×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Go Daddy: Network Issues, Not Hacks Or DDoS, Caused Downtime

Soulskill posted about a year and a half ago | from the but-a-random-internet-person-said-otherwise dept.

Network 143

miller60 writes "GoDaddy says yesterday's downtime was caused by internal network problems that corrupted data in router tables. 'The service outage was not caused by external influences,' said Scott Wagner, Go Daddy's Interim CEO. 'It was not a 'hack' and it was not a denial of service attack (DDoS). ... At no time was any customer data at risk or were any of our systems compromised.' The outage lasted for at least six hours, and affected web sites and email for customers of the huge domain registrar."

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered

143 comments

Had to Take the Network Down... (3, Funny)

CanHasDIY (1672858) | about a year and a half ago | (#41303259)

... so the NSA could install their backdoors.

Re:Had to Take the Network Down... (0)

Anonymous Coward | about a year and a half ago | (#41303501)

Nah, the TLAs don't need downtime to install their backdoors.

anonymous U So haxor!!! (4, Funny)

DeTech (2589785) | about a year and a half ago | (#41303293)

Wow, anonymous was so good they were undetectable... And they almost got away with it too. To bad anonymous caught them.

Doesn't Really Help (5, Insightful)

Anonymous Coward | about a year and a half ago | (#41303299)

This just makes them look even less competent as a service provider, if the problem was purely internal then.

Re:Doesn't Really Help (5, Funny)

dyingtolive (1393037) | about a year and a half ago | (#41303391)

Yup.

"Good news everyone, we weren't compromised. We're just incompetent!"

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41303831)

Am I the only one who always imagine Professor Hubert J. Farnsworth when a sentence begins with "Good news everyone"?

Re:Doesn't Really Help (1)

osu-neko (2604) | about a year and a half ago | (#41303997)

"Good news everyone, we weren't compromised. We're just incompetent!"

To be fair, everyone who uses their hosting is already well aware of that, so this doesn't really hurt them to say...

Re:Doesn't Really Help (1)

MrEricSir (398214) | about a year and a half ago | (#41303551)

This just makes them look even less competent as a service provider, if the problem was purely internal then.

Or if it turns out it was a hacker, that won't inspire confidence in GoDaddy either.

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41305249)

Heh... It'll be less inspiring considering the amount of chaos they caused. A cracker/script kiddie means they got PWNED. Could be incompetence or not there.

If it was an INTERNAL problem...heh...that's really bad, image-wise, for them. That means they're just utterly incompetent and bodged up the Internet because of it.

Re:Doesn't Really Help (2)

pspahn (1175617) | about a year and a half ago | (#41303581)

Or possibly a way for them to market their own Premium DNS offerings. I understand that users on Premium DNS were hardly affected (according to a co-worker who was monitoring the whole thing yesterday and had a number of Premium DNS users).

Re:Doesn't Really Help (2)

whoever57 (658626) | about a year and a half ago | (#41303695)

Or possibly a way for them to market their own Premium DNS offerings. I understand that users on Premium DNS were hardly affected (according to a co-worker who was monitoring the whole thing yesterday and had a number of Premium DNS users).

Odd. I saw the reverse: our company's domain which is on GoDaddy's Premium DNS servers was affected, while a colleage's personal domain on the standard DNS servers was unaffected.

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41305361)

We had a few dozen domains on their Premium DNS, all down.

Re:Doesn't Really Help (2)

fermion (181285) | about a year and a half ago | (#41303733)

I commend them for being hones with their mistake. As an alleged premier top level domain name reseller, though, we would expect that they had the facilities to prevent both internal errors and external attacks. If I were superstitious, I would say something in the Juju right now. Lots of computer stuff going down.

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41303771)

This was a DNS problem and DNS is a woodoo, I bet nobody at GoDaddy know exacly how it works and what is wrong with it due to unmanageable config files and unpredictable behaviour of BIND.

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41303809)

As much as I am a BIND basher (tinydns for the win), even BIND can't help if there is a routing issue.

Re:Doesn't Really Help (1)

EdIII (1114411) | about a year and a half ago | (#41305489)

Routing issues aside, the problem could have been largely mitigated with reasonable TTLs IHMO.

I refuse to use GoDaddy because they are lying fucking sociopaths, but from time to time, I do need to help people out with services hosted there. Last time I saw a DNS control panel it had TTLs of 30 minutes as the default for most DNS records.

The outage lasted 6 hours. If you had a TTL of 12-24 hours you would have been just fine, unless I am completely off base on how caching DNS servers operate.

Such short TTLs don't make sense anyways for most use cases. DDNS, and some setups I can understand having it, but webservers and mailservers?

Re:Doesn't Really Help (4, Insightful)

caknuckle (2521404) | about a year and a half ago | (#41303811)

This just makes them look even less competent as a service provider, if the problem was purely internal then.

It might make them look less competent, but on the flip side suggests an "isolated" incident, and that it won't likely happen again, whereas if it's hackers you as a customer may wonder when the next hack will happen and what effect it will have on your websites, DNS etc. I.e. we better move off before it gets targeted again.

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41303907)

This just makes them look even less competent as a service provider, if the problem was purely internal then.

The VP of Marketing made a highly technical and calculated decision as to how to spin this.

It went something like this...

(flips coin)

Re:Doesn't Really Help (5, Insightful)

Kaptain Kruton (854928) | about a year and a half ago | (#41304199)

It makes GoDaddy appear incompetent to geeks and computer-savvy users. However, to the average person that does not know much about computers, they will accept it as a computer problem that 'just happens'.... just like all of the errors that they have on their home computers that supposedly have no cause. As long as GoDaddy makes the problem sound really technical while saying they know exactly what caused it and know how to quickly implement a solution that prevents future instances, they will appear competent to the average computer user. After all, to an average user, an admin's ability to solve a problem that sounds complex will make the admin's skill sound really impressive.

Remember many of GoDaddy's customers are individuals and small businesses that have mediocre computer skills that rely on a simplified WYSIWYG tool. To them, evil hackers that steal information are much worse than an annoying problem that just happens because computers all have problems (in their experience). As long as the customer doesn't realize that it was a problem that should not have occurred and it was only caused by incompetence, then they are less likely to lose those customers.

Re:Doesn't Really Help (-1)

Anonymous Coward | about a year and a half ago | (#41304427)

then they deserve to have there fucking identities stolen, specially since there using a fucking wysiwyg tool to build a fucking webpage. go anonymous, obliterate godaddy and there fucktarded customers that are to fucking stupid to even exist let alone use a computer.

Re:Doesn't Really Help (-1)

Anonymous Coward | about a year and a half ago | (#41304565)

It makes GoDaddy appear incompetent to geeks and computer-savvy users. However, to the average apple user that does not know much about computers, they will accept it as a computer problem that 'just happens'.... just like all of the errors that they have on their home computers that supposedly have no cause.

FTFY

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41304655)

Bring down the websites of thousands of high profile customers? Sounds like the very definition of an RGE. http://etherealmind.com/network-dictionary-resume-generating-events/

Re:Doesn't Really Help (0)

Anonymous Coward | about a year and a half ago | (#41305633)

This just makes them look even less competent as a service provider, if the problem was purely internal then.

So how about Google then when they lost a datacenter (network-wise) and their backups caused internal DoS?

I'm not exactly a fanboy of GoDaddy and would move from them if possible, but there does not exist viable alternatives. Which domain registrar provides,

1. CND (canadian dolar payment)
2. DNSSEC
3. IPv6 glue
4. bonus - Canadian based

I've looked at Tucows. No DNSSSEC. Not even CND option!!

Joker.com is even worse than godaddy - they wanted me to send them high-res scanned CC details and photo ID to make a payment worth about $60 despite paying with same CC year before. And the domains were years old too!

So yes, you may say Godaddy sucks, but there really aren't many other competent registrars anyway.

As for hosting providers, a lot more choices. No, I would not host my domains with GoDaddy. I don't even host DNS with them, just use them as registrar.

If you believe that... (2, Insightful)

Rix (54095) | about a year and a half ago | (#41303303)

Then I've got a fully alive not dead elephant to sell you.

Re:If you believe that... (2, Insightful)

Anonymous Coward | about a year and a half ago | (#41303399)

How does it help GoDaddy to tell everyone that they are incompetent instead of admitting they were attacked?

Re:If you believe that... (0)

Rix (54095) | about a year and a half ago | (#41303795)

If they were successfully attacked then their both incompetent and insecure.

Re:If you believe that... (0)

Anonymous Coward | about a year and a half ago | (#41304271)

they're not their. bad habit, I used to do the same thing.

Re:If you believe that... (0)

Anonymous Coward | about a year and a half ago | (#41303995)

If they admit the downtime of millions of sites was the work of a lone hacker their customers would lose all confidence.

Re:If you believe that... (0)

Anonymous Coward | about a year and a half ago | (#41305671)

Sorry, I'm not into that.

Wow (1)

MyLongNickName (822545) | about a year and a half ago | (#41303317)

Talk about having a bad day at the office... can you imagine being a Sys Admin at GoDaddy?

We have a few odd DNS entries still hosted at GoDaddy. We'll be yanking those last ones away. Any advice on how to set it up so I'm not depending on one registrar?

Re:Wow (1)

cnastase (1504381) | about a year and a half ago | (#41303409)

Any advice on how to set it up so I'm not depending on one registrar?

Yes. You can depend on more hosting services which use different upstream providers and are located in different datacenters. And pray they don't go offline in the same time :)

Re:Wow (1)

kwalker (1383) | about a year and a half ago | (#41303529)

That doesn't get around your registrar going down, just your hosting.

Re:Wow (0)

Anonymous Coward | about a year and a half ago | (#41303633)

Unless your hosting your DNS or actual website at your registrar - once you register your domain and they push your NS to roots. They could could go down for months even years and it would not matter. Unless you needed to change your NS for your domain, or register a new domain registrar has nothing to do with actual access to sites or dns.

Re:Wow (5, Interesting)

kwalker (1383) | about a year and a half ago | (#41303797)

You would think so, but the company I work for uses GoDaddy (At least up until today we did, we may be going elsewhere now) for our registrar, but nothing else. We run our own DNS servers, our own web servers and load balancers, our own mail servers, etc. but we got scads of complaints about "the website is down" yesterday during the event. We traced it back to external DNS failures, but I have full-time monitoring on all of our systems and nothing on our end even hiccuped. It worked for some locations but not others.

It makes no sense to me either.

Re:Wow (2, Insightful)

Anonymous Coward | about a year and a half ago | (#41304089)

You sure it was not say a SSL issue with certs issues by them - they now are a CA as well. The crl is a crl.godaddy url -- depending on browser, if crl is not available then ssl can be flagged as invalid.

A registrar of a domain has NOTHING to do with the resolving of your domain, once it has been sent to roots.

Do a simple dig +trace query for your domains, where in that line would your registrar be talked too? You hit roots, you hit servers for your tld (org.com,etc), you hit your NS = done. A registrar does not come into play for the resolution of a fqdn - unless they are hosting your dns, or they host the site.

Now if godaddy was in line for resolution of your the domain your NS reside in, then ok that could cause some problems if they are down.

What are you hosting on your site? If say ADs or images from other domains dns or site was hosted by godaddy - that could cause some issues if site loading if parts of your page could not be resolved.

Re:Wow (0)

Anonymous Coward | about a year and a half ago | (#41305595)

Bought my domain through godaddy and since all I use them for is a registrar (self-hosted everything), I don't care enough to bother switching registrars.

At no point during the outage did I find my domain not working. Perhaps you have a case of things breaking at the same time.

Lies (0)

Anonymous Coward | about a year and a half ago | (#41303319)

I don't believe them. Why would a company employing many "networking experts" admit to being seriously disrupted by script kiddies?

Of course they would deny it.

Re:Lies (4, Funny)

dgatwood (11270) | about a year and a half ago | (#41303429)

Never attribute to malice what can be attributed to GoDaddy's incompetence just as easily.

Re:Lies (3, Insightful)

maxwell demon (590494) | about a year and a half ago | (#41303715)

What's worse: Not being able to keep your network running when someone actively tries to disrupt it, or not being able to keep your network running under otherwise perfectly normal conditions?

Perhaps... (4, Interesting)

ackthpt (218170) | about a year and a half ago | (#41303333)

if they'd pay some of that massive advertising budget to competent employees, quality software and proper maintenance. ... naw, bring on the chick ads.

So that's, what, two big hits for Go Daddy this year?

Re:Perhaps... (0)

Anonymous Coward | about a year and a half ago | (#41303387)

So that's, what, two big hits for Go Daddy this year?

According to their ad, it's two big tits...

No vulerabilities! (0)

Anonymous Coward | about a year and a half ago | (#41303353)

"Our PR department told us to say we have NO vulnerabilities. It was just an internal glitch. Nothing to see here. Continue buying our (insecure) products please!"

We weren't attacked (0)

Anonymous Coward | about a year and a half ago | (#41303361)

we're just incompetent.

Re:We weren't attacked (0)

DickBreath (207180) | about a year and a half ago | (#41303711)

Does "network issues" just an obscure way to refer to something about using Microsoft Windows for servers?

Go away GoDaddy (1)

skaag (206358) | about a year and a half ago | (#41303375)

I don't buy this for a nickel, and I doubt they are even capable of detecting that a problem was caused by "external influences".
Laughably feeble attempt to save face in front of countless customers who should have known better than to use GoDaddy services.

Re:Go away GoDaddy (3, Insightful)

fuzzyfuzzyfungus (1223518) | about a year and a half ago | (#41303467)

Hey, cut them some slack. Lying in public is one of the few pleasures of having a customer base that consists of people who don't know better...

Re:Go away GoDaddy (0)

Anonymous Coward | about a year and a half ago | (#41304235)

Hey, cut them some slack. Lying in public is one of the few pleasures of having a customer base that consists of people who don't know better...

You have a future in politics, my man.

Today's competing Big Lies:

1. We can spend our way to prosperity!
2. We can balance the budget without tax increases!

Not so sure (1)

Anonymous Coward | about a year and a half ago | (#41303437)

I received emails last night from some SAAS companies claiming that there service outages were due to attacks by hackers. They did not mention GoDaddy specifically, but I know their DNS is hosted there.

Why would they be saying it was hackers?

Sounds like damage control to me.

Re:Not so sure (2, Informative)

Anonymous Coward | about a year and a half ago | (#41303469)

Because someone on twitter said that they did it and everyone believed them?

That makes more sense (5, Insightful)

Spy Handler (822350) | about a year and a half ago | (#41303443)

There was no other indication of a DDOS than the "I did it" tweet by a lone troll. To knock out someone as big as Godaddy for as long as they did would've required an epic-scale DDOS and you'd think something like that would've been noticed by their upstream providers.

This is the second time this week an Anonymous troll lied about an attack (the other one was stealing iPad device ID from FBI)... Anonymous's sterling reputation is being tarnished!

Re:That makes more sense (1)

Anonymous Coward | about a year and a half ago | (#41303521)

I like how you so easily believe that they were both false. It makes me giggle.

Re:That makes more sense (1)

Jason Levine (196982) | about a year and a half ago | (#41303735)

We have one Anonymous member claiming that it was his attack that brought down GoDaddy.
We have GoDaddy claiming that it was network issues.

Lacking any further evidence, we're in a he said-she said scenario. While I'm not advocating blindly believing GoDaddy representatives, blindly believing an Anonymous member without any evidence to back him up seems foolish also. (A tweet the Anonymous member made during some service's downtime doesn't count as evidence.)

Re:That makes more sense (0)

Anonymous Coward | about a year and a half ago | (#41305853)

I like how you so easily believe that they were both false. It makes me giggle.

So you would trust an anonymous group of individuals who won't show their face in public that lie, cheat and steal to be honest? All hatred aside for Godaddy but they are more trustworthy than someone who would swipe your credit card if you blinked too long.

Re:That makes more sense (1)

Anonymous Coward | about a year and a half ago | (#41303703)

What I think you mean is anonymous troll. Anonymous weren't trolling, as in, a person who is an active participant in the Anonymous movement.

There is a difference between an anonymous person and an Anonymous person in this case. The former is just any random person on the internet with a pseudonym trying to troll the latter, which is a group united under one pseudonym.

Re:That makes more sense (1)

ColdWetDog (752185) | about a year and a half ago | (#41304723)

What I think you mean is anonymous troll. Anonymous weren't trolling, as in, a person who is an active participant in the Anonymous movement.

There is a difference between an anonymous person and an Anonymous person in this case. The former is just any random person on the internet with a pseudonym trying to troll the latter, which is a group united under one pseudonym.

Maybe you ought to trademark the term "Anonymous" - too many people are using it, customers get confused.

Re:That makes more sense (0)

Anonymous Coward | about a year and a half ago | (#41304057)

"There was no other indication of a DDOS than the "I did it" tweet by a lone troll."

It really does seem like someone trying to take credit for something that didn't actually happen, especially with "official" anon related accounts distancing themselves from the supposed attack.

Has anyone seen an actual time stamp for the tweets? Does that account take credit for the "attack" three minutes after godaddy announced they were working on fixing the outage?

Re:That makes more sense (1)

jameshofo (1454841) | about a year and a half ago | (#41304515)

Then again at least they're honest enough to admit it, but then again the tweet only says, #TangoDown -- godaddy.com | by @AnonymousOwn3r. it appears to be the ASSumption of the original author that it was a DDoS.

but then again taking a look at some of the tweets, you get more of a "c'mon are we actually taking this seriously?"

Surely we can take some artistic Licences with the quotes from go-daddy as well! (From the article)
Wagner also noted that the company has provided a 99.999 percent uptime in its DNS infrastructure. More importantly, he admitted that his team “let our customers down and we know it” and that “we apologize to our customers for these events and thank them for their patience.”

As we ask what year was that? Because you can count 2012 out!

Re:That makes more sense (1)

adameros (851468) | about a year and a half ago | (#41305357)

Early in the outage (1st hr), I was looking at http://www.isitdownrightnow.com/godaddy.com.html [isitdownrightnow.com] and it was able to still ping godaddy.com (I'm assuming the IP was still cached), but it had, as I remember, 3000ms+ ping times. To me, this lends a little credence to the DDOS claims, but it is not definitive.

Re:That makes more sense (1)

nmos (25822) | about a year and a half ago | (#41305515)

What makes you think an attack would have to involve a DDOS? There are other ways of attacking a network you know.

Re:That makes more sense (0)

Anonymous Coward | about a year and a half ago | (#41305825)

There was no other indication of a DDOS than the "I did it" tweet by a lone troll. To knock out someone as big as Godaddy for as long as they did would've required an epic-scale DDOS and you'd think something like that would've been noticed by their upstream providers.

This is the second time this week an Anonymous troll lied about an attack (the other one was stealing iPad device ID from FBI)... Anonymous's sterling reputation is being tarnished!

Sterling reputation? More like proving they are a bunch of scrubs that can't actually hack anything. It wouldn't surprise me if most of their work they take credit for never happened.

Internal influences, eh? (0)

Anonymous Coward | about a year and a half ago | (#41303481)

I bet it has something to do with those distracting young ladies selling their wares to executives right next to the geeks trying to do their work.

Normalcy (0)

Anonymous Coward | about a year and a half ago | (#41303499)

"Don't worry, it wasn't DDoS. We're just incompetent." - GoDaddy

Not hacked... (0)

Anonymous Coward | about a year and a half ago | (#41303509)

They don't want the terrorists to win.

The real story is the media (0)

Anonymous Coward | about a year and a half ago | (#41303555)

One person sends tweets claiming to have DDOS'd all of GoDaddy and the whole media swallows this and reports it as major news. No investigation, no other source.

Can't win here. (1)

JustAnotherIdiot (1980292) | about a year and a half ago | (#41303603)

If you were hacked? It shows your defenses are weak.
If you weren't hacked? It shows you have some seriously poor management/backup equipment.
Either way, less people are going to want to use you after this.

Another KKR debacle (2, Informative)

Anonymous Coward | about a year and a half ago | (#41303641)

Disclaimer: I work for a company that got "bought out" by KKR, just like GoDaddy.

Since KKR bought them out, GoDaddy has jacked up their prices (to make up for the billions I'm sure KKR "leveraged" out of GD for their execs and shareholders), took a pro-SOPA and PIPA stance (which garnered them a bit of a boycott), and is now having infrastructure problems. I haven't heard, but I'd bet there were layoffs and some brain-drain shortly after the KKR mafia took over.

Go figure.

If you own stock in a company that is being eyed by KKR (think: Bain Capital) dump it quick. If you're a customer, make plans to jump ship.

Re:Another KKR debacle (1)

iplayfast (166447) | about a year and a half ago | (#41303927)

according to www.stockchase.com KKR

"Would characterize dividend as not being safe because it is merely a function of income that the company generates on a quarterly basis. It goes up and down depending on whether they are capitalizing any deals. This quarter will probably have a very nice dividend because they just sold a position in Alliance Boots to Walgreens. Trades at a very reasonable price."

In other news godaddy is still having problems. They weren't relaying emails from a website I have with them, I complained and the whole godaddy went down. Maybe I caused it? Am I anonymous?

They would relay emails to my gmail address, but not to my local ISP.

Re:Another KKR debacle (1)

ArsenneLupin (766289) | about a year and a half ago | (#41304225)

If you own stock in a company that is being eyed by KKR (think: Bain Capital) dump it quick.

Why would you dump stock of a take-over target? Just keep it until the take-over at least... stocks usually rise in anticipation of take-over, because the buyer, no matter how incompetent, will usually pay premium for the stock in order to ensure a quick conclusion of take-over... and if the buyer is so incompetent that he doesn't know that he has to do that, he won't be in a position to ruin the company, because he'll never own enough shares in it.

YES! fmP (-1)

Anonymous Coward | about a year and a half ago | (#41303781)

your own beer there are only Won't be standing it was fun. If I'm one Here but now ~280MB MPEG off of centralized models contaminated while to use the GNAA overly morbid and code.' Don't dicks produced operating systems, Truth, for all FreeBSD because is ingesting a conscious stand that *BSD is mire of decay, bombshell hit community at over the same tossers, went out BSD culminated in and the bottom NAME ON THE JAR OF this post up. live and a job to *BSD BUT FREEBSD Chosen, whatever = 36400 FreeBSD Standpoint, I don't into a sling unless the bottoms buut live and a job to Accounts for less approximately 90% OS I do, because

It was bad now worse (0)

Anonymous Coward | about a year and a half ago | (#41303847)

So they are saying they weren't incompetent and got hacked they were just incompetent.

Well duh ... (3, Funny)

jest3r (458429) | about a year and a half ago | (#41303861)

If one "anonymous" person could take down 5 million websites then we might as well give up on the Internets ...

Then again it could have been one GoDaddy Admin who accidentally misconfigured the routing tables that caused all of this ... I'd probably want to be anonymous if I was that person as well ...

Re:Well duh ... (0)

Anonymous Coward | about a year and a half ago | (#41305887)

If one "anonymous" person could take down 5 million websites then we might as well give up on the Internets ...

Then again it could have been one GoDaddy Admin who accidentally misconfigured the routing tables that caused all of this ... I'd probably want to be anonymous if I was that person as well ...

Better yet. This network admin is actually the person from Anonymous so he broke the routing table at his own company and praised himself on Twitter!!

Can I have my $80 back? (1)

CubicleZombie (2590497) | about a year and a half ago | (#41303883)

That's what it cost me to figure out that each hosted domain has a different credit card record for autorenewal. So updating one record won't stop the rest of your domains from expiring. Bastards. They're worse than Comcast.

Good for me, though, since that caused me to switch everything to a competitor and not be affected by this outage.

It's the network!! (1)

ctime (755868) | about a year and a half ago | (#41303911)

This is almost certainly a result of a network change plus some really bad luck. Big player BGP peering connections are under intense scrutiny right now because of a few mistakes made at company A were introducing blackhole routes into company B (c,d,e,f's) routers.

Networking is the most often overlooked, often shit on, everyday service that everyone ab(uses) and gets pissed when it doesn't work properly. Like toilets.

Re:It's the network!! (0)

Anonymous Coward | about a year and a half ago | (#41304323)

Back in the 90's when it was much easier to get away with this stuff. I worked for a regional backbone provider and we had 4 trusted BGP peers (plus 1 untrusted, pretty sure it was UUNET). And if someone ticked me off on IRC I'd just make a new BGP entry routing their IP block off to wherever...

Something isn't right (0)

Anonymous Coward | about a year and a half ago | (#41303957)

And somebody else just happened to know about it and take credit for it?

99.999% Doesn't mean what you think it means (4, Informative)

Anonymous Coward | about a year and a half ago | (#41304017)

They were down for 6 hours but still claim 99.999% uptime. But unless they have been around for more than 57 years, I dont' see how that is possible. Wonder what funky math they use to back up that number.
  https://encrypted.google.com/search?q=5+hours+%2F+(1-99.999%25)

Re:99.999% Doesn't mean what you think it means (1)

Burning1 (204959) | about a year and a half ago | (#41304897)

I suspect they declared a 'maintenance window' 5 minutes into the outage.

SLA Violated??? (0)

Anonymous Coward | about a year and a half ago | (#41304031)

So now that they admit it was a internal issue does that mean everyone that has their "Premium" DNS SLA agreement of 99.999% uptime can walk away from any contractual agreement and/or get some giant credit?

So what? (2)

thePowerOfGrayskull (905905) | about a year and a half ago | (#41304301)

To this I say "so what"? When you have one primary job to do - respond to DNS requests for millions of domains that are registered through you - and you fail to do so, it's over. No matter what the root cause is, you caused *millions* of web sites to be unreachable for most people, for a period of time spanning hours. This is not "oops", this is catastrophic failure from a business perspective.

I can only hope that sufficient numbers of customers will be as offended, and seek more reliable solutions.

Re:So what? (0)

Anonymous Coward | about a year and a half ago | (#41304805)

I have no doubt that huge number of customers will happily take their business.... ...oooh - Danica Patrick in the shower? Where?

Meaningless lies (0)

Anonymous Coward | about a year and a half ago | (#41304329)

"Network issues" has no real meaning. DDoS and network hacks are both types of "network issues." This is like saying someone died from "natural causes": it means nothing; there is always an actual cause.

Got all intern up in there (0)

Anonymous Coward | about a year and a half ago | (#41304807)

Some stupid intern tripped over the network connection and broke everything

Or... (0)

Anonymous Coward | about a year and a half ago | (#41304835)

Anonymous has a person that works inside of GoDaddy and they caused the problem from the inside!

Or GoDaddy is a bunch of baboons....

Not Surprised (0)

Anonymous Coward | about a year and a half ago | (#41304849)

Would you really expect them to admit it if it happened?

Who to Switch to? (0)

Anonymous Coward | about a year and a half ago | (#41305269)

I work at a firm that was setup on Godaddy before I arrived. Only for domain register and public dns. What is /. recommendation for who to switch too?

Ok, if it wasn't Anonymous then... (0)

Anonymous Coward | about a year and a half ago | (#41305429)

how did they obtain the source code and database for godaddy?

https://twitter.com/AnonymousOwn3r/status/245626172103344128

Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...