InternetNZ will begin a DNSSEC Zone Signing Key rollover in our current
standby chain.
This should not affect the active chain used in DNS resolution for .nz.
The status and scheduling will be posted to status.internetnz.nz.
This will consist of two maintenance windows, in each window we will pause
zone distribution to make changes, perform validation, and resume zone
distribution for the following zones:
nz, ac.nz, co.nz, cri.nz, geek.nz, gen.nz, govt.nz, health.nz, iwi.nz,
kiwi.nz, maori.nz, mil.nz, net.nz, org.nz, parliament.nz, and school.nz
The first change window is on the following link:
https://status.internetnz.nz/incidents/dgmt15cqy4r7
For questions or issues please contact registry(a)internetnz.net.nz, for
updates please subscribe to the IRS Production > Zone Publish component of
status.internetnz.nz
--
Ngā mihi
Felipe Agnelli Barbosa
DNS Specialist
InternetNZ | Ipurangi Aotearoa
We are the home of .nz and we work for an Internet that benefits all of
Aotearoa.
www.internetnz.nz
GPG: 95C1 8BDC EFA7 9CAC 303D 003E A058 2449 D152 8580
Hello everyone,
The APNIC 60 Program Committee (PC) is seeking presentations for the APNIC 60 conference in Da Nang, Viet Nam. The three conference days will be held from 9 to 11 September 2025. We are looking for content that would suit technical sessions, tutorials, lightning talks, BoFs and panel discussions. APNIC 60 conference registration is free for selected speakers.
Topics for conference sessions must be relevant to Internet operations and technologies. The following topics are examples of possible areas of interest.
* IP core network routing, switching
* IPv6 deployment and transition technologies
* Access and transport networks including Cable/DSL, LTE/5G/6G, wireless, metro ethernet, fibre, segment routing
* Cyber security, network security issues (NSP-SEC, DDoS, Anti-Spam, Anti-Malware) and BCPs
* Software defined networking, network function virtualization and network automation
* Content & service delivery (Multicast, Voice, Video, Telepresence, Gaming) and cloud computing
* DNS / DNSSEC and RPKI
* IXPs and Peering
* Internet of Things (IoT) architectures, standards, services, security, addressability, and manageability
* Smart Cities architecture, security, and addressing
* Research on Internet operations and deployment
* Quantum computing
* AI in network operations
Presentations are expected to last 20 minutes, and tutorials are expected to last 90 minutes. It's acceptable to submit a talk you've already given or have submitted to another conference.
If you would like to submit a presentation, head over to https://submission.apnic.net/user/login.php?event=222. The final deadline for submissions is Monday 30 June 2025. More information can be found on https://conference.apnic.net/60/program/callforpresentations/index.html. If you have any questions or concerns, please do feel free to send an email to the Program Committee at apnic-pc(a)apnic.net<mailto:apnic-pc@apnic.net>.
-----
Regards,
Christopher Hawker
On behalf of the APNIC 60 Program Committee
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Apr 2025:
none inferred
Source Address Validation issues inferred during Apr 2025:
ASN Name First-Spoofed Last-Spoofed
9500 VODAFONE-TRANSIT 2025-03-19 2025-04-29
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org