It's a pain to visit directadmin.com !
again server inacessible this morning and now
I must use http://66.51.122.131/forum/
because you have lot of dns timeout !
from http://www.dnsstuff.com/tools/dnsreport.ch?domain=directadmin.com
first,
NS FAIL A timeout occurred getting the NS records from your nameservers! None of your nameservers responded fast enough. They are probably down or unreachable. I can't continue since your nameservers aren't responding. If you have a Watchguard Firebox, it's due to a bug in their DNS Proxy, which must be disabled (31 Jul 2006 UPDATE: several years after being informed of this, there is a rumor that there is a fix that allows the Watchguard DNS proxy to work).
Second, if you don't correct your open dns server (recursive lookup), you can be spoofed, possibly hacked or ddosed
FAIL Open DNS servers
Server 66.51.122.129 reports that it will do recursive lookups. Server 66.51.122.130 reports that it will do recursive lookups.
Third,
Is your bind version 9.3.1 vulnerable ?
http://www.kb.cert.org/vuls/id/915404
Fourth,
WARN Mail server host name in greeting
directadmin.com claims to be host jbmc-software.com [but that host is at 216.194.67.119 (may be cached), not 66.51.122.131].
That 's all folk's !
again server inacessible this morning and now
I must use http://66.51.122.131/forum/
because you have lot of dns timeout !
from http://www.dnsstuff.com/tools/dnsreport.ch?domain=directadmin.com
first,
NS FAIL A timeout occurred getting the NS records from your nameservers! None of your nameservers responded fast enough. They are probably down or unreachable. I can't continue since your nameservers aren't responding. If you have a Watchguard Firebox, it's due to a bug in their DNS Proxy, which must be disabled (31 Jul 2006 UPDATE: several years after being informed of this, there is a rumor that there is a fix that allows the Watchguard DNS proxy to work).
Second, if you don't correct your open dns server (recursive lookup), you can be spoofed, possibly hacked or ddosed
FAIL Open DNS servers
Server 66.51.122.129 reports that it will do recursive lookups. Server 66.51.122.130 reports that it will do recursive lookups.
Third,
Is your bind version 9.3.1 vulnerable ?
http://www.kb.cert.org/vuls/id/915404
Fourth,
WARN Mail server host name in greeting
directadmin.com claims to be host jbmc-software.com [but that host is at 216.194.67.119 (may be cached), not 66.51.122.131].
That 's all folk's !