by markprovan on 6/3/13, 1:05 PM with 28 comments
by the9to5 on 6/3/13, 6:10 PM
But it also seems as though the same advice proposed in that thread should have been used by their customers: Namely, utilize multiple DNS providers to mitigate risk, and choose providers with IP anycast. Heck, even setting up your own secondary DNS on a $5/mo cloud server would keep your site up (unless of course your site is the main target of the DDOS).
by whafro on 6/3/13, 3:23 PM
Short term, keep your ALIAS record and add an additional A record for your root domain pointing to one of the IPs indicated by your hostname. DNSimple says they'll treat the A record as a fallback when ALIAS isn't working, and will return both sets of records when it is (https://twitter.com/dnsimple/status/341574753276002304).
For the next 3/12/24/96 hours or however long it takes for the threat to subside, this should increase your availability, and the likelihood that your A record will work for that time is probably reasonable. Longer term, you'll want to get rid of the A record.
by yesimahuman on 6/3/13, 1:41 PM
by soci on 6/3/13, 1:45 PM
Unfortunately, DNSimple is now the weakest layer of our stack. And at http://KiteBit we are suffering it right now!
[1]https://devcenter.heroku.com/articles/custom-domains#root-do...)
by jwarzech on 6/3/13, 2:15 PM
by zrail on 6/3/13, 5:27 PM
by thejosh on 6/3/13, 1:36 PM
It's easier to hit these sorts of "smaller player DNS hosts" if the website you want to take down is otherwise protected?
by randall on 6/3/13, 3:03 PM
by dexcs on 6/3/13, 1:35 PM