Hi all,
We’re just 8 (!) days away from NLNOGDay 2022, the 20th-anniversary
edition.
Please read this e-mail carefully, it has some important information.
Tickets:
-There are just 10 more tickets available, if you haven’t registered
yet, HURRY! :-)
-If you already know you can’t attend, please cancel your ticket in
Eventbrite so others can join.
-To watch the stream, you don’t have to register. We’ll publish the URL
on the event page on Friday morning:
https://nlnog.net/nlnog-day-2022-the-20th-anniversary-edition/
Event:
-NLNOGDay 2022 will be held on Friday 30 September at Podium Mozaiek,
Bos en Lommerweg 191, Amsterdam
-Did you see the list of awesome talks? We’re super proud of all the
speakers!
-We will start at 09:30 sharp, and you don’t want to miss out on our
first talk
-Of course, we’ll end the day with THE MERCILESS NLNOG QUIZ! With epic
prizes, which we won’t ship. So, you need to be there to win. (No /24
this time, but trust us, we got stuff almost as good)
COVID-19:
-Like last year, there will be two types of lanyards:
Orange if you’re OK to shake hands, blue if you’re not. Pick your
lanyard at the registration
-We highly recommend doing a self-test before coming to the venue and
staying home if you have cold or similar symptoms.
Hoodies:
-Cost 35 Euro
-If you ordered a hoodie, you MUST (this is an RFC2119 MUST!) pick it up
before 14:00
-If you can’t make it before that time, arrange for a colleague or
friend to pick it up.
-We accept cash payment (pay appropriate, we might not have change) or
via Tikkie. We don’t have an ATM or PIN machine.
-We’re not responsible for size changes, you will get the size you
ordered.
-Hoodies not picked up by 14:00 will be sold to people who have not
reserved a hoodie.
-Sorry if we sound strict, we never did this before ;)
Sponsors:
-Our list of fabulous sponsors keeps growing, and we’re very proud of
all these organisations that make NLNOG events, the NLNOG Ring, looking
glass and IRR Explorer possible. Shoutout to you: Juniper Networks –
RIPE NCC – AMS-IX – KPN B.V. – PowerDNS – SpeedIX – LONAP – i3D.net –
Duocast – NLnet Labs – NL-IX – RETN – ISOC – OpenBSD Amsterdam – Quanza
– Arista – Nokia – Smart Optics – Leaseweb – Fiberring – Fusix Networks
– One Zero IT – Alkira – BIT – PC Extreme – NTT
We’re all excited to see you on Friday 30 September!
On behalf of the NLNOG Crew,
Nathalie
Hi all,
As you may have noticed, the NLNOG Looking Glass has been unavailable
for a while. The reason for this is that we had to transfer the Looking
Glass from a physical server hosted at XS4all to a virtual server
provided by BIT. In the process, we had to replace the Bird looking
glass backend with a new OpenBGPD setup. And since we were using a
(modified) version of bird-lg as a webfrontend, we had to replace that
as well with something that could talk to OpenBPGD. Eventually, we ended
up writing our own LG frontend.
As of this week, the looking glass is available again at
https://lg.ring.nlnog.net. Since we’re running a new web front end, so
some features have changed.
And since we moved the backend to a new machine, the IP addresses
changed as well (as Job already announced some time ago on the
ring-users mailinglist). If you’re peering with the LG but haven’t
done so, please change the IP addresses:
%%% ACTION REQUIRED BEGINS %%%
Related to AS 199036 (unchanged)
Remove OLD sessions, configure NEW sessions.
OLD: 82.94.230.130 (please remove)
OLD: 2001:888:2001::130 (please remove)
NEW: 212.114.120.72 (please send all IPv4 NLRIs)
NEW: 2001:7b8:62b:1:0:d4ff:fe72:7848 (please send all IPv6 NLRIs)
%%% ACTION REQUIRED ENDS %%%
One of the new features of the LG is that it has some knowledge about
communities used by various ASNs. You can see this if you’re looking
up routes and see blue coloured community labels. When hovering over
them, you can read more about what the community is used for. For now,
this is mostly limited to some Tier 1 networks, but we’re happy to add
information on your network if you can provide this. You can read more
about how to provide this at https://github.com/NLNOG/lg.ring.nlnog.net
(by creating a pull request), but feel free to send me a list of your
communities (off-list!) as well.
We’d like to thank XS4all for all those years of hosting the LG server
and BIT for continuing this, and Job and the OpenBGPD developers for
helping us build a looking glass server capable of handling the large
amount of peers and routes we process: ~140 IPv4 and ~140 IPv6 peers,
roughly 80M IPv4 routes and 14M IPv6 routes (and increasing)
New peers are welcome. You can setup peering and add your details at
https://github.com/NLNOG/ring-ansible/blob/master/roles/openbgpd/vars/peers…
(by creating a pull request), or contact ring-admins(a)nlnog.net.
Feature requests, bug reports, etc on the new web frontend are welcome
too. Either by opening an issue at
https://github.com/NLNOG/lg.ring.nlnog.net or by contacting the RING
Admins at ring-admins(a)nlnog.net.
Thanks!
Teun
Hoi allemaal,
RIPE NCC doet een onderzoek naar hoe verschillende NOGs opereren en hoe
gebruikers dat ervaren. Ze hebben tot nu toe erg weinig input vanuit
NLNOG-hoek ontvangen, dus als je zin en tijd hebt wordt het gewaardeerd
als je https://ripe-ncc.typeform.com/to/SjgKEKSx wilt invullen.
Bedankt namens RIPE NCC,
Teun
PS: de kaartjes voor NLNOG Day 2022 op 30 september gaan hard, schrijf
je snel in als je dat nog niet gedaan hebt op
https://nlnog.net/nlnog-day-2022-the-20th-anniversary-edition/
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during Aug 2022:
ASN Name Fixed-By
213268 Cloudwebservices 2022-08-03
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Aug 2022:
ASN Name First-Spoofed Last-Spoofed
20847 PREVIDER 2018-04-17 2022-08-29
8587 Infracom 2019-10-28 2022-08-01
213268 Cloudwebservices 2020-12-07 2022-08-03
34465 SPV 2022-07-29 2022-08-08
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org