> On Oct 21, 2016, at 6:35 PM, Eitan Adler <li...@eitanadler.com> wrote: > > [...] > > In practice TTLs tend to be ignored on the public internet. In past > research I've been involved with browser[0] behavior was effectively > random despite the TTL set. > > [0] more specifically, the chain of DNS resolution and caching down to > the browser. Yes, but that it can be both better and worse than your TTLs does not mean that you can ignore properly working implementations. If the other end device chain breaks you that's their fault and out of your control. If your own settings break you that's your fault. Sent from my iPhone
- Re: Dyn DDoS this AM? Randy Bush
- Re: Dyn DDoS this AM? David Birdsong
- Re: Dyn DDoS this AM? Randy Bush
- Re: Dyn DDoS this AM? Niels Bakker
- Re: Dyn DDoS this AM? Måns Nilsson
- Re: Dyn DDoS this AM? Keenan Tims
- Re: Dyn DDoS this AM? Rob Szarka
- Re: Dyn DDoS this AM? david raistrick
- Re: Dyn DDoS this AM? Jean-Francois Mezei
- Re: Dyn DDoS this AM? Eitan Adler
- Re: Dyn DDoS this AM? George William Herbert
- Re: Dyn DDoS this AM? Masood Ahmad Shah
- Re: Dyn DDoS this AM? Mark Andrews
- Re: Dyn DDoS this AM? LHC
- Re: Dyn DDoS this AM? LHC
- Re: Dyn DDoS this AM? Eitan Adler
- Re: Dyn DDoS this AM? Suzanne Woolf
- Re: Dyn DDoS this AM? joel jaeggli
- Re: Dyn DDoS this AM? Måns Nilsson
- Re: Dyn DDoS this AM? Måns Nilsson
- Re: Dyn DDoS this AM? Crist Clark