Hi Romeo, Perhaps you can share more details in the member only part of the next DNS-OARC session? Jacques
> -----Original Message----- > From: dns-wg [mailto:dns-wg-boun...@ripe.net] On Behalf Of Romeo Zwart > Sent: December-15-15 12:48 PM > To: Brett Carr > Cc: RIPE DNS Working Group > Subject: Re: [dns-wg] RIPE NCC Authoritative and Secondary DNS services on > Monday 14 December > > Hi Brett, > > On 15/12/15 18:25 , Brett Carr wrote: > > Thanks for the information Romeo I wonder if perhaps you would consider > doing a presentation at the next WG meeting on the issues you encountered > and mitigation techniques you used. > > We will consider it. As you will understand, and will have noticed in our > communication about this, we are trying to balance providing operationally > relevant information about the event with a desire to not aid in designing any > future events. So the information we give will likely be unsatisfactory for > many people in the technical audience we have here. > > However, we might be able to present more information in a somewhat > generalised way that is still useful to the community. As said, we will > consider > it. > > Regards, > Romeo > > > > > Thanks > > > > Brett > > > > -- > > Brett Carr > > Senior DNS Engineer > > Nominet UK > > > >> On 15 Dec 2015, at 12:35, Romeo Zwart <romeo.zw...@ripe.net> wrote: > >> > >> Dear colleagues, > >> > >> Yesterday, Monday 14 December 2015, RIPE NCC Authoritative DNS > >> services were functioning in a severely degraded state during parts of the > day. > >> > >> This was due to an attack on one of the ccTLDs for which the NCC > >> hosts a secondary DNS service. The attack traffic started around > >> 08:00 UTC. RIPE NCC staff applied various countermeasures during the > >> day. These mitigations were effective for some time. However, after > >> implementing each of these mitigations, the traffic patterns were > >> modified to evade them. Towards the end of the day, the volume of the > >> attack traffic targeted at our servers had increased to such a level > >> that it was overloading our incoming links and our mitigation > >> measures were no longer sufficiently effective. > >> > >> At that time we were forced to contact our upstream peers to assist > >> us with mitigation measures. Apart from the ccTLD service for the > >> attacked domain, normal services were restored at around 18:30 UTC. > >> > >> The attack is ongoing, and we continue with mitigation measures in > >> order to provide the best service possible under the circumstances. > >> > >> We note that attacks like this rely on spoofing source addresses in > >> the attack packets. Therefore, Source Address Validation and BCP-38 > >> should be used wherever possible to reduce the ability to abuse > >> networks to transmit spoofed source packets. > >> > >> Kind regards, > >> Romeo Zwart > >> > > > > >