▲ | SaggyDoomSr 3 days ago | |||||||||||||||||||||||||
I worked in the networking group for a cloud computing company. You've heard of them. We didn't charge for (some) DNS traffic, so some customers figured out how to use DNS as a transport mechanism to skirt around paying data transfer fees. It would essentially be a DoS attack which affected EVERY customer, so a few could save tiny fractions of their overall spend. A peer team of mine had to deal with the mess. That team had > 100% annual staff turnover, because they just made the oncall staff deal with the problem every time it showed up rather than ever solve the core issue of having a DoS vector masquerading as a feature. | ||||||||||||||||||||||||||
▲ | zoky 3 days ago | parent [-] | |||||||||||||||||||||||||
Wouldn’t the solution be to just start charging for excessive DNS traffic? | ||||||||||||||||||||||||||
|