This workshop will be a hybrid event.
Date - 16-17 May 2026
Location - Edinburgh, Scotland
Times - approximately 09:00-16:00 UTC (Local time BST is UTC +1 )
Adjacent to - RIPE 92 (18 - 22 May 2026, https://ripe92.ripe.net/)
Deadline for Submissions - 2026-03-06 23:59 UTC
https://indico.dns-oarc.net/event/56/abstracts/
All DNS-related subjects and discussion topics are welcome although
we're particularly keen to hear more about operational and security
related experiences, best practices and practical advice; both for
newcomers to the DNS arena and those who have been around for longer who
want to learn more about new features and opportunities to improve
resilience, security and privacy. (These topics we think will complement
the usual high-quality data-based research submissions we always hope to
receive!)
If you have something interesting to share with the community that lies
outside of the focus above, please don't be put off - if it's good,
we'll be happy to include it.
If you'd like to offer a talk, but are not quite sure what to pick,
here's a non-exhaustive list of ideas:
1. *Operations & Deployment*
* Configuration management, deployment processes, and
interoperability experiences.
* Tools, tips, and making effective use of DNS software features.
2. *Performance, Resilience & Scaling*
* Provisioning, load-balancing, and planning for resilience.
* DNS performance management, efficiency improvements, and metrics.
* Monitoring infrastructure: log pipelines, analytics, and anomaly
detection.
3. *Security, Privacy & Policy*
* DoS attacks, DNS abuse, DNSSEC signing and validation.
* Privacy considerations, for example: encrypted transport, qname
minimization, data anonymization.
* Relevant global and regional policies, legislation, and compliance.
4. *Research & Innovation*
* Data-driven testing, measurement, and analysis.
* New protocols, protocol extensions, and next-generation
namespace management.
5. *Lessons & Learnings*
* Outage experiences, recovery stories, and cautionary tales
For further details please see https://www.dns-oarc.net/oarc46
Willem Toorop, for the DNS-OARC Programme Committee
Hello,
We were notified by Pretix, the company hosting the ticketing system we have used for our events for the last few years, of a security incident, which in theory could lead to exfiltration of personal information of people who bought a ticket.
The issue in their software has been resolved by Pretix, and no evidence has been found that this vulnerability has been exploited. More information on this can be found here: https://pretix.eu/about/en/blog/20260216-release-2026-1-1/
We realise that many of you use unique email addresses to identify sources of spam, so if you do see any unexpeced email on the address you used to for obtaining a ticket, please do let us know, so we can contact Pretix about it.
Even although this doesn't help for this incident, for future events we will make sure that we will quickly remove all personally identifiable information (PII) after the event has taken place. And of course we will make sure to to this for past events now.
On behalf of the NLNOG board,
Teun
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during Jan 2026:
none inferred
Source Address Validation issues inferred during Jan 2026:
ASN Name First-Spoofed Last-Spoofed
28685 ASN-ROUTIT 2017-03-26 2026-01-29
39647 REDHOSTING 2019-12-02 2026-01-26
3920 IMS-RTFM 2023-10-06 2026-01-30
62353 ASN-DATAPLACE 2023-12-12 2026-01-23
35316 PRODACOM 2025-12-17 2026-01-27
134835 SNL-HK 2026-01-22 2026-01-22
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org