DNSimple target of DDoS attack(twitter.com) |
DNSimple target of DDoS attack(twitter.com) |
But it also seems as though the same advice proposed in that thread should have been used by their customers: Namely, utilize multiple DNS providers to mitigate risk, and choose providers with IP anycast. Heck, even setting up your own secondary DNS on a $5/mo cloud server would keep your site up (unless of course your site is the main target of the DDOS).
Short term, keep your ALIAS record and add an additional A record for your root domain pointing to one of the IPs indicated by your hostname. DNSimple says they'll treat the A record as a fallback when ALIAS isn't working, and will return both sets of records when it is (https://twitter.com/dnsimple/status/341574753276002304).
For the next 3/12/24/96 hours or however long it takes for the threat to subside, this should increase your availability, and the likelihood that your A record will work for that time is probably reasonable. Longer term, you'll want to get rid of the A record.
- domain.com ALIAS sub.herokussl.com - www.domain.com CNAME domain.com
Unfortunately, DNSimple is now the weakest layer of our stack. And at http://KiteBit we are suffering it right now!
[1]https://devcenter.heroku.com/articles/custom-domains#root-do...)
However I'm glad this happened whilst I was still beta testing! My CloudFront stack was pointing at the root domain, which was stupid. Fixed that now.
We have a URL forwarding set to www that points to out root domain so we are completely down.
You could be an open resolver being used for reflection. You could be running DNSSEC and providing an amplification vector. You could be getting queries for another DNS server that used to have your IP. The possibilities are endless.
I'm planning on moving hosting over to Route53 at some point in the next few days, because the fact that I can't figure this out other than "turn off logging" tells me I probably shouldn't be running DNS servers.
It's easier to hit these sorts of "smaller player DNS hosts" if the website you want to take down is otherwise protected?
[0] https://cp.dnsmadeeasy.com/u/62796 (affiliate link)
1. Adding NS records to the parent zone via your registrar. E.g. if you are using example.com, when you add nameservers with your registrar they add them to the ".com" zone.
2. Update the NS records in your own copies of the zone on your DNS providers.
If your registrar is also one of your DNS providers, then both of these steps are sometimes handled in one action from your registrar - but you still need to update the NS records on the other provider.
"NS" record sets are special in DNS in that there is a copy of the NS record for a particular zone in both the parent zone and the child zone. About 8% of resolvers consider the parent zone's copy the one that matters, the other 92% honour whatever is in the child zone's.
This can lead to confusing cases where you have different NS configurations on different providers - the resolver may "stick" to whichever one it found first (as long as both providers are in the parent zone). DNS can be maddening!
Full-disclosure: I'm a Route 53 developer.
Of course, you can always do it manually..which is fine if you have few records and they are static.
edit: Kept googling and I did find http://www.dnsly.net/ neat enough that I wanted to share it, even though I think dns providers should be doing this as part of their existing packages.
Also, although it's no guarantee, dns providers that use anycast are less susceptible (but not invulnerable) to ddos.
https://twitter.com/scottvdp/status/341604885600534530
So I can make an Alias record to the ELB that heroku is pointing at with their SSL CNAMES.