You are here: Home > Publications > RIPE Labs
RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

130 items matching your search terms
21
Much has been said about how Google uses the services they provide, including their mail service, their office productivity tools, file storage and similar ...
22
Since 2003, the RIPE NCC’s DNS Monitoring Service (DNSMON), has been providing a comprehensive, objective, and up-to-date overview on the quality of the ...
23
Page - On RIPE Labs
Following my recent research on DNS hijacking and the cases I have personally observed, I wondered whether this is a common practice among the operators. With ...
24
The DNS is at the core of most interactions on the Internet. Therefore it is essential to ensure proper authentication and encryption of DNS data. There are ...
25
By analysing how resolvers select authoritative name servers in the wild we investigated how DNS operators are able to reduce DNS response times.
26
The first part of this article looked at what happens when an authoritative DNS server delivers fragmented UDP responses to DNS resolvers using IPv6. Now we ...
27
In this article, I'm showing how we can mitigate DNS attacks by implementing a stateless firewall filter at the aggregation or edge router.
28
Open DNS resolvers that answer queries coming from anyone have been the main component of a large number of DDoS attacks in recent years.
29
Tony Smith from the APNIC gives an update on the DNS Root Zone Key-Signing and explains how the key-signing-key roll over will be done for the first time.
30
DNS TTL violations is a controversial topic. It basically means a resolver overrides a TTL value provided by an authoritative server, and then serving its ...
130 items matching your search terms