This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
[dns-wg] Another attack against RIPE Authoritative DNS services
- Previous message (by thread): [dns-wg] RIPE Authoritative DNS services degraded
- Next message (by thread): [dns-wg] Call for presentations RIPE 72
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Romeo Zwart
romeo.zwart at ripe.net
Sat Jan 16 23:03:43 CET 2016
Dear colleagues, This evening, 16 January, between 20:45 UTC and 21:05 UTC, we again received an unusually large amount of incoming traffic on the servers for the RIPE Authoritative DNS services. The volume of traffic was overflowing our inbound connections. It will be clear that this has severely impacted our Authoritive DNS services while the attack was ongoing. This attack was quite similar to the incident we had earlier this week. However, an important difference was that this time the attack traffic was directed at the RIPE NCC DNS services directly. As mentioned in an earlier announcement, we are investigating potential improvements to our infrastructure to increase our mitigation capabilities in case of future incidents. Kind regards, Romeo Zwart
- Previous message (by thread): [dns-wg] RIPE Authoritative DNS services degraded
- Next message (by thread): [dns-wg] Call for presentations RIPE 72
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ dns-wg Archives ]