To address the newly-discovered SSLv3 security vulnerability disclosed in CVE 2014-3566 (the "POODLE" vulnerability), we have disabled SSLv3 on our web control panel and HTTP API.
If you experience problems connecting to these services over HTTPS, please do not hesitate to contact us at firstname.lastname@example.orgRegards,
From September 13th, 2014, 00:00 to September 15th, 2014, 9:00 the EURid Main Registry will be unavailable due to the complete reconstruction of its internal interface (extranet). During the downtime of the system, customers won't be able to register new .EU domains, renew their existing .EU domains, transfer domains or enter any changes (DNS, domain holder, generate AUTH-ID).
After the EURid registry shutdown some changes in registration of .EU domains will be deployed. Please pay attention to the new rules as described below:
After September 15th, 2014, the newly registered .EU domains will no longer expire at the end of month but rather at the end of their registration term, calculated in years starting on the registration date, i.e. expiry date = date of registration + number of years according to the customer's order.
Example: domain name abcdefg.eu will be registered on September 16th, 2014, for 1 year -> its expiration date will be calculated to September 16th, 2015.
Currently all .EU domains have their expiry date set to the end of a month, even for domains registered on the first day of a month.
Example: domain name abc.eu was registered on September 1st, 2014, for 1 year - according to the current rules of the EURid registry is its expiry date calculated to September 30th, 2015.
For all .EU domains registered with ClouDNS before September 15th, 2014, the expiry date will be left on the last day of the month in which the domain was registered.
For new .EU domains registered after September 15th, 2014, the expiry date will be set to the date of registration + number of years according to the order.
According to the new Terms and Conditions, the .EU domains may get into the "SUSPENDED" status. This status can be set directly by the EURid Main Registry in the following cases:- a domain becomes subject to a legal dispute,
Domains in status SUSPENDED cannot be transferred to ClouDNS.
(Note - the contact details for .EU domains can be verified on www.eurid.eu. For adjustments, if necessary, contact the ClouDNS team via authorized ticket from the control panel, menu Support).
Automatic operation of the administration system for .EU domains should be restored on September 15th, 2015, at 09:00. However, technical problems in the Main Registry might occur, therefore we would like to ask our customers and sub registrars for patience during the deployment of the new platform.
Thank you for your understanding and cooperation.Regards,
We now accept bitcoin payments. The prices of our DNS hosting and Domain names will continue to be in USD and at the end of your orders you will see an option to pay in bitcoins. When you pay with bitcoins, the amount of bitcoins that you need to transfer will be calculated on market price.
130 new domain names are available for registration and transfer - .systems, .company, .email, .solutions .support, .wiki, .website, check them all here...
The prices start from $12.99/year!
This week we launch our Summer Promotion!
All DDoS Protected plans will be discounted with 50% until Aug 15, 2014:
- DDoS Professional plan with 50 DNS zones for only $2.45/month
- DDoS Business plan with 250 DNS zones for only $8.95/month
- DDoS Enterprise with 1,000 DNS zones for only $29.95/month
The promotion is valid for new and existing customers.
Order from here: https://www.cloudns.net/ddos-protected-plans/
Discounted domain name registrations until the end of August:
.NET for only $9.95
.ORG for only $7.95
.BIZ, .EU and .IN for only $5.95
.WS for only $9.95
.CO for only $12.95
.ME for only $9.95
The promotion is valid for the first year of new domain name registration.
Order from here: https://www.cloudns.net/domain-pricing-list/
ClouDNS Sales Team
Dear Customers,We have added a few new features to our control panel:
Support for SSHFP records
Now you can secure your SSH at DNS level. SSHFP record is available for Master (Primary) and Slave (Secondary) DNS zones.
Option to delete a DNS zone from the Records page
It's easy to find a DNS zone with the search option from the Dashboard, but it wasn't so easy to delete it. Now if you have 1000+ DNS zones and you want to delete one of them, you can find the zone with the search and delete it from the button at the Records page.
Option to move a DNS zone to another accout
If you sell any of your domain names and want to move the DNS settings to another account (e.g. of your customer), you just need his e-mail address.
Option to import records in Master DNS zone from external Master DNS server
If you allow the zone transfers for www.cloudns.net (18.104.22.168), you will be able to import records from this remote server to your Master DNS zone here. When you send the request to the other DNS server, you will see a list with all DNS records and option to add them. The feature is available in the right menu of the DNS zone control panel with the records.
We are starting June Domain Promotion for new domain registrations:
For every domain registration you will receive 1 month free Premium account extension!
The promotion is active until the end of June.Regards,
For the last 5 days DNS servers pns1.cloudns.net, pns2.cloudns.net, pns3.cloudns.net and pns4.cloudns.net are under large DDoS attacks (over 25Gbps and 2,000,000 packages per second). From the beginning of the attack pns1.cloudns.net and pns4.cloudns.net are null routed, because of a limited capacity of the data centers in the United Kingdom and Romania.Mitigation strategy
pns1.cloudns.net is restored to normal activity.
pns2.cloudns.net is with changed IP - 22.214.171.124 (old IP is 126.96.36.199). The service is provided by DDoS Guard and is with 140Gbps capacity. It should be able to handle this big attack against our service.
pns3.cloudns.net is with unchanged IP address. It is backed by Staminus (one of the largest DDoS protection providers). The limit of the protection is 5Gbps. We will upgrade it soon.
pns4.cloudns.net is forwarded to the new pns2.cloudns.net server.
pns6.cloudns.net is with changed IP - 188.8.131.52 (old IP is 184.108.40.206). The new server is located again in Texas, USA.
If you use Slave DNS zones, you need to allow the new IP addresses of pns2.cloudns.net and pns6.cloudns.net for zone transfers. Currently all Slave DNS zones are migrated with their last state.
If you use DNS branding, you need to upgrade your A and Glue records to the new pns2.cloudns.net and pns6.cloudns.net IP addresses.
The old IP addresses of pns2.cloudns.net and pns6.cloudns.net will be supported until Jun 1, 2014.1,000% SLA
According to our 1,000% SLA all our customers with these servers are extended with 50 days for free.
Sorry for the caused inconvenience. Please contact us, if you have any problems.
pns1.cloudns.net and pns4.cloudns.net are temporary down, because of a large DDoS attack (over 30Gbps).
[UPDATE 16:34 CET] pns1.cloudns.net is currently okay. Attack is moved to pns2.cloudns.net and pns3.cloudns.net. To prevent damades our Romanian data center null-routed pns4.cloudns.net
[UPDATE 19:21 CET] Everything is okay from 2 hours on pns2.cloudns.net and pns3.cloudns.net. We work to get pns1.cloudns.net back up.
[UPDATE 21:20 CET] ns2.cloudns.net is included to the list with attacked servers.
[UPDATE Apr 19, 16:00 CET] pns1.cloudns.net and pns4.cloudns.net are still null-routed. We will try to get pns1.cloudns.net back up after few hours.
[UPDATE Apr 19, 20:00 CET] The Attack continues with full power. pns1.cloudns.net, pns2.cloudns.net, pns3.cloudns.net and pns4.cloudns.net are attacked with over 20Gbps
[UPDATE Apr 20, 20:00 CET] Everything with the attack is okay now. pns4.cloudns.net is still nullrouted to be save data center in Romania. pns3.cloudns.net is in the Staminus data center in their Irvine DC and currently is down, because an outage of the data center. The problem is related with the fiber connection and it is not related with our attack.
[UPDATE Apr 21, 05:00 CET] The problem of Staminus Irvine DC is fixed. pns3.cloudns.net is back up and everything looks okay. If everything is okay today, we will remove the nullroute of pns4.cloudns.net and add it back to the cloud.
[UPDATE Apr 21, 9:45 CET] The attack started again. pns1.cloudns.net and pns4.cloudns.net are nullrouted.
[UPDATE Apr 22, 7:30 CET] pns1.cloudns.net and pns4.cloudns.net are forwarded to pns3.cloudns.net and pns2.cloudns.net is forwarded to ns1.cloudns.net. We work to mitigate the attack with third party services like BlackLotus and Staminus. More information will be added soon.
[UPDATE Apr 22, 10:45 CET] The IP address of pns2.cloudns.net is changed to 220.127.116.11. The owners of slave (Secondary) DNS zones need to add this IP to their list with allowed master servers for transfers. The customers with DNS branding should update it too. Customers with Master DNS zones don't need to change their settings. The service behind this IP is provided by DDoS Guard.Regards,
Because of a required emergency synchronization of some of our servers, it is possible the updates to be delayed. We are sorry for the caused inconvenience.
[UPDATE 18:45 CET] Emergency synchronization is completed. Please contact our technical support, if you have any problems questions.Regards,
We have received a few questions related with this vulnerability. We want to inform you that our servers are not affected by Heartbleed vulnerability. So please don't panic and enjoy your service.Regards,