Work is under way to remove Vocus New Zealand's AS9790 from Auckland Peering Exchange.
This does not reflect a change in Vocus NZ's open peering policy and does not involve other Vocus AS's. In particular, there is no change to AS4826.
* Donald Neal
Donald Neal | Network Architect
D: +64 9 929 2958E: Donald.Neal(a)vocusgroup.co.nz
M: +64 27 808 1023W: vocusgroup.co.nz
A: Level 5, 34 Sale St, Auckland 1010
Work is under way to remove Vocus New Zealand's AS9790 from Auckland Peering Exchange. We plan to shut down our peering with the exchange route servers in the coming fortnight.
This does not reflect a change in Vocus NZ's open peering policy and does not involve other Vocus AS's. In particular, there is no change to AS4826.
* Donald Neal
Donald Neal | Network Architect
D: +64 9 929 2958E: Donald.Neal(a)vocusgroup.co.nz
M: +64 27 808 1023W: vocusgroup.co.nz
A: Level 5, 34 Sale St, Auckland 1010
On behalf of APNOG and FYI, see below.
Regards,
Terry Sweetser
General Manager, IX Australia
Terry.Sweetser(a)ix.asn.au
-----Original Message-----
From: pacnog-bounces(a)pacnog.org <pacnog-bounces(a)pacnog.org> On Behalf Of Philip Smith
Sent: Wednesday, 16 October 2019 9:09 AM
To: PacNOG <pacnog(a)pacnog.org>
Subject: [pacnog] APRICOT 2020 Fellowships
Hi everyone,
Fellowships for APRICOT 2020 can now be applied for! If you meet the eligibility criteria as per:
https://2020.apricot.net/fellowship/overview/
please apply via that URL.
Applications close on Monday, 28th October at 23:59 (UTC +8).
Successful candidates will be notified from 22nd November onwards.
The 2020 Programme
------------------
APRICOT provides financial support to network operators and engineers from these developing economies to build their Internet infrastructure capacity, network with Internet network professionals, and assist their professional development.
The APRICOT 2020 Fellowship programme is especially interested to receive applications from qualified candidates living and working outside the major urban centres in the Asia & Pacific region.
Women are especially encouraged to apply.
What's included
---------------
Successful fellows will receive:
- 100% of the registration fees to either the workshop or conference
- 100% of the accommodation costs (up to six nights for the workshop
and up to five nights for the conference)
- A contribution towards airfare and per diem up to a total of USD 400
for Australia/New Zealand based fellows and USD 700 for Asia &
Pacific based fellows.
More information
----------------
For more information about the key dates, eligibility and selection criteria, please visit:
https://2020.apricot.net/fellowship/overview/
General Guidelines
------------------
To help with your application, please provide the information asked for. Personal CVs and employer mission statements are not suitable answers to any of the questions. Applicants should also seek approval from their employers before applying, as this will avoid disappointment later on.
We look forward to receiving your application!
Best wishes,
Rupesh Shrestha, Aftab Siddiqui, Philip Smith APRICOT Fellowship Committee Chairs
--
_______________________________________________
pacnog mailing list
pacnog(a)pacnog.org
https://mailman.apnic.net/mailman/listinfo/pacnog
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Sep 2019:
ASN Name Fixed-By
55850 TRUSTPOWERLTD 2019-09-18
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Sep 2019:
ASN Name First-Spoofed Last-Spoofed
4768 VFNZ-INET 2019-09-14 2019-09-14
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org