[192174] in North American Network Operators' Group
Re: Dyn DDoS this AM?
daemon@ATHENA.MIT.EDU (George William Herbert)
Fri Oct 21 21:44:13 2016
X-Original-To: nanog@nanog.org
From: George William Herbert <george.herbert@gmail.com>
In-Reply-To: <CAF6rxgk9E1=f1Dz+yMOqMkvUbjX3Jqwxisu28M1YAs7_kYLonQ@mail.gmail.com>
Date: Fri, 21 Oct 2016 18:43:58 -0700
To: Eitan Adler <lists@eitanadler.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
> On Oct 21, 2016, at 6:35 PM, Eitan Adler <lists@eitanadler.com> wrote:
>=20
> [...]
>=20
> In practice TTLs tend to be ignored on the public internet. In past
> research I've been involved with browser[0] behavior was effectively
> random despite the TTL set.
>=20
> [0] more specifically, the chain of DNS resolution and caching down to
> the browser.
Yes, but that it can be both better and worse than your TTLs does not mean t=
hat you can ignore properly working implementations.
If the other end device chain breaks you that's their fault and out of your c=
ontrol. If your own settings break you that's your fault.
Sent from my iPhone=