Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Gandi.net was under DDoS (gandi.net)
68 points by esamueljohnson on Jan 23, 2021 | hide | past | favorite | 53 comments


Gandi has been my registrar for years -- they're solid, high-integrity folks. Hope they manage to resolve this without too much damage.


I used to think that. But from my experiences, their customer service is crap, and I had a bunch of downtime on their VPS offering with no compensation offered.

I've stayed away from them since then. Not a very impressive company, and I'm not too surprised they're failing to deal effectively with this DDoS.


Gandi is a domain registrar first and in that respect they're lightyears ahead of the competition. They don't do shady stuff of squatting on your domain searches etc.

If you choose to use a value added service like VPS, you should expect subpar experience. You can go to any cloud provider and find a service for which you're going to have a worse experience than you had with Gandi VPS.


No I shouldn't expect a subpar experience, and that's why I no longer use Gandi.

Claiming not to do shady things with user data is the minimum I expect from a domain registrar. Fortunately, Gandi aren't unique in that respect.

Gandi came highly recommended to me, so I was quite disappointed by the reality.


So who in your opinion is _clearly_ better than Gandi?


OVH, DigitalOcean, Hetzner, AWS... everyone else is much better performance and stability wise.


AWS uses Gandi for domains


Gandi is not awful for managing domains (although they had issues with DNS management for years) but Gandi is a no-no-everything-constantly-on-fire for everything else, notably VPS and networking stacks


Try njalla, a privacy focused domain provider. It was founded by Peter Sunde, one of the original creators of The Pirate Bay. You can pay with crypto currencies and they even have a .onion domain of their website, so you can reach them over Tor.


Njalla is not a domain registrar.

They buy the domain themselves, and let you pay with Dogecoins -- possibly a good deal for the next Pirate Bay, but not what I would use for general domain registration. There is a good chance one day they will go down and take your (their!) domain with them.

From their website:

---

We're not actually a domain name registration service, we're a customer to these.

[...]

When you buy a domain in our system, we're actually purchasing it for ourselves. We will be the actual owners of the domain.


Yep, this is like going to IKEA to buy kitchen knives.


If I bought what turned out to be blunt or broken kitchen knives from IKEA, and they refused to accept a return and offer a refund, I wouldn't shop there again either.


> They don't do shady stuff of squatting on your domain searches etc.

According to other HN users, they do: https://news.ycombinator.com/item?id=22002534


I would add that their dreadful customer service extends to domains as well.

In my experience having to engage after a technical issue on their side, they were rude, argumentative, and totally unhelpful.

If you value your domains I would register them literally anywhere else.


We used them for years too but their admin panels and tooling had too many issues. We lost access to stuff more than once and we moved to name.com at some point. Haven’t had any issues on name.com so I would not really recommeng Gandi.


I would not call Gandi high integrity folks after having seen that story of them losing customers' paid emails and telling them to restore from their own backups https://news.ycombinator.com/item?id=22001822


A few friends of mine work there, so I'm biased obviously. But I think they're overall pretty awesome


Bad timing here, was about to renew a few personal domains and do some DNS record maintenance.

Good luck to the ops team! Never fun on a Friday night...


It is Saturday morning in Paris :-)


We under DDoS, teams are working to mitigate the attack.


I think it is better not to share it on hn, you will receive more traffic as this is on front page and could worsen the ddos


I would be surprised if a niche site like HN which has relatively small number of users could bring down Gandi. Surely, their status page is behind a solid CDN.


Their status page uses statuspage.com (owned by Atlassian).


If Gandi folks read this: I am curious to read your post-mortem analysis on this.

I was seriously thinking about bringing some domains back to LiveDNS. I am thinking that after this, you may even be a little better at your job. Transparency is key here for me, even if you messed up.


I would be really interested in a website that tracks services that are currently under attack or some sort of fire so I can follow their status updates. I love examining high stress situations like that in real time.


On the site it says """Identified - We are still targeting by a DDoS. Our teams are starting to push mitigations."""

they are the target of the DDoS, right? If so, it should be """We are targeted by a DDoS.""" It is confusing to read...


It's a French company so the person who wrote this probably uses English as their second language


Why would someone be DDOSing Gandi? extortion?


It can also be a shroud for data exfiltration. As in 100GB of sensitive data traffic would be drowned in the noise of the DDoS traffic.


That would be a weird and not so subtle approach. The service has to be responsive enough to handle that 100GB of traffic, which DDoS works against. 1GB a day would be a rounding error for any established internet service, on the other hand if you get DDoS'ed, you will do at least a bit of log review.

I don't see what anyone would gain this way.


Not really. If the attacker has code execution on the target servers they can just blast out UDP packets (with erasure coding for bonus points). The DDOS will jam up the inbound link to the target server, but the outbound link will be able to send out unacknowledged UDP packets just fine. Can make them look like DNS requests if you're paranoid.

If the attacker doesn't have code execution on the target -- in other words they just found a way to make some web server cough up data that it shouldn't -- then this won't work.


This sounds like an action movie sequence. See the sibling answer. DDoS gives people reason to look into logs/metrics. If you get caught by an automatic check, you fail either way. If not, you move from an "everything normal" scenario to "we're looking at ways to kill traffic" scenario, which is not beneficial for exfil.


You divert the time and attention of the security and ops teams; and DDoS-for-hire has made it relatively trivial to stage an attack even if you don’t have a bot net.


Sec/ops doesn't normally involve looking at live network capture snapshots all day. ("Eyes on glass" monitoring exists, but that's not for common services) You're not distracting people from spotting exfil.

Either the company has the capacity to spot traffic anomalies like that or it doesn't. If they do, you're caught. If they don't, you're only giving them a reason to look in the logs because of DDoS. If your only issue was masking the higher network throughput, you can slow down. By starting DDoS you don't know what protections will be activated - it can be "running services in this state is useless, let's kill all of them until traffic stops". Or "there's lots of traffic to/from this AS, let's just kill that route". (it was your AS)


> Sec/ops doesn't normally involve looking at live network capture snapshots all day. ("Eyes on glass" monitoring exists, but that's not for common services) You're not distracting people from spotting exfil

No, but if the people on call are being drowned in alerts because everything is down due to the DDoS, an alert saying there's anomalous traffic ( if it's even capable to detect that during a DDoS, when all traffic would be anomalous depending on infrastructure) could be easily missed.


From my experience handling on-call during DDoS, there's not much drowning in alerts. You mute alerts about things being down. Then look at ways to drop the biggest / isolated types of traffic. Then analyse what is affected and start logging the impact. I don't believe anything would be missed: security monitors would alert different people / channels than service ops, post-incident review would look at alerts raised, any weird traffic would be looked at during "isolate and kill traffic" stage.

Volume is not the only way to notify about anomalies. Poisoned data entries / canaries, outbound traffic which should never exist, unexpected DNS queries, and many others will trigger regardless of DDoS.


You are assuming everyone has their sh*t together, which is often not the case.


Are there any precedents?


Could also be something really petty, like Gandhi shutting down a malware domain.


Could be, also they could be showing off their capacity.


Can someone change the title to "We are under DDos" for grammatical correctness? It's correct on gandi.net's site.


OP here. They corrected later.

Screenshot I took at that time:

https://imgur.com/yeFkbCM


It gave me a nice chuckle.


I read it in Kevin Hart's voice followed by his famous "Help me!"[0].

0.https://youtu.be/3bBahi0y970


Agreed but it is a little insensitive


I found it humorous that the title was insinuating they werent DDoSing enough. What did you find insensitive about it?


Disturbing Disruption of Sentence

Disavowal? Disavowel? :)


It somehow reinforced a sense of urgency for me.


They are french... they should change it to “we are sur le ddos”


they should use cloudflare, such a rookie mistake.


Does cloudflare use cloudflare?


Cloudflare, the solution for no problem... I don't believe in DDOS without any proof. Imo they just have some performance problems to solve. I think the DDOS would magically stop after Database Maintenance on Jan 25.


Look at DAnon over here




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: