2026年3月30日事件 – 意外CDN缓存
Incident March 30th, 2026 – Accidental CDN Caching

原始链接: https://blog.railway.com/p/incident-report-march-30-2026-accidental-cdn-caching

## 铁路事件总结 - 2026年3月30日 铁路于2026年3月30日UTC时间10:42至11:34期间发生一起重大事件,CDN缓存意外地为约0.05%的域名启用,而这些域名用户并未选择启用。这导致潜在的敏感认证数据被提供给未经授权的用户。 问题源于部署到铁路CDN提供商的配置更新。虽然`Set-Cookie`头部未被缓存,但大多数没有特定缓存指令的GET响应都被缓存,导致用户数据泄露。该更改在52分钟内被回滚并清除了缓存。 铁路已实施预防措施,包括加强预生产测试和更慢、分阶段的CDN发布。受影响的用户将直接收到通知。铁路承认此错误的严重性,并将安全性与稳定性置于新功能开发之上,以重建信任并防止未来发生。更多详细信息请参见其状态页面。

黑客新闻 新的 | 过去的 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 2026年3月30日事件 – 意外CDN缓存 (railway.com) 12点 由 cebert 1小时前 | 隐藏 | 过去的 | 收藏 | 讨论 帮助 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

🚄

Edits have been added to provide additional clarity as of 00:00 UTC, in addition to an update to the title for accuracy

Railway experienced an incident where CDN features were accidentally enabled for some domains without users enabling them.

For those affected, this may have resulted in potentially authenticated data being served to unauthenticated users.

On March 30, 2026 between 10:42 UTC and 11:34 UTC (52 minutes), a Railway engineer rolled out a change causing HTTP GET responses to be incorrectly cached across ~0.05% of domains on Railway with CDN disabled.

During this window, cached responses may have been served to users other than the original requester, which meant potentially unauthenticated data is served to authenticated users.

This meant that, your application may have served requests for one user to a different user.

As a result, for those applications serving on Railway, your users may have seen pages intended for other users.

We take this very seriously, and detail below what happened, how we’ve addressed it, and how we’re preventing it from happening in the future.

On March 30, 2026:

  • 10:42 UTC - A Railway engineer deployed a configuration update to our CDN provider. This accidentally enabled caching for domains that had CDN turned off.
  • 11:14 UTC - First identification of a possible issue, based on internal information + user reports
  • 11:34 UTC - The change was fully reverted and all cached assets were purged globally.

The full incident is available on our Status Page here.

A CDN (Content Delivery Network) caches your application's content at edge servers around the world so it can be served faster to users. On Railway, CDN caching is opt-in. Domains without CDN enabled will always route requests directly to your application.

During this incident, a configuration update accidentally enabled caching on domains that had it disabled. As a result, responses — including authenticated ones (without Set-Cookie) — were stored and served from our edge cache instead of reaching your application directly.

Origin Cache-Control directives were respected where provided, and Set-Cookie response headers were not cached. However, most GET responses without explicit cache headers were cached by default during this window.

Users with domains affected by this incident will be notified via e-mail shortly.

We have already rolled out the following:

  • Additional tests for correct/incorrect caching behaviors before changes are in production
  • Aggressive shard-ing of CDN rollouts over hours as opposed to minutes

We are deeply sorry for this grave error on our part. We have already put mitigations in place to prevent it from happening again (see below), but we realize that incidents like this damage your trust in Railway, which is of paramount importance to us.

We have been working nonstop to keep up with the surge in growth we are experiencing, but will be prioritizing safety and security over new feature development to make sure we avoid similar issues in the future

联系我们 contact @ memedata.com