<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Fri, Dec 26, 2014 at 9:27 AM, Anthony Eden <span dir="ltr"><<a href="mailto:anthony.eden@dnsimple.com" target="_blank">anthony.eden@dnsimple.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>We published an incident report after our outage:</div><div><br></div><a href="http://blog.dnsimple.com/2014/12/incident-report-ddos/" target="_blank">http://blog.dnsimple.com/2014/12/incident-report-ddos/</a><br><div><br></div><div>I have not yet seen an incident report from Rackspace.</div></div></blockquote><div><br></div><div>Thank you for posting that (I'd forgotten I'd seen it). And thank you for the detailed report, not just describing the root cause (DDoS on DNS servers), but also revealing traffic type and volume (random subdomain attack at 50Mpps/25Gbps) and your internal procedure for responding to it (black-box monitoring to detect the outage, post status notice after 10 minutes, assemble team via a Hangout after 20 minutes, try various technical mitigations, etc). This level of detail is rare in a public report, but greatly appreciated. Hopefully others will learn from your example.</div><div><br></div><div>Damian</div><div><br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="gmail_extra"><div><div class="h5"><div class="gmail_quote">On Fri, Dec 26, 2014 at 2:02 AM, Damian Menscher <span dir="ltr"><<a href="mailto:damian@google.com" target="_blank">damian@google.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Has anyone seen details of the attack styles or volumes? It would be helpful to share attack knowledge with the community so others know what to prepare for.<span><font color="#888888"><div><br></div><div>Damian</div></font></span></div><div class="gmail_extra"><br><div class="gmail_quote"><span>On Wed, Dec 24, 2014 at 1:56 AM, Stephane Bortzmeyer <span dir="ltr"><<a href="mailto:bortzmeyer@nic.fr" target="_blank">bortzmeyer@nic.fr</a>></span> wrote:<br></span><div><div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
<a href="https://news.ycombinator.com/item?id=8784210" target="_blank">https://news.ycombinator.com/item?id=8784210</a><br>
<br>
After the successful attacks against Rackspace, Namecheap, DNSsimple<br>
and 1&1, it is clear that dDoS attacks against DNS servers are very<br>
common this winter, and they succeed :-(<br></blockquote></div></div></div></div></blockquote></div></div></div></div></blockquote></div></div></div>