The issue has been reported to the proper people inside Akamai.  They are 
investigating, we are not ignoring the issue.

If any network with on-net Akamai servers has an issue, including this or any 
other, please e-mail netsupport-...@akamai.com and that will open a ticket with 
our Network Support group.

-- 
TTFN,
patrick


On Jan 21, 2011, at 9:43 AM, Jack Bates wrote:
> On 1/21/2011 8:38 AM, Tom Beecher wrote:
>> Jack-
>> 
>> This is exactly what we're seeing. The Akamai server starts a
>> retransmission flood aimed at a specific address randomly. We're seeing
>> thousands of retransmissions of the same packet over and over again,
>> same sequence/ack numbers, all 1460 bytes. In the last capture I have,
>> it was all JPEG data, although we weren't capturing entire packets.
>> There is a slight difference in the capture payloads, two bytes each time.
>> 
> 
> The content between attacks changes at times, as do the source IPs, as they 
> send different content. We've noticed at least 2 different akamai hosted 
> sites packets being sent.
> 
> 1460 is definitely the number. What gets me is that the 3-way should be 
> complete to allow the 1460, and the modem bank is spamming host unreachable 
> ICMP messages since that IP is offline.
> 
>> I had another dial-up provider contact me off list, and he's seeing the
>> same thing. I'm wondering if this is actually more widespread, but only
>> dial-up providers are really seeing the effects since a 3-5Mbps burst is
>> most noticeable for us on our smaller upstream links. //
> 
> This was my thought, though in my downstream's case, it's saturating his 
> DS-3. The 45mb spikes were just enough for me to barely make it out on the 
> akamai gig-e graphs.
> 
> He's also not always receiving from my local node. Sometimes his other 
> transit links saturate due to remote nodes doing the same thing.
> 
> 
> Jack
> 


Reply via email to