Dear Dutch NOG/RIPE colleagues,
if you are planning to follow RIPE88 remotely [1] - I suggest to get
together with a few others, maybe even together with others from
adjacent communities (IXPs, hackerspaces...) and jointly organise a
Local Hub [2] !
We already have 3 confirmed Local Hubs (Ukraine, Poland, Italy) [3],
with 3 more in the pipeline.
Last year, in addition to the "main" meeting in Rome, RIPE community had
good experiences with "remote yet together" participation in Local Hubs
in Bruges (BE-NOG!), Kyiv, Rotterdam, Sanaa, Tallinn & Amsterdam.
(TechInc hackerspace)
Deadline is coming up, so please apply ASAP, if you are interested.
Regards,
Vesna
[1] 20-24.May, Krakow: https://ripe88.ripe.net/
[2] https://ripe88.ripe.net/attend/call-for-local-hubs/
[3] https://ripe88.ripe.net/attend/call-for-local-hubs/local-hubs/
--
Senior Community Builder, RIPE NCC
https://labs.ripe.net/author/becha/
Hallo allemaal!
[English text can be found below]
Net als vorig jaar gaan we ook dit jaar weer net voor de zomervakantie
een NLNOG event organiseren. Vorig jaar hebben we voor het eerst de
combinatie gemaakt van een aantal presentaties omtrent één thema
(toen: Labs) met een aansluitend een borrel en barbecue. Dat concept
beviel ons en velen van jullie erg goed, dus dat zetten we dit jaar
voort. Natuurlijk dan wel met een ander thema, en dit jaar is gekozen
voor '(netwerk)security'
We zijn voor de invulling van het programma nog op zoek naar mensen die
hun kennis en ervaring omtrent netwerksecurity met ons willen delen.
Denk daarbij bijvoorbeeld aan red/blue teaming, penetration testing,
security incident handling, tooling en best practices.
Heb je een onderwerp waarover je zo'n 20 minuten kunt presenteren en
vervolgens wat vragen van onze gasten over wilt beantwoorden, dan horen
we graag uiterlijk 31 mei van je via stichting(a)nlnog.net.
Het event zal plaatsvinden op vrijdagmiddag 28 juni in BIT-MeetMe in
Ede. Meer details over het programma en hoe je je hiervoor aan kunt
melden zullen snel volgen. Hou dus je mail, onze socials en
https://nlnog.net/nlnog-summer-event-2024/ in de gaten!
Belangrijk om te weten (ook voor de presentatoren): we zullen géén
livestream of opnames maken, zorg dus dat je er live bij bent!
Hopelijk zien we je daar als presentator of bezoeker!
Met vriendelijke groet van het gehele NLNOG Bestuur,
Teun
[English text]
Hi everyone!
Just like last year we're planning to host a NLNOG summer event right
before the summer holidays. Last year we combined a number of
presentations on one theme (back then: Labs) with a drink and barbecue.
Since we and many of you liked this concept a lot we have decided to do
this again, this time with '(network)security' as topic for the talks.
We are looking for people who are willing to share their knowledge and
experiences with us. Topics can include red/blue teaming, penetration
testing, security incident handling, tooling and best practices.
If you have a topic you want to do a 20 minute presentation on followed
by a few minutes of Q and A, please contact before June 1st on
stichting(a)nlnog.net.
The event will be hosted on Friday, June 28th in the afternoon in
BIT-MeetMe in Ede. More details about the programme and how to register
will be provided soon. So keep an eye on your mail, our socials and
https://nlnog.net/nlnog-summer-event-2024/
One last important note (also for presenters): we will not be providing
a live stream or recordings, so make sure to join us in person!
We hope to see you there as a presenter or attendee!
Kind regards,
On behalf of the NLNOG board
Teun
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during Mar 2024:
ASN Name Fixed-By
207176 OPENFIBER 2024-03-05
20847 PREVIDER 2024-03-22
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Mar 2024:
ASN Name First-Spoofed Last-Spoofed
1136 KPN 2019-09-04 2024-03-24
213268 2020-12-07 2024-03-27
207176 OPENFIBER 2022-09-30 2024-03-28
3920 IMS-RTFM 2023-10-06 2024-03-20
215845 2024-01-02 2024-03-27
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org