Hi Nico,

On 15/11/30 13:36 , Nico CARTRON wrote:
> Hello Romeo,
> 
> On 30 November 2015 at 12:05:03, Romeo Zwart ([email protected]
> <mailto:[email protected]>) wrote:
> 
>> Dear colleagues, 
>>
>> Between about 07:00 and 09:15 UTC today multiple root operators 
>> including K-root were receiving an unusually large amount of query 
>> packets. This was impacting the overall performance of K-root DNS 
>> services, as can be seen for example in DNSMON (with apologies for the 
>> unpleasant URL below): 
>>
>> https://atlas.ripe.net/dnsmon/group/k-root?dnsmon.session.color_range_pls=0-30-30-70-100&dnsmon.session.exclude-errors=true&dnsmon.type=server-probes&dnsmon.zone=k-root&dnsmon.startTime=1448835600&dnsmon.endTime=1448877600&dnsmon.ipVersion=both&dnsmon.server=193.0.14.129
>>  
>>
>> After initial investigation, the RIPE NCC took counter-measures during 
>> the incident. The results of these measures are partially visible in 
>> DNSMON. The full effect of the mitigations implemented roughly coincided 
>> with the end of the event. 
>>
>> We will investigate the events and the effectiveness of our response 
>> further and report about this in the near future. 
> 
> Thanks for  the heads-up - would be interesting to know which
> countermeasures you implemented?

That will be part of the follow up message. To the appropriate level of
detail of course.

Kind regards,
Romeo

> 
> Cheers,
> 
> — 
> 
> Nico
> 


Reply via email to