Dyn DDoS this AM?

George William Herbert george.herbert at gmail.com
Sat Oct 22 01:43:58 UTC 2016

> On Oct 21, 2016, at 6:35 PM, Eitan Adler <lists at eitanadler.com> wrote:
> [...]
> In practice TTLs tend to be ignored on the public internet. In past
> research I've been involved with browser[0] behavior was effectively
> random despite the TTL set.
> [0] more specifically, the chain of DNS resolution and caching down to
> the browser.

Yes, but that it can be both better and worse than your TTLs does not mean that you can ignore properly working implementations.

If the other end device chain breaks you that's their fault and out of your control.  If your own settings break you that's your fault.

Sent from my iPhone

More information about the NANOG mailing list