In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during May 2025:
none inferred
Source Address Validation issues inferred during May 2025:
ASN Name First-Spoofed Last-Spoofed
9500 VODAFONE-TRANSIT 2025-03-19 2025-05-29
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org
InternetNZ will begin a DNSSEC Zone Signing Key rollover in our current
standby chain.
This should not affect the active chain used in DNS resolution for .nz.
The status and scheduling will be posted to status.internetnz.nz.
This will consist of two maintenance windows, in each window we will pause
zone distribution to make changes, perform validation, and resume zone
distribution for the following zones:
nz, ac.nz, co.nz, cri.nz, geek.nz, gen.nz, govt.nz, health.nz, iwi.nz,
kiwi.nz, maori.nz, mil.nz, net.nz, org.nz, parliament.nz, and school.nz
The first change window is on the following link:
https://status.internetnz.nz/incidents/dgmt15cqy4r7
For questions or issues please contact registry(a)internetnz.net.nz, for
updates please subscribe to the IRS Production > Zone Publish component of
status.internetnz.nz
--
Ngā mihi
Felipe Agnelli Barbosa
DNS Specialist
InternetNZ | Ipurangi Aotearoa
We are the home of .nz and we work for an Internet that benefits all of
Aotearoa.
www.internetnz.nz
GPG: 95C1 8BDC EFA7 9CAC 303D 003E A058 2449 D152 8580