NZIX (formerly AKL-IX) are holding their end of year drinks on the 7th of
December in Auckland.
If you are a member and in Auckland please RSVP and head along.
See you there!
Citylink's official Debian mirror (ftp.nz.debian.org) is apparently
again broken (not even listening on port 80 from where I'm sitting).
Would anyone be seriously interested in donating rack space, national
transit, or hardware to the cause of another official Debian mirror for
Having reliable and cheap access to free software projects like Debian
is critically important, and having a second official mirror seems like
a no-brainer to me.
I am very happy to donate my time to admin and monitor any equipment
provided for this, and to liase with the Debian project as required.
Perhaps Citylink could give us some insight in to the traffic levels
their existing mirrors see?
If anyone from ASB Bank NOC is on-list or anyone knows someone who operates their firewalls can you please contact me off-list? We have a business customer who’s IP has been blacklisted by ASB.
Got a customer looking for secondary bandwidth options at Tauranga Exchange.
Who has a physical presence here and a willingness to sell IP transit to a
small client (below 1Gbps requirement) ?
They’ve got an AS and a /22 that will be operational soon.
*General Manager*Full Flavour
*p. *07 577 0099 *ddi*. 07 281 1391
*s*. Skype "myfullflavour"
*e*. jesse(a)fullflavour.nz <jesse(a)fullflavourmedia.co.nz>
*w*. fullflavour.nz <http://www.fullflavourmedia.co.nz/>
*a. *Basestation, 148 Durham Street, Tauranga
*a*. PO Box 13403, Tauranga Central, Tauranga 3141, New Zealand
Looks like Bigpipe has decided to withdraw IPv6 from their broadband customers...
If you have contacts at Bigpipe please get in touch with them and ask them WTF they're doing. This is absurd.
I've been recommending Bigpipe to people for ages because they offered IPv6. Forcing their customers to renumber and drop back to legacy IPv4 at this point is just idiotic, let alone not continuing to offer this service.
---------- Forwarded message ----------
From: Bigpipe Broadband <support(a)bigpipe.co.nz>
Date: 14 May 2018 at 09:54
Subject: Changes to your Bigpipe connection
Thanks for taking part in our IPv6 trial that we announced on Geekzone.
We’ve had a heap of really useful feedback to keep in mind for our future
developments in this space.
>From the 12th of June 2018 the trial will be ending and you may notice a
short 5-10 minute outage while we withdraw it. We’ll be making the change
overnight at a time that has as little impact as possible. There’s nothing
further you need to do, however as with any outage if you find you haven’t
automatically connected again, simply restart your modem or router.
If you have any questions or want to chat this through, you can get in
touch via https://ww.bigpipe.co.nz/contact-us
Thanks again for getting involved.
The Bigpipe People
I'm seeing lots of log messages like these:
May 11 06:54:32 jet ntpd: receive: KoD packet from
2001:dce:2:17a::18 has inconsistent xmt/org/rec timestamps. Ignoring.
... on a home server.
A quick web search suggests that KoD packets are a self-defence
mechanism. Am I (accidentally) abusing s[1-3].ntp.net.nz?
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Apr 2018:
ASN Name First-Fixed
137259 M174-AS-AP 2018-04-26
Further information for the inferred remediation is available at:
Source Address Validation issues inferred during Apr 2018:
ASN Name First-Spoofed Last-Spoofed
9876 NOWNEW-AS-AP 2016-09-26 2018-04-23
Further information for these tests where we received spoofed
packets is available at:
Please send any feedback or suggestions to spoofer-info(a)caida.org
[with apologies to those who see this on multiple lists]
The 29th DNS-OARC Workshop will be a joint workshop combined with
CENTR-Tech and will take place at the Hotel Okura, Amsterdam,
Netherlands, on October 13th and 14th 2018.
- 01 May 2018 - Workshop Announcement
- 01 Jun 2018 - Submissions and Registrations open via Indico
- 13 Jul 2018 - Deadline for submission
- 17 Aug 2018 - Contribution list published
- 14 Sep 2018 - Full agenda published
- 06 Oct 2018 - Deadline for slideset submission
- 13 Oct 2018 - Workshop
Sebastian Castro, on behalf of the joint Programme Committee
OARC depends on sponsorship to fund its workshops and associated social
events. Please contact <sponsor(a)dns-oarc.net> if your organization is
interested in becoming a sponsor.
Chief Scientist @ InternetNZ
desk: +64 4 495 2337
mobile: +64 21 400535