Call for Interests to New Zealand Software-Defined Networking (SDN) Workshop, February 13th and 14th, 2019 , Victoria University, Wellington.
The workshop information can be found here (the Google Docs link is shortened by bitly): http://bit.ly/sdncon3
If with any inquire please do not hesitate to contact Associate Professor Dr Ian Welch <ian.welch(a)vuw.ac.nz<mailto:email@example.com>>.
Cheers Will@AUT, NZ
I am looking for help for https://dev.networkatlas.org project in NZ. I
can't seem to be able to collect KZMs from people ;) if you are able to
help us get KMZs (terrestrial) it would be great.
thanks bunch in advance.
ps; if you want to help in any other way, please reach out.
Long time lurker here, just a quick note to see if anyone wants four Cisco
1720 routers before they go in the e-waste bin? There may also be other
older Cisco kit on offer (Pix, switches etc).
If there is interest please contact me off list with offers of postage and
maybe beer, I am located in New Plymouth.
Hello NZNOG Community:
InternetNZ and the Domain Name Commission are hosting a forum on domain
name abuse issues in Wellington on Tuesday 27 November.
There are various forms of abuse - content, infrastructure, and
registration related - where the Domain Name System faces challenges,
including challenges where other parties in the Internet ecosystem need to
be part of the solution.
This note is to let you know about the event as I thought it might be of
interest to you.
The programme draft is on our site along with registration at
Chief Scientist @ InternetNZ
desk: +64 4 495 2337
mobile: +64 21 400535
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Oct 2018:
Source Address Validation issues inferred during Oct 2018:
ASN Name First-Spoofed Last-Spoofed
9876 NOWNEW 2016-09-26 2018-10-04
Further information for these tests where we received spoofed
packets is available at:
Please send any feedback or suggestions to spoofer-info(a)caida.org
We wanted to share several updates about our project Network Atlas with
you. First of all we are very excited to announce now our page has many
more features (and more to come) and hosted in a much more robust platform
We've recently made a press release about our project ,
Now we are working on two major tracks
1) Raising funds via sponsorship and our kickstarter to be able to afford
future of developments.
2) Talking to engineers , network professionals to understand what would
make this tool better everyone.
As you might be already aware we have a slack channel you can join and
discuss/help the project. here is the slack channel link -
Overall we need network operators who have access to networks/fibre/route
information and operational status as we are developing our self service
portal which via GUI and API will enable you to be able to provide status
of global fibre optic cables, and receive updates the same way.
For more information about this project, and other ideas feel free to join
our slack or email me directly at mehmet(a)networkatlas.org
thank you and we will follow up with further updates in December 2018! We
are very excited how far we came so far providing more visibility already (
even though we are just in demo state )
A reminder to all New Zealand Network Operators that it is November again, which means its time for your Designated Contacts to ensure the Chief Executive completes your annual TICSA update.
Complete the update here -- TICSA Registration Portal:
Information -- Police TICSA webpage:
Portal Issues -- Contact NZ Police TICSA Team:
TICSA Legislation - Link to the act:
Excerpt from the act:
69 Annual update
(1) A network operator must give to the Registrar each year in November an annual update of information on the register relating to that operator.
(2) The annual update must—
(a) specify any changes to the information referred to in section 62 that have occurred since the network operator last gave information to the Registrar (whether in a notice under section 68, the previous annual update, or an application under section 61); and
(b) confirm that, apart from the changes under paragraph (a), all other information referred to in section 62 that is currently held by the Registrar remains correct; and
(c) be in the form (if any) required by the Registrar; and
(d) be accompanied by a certificate signed by the chief executive of the network operator confirming that the information contained in the annual update is true and correct.
(3) An annual update does not need to be provided in the year during which this section comes into force.
NZ Police TICSA Team.
The information contained in this email message is intended for the addressee only and may contain privileged information. It may also be subject to the provisions of section 50 of the Policing Act 2008, which creates an offence to have unlawful possession of Police property. If you are not the intended recipient of this message or have received this message in error, you must not peruse, use, distribute or copy this message or any of its contents.
Also note, the views expressed in this message may not necessarily reflect those of the New Zealand Police. If you have received this message in error, please email or telephone the sender immediately