Hi NZNOG Community,
As you may know, every two years APNIC conducts a large-scale survey to
help us understand the needs and wishes of its Members and those who use
APNIC services.
The results of the survey provide guidance for the future direction of
APNIC.
As a valued member of the APNIC community, I’d like to personally invite
you to take the survey. Please also share the survey link with your
colleagues so they can complete the survey too.
https://survey.apnic.net
The survey is anonymous and no identifying information will be made
available to APNIC.
The survey closes on 2 July 2018. There will be three prize draws during
the survey period.
Thank you for your continued support of APNIC.
Kind regards,
Elly
APNIC
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during May 2018:
ASN Name Fixed-By
55850 TRUSTPOWERLTD 2018-05-21
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during May 2018:
ASN Name First-Spoofed Last-Spoofed
9876 NOWNEW 2016-09-26 2018-05-31
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org