

    It is actually NOT easyDNS who was hosting wikileaks.org and shut them down. It was everydns. A different company and unrelated. But we've sure been taking the rap for their decision today.

     

    reply to this | link to this | view in thread ]

  57.  
    identicon
    Arnon, Dec 3rd, 2010 @ 11:01am

    Thanks Mike

    Thanks for the correction Mike. If you feel like making that a larger font, that would be great. *wry grin* a LOT of people have been disseminating the wrong name.

    See http://blog.easydns.org for details.

     

    reply to this | link to this | view in thread ]

  58.  
    identicon
    Arnon, Dec 3rd, 2010 @ 11:05am

    Re:

    Hey AC,

    If you're curious about the realities behind dealing with DOS attacks, there's a good article at

    http://blog.easydns.org/2010/08/19/dos-attacks-and-dns-how-to-stay-up-if-your-dns-provider-goes- down/

     

    reply to this | link to this | view in thread ]

  59.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:16pm

    Re: Re:

    That was actually an interesting read, but, I do have a question. If I read the article correctly (and I very well may have not) it speaks about dealing with a DOS Attack on the DNS itself, and not a website that goes through the DNS?

    I noticed above that SJ mentioned that you can attack the DNS by doing a DNS Lookup, is that the case here, or is it just a possibility? (I assume doing an attack of that nature posts which website is being looked up, so that there is a way to know who drew the ire of the attacker(s)).

    And with the above, does the attack do double damage, hitting both the website and DNS provider, or is it basically an attack on just the provider with a link to why?

    I also wonder that if it is an attack on the DNS provider itself, how do you track which website drew the ire? Or, does the fact that they do have one website to blame indicate that it was not an attack on the provider directly?

    I am admittedly ignorant on how much of this works, and always glad to learn a bit more. Thank you for your time.

     

    reply to this | link to this | view in thread ]

  60.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 12:49pm

    Re:

    We WILL NOT stand for our members coming under attack by criminals, and WILL cancel your account permanently upon being attacked.

    Sometimes you have to wipe out an entire village in order to save it.

     

    reply to this | link to this | view in thread ]

  61.  
    identicon
    Anonymous Coward, Dec 3rd, 2010 @ 1:21pm

    Well, I could understand being arrested for being shot, I mean, its not your bullet and you probably should give it back.

    What has happened in the past isn't what this shutdown is about, media centers already have every document that has been posted. Makes for nice new articles every day.

    Why did it get taken down now? What was coming up? It sure wasn't taken down to close the barn door after the horses got out, so just what was coming up to be released? Answer that and you might answer the question of who took it down.

     

    reply to this | link to this | view in thread ]

  62.  
    identicon
    call center, Dec 3rd, 2010 @ 5:38pm

    wikileaks FTW

    The Government can't handle the truth...

     

    reply to this | link to this | view in thread ]

  63.  
    icon
    aldestrawk (profile), Dec 3rd, 2010 @ 6:40pm

    EveryDNS rationale makes no sense

    EveryDNS does not say if there is a DDOS attack on their nameservers or just on the Wikilieaks site. If their response to a DDOS attack on a customer is to delete their listing on the nameserver then this would only encourage DDOS attacks as this makes the attack, essentially, more effective. Also, since EveryDNS does not do domain hosting how are other customers affected by a DDOS attack on one customer? If EveryDNS itself is undergoing a DDOS attack, de-listing Wikileaks.org will not directly stop that attack. They are just hoping that de-listing will placate the attackers who will then gratefully cease their attack. A strategy that, again, makes DDOS attacks more effective and so encourages them. This also assumes that the DDOS attack comprises repeated queries for only the Wikileak domain(s). Their rationale is not believable and stinks of unspoken outside pressures.

     

    reply to this | link to this | view in thread ]

  64.  
    identicon
    Anonymous Coward, Dec 10th, 2010 @ 8:35am

    Re: customer letter

    Actually it's not quite like that ...

    Dear Customer:

    Your website has come under a Distributed Denial of Service Attack (DDOS). This is an attack by multiple systems across the Internet against your DNS service, designed to make it impossible for anyone to reach your website.

    Unfortunately the attack has the collateral affect of making it impossible for anyone to reach the websites of all our clients, not just you.

    We have the unfortunate choice between shutting down your DNS until the attack subsides, or having all our DNS services shut down for all our clients. To avoid loss of service to all our clients, we've had to make the choice to shut down your DNS service. Doing this is not something we take lightly, but unfortunately there's no other choice; ir we don't take this step your site goes down anyone, and so does everyone else's.

    If this is a random DDOS attack it will subside in time, and we'll start hosting your DNS again, and of course we'll let you know. However if you're suffering a continuous DDOS attack it's unlikely we'll be able to continue serving your DNS. In that case we'll be happy to consult with you in setting up a DNS solution just for you (no other clients sharing the same servers) which could be more robust in the event of such an attack.

    However, we should warn you that this solution could be significantly more expensive than shared DNS hosting.

    Please feel free to contact me by email or by telephone to discuss the issues involved and how to best remedy them.

    Of course we'd include some links to our terms of service, some excellent articles on preserving DNS services in the face of DDOS attacks, and the like.

    In response to your last paragraph, I can only admit that yes, our TOS allows us to shut you down for DDOS. If we had to build the kind of infrastructure that would uphold any DDOS attack, and pay for all the traffic in a DDOS attack, then we'd have to charge 100 times more for our DNS services than we do now.

    And then we most likely wouldn't get your business, you'd go elsewhere and risk getting caught up in exactly the DDOS mitigation we do.

     

    reply to this | link to this | view in thread ]

  65.  
    identicon
    Anonymous Coward, Dec 10th, 2010 @ 8:35am

    Re: customer letter

    Actually it's not quite like that ...

    Dear Customer:

    Your website has come under a Distributed Denial of Service Attack (DDOS). This is an attack by multiple systems across the Internet against your DNS service, designed to make it impossible for anyone to reach your website.

    Unfortunately the attack has the collateral affect of making it impossible for anyone to reach the websites of all our clients, not just you.

    We have the unfortunate choice between shutting down your DNS until the attack subsides, or having all our DNS services shut down for all our clients. To avoid loss of service to all our clients, we've had to make the choice to shut down your DNS service. Doing this is not something we take lightly, but unfortunately there's no other choice; ir we don't take this step your site goes down anyone, and so does everyone else's.

    If this is a random DDOS attack it will subside in time, and we'll start hosting your DNS again, and of course we'll let you know. However if you're suffering a continuous DDOS attack it's unlikely we'll be able to continue serving your DNS. In that case we'll be happy to consult with you in setting up a DNS solution just for you (no other clients sharing the same servers) which could be more robust in the event of such an attack.

    However, we should warn you that this solution could be significantly more expensive than shared DNS hosting.

    Please feel free to contact me by email or by telephone to discuss the issues involved and how to best remedy them.

    Of course we'd include some links to our terms of service, some excellent articles on preserving DNS services in the face of DDOS attacks, and the like.

    In response to your last paragraph, I can only admit that yes, our TOS allows us to shut you down for DDOS. If we had to build the kind of infrastructure that would uphold any DDOS attack, and pay for all the traffic in a DDOS attack, then we'd have to charge 100 times more for our DNS services than we do now.

    And then we most likely wouldn't get your business, you'd go elsewhere and risk getting caught up in exactly the DDOS mitigation we do.

     

    reply to this | link to this | view in thread ]

  66.  
    identicon
    Anonymous Coward, Dec 10th, 2010 @ 8:36am

    Re: customer letter

    Actually it's not quite like that ...

    Dear Customer:

    Your website has come under a Distributed Denial of Service Attack (DDOS). This is an attack by multiple systems across the Internet against your DNS service, designed to make it impossible for anyone to reach your website.

    Unfortunately the attack has the collateral affect of making it impossible for anyone to reach the websites of all our clients, not just you.

    We have the unfortunate choice between shutting down your DNS until the attack subsides, or having all our DNS services shut down for all our clients. To avoid loss of service to all our clients, we've had to make the choice to shut down your DNS service. Doing this is not something we take lightly, but unfortunately there's no other choice; ir we don't take this step your site goes down anyone, and so does everyone else's.

    If this is a random DDOS attack it will subside in time, and we'll start hosting your DNS again, and of course we'll let you know. However if you're suffering a continuous DDOS attack it's unlikely we'll be able to continue serving your DNS. In that case we'll be happy to consult with you in setting up a DNS solution just for you (no other clients sharing the same servers) which could be more robust in the event of such an attack.

    However, we should warn you that this solution could be significantly more expensive than shared DNS hosting.

    Please feel free to contact me by email or by telephone to discuss the issues involved and how to best remedy them.

    Of course we'd include some links to our terms of service, some excellent articles on preserving DNS services in the face of DDOS attacks, and the like.

    In response to your last paragraph, I can only admit that yes, our TOS allows us to shut you down for DDOS. If we had to build the kind of infrastructure that would uphold any DDOS attack, and pay for all the traffic in a DDOS attack, then we'd have to charge 100 times more for our DNS services than we do now.

    And then we most likely wouldn't get your business, you'd go elsewhere and risk getting caught up in exactly the DDOS mitigation we do.

     

    reply to this | link to this | view in thread ]

  67.  
    identicon
    kit51, Feb 15th, 2011 @ 12:40pm

    Re: Betting on the banks

    Are you thinking Bilderberg group banks / stuff or something in a smaller scale?

     

    reply to this | link to this | view in thread ]

  68.  
    icon
    kit51 (profile), Feb 15th, 2011 @ 12:54pm

    Re: Betting on the banks

    Are you talking Bilderberg group size banks / other ??

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This