You are here: Home > Publications > RIPE Labs
RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

104 items matching your search terms
11
More and more governments, authorities and courts are requesting censorship of Internet content. It is often done via a lying DNS resolver. Can we use RIPE ...
12
Much has been said about how Google uses the services they provide, including their mail service, their office productivity tools, file storage and similar ...
13
The first part of this article looked at what happens when an authoritative DNS server delivers fragmented UDP responses to DNS resolvers using IPv6. Now we ...
14
The RIPE NCC's fifth hackathon event will happen in Amsterdam, in April 2017. We would like to invite operators, designers, researchers and developers to take ...
15
By analysing how resolvers select authoritative name servers in the wild we investigated how DNS operators are able to reduce DNS response times.
16
Since 2003, the RIPE NCC’s DNS Monitoring Service (DNSMON), has been providing a comprehensive, objective, and up-to-date overview on the quality of the ...
17
Tony Smith from the APNIC gives an update on the DNS Root Zone Key-Signing and explains how the key-signing-key roll over will be done for the first time.
18
Page - On RIPE Labs
Following my recent research on DNS hijacking and the cases I have personally observed, I wondered whether this is a common practice among the operators. With ...
19
In this article, I'm showing how we can mitigate DNS attacks by implementing a stateless firewall filter at the aggregation or edge router.
20
Open DNS resolvers that answer queries coming from anyone have been the main component of a large number of DDoS attacks in recent years.
104 items matching your search terms