Hi all,
As you might know, the organisers of MCH2021 ( https://mch2021.org/#/ <https://mch2021.org/#/>) have started the ticket sales. Some of us in the board of NLNOG thought it would be cool to have an NLNOG Village there.
But we had an NLNOG Camp a few years back and although it was great fun, if was a bit expensive for the amount of people that attended. That’s why we decided to first find out if there is enough interest to move forward with this.
We’ve set up a 3 question (30 seconds!) questionnaire on SurveyMonkey: https://nl.surveymonkey.com/r/LT86B8G <https://nl.surveymonkey.com/r/LT86B8G>
If you don’t want to click links, you can also reply to the questions in this mail:
-Are you considering to attend MCH2021?
-Would you join the NLNOG Village?
-Would you be interested to help out organising? (build-up, program, bar, etc.)
It would help us tremendously if you could take 30 seconds to reply or fill in the survey on SurveyMonkey! (Also if you’re not going to attend MCH2021!)
Thanks and happy holidays from all of us!
NLNOG Crew
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during May 2021:
ASN Name Fixed-By
213268 Cloudwebservices 2021-05-09
48347 MTW 2021-05-18
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during May 2021:
ASN Name First-Spoofed Last-Spoofed
33915 TNF 2019-01-28 2021-05-18
8587 Infracom 2019-10-28 2021-05-12
34373 XXLnet 2020-11-09 2021-05-27
213268 Cloudwebservices 2020-12-07 2021-05-06
207375 FIBO 2021-02-19 2021-05-19
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org
Hoi,
(English below)
DANE voor SMTP wordt nog niet op grote schaal gebruikt.
Via een enquête willen wij, als onderdeel van een samenwerking met Seoul National University, Virginia Tech en de University of Twente, antwoord krijgen op de vraag waarom dit het geval is en achterhalen tegen welke problemen operators aanlopen als het gaat om DANE.
Ook willen we graag weten hoe DANE juist wél succesvol ingezet wordt.
Met het uiteindelijke doel om oplossingen te ontwikkelen die het beheren van DANE makkelijker maken.
Het invullen van de enquete duurt tussen 10 en 20 minuten.
Wij zouden jullie deelname erg waarderen.
https://forms.gle/QUHA2cHpDjGWW47J7
——————
DANE for SMTP is not deployed on large scale. Together with researchers from Seoul National University, Virginia Tech en de University of Twente, we would like to understand which challenges operators face when deploying DANE for SMTP.
Also, we would like to understand how operators deploy DANE successfully.
Finally, we want to develop solutions to simplify DANE deployment for SMTP.
Filling in the survey should take between 10 and 20 minutes.
We would highly appreciate your participation.
https://forms.gle/qpxtbi9zecT4haxC8
—
Moritz Müller | Research Engineer
SIDN | Meander 501 | 6825 MD | Postbus 5022 | 6802 EA | ARNHEM
T +31 (0)26 352 55 00
moritz.muller(a)sidn.nl | www.sidn.nl