@techreport{pappas-dnsop-long-ttl-04, number = {draft-pappas-dnsop-long-ttl-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-pappas-dnsop-long-ttl/04/}, author = {Eric Osterweil and Vasileios Pappas}, title = {{Improving DNS Service Availability by Using Long TTL Values}}, pagetotal = 17, year = 2012, month = feb, day = 23, abstract = {Due to the hierarchical tree structure of the Domain Name System {[}RFC1034{]}{[}RFC1035{]}, losing all of the authoritative servers that serve a zone can disrupt services to not only that zone but all of its descendants. This problem is particularly severe if all the authoritative servers of the root zone, or of a top level domain's zone, fail. Although proper placement of secondary servers, as discussed in {[}RFC2182{]}, can be an effective means against isolated failures, it is insufficient to protect the DNS service against a Distributed Denial of Service (DDoS) attack. This document proposes to reduce the impact of DDoS attacks against top level DNS servers by setting long TTL values for NS records and their associated A and AAAA records. Our proposed changes are purely operational and can be deployed incrementally.}, }