In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Aug 2018:
none inferred
Source Address Validation issues inferred during Aug 2018:
ASN Name First-Spoofed Last-Spoofed
4764 wideband-as-au 2018-08-16 2018-08-17
131291 LANWORXLIMITED 2018-08-24 2018-08-24
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org
>From http://root-trust-anchor-reports.research.icann.org/ :
The ICANN org is publishing the IP addresses that are sending RFC
8145 telemetry ostensibly indicating that a resolver at the reported
address (or another resolver that is forwarding through the resolver
at the address) is validating using only KSK-2010 as a trust
anchor. Publishing these addresses allows ISPs and other
organizations who know who operates resolvers at those addresses to
contact the resolver operator and notify them of the need to update
their DNSSEC trust anchors. Without further action, these resolvers
will stop working after the root KSK is rolled on 11 October 2018.
http://root-trust-anchor-reports.research.icann.org/rfc8145-addresses.txt
The following ASes have their country recorded as NZ in whois, and are
in the ICANN list. The following resolvers may or may not be operated
by the ASN identified.
4771 Spark
122.56.234.219 122-56-234-219.mobile.spark.co.nz.
122.57.192.56 122-57-192-56-adsl.sparkbb.co.nz.
122.61.118.222 122-61-118-222-adsl.sparkbb.co.nz.
219.88.186.152 rns6.xtra.co.nz.
222.153.3.78 222-153-3-78-fibre.sparkbb.co.nz.
222.154.149.63 222-154-149-63-fibre.sparkbb.co.nz.
9500 Vodafone
203.96.208.52 akrdns2.akl.vf.net.nz.
203.96.208.61 akrdns3.akl.vf.net.nz.
203.96.208.62 akrdns4.akl.vf.net.nz.
203.96.208.91 cbrdns1.chc.vf.net.nz.
203.96.208.92 cbrdns2.chc.vf.net.nz.
210.246.17.115 210-246-17-115.dsl.dyn.ihug.co.nz.
2407:7000:ff00:5382:bd9d::1
2407:7000:ff00:5382:bd9d::2
49.224.251.45 45.251.224.49.dyn.cust.vf.net.nz.
23655 SNAP
111.69.178.254 254.178.69.111.dynamic.snap.net.nz.
111.69.195.153 153.195.69.111.dynamic.snap.net.nz.
24183 DTS
202.174.180.228
38793 2degrees
118.148.149.52 52-149-148-118.nzcomms.co.nz.
118.149.151.121 121-151-149-118.nzcomms.co.nz.
45177 Vibe
45.64.48.2 cdns-02.as45177.net.
45179 SiteHost
103.250.234.202 103-250-234-202.static.webslice.co.nz.
45267 Lightwire
114.134.0.194 114-134-0-194.lightwire.co.nz.
132347 MikiPro
2404:ab00:6:1::6
132692 GlobiCom
103.18.58.198 vpn2.torguardvpnaccess.com.
133607 Web Connect
103.51.101.28
135069 Feenix
103.208.143.164 103-208-143-164.feenix.co.nz.
Further information is available at the ICANN site, and it might pay
for other operators on NZNOG to double check the ICANN list.
http://root-trust-anchor-reports.research.icann.org
Matthew
Hi all
As part of NZNOG we normally offer a 3 day workshop (Mon to Wed) and a few
tutorials on the Wednesday.
APNIC have the following workshops/tutorials offered at the moment.
https://training.apnic.net/courses/
We're seeking feedback (on or off list) on what people may want.
Note, most recently we've had a 1 day Network Security tutorial
(Queenstown) and a 3 day MPLS workshop (Tauranga).
Ideas for next year:
-3 day Network Security
-3 day Routing I
-3 day SDN (5 days condensed in to 3 days)
-3 day DNSSEC
-1 day IPv6 essentials
-1 day DNSSEC
-1/2 day BGP techniques
Or, what else would people like to see at NZNOG (workshop and tutorial
wise) that APNIC don't offer?
On-list discussion encouraged :)
Cheers
Dave