Same question as for the root incident - would you be willing to share
more information OTR with software implementors (such as well, me)?
Pinky swear that I'm not the perpetrator.
Best,
Marek
On 15 December 2015 at 18:48, Romeo Zwart wrote:
> Hi Brett,
>
> On 15/12/15 18:25 , Brett Carr wrote:
Hi Brett,
On 15/12/15 18:25 , Brett Carr wrote:
> Thanks for the information Romeo I wonder if perhaps you would consider doing
> a presentation at the next WG meeting on the issues you encountered and
> mitigation techniques you used.
We will consider it. As you will understand, and will have
Thanks for the information Romeo I wonder if perhaps you would consider doing a
presentation at the next WG meeting on the issues you encountered and
mitigation techniques you used.
Thanks
Brett
--
Brett Carr
Senior DNS Engineer
Nominet UK
> On 15 Dec 2015, at 12:35, Romeo Zwart wrote:
>
>
On 15 Dec 2015, at 18:25, Brett Carr wrote:
>
> Thanks for the information Romeo I wonder if perhaps you would consider doing
> a presentation at the next WG meeting on the issues you encountered and
> mitigation techniques you used.
>
> Thanks
>
> Brett
>
+1
Cheers,
--
Nico
Dear colleagues,
Yesterday, Monday 14 December 2015, RIPE NCC Authoritative DNS services
were functioning in a severely degraded state during parts of the day.
This was due to an attack on one of the ccTLDs for which the NCC hosts a
secondary DNS service. The attack traffic started around 08:00 U