Very interesting tool in these times of ip runout.
Skeeve Stevens, CEO - eintellego Pty Ltd
skeeve(a)eintellego.net<mailto:email@example.com> ; www.eintellego.net
Phone: 1300 753 383 ; Fax: (+612) 8572 9954
Cell +61 (0)414 753 383 ; skype://skeeve
facebook.com/eintellegotwitter.com/networkceoau ; www.linkedin.com/in/skeeve
PO Box 7726, Baulkham Hills, NSW 1755 Australia
eintellego - The Experts Who The Experts Call
Juniper - HP Networking - Cisco - Brocade
On 23/11/11 8:13 AM, "ARIN" <info(a)arin.net<mailto:firstname.lastname@example.org>> wrote:
ARIN is pleased to announce the availability of a trial WHOWAS service
that will provide historical registration information for a given IP
address or ASN. During the trial, requests should be submitted via email
to hostmaster(a)arin.net<mailto:email@example.com> and must include details about the registration
in question and the reason for the request.
Requestors will then be required to sign and return an WHOWAS Terms of
Use Agreement before their WHOWAS request can be processed. Because
requests will be manually processed during the trial, ARIN reserves the
right to set limits on the number of requests that can be made by any
single entity, regarding both the number of requests and period of time
ARIN will make every effort to process requests in a timely fashion, but
makes no specific guarantees related to processing time.
This trial period will run for the remainder of 2011, and will serve to
provide much needed data to assist ARIN in defining the scope and
requirements for automating this service. ARIN reserves the right to
terminate this service prior to the end of 2011 should request volumes
exceed ARIN’s ability to provide responses in a timely manner. During
the trial, ARIN will evaluate, what, if any fees may be charged for
future availability of this service.
For full details, instructions on how to take advantage this trial
Chief Operating Officer
American Registry for Internet Numbers (ARIN)
You are receiving this message because you are subscribed to
the ARIN Announce Mailing List (ARIN-announce(a)arin.net<mailto:ARINfirstname.lastname@example.org>).
Unsubscribe or manage your mailing list subscription at:
Please contact info(a)arin.net<mailto:email@example.com> if you experience any issues.
Changes to APNIC IPv4 transfer policy
APNIC account holders wishing to be the recipient of IPv4 transfers
must now justify their need for the resources as a result of a policy
change taking effect from today, Monday, 21 November 2011.
To streamline the process, those seeking to be the recipient of IPv4
transfers may apply for pre-approval by demonstrating their need before
locating a source for the address space.
Updated policy documents
This policy change is the implementation of prop-096: Maintaining
demonstrated needs requirement in transfer policy after the final
You can view the history of this policy proposal at:
The revised APNIC transfer, merger, acquisition, and takeover policy is
now open for final editorial comments. Please provide comments before
21 December 2011.
You can access the editorial call for comment at the link below.
Had this come through from one of our techs. Thought I should pass it on in case it's appearing elsewhere
Network & Systems Engineer
[Description: Description: Wasp New Zealand]
Sent: Monday, 21 November 2011 6:14 p.m.
Subject: A new scam is appearing
Hi all, I been on the phone this avo to a few people who I support and help out, asking about telcos wanting them to pay their bill via credit card, what they are doing to phoning people saying they are either from Telecom / Xtra or another isp saying their account was overdue and if they dont pay they would be disconnected, and they had to pay via credit card and also they want remote access to check adsl modem settings are ok.
I phoned Telecom and vodafone about this one and they said its a new scam happening, so I thought I better pass this info for you to inform your clients or while talking on ph to customers that this is a scam to be aware of it.
Firefox/Thunderbird often picks up a lot of this crap. I don't know how
I don't know how you give the browsers the heads up so this crap doesn't
impact other users who have less clue than the likes of us.
I don't know if ISPs are putting blocks in for this sort of crap in
I don't know if KiwiBank have an active team dealing with this sort of
rubbish, though I get hit with them quite often, so clearly someone has
KB in their sights.
I do appreciate that some of this is just noise and business as usual,
but I welcome any comment on or off list.
As operators or people with some level of clue, I do consider it our
role to take some ownership.
31 Acheson Ave
Christchurch, New Zealand
Ph: + 64 3 348 7235
Mobile: + 64 21 114 0699
During the past few days, two major milestones have been accomplished in
the journey to enable DNSSEC for .nz
On Friday November 18th, the cryptographic keys required to sign the .nz
zones with DNSSEC were created. We have posted part of the materials
used during this procedure in our website:
At 10:00am on Monday November 21st NZDT, a signed version of the .nz
zone went live. The DNSKEY records have been obscured to prevent
validation as a first step on the deployment phase. More details
We've been monitoring the service closely during the past few hours and
no major changes have been observed. We are ready to see an spike on
DNSKEY queries starting from now ;)
.nz Registry Services (New Zealand Domain Name Registry Limited)
desk: +64 4 495 2337
mobile: +64 21 400535
[Apologies if you've already seen this message in other forums.]
We'd be grateful if folks who've yet to do so would take a few minutes to participate in the 2011 WISR opsec survey - responses will be tabulated on Sunday, 20Nov11, and input from the operational community is greatly appreciated!
This link redirects to the http/s-enabled survey tool:
Roland Dobbins <rdobbins(a)arbor.net> // <http://www.arbornetworks.com>
The basis of optimism is sheer terror.
-- Oscar Wilde
Possibly of interest to some here. - detail in PDF. scaled fees
[includes a REANNZ service charge]
---------- Forwarded message ----------
From: Chris Litten <chris.litten(a)reannz.co.nz>
Date: 17 November 2011 11:28
Subject: KAREN Research Internet Service
To: Chris Litten <chris.litten(a)reannz.co.nz>
I am delighted to be able to announce the KAREN Research Internet Service.
Please find attached the announcement and information.
--- --- ---
Member Engagement Manager
Research & Education Advanced Network NZ Ltd
D 2 M: +64 4 913 1095
+64 21 536 090
BIND 9 Resolver crashes after logging an error in query.c
Summary: Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9. ISC is actively investigating the root cause and has produced patches which prevent the crash. Further information will be made available soon.
Document Version: 1.1
Document URL: http://www.isc.org/software/bind/advisories/cve-2011-4313
Posting date: 16 Nov 2011
Program Impacted: BIND
Versions affected: All currently supported versions of BIND, 9.4-ESV, 9.6-ESV, 9.7.x, 9.8.x
An as-yet unidentified network event caused BIND 9 resolvers to cache an invalid record, subsequent queries for which could crash the resolvers with an assertion failure. ISC is working on determining the ultimate cause by which a record with this particular inconsistency is cached.At this time we are making available a patch which makes named recover gracefully from the inconsistency, preventing the abnormal exit.
The patch has two components. When a client query is handled, the code which processes the response to the client has to ask the cache for the records for the name that is being queried. The first component of the patch prevents the cache from returning the inconsistent data. The second component prevents named from crashing if it detects that it has been given an inconsistent answer of this nature.
CVSS Score: 7.8
CVSS Equation: (AV:N/AC:L/Au:N/C:N/I:N/A:C)
No workarounds are known. The solution is to upgrade. Upgrade BIND to one of the following patched versions: BIND 9.8.1-P1, 9.7.4-P1, 9.6-ESV-R5-P1, 9.4-ESV-R5-P1
Patches mitigating the issue are available at:
ISC is receiving multiple reports and working with multiple customers on this issue. Please E-mail all questions, packet captures, and details to security-officer(a)isc.org
We very much appreciate all reports received on this issue.
Do you have Questions? Questions regarding this advisory should go to security-officer(a)isc.org.
ISC Security Vulnerability Disclosure Policy: Details of our current security advisory policy and practice can be found here: https://www.isc.org/security-vulnerability-disclosure-policy
Internet Systems Consortium (ISC) is providing this notice on an "AS IS" basis. No warranty or guarantee of any kind is expressed in this notice and none should be implied. ISC expressly excludes and disclaims any warranties regarding this notice or materials referred to in this notice, including, without limitation, any implied warranty of merchantability, fitness for a particular purpose, absence of hidden defects, or of non-infringement. Your use or reliance on this notice or materials referred to in this notice is at your own risk. ISC may change this notice at any time.
A stand-alone copy or paraphrase of the text of this document that omits the document URL is an uncontrolled copy. Uncontrolled copies may lack important information, be out of date, or contain factual errors.
[ plosher(a)isc.org | Senior Operations Architect | ISC | PGP E8048D08 ]