________________________________________________________________________
Monitor your network health with DASH
________________________________________________________________________
Hi NZNOG Community,
APNIC is pleased to announce a new tool to help keep your network
devices secure and healthy by monitoring suspicious traffic come from
your network.
The Dashboard for Autonomous System Health (DASH) is free for all
APNIC Members and uses information from current honeynet data to see,
for example, if malware exists in your networks, which in turn, may
launch attacks on other networks.
Is DASH right for me?
---------------------
DASH will give you an idea of how your Autonomous System (AS) looks
relative to other networks. By analysing the level of suspicious
activity using DASH, you can check to see if the problem is serious and
do something about it. DASH allows you to check how your AS looks
compared to the broader economy or region, whether your network has a
history of suspicious activity, and whether it’s getting better or
worse.
By monitoring this activity and correcting any compromised devices on
your network, you’re also protecting other networks in the region, as
well as your customers and infrastructure.
Added benefits
--------------
DASH also provides you with:
- Reports for informed decision making (table of offending prefixes,
high-level summary PDF report, and so forth)
- Detailed information on specific prefixes and IP addresses that
have been sending suspicious traffic
- Additional insights about a set of prefixes if requested
- Up-to-date security news
Explore DASH now and see how you can secure your network and help
improve the health of networks across the Asia Pacific.
Try DASH now!
-------------
https://dash.apnic.net/?utm_source=apnic_blog&utm_medium=text_ref&utm_campa…
On behalf of:
Sofia Silva Berenguer
Product Manager, Information Services
APNIC
_______________________________________________________________________
Join the APNIC Policy Development Process Community Consultation
_______________________________________________________________________
Hi NZNOG Community,
Thank you for taking the time to join the Policy SIG Open Policy Meeting
(OPM) at APNIC 50.
With all policy discussions remaining online-only for the foreseeable
future, we believe there is a need to provide additional opportunities
for the community to discuss policy matters (in addition to the mailing
list) ahead of APNIC 51.
In particular, the Policy Development Process (PDP) review report
contains important recommendations for community discussion.
We invite you to join a virtual community consultation session on this
topic:
Date: Friday, 30 October 2020
Time: 11:00 (UTC+8) (Time converter https://tinyurl.com/y5xjej2d)
Duration: 1 hour
The consultation session is free and open to anyone who wishes to
participate.
If you are interested, please register by Thursday, 29 October 2020.
https://www.apnic.net/community/participate/sigs/community-consultation/
Useful links
------------
- PDP and SIG Guidelines Review Report
https://conference.apnic.net/50/assets/files/APCS790/PDP-and-SIG-Guidelines…
- Policy Development Process (PDP) redline document
https://ftp.apnic.net/apnic/drafts/pdp-v002-v003-diff.html
Regards,
Bertrand Cherrier and Ching-Heng Ku
APNIC Policy SIG Chairs
________________________________________________________________________
APNIC Secretariat secretariat(a)apnic.net
Asia Pacific Network Information Centre (APNIC) Tel: +61 7 3858 3100
PO Box 3646 South Brisbane, QLD 4101 Australia Fax: +61 7 3858 3199
6 Cordelia Street, South Brisbane, QLD http ://www.apnic.net
________________________________________________________________________
I've had 2 calls today from a USA number (At 7:40am and 12:30 pm ) trying to sell me BGP network monitoring software.
I think they may be calling ISP NOC's from the NOC list (Not a recent copy) . Searching for the number they called from it seems they have been complaints of them doing it in the past.
Sent from my iPhone
Hi,
The IANA AS Numbers registry has been updated to reflect the allocation of the following blocks to APNIC:
141626-142649 Assigned by APNIC 2020-10-20
142650-143673 Assigned by APNIC 2020-10-20
You can find the registry at:
https://www.iana.org/assignments/as-numbers/
The allocation was made in accordance with the Policy for Allocation of ASN Blocks to Regional Internet Registries:
https://www.icann.org/resources/pages/global-policy-asn-blocks-2010-09-21-en
Best Regards,
--
Selina Harrington
Lead IANA Services Specialist
The NZNOG Trust has unfortunately had to postpone and potentially cancel
the NZNOG Conference that under normal conditions would be held at the
end of January 2021. Although the latest CoVID outbreaks appear to be
over and we are all back to level 1, there are still some big
uncertainties that make the event too risky.
- Another outbreak is still possible that may result in travel and
group limitations. Although we could schedule the meeting somewhere
less likely to have an outbreak than Auckland we are reliant on
Aucklanders attending so that would not help.
- NZNOG is quite dependent on international input for both
Sponsorship and Speakers. At present it is not possible to get overseas
speakers in to the country, which traditionally is more than 50% of our
program. Sponsors are also doubtful, and that is more than 50% of our
income for the conference.
We are still working on options to hold an NZNOG Conference in 2021.
Later this year or early next we will consider an event around May/June
2021. Another option may be mini events for all or part of a day for
smaller numbers of people.
We are not considering a virtual event as there doesn't seem to be
anything we can offer different to APNIC or other virtual event hosts.
Richard Nelson
for NZNOG Trust
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nzl.
Inferred improvements during Sep 2020:
none inferred
Source Address Validation issues inferred during Sep 2020:
ASN Name First-Spoofed Last-Spoofed
45671 AS45671-NET-AU 2020-08-18 2020-09-03
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nzl&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org