Settings

Theme

Issues with 1.1.1.1 public resolver and WARP

cloudflarestatus.com

183 points by WayToDoor 2 years ago · 117 comments

Reader

sillysaurusx 2 years ago

Note that if you use 1.1.1.1, you apparently can't visit archive.is links. I'm not sure why, but around a dozen people on HN have confirmed this. (At least as of a couple months ago.)

I think the world could use more alternatives to 8.8.8.8. Hopefully 1.1.1.1 will become more reliable as the years tick by.

(Do you use something besides 8.8.8.8 or 1.1.1.1? If so, post it here! Collecting reliable DNS servers might be a niche hobby, but it's a fun one. I was going to suggest 9.9.9.9 aka Quad9, but apparently it comes with strings attached. https://news.ycombinator.com/item?id=16728214)

  • cmeacham98 2 years ago

    As neutrally as possible:

    Cloudflare doesn't support the DNS Extension that sends part of clients' IPs to the upstream resolver (https://en.m.wikipedia.org/wiki/EDNS_Client_Subnet). Cloudflare believes this is better for privacy.

    Archive.is doesn't like this (because it prevents DNS-based CDN routing), and thus has a hardcoded exception to intentionally return bogus results to Cloudflare's resolvers.

    • 542458 2 years ago

      I think it's also worth noting that Cloudflare's implementation is EDNS compliant. The EDNS extension for sending the client subnet is explicitly optional in the standard.

    • silotis 2 years ago

      Cloudflare's lack of EDNS doesn't prevent DNS based routing. It can still be done based on the DNS request's source address. This will be the IP of the Cloudflare POP closest to the client.

      Lack of EDNS only makes DNS based routing slightly worse if your CDN has a POP density similar-or-greater-than Cloudflare's.

      • Scaevolus 2 years ago

        Correct. Cloudflare's POP routing is quite extensive, and I'd be shocked if archive.is had more than a handful of backends it's routing to.

        Even so, why would an extra few dozen ms matter at all? Archive.is appears to be spindle-limited, is a client with marginally higher RTT an issue? The admin is silly.

        https://www.cloudflare.com/network/

        • jrochkind1 2 years ago

          It seems so silly and mysterious that it makes me wonder if archive.today wants exact client IP addresses for some other unstated reason. (It's not clear how/if archive.today, a possibly illegal site, brings in revenue?).

          The whole thing is very odd.

          • depr 2 years ago

            There is another reason but it is stated here: https://news.ycombinator.com/item?id=36971650 (routing people to the nearest server _outside_ their own country).

          • arkadiyt 2 years ago

            > it makes me wonder if archive.today wants exact client IP addresses for some other unstated reason

            They still get the client ip from the request to the service itself (unless you're using a VPN, but if you're using a VPN then archive wouldn't get your ip from your DNS request either).

        • mike_d 2 years ago

          Do you happen to have a mapping of Cloudflare IP space to physical POPs?

          To the best of my knowledge they do not publish this, which makes it quite a chore to track all their edge locations manually.

          • Scaevolus 2 years ago

            You could probably take their network map SVG and convert the circle coordinates from integer Mercator projection points to lat/lon pairs, and then map them to cities.

    • tomrod 2 years ago

      > thus has a hardcoded exception to intentionally return bogus results to Cloudflare's resolvers.

      This is a bad practice.

    • eli 2 years ago

      It prevents DNS-based CDN routing in the particular way Archive wants to do it.

    • handsclean 2 years ago

      There are two missing facts here that change the story quite a bit:

      - In addition to not supporting EDNS, Cloudflare sends DNS requests from effectively random PoPs, so the recipient doesn’t know even the visitor’s nationality.

      - The reason archive.is doesn’t like this is it makes them vulnerable to DoS attack.

      Source and details: https://news.ycombinator.com/item?id=36971650

    • andrewla 2 years ago

      If I understand this correctly, that's hilarious -- Cloudflare is essentially saying that nobody can layer their own cloudflare-like offering on top of their DNS. Edge-routing is their bread and butter!

      If you want to use the client's IP geolocation to resolve a CNAME to an edge server, this blocks you from doing so. You have to buy Cloudflare's products to get this benefit, and use their edge servers.

      • NicoJuicy 2 years ago

        No, they don't, please read this before making unresearched guesses ( note: I had the same reaction at first a couple of years ago).

        They forward every info that is required for cdn's to function, that's why no other cdn's are complaining.

        See the statement of the CEO:

        https://news.ycombinator.com/item?id=19828317

        Tldr:

        > We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results. For a relatively small operator like archive.is, there would be no loss in geo load balancing fidelity relying on the location of the Cloudflare PoP in lieu of EDNS IP subnets.

        We are working with the small number of networks with a higher network/ISP density than Cloudflare (e.g., Netflix, Facebook, Google/YouTube) to come up with an EDNS IP Subnet alternative that gets them the information they need for geolocation targeting without risking user privacy and security.

        • andrewla 2 years ago

          Thanks for the clarification and link!

          I do think that this has the effect of locking customers into Cloudflare's geoip data, which seems a little sketchy. The operator of archive.is claims that the data itself is bad[1] but I can't speak to his biases or motivations.

          If the data is incomplete or bad, then you gain an advantage by using Cloudflare's services over rolling your own or using a competitor if a large number of customers are using their DNS, so I think the original point does stand. And if you are a competitor, your ability to compete with greater edge capacity or more targeted edge capacity is nonexistent.

          [1] https://twitter.com/archiveis/status/1018691421182791680

          • NicoJuicy 2 years ago

            I would doubt the owner has a bigger network than cloudflare as their cdn.

            If you're cdn is Azure, GCE, or AWS, than you're cdn is spread over the regions that their cloud offers. You still have no use-case to know more.

            So, who? There isn't a provider atm in the world. So the issue at hand is currently not existent, as far as I'm aware.

            • andrewla 2 years ago

              Let's say you have more fine-grained capacity in a given metro than Cloudflare has in an attempt to provide additional value in that metro than Cloudflare can offer. You are blocked from doing so if endusers are using Cloudflare DNS.

              I don't know if this is happening at the moment, but it's pretty clear that there is no real incentive to even attempt this given that you simply will not be able to offer any benefits because you don't have the data.

              • NicoJuicy 2 years ago

                Who would set up ( or use) a dns that is better in 1 metro in the world? Do you?

                The example given doesn't make any sense.

                You're just giving an ideological example. Not one that occurs in the real world.

                Here is one that actually happens: Using cloudflare DNS to protect privacy is one that occurs in the real world and eg. Apple is using them for exactly that.

                But let's repeat:

                > We are working with the small number of networks with a higher network/ISP density than Cloudflare (e.g., Netflix, Facebook, Google/YouTube) to come up with an EDNS IP Subnet alternative that gets them the information they need for geolocation targeting without risking user privacy and security.

            • pseg134 2 years ago

              Yeah, so cloudflare is making sure no one else can compete.

              • NicoJuicy 2 years ago

                Didn't read the last alinea?

                > We are working with the small number of networks with a higher network/ISP density than Cloudflare (e.g., Netflix, Facebook, Google/YouTube) to come up with an EDNS IP Subnet alternative that gets them the information they need for geolocation targeting without risking user privacy and security.

                ---

                I don't know what happened between that statement and now. Since they were working together with eg. Google to solve it.

                Still. No example? So not an issue now?

  • LinuxBender 2 years ago

    Do you use something besides 8.8.8.8 or 1.1.1.1?

    99% of the time I just talk directly to the root servers from my home network and pre-cache the most popular places I visit. Unbound also supports DoH but most distributions of Linux do not enable that compile time flag in their Unbound package build and I have long since stopped compiling things as most distributions finally started using the right security options in their builds. I also have DoT running at home which the cell phone figured out on it's own.

    I keep DoT Unbound DNS running on several VPS providers that also talk directly to the root servers just in case. Useful for cell phones. My ISP is a tiny community ISP and would never filter any results and DNS privacy is just one tiny piece of browsing habits. Until encrypted SNI is fully adopted by all SSL libraries and applications they can still see where I browse unless I am using my own Tinc VPNs or SSH tunneling.

    • lxgr 2 years ago

      > I just talk directly to the root servers from my home network and pre-cache the most popular places I visit.

      Out of curiosity: Why, if you generally trust your ISP? Do you get worse performance using their DNS servers?

      • LinuxBender 2 years ago

        I prefer to use my own server as I can optimize cache hit ratios for the things I request. This makes the internet perceptibly faster for me and others on my network. I can also pull statistics from my server whereas I would have to beg someone at the ISP for that data as a one-off request. This also gives me the option to block domain names used for dark patterns or outright malevolent behavior. I also have control over the upper and lower limits of cache and I can flush to cache if a website is still relying upon DNS failover vs BGP Anycast but I have not run into that for about a decade.

        Speaking of stats, I can also see what IoT/Cell devices are requesting to keep an eye on their behavior and look for interesting patterns of DNS requests.

        I have honestly never used the ISP DNS servers so I don't know what their performance is like. It's just muscle memory for me to set up my own home Linux router to be a DNS server. I highly doubt they could top the performance of Unbound and cron-jobs that request commonly used records on an hourly basis. I do know that my performance is better than talking to the DoH/DoT servers on the internet. The cached record response time is in microseconds vs 23ms for CF and non cached response time is generally between 50ms and 70ms vs 80ms to 160ms for CF not-cached.

        Another nifty option in Unbound is to cache the "Infrastructure" records and to "Keep Probing" multiple nodes. This combines into a nice balance of speed and resilience especially if someones name server is having a moment but their status page is green.

            unbound-control dump_infra|wc -l
            1235
        
        These numbers are thrown off a bit by my cron jobs that are requesting things that I am not visiting all the time and when the authoritative record is sub 3600 seconds. They are requested hourly. Some of the government domains in my cron job seem to be throwing off the curve, I will reach out to them.

            total.num.cachehits=20949
            total.num.cachemiss=8010
            total.num.prefetch=753
            total.recursion.time.median=0.0698958
        • lxgr 2 years ago

          Interesting, thank you!

          Yeah, local caching is a good point if your operating system(s) doesn't already do it in the DNS client.

          > This also gives me the option to block domain names used for dark patterns or outright malevolent behavior.

          I wonder how long this will actually remain possible, given that with DoH it now seems entirely feasible for websites to provide their own application-level DNS resolver?

          • LinuxBender 2 years ago

            Interesting, thank you!

            You're quite welcome!

            I wonder how long this will actually remain possible, given that with DoH it now seems entirely feasible for websites to provide their own application-level DNS resolver?

            For me, forever. Applications can not bypass my DNS unless they are hard coding IP addresses in the application. Windows Update does have some hard coded IP addresses it can fall back on.

            It is often said that DoH can't be blocked because in theory it can be hosted on any generic CDN IP pool but to my knowledge this has never been the case. It's quite the opposite, most DoH/DoT providers try to use vanity IP addresses. I null route them and NXDOMAIN the canary domain use-application-dns.net which is entirely optional but a nice gesture to applications to behave. Some vendor may decide one day to host their own DoH/DoT servers but I suspect I would learn about them. I would likely just avoid buying/using that device/application.

            Perhaps some day a DoH provider may be so bold as to use a generic CDN pool and I will have to address that issue when it arises. I suspect this would be more challenging for the provider as the app/device will need a way to discover this pool DNS name, HTTP headers, API calls, etc... unless they hard code IP's. Either way I could dynamically null route them.

            • shagie 2 years ago

              Tangentially related: My Chromecast Ultra would not start until I began answering 8.8.8.8 --- https://news.ycombinator.com/item?id=19170671 (2019; 509 comments)

              The original post for that is https://mailarchive.ietf.org/arch/msg/dnsop/WCVv57IizUSjNb2R... from Paul Vixie

              Also:

              An Internet Born In a Threat-Free Environment - https://www.recordedfuture.com/podcast-episode-201 (2021)

              Paul Vixie and Peter Lowe on Why DoH is Politically Motivated - https://www.dnsfilter.com/blog/paul-vixie-and-peter-lowe-on-... (also from 2021)

              • LinuxBender 2 years ago

                That is a good write-up on Paul's comments. I think he has an account here on HN. I recall discussing similar concerns here on HN when the protocol was first being discussed but I think most of my concerns were largely ignored. People were enamored by the idea of DoH but I see it as exacerbating a few problems.

                It does not really address the issue of privacy unless one is only making DNS requests and not doing anything with said DNS results, as encrypted SNI is still not widely adopted. I guess I would call that cart before the horse. It does not prevent an abusive ISP from blocking access to a site as they can just block all the DoH resolvers or just NXDOMAIN the canary domain which also turns it off by default on most browsers. The bigger issue to me is that it doubles the number of organizations that can track behavior. Now my ISP gets this data and so does Cloudflare if I am the type to leave things default as most people are and they know it. CF may not wish to block something but should they receive a court order from any country they do business in then most people will lose access to something. That could be a future phase we have not yet reached due to mass adoption not reaching a set goal at this time. This is also a one-stop-shop for law enforcement to gather browsing data vs. having to issue a court order to each ISP.

                Some people mention it protects against rogue nations but they are by far the last people that DoH would be useful for. Rogue / bad / totalitarian nations will just null route anything they suspect to be a DNS servers not in their control and will extract people from their homes to re-educate them. In a way I can see DoH as being a risk to people in such situations. Meaning they could be accused of bypassing some state level control and may not even realize they were.

                In my opinion DoH/DoT should have been highly customizable in a GUI before it was ever implemented and default-off, default opt-out settings and instead if the browser or ideally the OS recognizes it is in a shared WiFi then maybe prompt the person to temporarily enable DoH. That's another issue, it's in the browser and not the OS. So the browser gets protection but nothing else does at least for the last few years. That is coming soon to some operating systems. Curious if they make it obvious what DNS partnership is in place.

            • lxgr 2 years ago

              > Applications can not bypass my DNS unless they are hard coding IP addresses in the application.

              That's what I mean: What if websites and applications just start querying IP addresses for the hostnames they want to connect to over DoH (to api.someapp.com, so you can't distinguish it from a regular API call that you want to allow for the app to work), and then connect to the resolved IP directly?

              • kxrm 2 years ago

                I reroute all DNS queries attempting to leave my network to my DNS server. It won't work in scenarios where there is DoH without user consent, however at that point I should reconsider purchasing such hostile devices.

              • Bender 2 years ago

                The heavy-handed solution looks like this:

                    local-zone: "api.someapp.com." always_nxdomain
                
                Then I reach out to them and say something to the effect of, "Hey, nice application/device you have there! In order for anyone on my network to utilize this app/device the DNS would need to be put back into your DNS servers and removed from the API records." Of course they will laugh at me but that is fine given that 100% of the internet and internet connected devices are entirely optional for me. It is unlikely that a statistically significant number of people would use this heavy handed approach. Or perhaps I am OK with their API method and make use of their API that bypasses DNS. This probably depends on if this is malicious or not. i.e. serving ads or malware

                Another heavy-handed option would be to force all traffic through a MITM proxy which I have done in the past. Any device that can't have my CA cert loaded would be a paperweight and thus returned to Amazon with less than 5 stars and a review that details the DNS implementation which most customers would not care about or understand but my fellow cranky network admins may find useful. If it's a website then I would just not use it. Some businesses take this approach. There are both commercial and open source solutions for this. Look for Squid SSL-Bump MITM proxy if one is curious. This requires bypasses for domains still using public key pinning which is an insignificant number of them. Most have moved away from HPKP due to the induced fragility and risks.

                There are other methods but they come with security implications such as decompiling applications, shimming something into it or pre-loading libraries to do the same thing but this usually requires rooting a device and potentially compromising security as the vendor signing may be removed. I'm sure some of the mobile developers here have more elegant and secure methods.

                I doubt many would do any of this of course, but you asked.

        • fsmv 2 years ago

          But your home DNS server has to talk to some other server to get the IPs right? Usually it's like DNSMasq configured to cache and forward requests to 8.8.8.8 or whatever.

          Is there some other option where you talk directly to the top level DNS root and the nameservers directly??

          Edit: my bad you said you talk to the root servers directly. Not sure how to delete comments

          • LinuxBender 2 years ago

            Edit: my bad you said you talk to the root servers directly. Not sure how to delete comments

            It's still a valid question. You are right, one has to bootstrap the root servers. There are a few ways to do this. Assuming one had working DNS server at some point in the past they can

                dig @e.root-servers.net +nocookie +tries=4 +retry=4 +time=8 . ns | grep -Ev "^;|^$" > /etc/unbound/named_hints.tmp # sanity check this
            
            and then do sanity checks on the output prior to loading it as hints in Unbound DNS. The 3K or so root servers are Anycast IP addresses and rarely change so this file will not be stagnant for a very long time thus making thumb drives a valid way to store and transfer this file.
            • icedchai 2 years ago

              Why not use the root.hints file available for this purpose? https://www.iana.org/domains/root/files

              Generally it is already included with most DNS servers, such as BIND.

              • LinuxBender 2 years ago

                That is useful for the initial bootstrapping but should be updated or at least validated a few times a year. If package maintainers are updating it a few times a year that works too.

                • icedchai 2 years ago

                  Root DNS server IP's do change. However, the old ones stay active for years. Updating your root.hints a few times a year is absolutely not necessary.

    • hk1337 2 years ago

      Pihole is preconfigured to use multiple DNS. I use cloudflare and OpenDNS and exclude Google.

  • iamdbtoo 2 years ago

    The reason has been known for a while now.

    https://news.ycombinator.com/item?id=19828317

  • lxgr 2 years ago

    The operators of archive.* have a peculiar problem with eDNS, or rather Cloudflare’s lack of support thereof. Some details here:

    https://community.cloudflare.com/t/archive-today-works-again...

    • 542458 2 years ago

      Cloudflare supports EDNS, they just don't support the optional EDNS Client Subnet extension.

  • frankjr 2 years ago

    > Note that if you use 1.1.1.1, you apparently can't visit archive.is links. I'm not sure why, but around a dozen people on HN have confirmed this. (At least as of a couple months ago.)

    https://news.ycombinator.com/item?id=19828702

  • shasts 2 years ago

    There is https://www.dns0.eu and https://nextdns.io.

    I like the 300K requests per month free tier that nextdns.io has. Comes with plenty of filters.

    • peddling-brink 2 years ago

      I’m a big fan of NextDNS, ad filters, logs (or not), block list, allow list, multiple profiles, parental-ish controls. They have binaries to add support for DoH to my router. I literally couldn’t be happier with a DNS provider.

      • basch 2 years ago

        My one gripe is with the block / parental controls interface.

        Let’s say you want to block Peacock, and there’s a bunch of urls you want to block, each is it’s own individual rule. If you accidentally delete one instead of disable it, it’s gone. If you can remember the url you accidentally deleted, now it’s placed at the top of the list, out of order. There appears to be no log of changes you make. It would be nice to be able to add custom parental controls with sets/bundles of urls.

        Also you can’t toggle or package ad blocking rules, only delete and add. Sort of the same interface complaint as above. I have to go in and delete four ad blocking packages every time I want to watch Paramount+. Then go find them again when I am done.

    • kmlx 2 years ago

      the marketing copy on dns0 is lol considering the many ISP data retention schemes across EU states.

      > The European public DNS that makes your Internet safer.

      > A free, sovereign and GDPR-compliant recursive DNS resolver with a strong focus on security to protect the citizens and organizations of the European Union.

      for example france: https://www.patrick-breyer.de/en/data-retention-france-illeg...

      > In a decree made public today, French Prime Minister Élisabeth Borne has extended the temporary retention of communications data of all citizens in France for another year. The blanket retention obligation concerns identity data (surname, first name, date and place of birth, postal address(es), e-mail address(es), telephone number(s)) as well as payment information, connection data (IP addresses, port numbers, identification numbers of users and their devices, date, time and duration of each communication, data on supplementary services and their providers)

      they basically collect everything.

    • sambazi 2 years ago

      like i ever wanted to care about the number of dns-requests originating from my systems.

      • ornornor 2 years ago

        300k is a lot to be fair. And if that’s not enough it’s something like 20$ a year. It’s the only way I found to block ads (except in YouTube) on the iPhone.

      • bharathyes 2 years ago

        even beyond that the DNS works fine but the filtering would be turned off.

  • re5i5tor 2 years ago

    Switched off 1.1.1.1 for that reason a while back. Currently using OpenDNS which is now unfortunately owned by Cisco. Definitely a lack of actually open alternatives.

    • dano 2 years ago

      Running your own resolver that points directly to root servers is also an option. https://nlnetlabs.nl/projects/unbound/about/

      It isn't too complicated to set up and provides faster responses than external DNS servers, especially after the cache gets built up a bit.

      • xorcist 2 years ago

        Not too complicated is an understatement. It's literally zero configuration unless you want to do something special.

      • mtsr 2 years ago

        Indeed, this is my preferred solution too. Unfortunately this doesn’t protect one from snooping by network intermediaries, although that’s much less of an issue in the EU due to privacy regulations. At least in principle, but it’s hard to be sure.

        • midasuni 2 years ago

          Run your own resolver on a vpc (perhaps in a different country, pay with bitcoin, adjust on your level of concern) and WireGuard to it (perhaps WireGuard over a service like mullvad)

      • re5i5tor 2 years ago

        Thanks for this, really interesting.

    • johnklos 2 years ago

      Quad9 seems decent. They're certainly not as shitty as Cloudflare or Cisco.

    • yakubin 2 years ago

      I used to use OpenDNS, but then out of nowhere they decided to enable parental control by default[1] and without an account I don’t think I could disable it.

      [1]: Maybe only in EU?

      • xist 2 years ago

        208.67.222.222 / 208.67.220.220 do not have the functionality worldwide. The IPs ending in .123 do have parental control enabled worldwide

    • agloe_dreams 2 years ago

      A Pihole will do what you want with a ton of control added.

      • re5i5tor 2 years ago

        I run Pihole. How does it solve upstream DNS provider troubles; it still needs / uses them? I'll admit there's a lot of Pihole config I have not explored.

    • metabeard 2 years ago

      It's not open, but I'm happy with https://nextdns.io/

    • ElongatedMusket 2 years ago

      It works again, so you can go back to 1.1.1.1

      • re5i5tor 2 years ago

        Thank you, switched back and so far archive.* seems to be working on 1.1.1.1

  • Jnr 2 years ago

    How come archive.is works for me?

    I have set up Cloudflare DoH in my router, I block other popular DoH servers on my network and I also redirect any other DNS queries (UDP 53) to my router's DNS (which in turn uses Cloudflare).

    And at least in my region (EU) I did not notice any issues with 1.1.1.1.

    • yakubin 2 years ago

      Maybe your computer ignores the DNS resolver address suggested by your router? You can check with dig what resolver you’re using, if you’re on a Unix-like system.

      • Jnr 2 years ago

        No, I mean - it uses Cloudflare and it works. I did try with dig. :) Also tried it from other countries in EU, works fine.

  • NicoJuicy 2 years ago

    Well. I used archive.is a lot. But Cloudflare has a point by not making a specific adjustment to fix the archive.is issue ( since it's on archive.is their end).

    So, I don't go to archive.is anymore.

  • lgeorget 2 years ago

    I use OpenDNS. 208.67.222.222 doesn't roll off the tongue (or fingers) as easily as 1.1.1.1 but if you use it frequently enough, you'll remember it.

  • 1vuio0pswjnm7 2 years ago

    As a "collector of reliable DNS servers"^1 I can report there are DoH servers that will actually take a traditional DNS query that does not support EDNS0 and, perhaps using the client IP from the TCP connection, return a response that includes EDNS0 Client Subnet (ECS). Whether the DoH provider is sending the ECS to authoritative servers I do not know, but to me it is quite sad to see this being returned in the response given I did not request it. Anyway, ECS is supposedly the reason 1.1.1.1 does not include DNS data for archive.is

    The site once used a tracking pixel as a poor mans ECS. The client IP address was inserted into the image name. Apparently the operator of the site explained this was used to achieve CDN-like functionality:

    https://news.ycombinator.com/item?id=27501867

    1. Perhaps we should be clear that "servers" here means open resolvers. These servers are of course not authoritative for any name, and generally recursion is slower than iteration, i.e., use of authoritative servers only (fee free to challenge me on this and I will share a citation, although I know this is true from own experiments). Thus "reliable" is perhaps ambiguous. Not all of them always return the same results. Some will return different answers, and not always for "load balancing" reasons. Some may be missing data entirely. Some will return wrong answers, e.g., pretending to be authoritative. Much DNS funny business on the internet today. I gather results from a variety of resolvers, from authoritative servers as well as other sources of DNS data, e.g., public zone files, scans and crawls, and I compare notes; I personally would not feel comfortable using one open resolver (third party DNS) as the source for all DNS data; I could not rely on it. As such, "reliable" is IMHO a loaded term if used to describe open resolvers.

  • Unfrozen0688 2 years ago

    ControlD

    From the makers of Windscribe VPN (Canadian)

    I use the filter that blocks ads and malware 76.76.2.2 76.76.10.2

    https://controld.com/free-dns

    https://docs.controld.com/docs

  • fragmede 2 years ago

    Cloudflare is in the wrong here. Archive.is had to develop a unique CDN system to protect against illegal content being uploaded and immediately reported, which led to server seizures and downtime. Cloudflare's DNS disrupts this system, putting archive.is at risk. Archive.is even offered to proxy Cloudflare DNS users via their CDN, but Cloudflare rejected the proposal. This leaves archive.is in a vulnerable position, and it's unreasonable to expect them to register their own autonomous system just to fix this issue.

  • mhitza 2 years ago

    I use https://www.dns0.eu/ but that doesn't have a fancy IP address

  • anuraaga 2 years ago

    I was using Cloudflare DNS for a while until learning it was the cause of archive brokenness, switched to Google DNS, and recently have started trying out Adguard DNS just out of curiosity of trying out DNS-over-QUIC (requires a VPN app that supports that). Can't say whether it's better or worse but always fun to try out a new tech.

  • beowa 2 years ago

    > Do you use something besides 8.8.8.8 or 1.1.1.1?

    NextDNS

  • jacooper 2 years ago

    You can use quad9 without filters, and i use it because unlike CF it supports EDNS(9.9.9.11)

    • RamblingCTO 2 years ago

      Duuuuuude, thank you so much! I was using 9.9.9.9 and it didn't work for me at all. Got stuck in a loop with the captcha for months now. Archive.is is essential for me. Using 9.9.9.11 fixed it for me.

  • ChrisArchitect 2 years ago

    coincidentally archive.ph links started working for me today, so not sure this is true anymore

quesera 2 years ago

Just a reminder for anyone on the fence, or who has not considered it previously...

Running your own DNS resolver is super easy. It probably has the highest ROI of any self-hosted service, because it is so easy and inexpensive to do.

I recommend Unbound: https://nlnetlabs.nl/projects/unbound

  • lantry 2 years ago

    Plus you can do fun things like block ads across your whole network with tools like pihole.

    • AnonC 2 years ago

      Can you disable the blocking on each device as and when needed (for a little while) and enable it back again (on iOS)? That would be a killer feature for running a DNS server and pi-hole at home.

      • snailmailman 2 years ago

        It has a pretty easy “toggle for 5 mins” button on the dashboard if I encounter issues. It has a few preset time options.

        I think you can set rules per device in Pihole? I haven’t tried personally. I’ve only had set a few (3-4) sites manually allowed through the blocklists.

  • RockRobotRock 2 years ago

    How slow is running your own recursive DNS?

    • quesera 2 years ago

      Depends on a few factors:

      My nameserver, 8.8.8.8, and 1.1.1.1 are all about 25ms away from me. Mine is actually a few ms closer, but that will vary.

      Bigger nameservers will have warmer caches, so first lookup might be a bit slower on my nameserver.

      I presume the big nameservers are managed well under capacity, so load should not be significant.

      All told, I cannot perceive any performance difference at all.

    • AndyMcConachie 2 years ago

      I run my own resolver on my home network and I never notice anything. When loading a webpage or doing pretty much anything else online the DNS delay is negligible. And if the answer is already cached in my house it's definitely faster than having to leave my home network to get a response.

    • rubatuga 2 years ago

      For my DNS resolver I run, it tends to take around twice as long for the initial request compared to other caching resolvers.

    • drexlspivey 2 years ago

      It's actually a lot faster since unbound can prefetch and cache your most common queries. Most lookups in my pihole resolve in sub 1ms

      • RockRobotRock 2 years ago

        Yeah but that's the same as a regular home DNS server that isn't recursive. Your devices also have their own cache.

        • drexlspivey 2 years ago

          The point is that if the TTL is 10mins and you lookup the domain after it expires the regular DNS will go and fetch it, unbound fetches it as soon as it expires and it is already cached

dintech 2 years ago

I’ve just started using Warp+ and it has been excellent for my specific use case: better peering to my Plex server while in another continent. Plex was unusable and now it’s not. Overall very happy despite this brief outage.

  • zozos 2 years ago

    I did not know you can use wrap+ like this. I will try it out as well. Plex has been unusable between continents.

    • jshier 2 years ago

      You can't use Warp+ to control your egress point, unlike many other VPN services, so you can't use it to bypass geographic blocks. However, since Warp+ (not Warp) routes you within Cloudflare's network (using their Argo routing from participating datacenters), I'd guess GP gets a more stable and faster connection to their server than the public internet would provide.

lopkeny12ko 2 years ago

What's the point of having a secondary endpoint 1.0.0.1 if an outage breaks both that and 1.1.1.1? Are these two servers not running in physically isolated regions with independent code deploys?

jshier 2 years ago

They've posted their incident report: https://blog.cloudflare.com/1-1-1-1-lookup-failures-on-octob...

denysvitali 2 years ago

Duplicate: https://news.ycombinator.com/item?id=37762227

lucgagan 2 years ago

Crazy how many things a single thing breaking takes down with it

  • diggan 2 years ago

    Not sure how crazy it is when that single thing's whole business objective is to be between what you're trying to reach and yourself.

    • ornornor 2 years ago

      Wait until you learn about what happens when the electricity stops working

  • luuurker 2 years ago

    And that's why we all use more than one DNS server. Right? :-P

T3OU-736 2 years ago

(Unaffected by this).

Found it the reverse chronological order (with timestamps being a smaller/lighter font, at least on mobile) to have caused extra thinking, which, for a status, seems undesireable.

I get wanting to expose the latest thing first, but the "top-posting" style seems intuitive. Perhaps, as a compromise, a status page would have a "Latest" block at the top, with the timestamp prominent, where the latest known status would be placed by whatever makes the updates, but the updates themselves are in the chronological order?

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection