Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I typically find myself off set with every new Cloudflare offering, followed by wondering if they are reaching for a niche outside of DDOS protection.

I'm not in a position to explore a need for Cloudflare outside of hiding my origin IP addresses, but for those of you who are, are you actually using and benefiting from the wide array of offerings from Cloudflare? As it stands now, I see these announcements and make a mental note to expect a slough of marketing emails in my inbox for the next couple weeks.



Yes, they have plenty of customers benefiting and are one of the few companies that are constantly innovating with new features, especially with content delivery performance and security. As much as I dislike network consolidation into a handful of companies, there are not many real competitors for the features and value of Cloudflare.


I thought I made it clear that I realized that when I asked for other people's opinions.


Speaking about consolidation, sometimes it looks like AOLv2 (or MSNv2) is coming, with Cloudflare on transport layer, Google on WWW layer on top of it, and Facebook on social layer on top of it.


Nice edit. Were the downvotes getting to you?


Nope.


I basically use Cloudflare for dns management, they make it so easy....


I use a ton of registrars, almost all have equal simple dns management as CF. Which requires a party less to use or leak traffic information to.


What is the turnaround time for DNS to propogate on all of those registrars? Are you forced into waiting for TTL's to expire?

I may be wrong but I think eugeneionesco is referencing instant DNS changes which come as a benefit of using Cloudflare and other large DNS management companies. I've never personally seen a registrar offer anything like that.


Almost instant DNS change is something that I kinda take for granted. Surprising that's so rare...


well ... the protocol was designed not do that.

DNS is "just" a globally distributed, eventually consistent, key:value store, with a ton of caching built into it.

Also, while it may look instant to you, it may not be to your customers / users / other internet people.


While DNS caches can sometimes impact DNS updates, we rebuild the entire zone file when a DNS value is updated, and purge the previous cache. Even for customers, this should happen pretty quickly. We maintain a 5 minute TTL on all proxied records internally. So, this happens much faster than most other DNS services.


Yeah - that's a pretty standard way of doing things, and thats how DNS servers themselves will operate (mostly) when you make an update to a recordset.

Its not your cache that is the issue.

People have miss behaving caches, that do not always respect TTLs, some apps can cache the DNS response (I remember a Java issue where the initial value found was cached for the lifetime of the process!).


The TTL publicly is static and doesn't matter. The resolver you hit will just point to Cloudflare NS. Why we are faster, is because we point internally, and we don't have misconfigured TTLs or caching (I mean, things happen but it's not common). So once you update the global resolvers your visitors would hit to point to CF, their cache/TTL should never matter since we dictate where our internal DNS points the requested record.


That is not how resolution works.

What happens is:

#1 - Application (browser, chat client, etc) gets FQDN. It checks if it has the recordset in its cache, and if the TTL is expired.

#2 - Application asks the OS for the recordset. The OS checks its cache, and TTL expiry.

#3 - OS asks the configured local DNS resolvers for the recordset. They check their cache, and TTL expiry.

#4 - These resolvers ask the configured upstream resolvers (e.g. ISP for most home users). They check their cache, and TTL expiry. (This step can repeat, depending on how networks are configured. E.G. ISPs may have DNS resolvers per city, which ask central servers)

#5 - If all of those previous steps fail (the recordset is not cached, or the TTL is expired) the last resolver in the chain will ask the root for the NS records of the zone, which will get fresh records from CloudFlare.

Remember - any of these recursive DNS servers could have an override to cache the recordset for longer than the publicly defined TTL. This is not as much of an issue anymore, but it used to be a massive one.

And this is before applications decide that they know better. - see http://docs.oracle.com/javase/8/docs/technotes/guides/net/pr... (networkaddress.cache.ttl section)


what mugsie wrote plus.. My post was regarding the management of the zonefile/domain, not so much performance or things related to TTL.

What exactly if your function at CloudFlare Jake? Pondering if this is more marketing then technical/service function. Any chance you are in charge of social media and forum posts about CF?


This is a secondary issue. Lots of shitty DNS hosts do not immediately start serving the new records when you push an update.


It's instant because CloudFlare isn't changing DNS records, just where its pointers point to.

Look at it / try it.


Their DNS changes are fast even when the site is not being proxied through CF.


Yeah - the global propagation time from you hitting save, to it being live in all their POPs is impressive.

As a reformed Akamai DNS customer it is like time travel :D


I have, and I use it.

Thats not DNS, that is global load balancing.

Try using something other than HTTP over that FQDN.


are you one of those people running DNS with TTL measured in tens to hundreds of seconds?


You don't leak any traffic information if you don't enable the proxy, which I don't.

I like the simple easy to use interface and the fact that all the domains that I manage are there, no need to login to multiple registrars.


I believe DDOS-repelling service is an intended consequence of their global CDN, not its purpose. Its purpose is speeding things up for users.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: