frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

How to Recover Your Stolen Crypto After a Scam–Guidance from Intelligence Wizard

1•Petersrobert•1m ago•0 comments

Do AI Agents Make Money in 2026? Or Is It Just Mac Minis and Vibes?

https://www.siliconsnark.com/do-ai-agents-actually-make-money-in-2026-or-is-it-just-mac-minis-and...
1•SaaSasaurus•1m ago•0 comments

Underground Salt Caverns Are Preserving Our History

https://eos.org/features/salt-of-the-earth-vast-underground-salt-caverns-are-preserving-our-histo...
1•sohkamyung•2m ago•0 comments

One-Stop Wan AI Video and Image Generator Platform

https://towan.net/
1•seagnson•3m ago•1 comments

Show HN: Ask Mob

https://mob.army/
1•cc-d•10m ago•0 comments

Show HN: A Kotlin Multiplatform app that works on watch, CLI, browser extension

https://arnav.tech/architecting-twofac-my-journey-into-kotlin-multiplatform-module-structure
1•championswimmer•10m ago•0 comments

NY bill would prohibit AI chatbots from giving legal advice

https://twitter.com/RobertFreundLaw/status/2028550955386704285
4•timr•13m ago•0 comments

Show HN: Generate random, valid US residential addresses for testing

https://meiguodz.com
2•roookiecookie•14m ago•0 comments

Unbound Video AI is the most unrestricted AI video tool I've tried in 2026

https://unbound.video
1•gabrieln•16m ago•1 comments

A timeline of cyber attacks:home users, contractors, and SMBs are now targets

2•EricAUS•18m ago•0 comments

Iran unleashes Shahed drones aimed at targets across Middle East

https://www.theguardian.com/world/2026/mar/02/iran-unleashes-hundreds-of-drones-aimed-at-targets-...
4•0in•19m ago•0 comments

Shutting down, open sourced private AI document server

https://github.com/queryhat/super-hat
3•chhetri978•21m ago•3 comments

Zuckerberg's internal emails rendered as Facebook Messenger

https://zuckmail.vercel.app/
2•not-chatgpt•23m ago•0 comments

Daily LNG freight rates jump over 40% amid Mideast strikes

https://www.reuters.com/business/energy/daily-lng-freight-rates-jump-over-40-amid-mideast-strikes...
4•geox•23m ago•0 comments

Solar Time vs. Standard Time heat map chart

https://blog.poormansmath.net/images/SolarTimeVsStandardTime.png
1•ivewonyoung•24m ago•0 comments

Show HN: One-click ComfyUI setup for RTX 50-series on Windows (cu130, no Docker)

https://github.com/hiroki-abe-58/ComfyUI-Win-Blackwell
1•GeneLab_999•25m ago•0 comments

Ask HN: Codex CLI error reveals "GPT-5.4-ab-arm2" string

1•quantisan•27m ago•1 comments

The Optimization Trap: Why the Birth Rate Can't Be Fixed

https://tantaman.com/2026-03-02-fertility-is-not-economics.html
1•tantaman•27m ago•1 comments

OpenAI, Pentagon add more surveillance protections to AI deal

https://www.axios.com/2026/03/03/openai-pentagon-ai-surveillance
2•foobarqux•28m ago•3 comments

Meteorologist warns federal cuts are undermining weather forecasts nationwide

https://www.lehighvalleynews.com/environment-science/local-meteorologist-warns-federal-cuts-are-u...
1•mkmk•30m ago•0 comments

Decimal Time (French Republican Clock)

https://en.wikipedia.org/wiki/Decimal_time
1•rawgabbit•34m ago•0 comments

Made a register-based bytecode VM in C, heres how the handler table works

https://github.com/goofgef/ZagMate
1•goofgef•41m ago•1 comments

The exploitation paradox in open source

https://lwn.net/SubscriberLink/1058031/a1b77f8039faed6c/
1•pabs3•44m ago•0 comments

Coasty automates anything – this post was written by the CUA itself

1•PrateekJ17•45m ago•1 comments

"Here is a re-post of an internal note"

https://twitter.com/sama/status/2028640354912923739
3•davidbarker•45m ago•1 comments

Ars Technica Fires Reporter After AI Controversy Involving Fabricated Quotes

https://futurism.com/artificial-intelligence/ars-technica-fires-reporter-ai-quotes
2•danso•49m ago•0 comments

Show HN: PHP 8 disable_functions bypass PoC

https://github.com/m0x41nos/TimeAfterFree
15•m0x41nos•49m ago•3 comments

Anthropic Adds Free Memory Feature and Import Tool to Lure ChatGPT Users

https://www.macrumors.com/2026/03/02/anthropic-memory-import-tool/
2•mgh2•49m ago•0 comments

LibreOffice hits back at critics, says its UI is better than Microsoft Office's

https://www.neowin.net/news/libreoffice-hits-back-at-its-critics-says-its-ui-is-better-than-micro...
7•bundie•54m ago•5 comments

Dyndispatch – Dynamic Dispatch for Python

https://git.sr.ht/~shakna/dyndispatch
2•shakna•54m ago•0 comments
Open in hackernews

Recovering from DNS Outages in Distributed Systems

https://singh-sanjay.com/2026/02/18/dns-the-silent-killer-of-distributed-systems.html
2•singhsanjay12•1h ago

Comments

singhsanjay12•1h ago
DNS keeps showing up in outage postmortems, but what's often missing is discussion about recovery, not just prevention.

In this post, I break down common DNS failure patterns (TTL propagation, resolver overload, control plane dependency loops) and why recovery can deadlock when your tooling itself depends on DNS.

I'd love to hear how others design around this:

Do you use DNS-independent fallbacks?

Static seed lists?

Separate control plane resolution?

Aggressive caching vs short TTLs?

Curious what patterns have worked (or failed) in real systems for folks.

Bender•1h ago
For me and also the place I retired from the optimal solutions was an instance of Unbound [1] on every node keeping local cache, retrying edge resolvers intelligently, preferring the fastest responding edge resolvers, cap on min-ttl or both resource records and infrastructure, pre-caching, etc... I've done that at home and when others talk about a DNS outage I have to go out of my way to see or replicate it usually by forcing a flush of the cache.

Most Linux distributions have a build of Unbound. I point edge DNS recursive resolvers to the root servers rather than leaking internal systems requests to Cloudflare or Google. Unbound can also be configured to not forward internal names or to point requests for internal names to specific upstream servers.

[1] - https://nlnetlabs.nl/projects/unbound/about/

singhsanjay12•1h ago
Nice. Running Unbound locally with intelligent upstream selection and caching definitely reduces blast radius from edge resolver outages.

I haven't tried Unbound but I’m curious though, how do you handle recovery behavior when the failure isn’t just recursive resolver unavailability, but scenarios like stale IPs after control plane failover, or long-lived gRPC connections that never re-resolve, or bootstrap loops where the system that needs to reconfigure DNS itself depends on DNS?

In my experience, local recursive resolvers solve availability pretty well, but recovery semantics still depend heavily on client behavior and connection lifecycle management.

Do you rely on aggressive re-resolution policies at the application layer? Or force connection churn after TTL expiry?

Would love to understand how you think about resolver-level resilience vs application-level recovery.

Bender•1h ago
stale IPs after control plane failover

We did not have to do this but in that scenario I would have automation reach out to Unbound and drop the cache for that particular zone or sub-domain. A script could force fetching the new records for any given zone to rebuild the cache.

Or force connection churn after TTL expiry?

The TTL can be kept low and Unbound told to hold the last known IP after resolution accepting this breaks an RFC and the apps may hold onto the wrong IP for too long and then Unbound will request it from upstream again to get the new IP. There is no one right answer. Whomever is the architect for the environment in question would have to decide with methods they believe will be more resilient and then test failure conditions when they do chaos testing. Anywhere there is a gap in resilience should be part of monitoring and automation when the bad behavior can not be eliminated through app/infra configuration.

how you think about resolver-level resilience vs application-level recovery

Well sadly the people managing or architecting the infrastructure may not have any input into how the applications manage DNS. Ideally both groups would meet and discuss options if this is a greenfield deployment. If not then the second best option would be to discuss the platform behavior with a subject matter expert in addition to an operations manager that can summarize all the DNS failures, root cause analysis and restoration methods to determine what behavior should be configured into the stack. Here again there is no one right answer. As a group they will have to decide at which layer DNS retries occur most aggressively and how much input automation will have at the app and infra layers.

The overall priority should be to ensure that past DNS issues known-knowns are designed out of the system. That leaves only unknown-unknowns. to be dealt with in a reactive state, possibly first with automation and then with an operations or SRE team.

Take a look through the Unbound configuration directives [2] to see some of the options available.

[2] - https://nlnetlabs.nl/documentation/unbound/unbound.conf/

singhsanjay12•59m ago
This matches what I've seen too.

Resolver-level resilience is often manageable centrally. The harder part is application-level recovery; especially in larger orgs where DNS behavior spans multiple teams.

Even with low TTLs or cache flush automation, apps may: resolve once at startup or hold long-lived gRPC/TCP connections, or even worse -> ignore TTL semantics entirely

So infra assumes "DNS healed," but the app never re-resolves.

Bender•53m ago
or even worse -> ignore TTL semantics entirely

I sense you may have java in your environment and are probably used to

    export JAVA_OPTS="-Djava.net.preferIPv4Stack=true -Dnetworkaddress.cache.ttl=0"
or something along that line including other options. At least I tried to get teams to use those and then rely on Unbound DNS cache and retry schemes. SystemD also has it's own resolver cache which can be disabled and told to use a local instance of Unbound. Windows servers require Group Policy and registry modifications to change their behavior.

One of my pet peeves is when groups do not manage domain/search correctly and they do not use FQDN in the application configuration resulting in 3x or 4x or more the number of DNS requests which also amplifies all DNS problems/outages. That really grinds my gears.

And of course if the Linux system uses glibc, editing /etc/gai.conf to prefer IPv4 or IPv6 depending on what is primarily used inside the data-center makes a big difference.