TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Incident Report – DDoS Attack

146 pointsby alainmeierover 10 years ago

6 comments

latchover 10 years ago
I need to learn to let things go, but: <a href="https://news.ycombinator.com/item?id=4280515" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=4280515</a><p>I&#x27;ve been a DnsMadeEasy customer for a while (they had an outage ~4 years ago from a 50Gbps attack), but once my year is up, I&#x27;m switching to Route53. The addition of the Geo DNS Queries was key for me. It isn&#x27;t clear to me why I shouldn&#x27;t pick Route53. DnsSimple&#x27;s unlimited queries seems nice, but I kinda like having actual scaling costs forwarded to customers.
评论 #8692892 未加载
评论 #8695878 未加载
评论 #8693019 未加载
katorover 10 years ago
&gt; A new customer signed up for our service and brought in multiple domains that were already facing a DDoS attack. The customer had already tried at least 2 other providers before DNSimple. Once the domains were delegated to us, we began receiving the traffic from the DDoS.<p>I&#x27;m curious did they know this in advance or discovered it after the fact?<p>I often wonder about business models where the core expense is &quot;unlimited and free&quot;. The reality is there is nothing unlimited or free for the service provider. It seems with a business model like this you open yourself to people abusing your service either by accident or by choice. Imagine poor Mr. Customer here who most likely was having horrible problems thinking to themselves &quot;These guys can do it and for free, if I go to X service they&#x27;ll cost me a lot of money&quot;.<p>I&#x27;m a big believer in business models that incentivize both parties properly. I&#x27;m sure in general this service provider is arbitraging the 99.9% of domains that barely need any services. That said it only takes a couple of &quot;opps&quot; customers to drive your operational costs through the roof.
评论 #8693008 未加载
评论 #8695925 未加载
stephenrover 10 years ago
The solution here is one for customers, not providers.<p>Manage your DNS at one location on &quot;master&quot; (potentially a &quot;private&quot; server with IP restricted access and zone transfer ACLs).<p>Setup 2+ accounts with &quot;DNS providers&quot; that support incoming zone transfers - that is, they can operate as &quot;slave&quot; DNS servers, pulling records automatically from your &quot;master&quot; (once access rules are set of course) and returning results directly to clients making DNS queries.<p>Most &quot;Secondary DNS&quot; packages are &lt; $50 year, so use a few, and don&#x27;t worry about individual DNS networks being burnt to the ground.
评论 #8693090 未加载
abaloneover 10 years ago
So who do you think the &quot;well-known third-party service that provides external DDoS protection using reverse DNS proxies&quot; is they&#x27;re going to use now?<p>CloudFlare?
评论 #8693501 未加载
评论 #8692923 未加载
cm2187over 10 years ago
Out of curiosity, what are the follow ups of an attack like that? The perpetrators are probably using their own servers or compromised clients or servers. Would DNS Simple follow up on this with the abuse&#x2F;complaint dept of the ISP of the attackers? Are ISP typically responsive to abuse and complaints? If they are not is there any way to black list blocks of IPs assigned to ISP who do not care about being the source of DDoS attacks?<p>Investing in anti DDoS devices is important but even more important is for the perpetrators to face the consequences of their acts (or anyone who lets his machine being used by pirates - terminating or suspending their contract would be a fair response).
评论 #8693403 未加载
milos_cohagenover 10 years ago
What was the overall makeup of the attack traffic? For example, 50% tcp syn, etc.