The NLUUG is the association of (professional) users of UNIX/Linux, Open
Source, Open Systems and Open Standards in the Netherlands. The NLUUG
organises two large conferences every year. The spring conference 2025
will be held Thursday the 22nd of May 2025 in the Van der Valk Hotel
Utrecht.
The Programme Committee is seeking contributions from the community.
For our conferences we like the following subjects (and more):
Automation, Content Management Systems (CMS), Configuration management,
Cryptography and crypto analysis, Databases, Home automation,
Information security, Internet (standards, technical aspects),
Interesting events and history, Network (analyse, firewalls), Open
source, Open standards, Operating systems, Programming languages,
Privacy, Software development, Tools, Web technology, and more... This
list is just an indication.
A default speaker slot is 45 minutes. This includes the time to answer
questions.
Speakers will receive the following benefits:
* Free access to our conference
* Lunch, coffee/tea/beverages
* Invitation to join our speakers dinner
Talks may be in English, but also in Dutch.
If you have a good topic, don't hesitate to submit a proposal on
https://cfp.nluug.nl/nluug-voorjaarsconferentie-2025/
Proposals can be submitted until the 13th of March 2025 23:59 CET.
Willem Toorop on behalf of the NLUUG programme committee
Dear Dutch NLNOG colleagues,
Yesterday, we sent out the call for nominees to the RIPE Community Mailing List (see below).
If you’d like more information, feel free to reach out to me (or someone else from the RIPE NomCom) or submit your nominations tonominations(a)ripenomcom.org. (Self-nominations are also welcome!)
regards,
Rinse Kloek
Volunteer of the Ripe NomCom
---
This year, a nominating committee (NomCom), with help from the wider
community, will select two people to fill the positions of RIPE Chair
and Vice Chair. As chair of the 2025 RIPE NomCom, I would like to invite
you to nominate candidates for these positions.
As members of the RIPE community, you will have some idea of what the
RIPE Chair is responsible for and what kind of person you would like to
see in this role as well as the Vice Chair role. Please think about
suitable candidates, engage with them, discuss this with your peers, and
nominate people who will have the support of the community.
You may nominate any member of the RIPE community for either position.
Self-nominations are also permitted. NomCom members and members of the
RIPE NCC Executive Board are not eligible to be considered.
Send your nominations tonominations(a)ripenomcom.org and include a
description of the skills or expertise that make your candidate a
desirable choice. Please also include a working email address or
telephone number for the nominee and indicate whether they are aware of
your nomination.
The NomCom will also be interested in your opinion about the performance
of the incumbent RIPE Chair, Mirjam Kühne, and RIPE Vice Chair, Niall
O'Reilly.
The NomCom is also interested in any lessons and observations we or the
community can take away from the previous NomCom and the first nominated
RIPE Chair / Vice Chair term which is drawing to a close.
The deadline for all nominations is Sunday, March 30th 23:59 UTC.
You can find more information in the relevant RIPE Documents:
ripe-714: A brief description of the RIPE Chair’s role. [1]
ripe-787: Information about the selection process. [2]
ripe-788: Detailed information about the RIPE NomCom [3]
RIPE NomCom web site:https://ripenomcom.org/
All information regarding the RIPE Chair / Vice Chair remuneration can
be found in the Remuneration document (authored by the RIPE NCC) [4]
We are happy to answer any further questions you may have.
Jan Žorž
Chair of the 2025 RIPE NomCom
[1] -https://www.ripe.net/publications/docs/ripe-714/
[2] -https://www.ripe.net/publications/docs/ripe-787/
[3] -https://www.ripe.net/publications/docs/ripe-788/
[4] -https://ripenomcom.org/wp-content/uploads/2025/02/2025-02-03-RIPE-Chair-Remuneration-.pdf
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during Jan 2025:
ASN Name Fixed-By
214145 2025-01-19
3920 IMS-RTFM 2025-01-25
Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php
Source Address Validation issues inferred during Jan 2025:
ASN Name First-Spoofed Last-Spoofed
39647 REDHOSTING 2019-12-02 2025-01-21
34465 SPV 2022-07-29 2025-01-28
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org