upvote
DNS is barely centralized. Is there an alternative global name lookup system that is less centralized without even worse downsides?
reply
GP said it was a risk (and it is), not that there are better alternatives. Not all risks can be eliminated easily but you should still be aware of them.
reply
GNS is the obvious response here, in addition to the various blockchain based solutions. Nothing that enjoys widespread support or mindshare unfortunately.

Even the current centralized ICANN flavor could be substantially more resilient if it instead handed out key fingerprints and semi-permanent addresses when queried. That way it would only ever need to be used as a fallback when the previously queried information failed to resolve.

reply
BGP, but the names in question are limited to 128 bits, of which at most 48 will be looked up, and you don't get to choose which 48 bits are assigned to you.
reply
Normally it should not have been, with cache and all, but that was the past...

Think about what would happen the day that letsencrypt is borken for whatever reason technical or like having a retarded US leader and being located in the wrong country. Taken into account the push of letsencrypt with major web browsers to restrict certificate validities for short periods like only a few days...

reply
Let's Encrypt has to be down for days before people begin to feel the pain. DNS is very different, it breaks stuff immediately everywhere.
reply
No it doesn't. DNS breaks as soon as TTLs run out. It's your choice to set them so low that stuff breaks immediately.
reply
Unfortunately you can't set DNS TTL arbitrarily high (or low) without some resolvers ignoring your suggestion and using arbitrary values.
reply
Most historical outages lasted minutes or hours. One arguably lasted much longer, when someone lost control of their servers due to civil war.

I haven't followed this closely, but have there been any... shall we say plain outages longer than six hours? That's not an outrageous TTL. Or a day.

reply
What do you recommend then? DNS doesn't usually change that often, but if you mess it up when it does, you're in for some pain if TTLs are high!
reply
Not the one you're replying to, but I'd keep TTL high normally and lower it one TTL ahead of a planned change.
reply
I would define high as "double time needed to fix a dns issue" and account for weekends
reply
This is the way.
reply
This assumes that the host name you want has been recently queried. If it's not cached, good luck...
reply
Not really? .com and .net are still up

If Let's Encrypt goes down, half of the Internet will become inaccessible in a week.

reply
Presumably if LetsEncrypt goes down and stays down for a week, the sites that go down are the ones that see that their CA went down and at no point in the week take the option to get certs from a different CA?
reply
I guarantee that there are a ton of sites out there not monitoring their certs.
reply
"A ton" being a misspelling of "the vast, vast majority".
reply
Are there alternative CAs that are anywhere as easy to deal with as Lets encrypt?
reply
acme.sh supports multiple CAs there is even a RFC for CAs that describe the api.
reply
So it seems we need something like this [1] for IT infrastructure? ;)

[1] https://outerspaceinstitute.ca/crashclock/

reply
deleted
reply