Yep, it is that time again...
The NZNOG trustees invite papers for the 16th annual NZNOG conference,
to be hosted at the Napier Conference Centre on 31 Jan and 1 Feb 2019.
With the conference there will be a three day Workshop 28-30 Jan and a
day of tutorials on 30 Jan.
The NZNOG conference, workshops and tutorials are a once-a-year
opportunity for individuals and organisations involved in Internet
operations to meet and share the latest in Internet operations,
technologies, practices and receive high quality training.
The event is unique in New Zealand and attracts technical, skilled
individuals with a genuine interest in Internet operations and
Submissions on any aspect of networking are welcome however we are
particularly interested in talks that involve real world deployment
experience, particularly in New Zealand.
Submit a paper:
Presenters are invited to submit talk proposals for consideration by
Monday 29 Oct. Please provide your talk title, a short presenter bio
and an abstract of the talk. Abstracts should be no more than one page
long and provide a summary of your networking related subject matter.
Normally presentations 30 min long, are video streamed live and slide
decks are posted to the NZNOG website. If you want a different duration
or other arrangements you need to let us know at submission time
To submit your paper please e-mail: talks(a)nznog.org
Proposals will be evaluated on fit with the conference’s objective and
its ability to stimulate lively discussions around the current state of
New Zealand networking.
This call for submissions can also be found at:
For more information about the conference visit www.nznog.org or
Longtime listener; first time caller.
I signed up to SamKnows (partly out of curiosity and partly so I can have
hard data about my connection that I pay for) at home.
Over the last week my connection has gone from slightly adequate with the
occasional drop out to a slow connection with regular drop outs.
Netflix and YouTube are stuttering, video games drop connection, and
websites hang at random times.
I can't help but think that the email shared by Dylan sheds some light on
why that maybe.
This programme won't be terribly successful if everyone gets sick of having
a terrible connection during peak hours and shuts the white box down.
*Brian Cole* */** Research Projects Developer*
*Research & Enterprise **/** Research Office **/** University of
*Private Bag 3105* */* *Hamilton 3240* */*
*New Zealand**www.waikato.ac.nz* <http://www.waikato.ac.nz/> */*
*mob + 64 21 049 9183**email brian.cole(a)waikato.ac.nz
Hi all, I'm wearing my REANNZ hat today.
I thought I'd share what we're seeing hosting the M-Lab  nodes in NZ
that the new Comcom/Samknows  broadband testing are using for some of
For a start, it looks like the testing has been ramping up over the last
week (see attached graph), in particular during the evening (6pm-midnight).
I had assumed the testing would be evenly spread out throughout the day,
but it looks like they're concentrating the testing during the busy evening
If anyone is interested in following how that traffic grows we have
publicly available graphs for the two M-Lab nodes:
If you want to try out the M-Lab nodes themselves, type "speedtest" into a
Google search box and there is a "Run Speed Test" option that uses M-Lab
(at least in my copy of Chrome, your mileage may vary).
The nodes each consist of 4 x Dell servers front ended by a Juniper QFX
switch. They're connected at 10Gbps. The nodes are fully run by M-Lab,
we're just providing some address space and capacity.
If anyone is concerned about their connectivity to REANNZ, we're on all the
major NZ exchanges (APE, WIX, CHIX, AKL-IX) where we peer with the route
I note Comcom have posted a FAQ  on their website with some more
details. The nodes are also IPv6 connected with addresses allocated from
It's worth noting we've been hosting M-Lab nodes for around 5 years now,
but no one from Comcom or Samknows has spoken to us about the testing so
it's all come as a bit of a surprise to us. If you have any interesting
information to share, we'd like to know more :)
So my domestic tables now have some 76,000 prefixes in them, as of ~ 6:30 last night.
I guess hello HE and welcome to AKL-IX?
Domestic table for NZ was more like ~ 10,000 prefixes not that long ago!
I've got some config that I'd like to lab but my own kit is tied up in a
Wondering if anyone has a spare MX5-MX80 they would be willing to fire up
to allow me to perform some tests.
Unfortunately, vMX doesn't quite work in this case.
*General Manager*Full Flavour
*p. *07 577 0099 *ddi*. 07 281 1391
*s*. Skype "myfullflavour"
*e*. jesse(a)fullflavour.nz <jesse(a)fullflavourmedia.co.nz>
*w*. fullflavour.nz <http://www.fullflavourmedia.co.nz/>
*a. *Basestation, 148 Durham Street, Tauranga
*a*. PO Box 13403, Tauranga Central, Tauranga 3141, New Zealand
Hello NZNOG Friends, long time.
I am looking for a VPS hosting firm which support BGP advertisements for
DNS anycast (for my experiement)
200GB Disk, 16 GB Memory , 4core cpu and small bandwidth running 18.04
Please contact me offlist if you are able offer this.
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Aug 2018:
Source Address Validation issues inferred during Aug 2018:
ASN Name First-Spoofed Last-Spoofed
4764 wideband-as-au 2018-08-16 2018-08-17
131291 LANWORXLIMITED 2018-08-24 2018-08-24
Further information for these tests where we received spoofed
packets is available at:
Please send any feedback or suggestions to spoofer-info(a)caida.org
From http://root-trust-anchor-reports.research.icann.org/ :
The ICANN org is publishing the IP addresses that are sending RFC
8145 telemetry ostensibly indicating that a resolver at the reported
address (or another resolver that is forwarding through the resolver
at the address) is validating using only KSK-2010 as a trust
anchor. Publishing these addresses allows ISPs and other
organizations who know who operates resolvers at those addresses to
contact the resolver operator and notify them of the need to update
their DNSSEC trust anchors. Without further action, these resolvers
will stop working after the root KSK is rolled on 11 October 2018.
The following ASes have their country recorded as NZ in whois, and are
in the ICANN list. The following resolvers may or may not be operated
by the ASN identified.
133607 Web Connect
Further information is available at the ICANN site, and it might pay
for other operators on NZNOG to double check the ICANN list.
As part of NZNOG we normally offer a 3 day workshop (Mon to Wed) and a few
tutorials on the Wednesday.
APNIC have the following workshops/tutorials offered at the moment.
We're seeking feedback (on or off list) on what people may want.
Note, most recently we've had a 1 day Network Security tutorial
(Queenstown) and a 3 day MPLS workshop (Tauranga).
Ideas for next year:
-3 day Network Security
-3 day Routing I
-3 day SDN (5 days condensed in to 3 days)
-3 day DNSSEC
-1 day IPv6 essentials
-1 day DNSSEC
-1/2 day BGP techniques
Or, what else would people like to see at NZNOG (workshop and tutorial
wise) that APNIC don't offer?
On-list discussion encouraged :)