Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

True, but DNS records have TTLs that expire, which forces you to reach back out to the authoritative server for the zone. A very decent number of records will have a TTL of 1hr, which means that a total DNS server outage lasting longer than an hour = 100% failure rate. You could always increase the TTL to a day (or whatever other arbitrary value), but that means that you'll be waiting upwards of a day for clients to see any updates to your DNS records. It's a tradeoff between different types of resiliency.

This is a simple case of a DNS provider evidently not having their crap together when it comes to a DDoS of any decent size. There are plenty of other DNS providers out there who are working fine currently, this DDoS is limited to just the one. It's all of that company's clients that are impacted.

I'm sure that DynETC will post something afterwards about how this was the largest DDoS they've ever encountered by many orders of magnitude and that there was no way for anyone to ever be prepared to take so much traffic... but at this point I think they're inept.

edit: just came back up. The TTLs on a few common records explain why this was so obviously a problem...

- www.reddit.com: 300 seconds (pointer to a fastly.net address, which is hosted via dynect)

- prod.reddit.map.fastlylb.net: 30 seconds

- api.twitter.com: 300 seconds

- herokussl.com: 3600 seconds

So, an outage of five minutes is enough to take out access to all of reddit and twitter. An outage of an hour is enough to take out heroku. Of course, these are best case scenarios: in reality, 50% of your users would lose access to reddit after 15 seconds (the fastly record), and so on.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: