Dear Subscriber,
This is the monthly reminder of subscription information for the
pacnog list, hosted at APNIC.
For subscription information including how to un-subscribe go to
http://mailman.apnic.net/mailman/listinfo/pacnog
Thank you for participating in this discussion.
Kind Regards,
List administrator
________________________________________________________________________
APNIC 27
23-27 February 2009, Manila, Philippines
________________________________________________________________________
Thank you to everyone who contributed to APNIC 27, held in conjunction
with APRICOT 2009.
The preliminary event participation statistics are:
Total number of delegates (including APRICOT): 473
Delegates at APNIC Member Meeting: 114
Economies represented: 40
APNIC member organizations represented: 113
APNIC held remote participation events via video conference in Suva,
Fiji and Colombo, Sri Lanka. Attendance figures for these events were:
Suva, Fiji 10
Colombo, Sri Lanka 22
Web-based online participation options included a choice of video,
audio and text chat. Participation figures for online remote delegates
were:
Online remote participation feeds 2518
To read, watch or listen to archives from the meeting, go to:
http://meetings.apnic.net
Elections
---------
During the APNIC Member Meeting (AMM) in Manila on Friday, 27
February 2009, the following candidates were elected to the APNIC
Executive Council (EC).
- Jian Zhang
- James Spencley
- Kuo-Wei Wu
- Hyun Joon Kwon
Congratulations to the successful candidates:
Election details are available at:
http://meetings.apnic.net/elections
Meeting decisions
-----------------
Policy SIG
Seven policy proposals were discussed.
The following proposals reached consensus and were subsequently
ratified at the APNIC Member Meeting. These proposals are now
subject to a 'last call' for comments:
prop-050 IPv4 address transfers (with modifications)
prop-069 Global policy proposal for the allocation of IPv4
blocks to Regional Internet Registries
The following proposals did not reach consensus and have been
abandoned:
prop-063 Reducing timeframe of IPv4 allocations from twelve to
six months
prop-060 Change in the criteria for the recognition of NIRs in
the APNIC region
prop-070 Maximum IPv4 allocation size
The following proposals were withdrawn by the author(s):
prop-068 Inter-RIR transfer policy
prop-067 A simple transfer proposal
You can check the status of all policy proposals on the following
page:
http://www.apnic.net/policy/proposals
MoUs Signed
-----------
APNIC signed Memorandums of Understanding with the following
organizations:
NSP (Networkers' Society of Pakistan)
ASTI (Advanced Science and Technology Institute
PHNOG (Philippine Network Operators Group)
Meeting sponsors
----------------
APNIC offers its deepest thanks to the sponsors of APNIC 27, whose
invaluable contributions allowed APNIC to offer a meeting program of a
very high standard:
http://meetings.apnic.net/sponsors
Upcoming APNIC meetings
-----------------------
APNIC 28 24-28 August 2009
Beijing, China
http://www.apnic.net/meetings/28
APNIC 29 1-5 March 2010
Kuala Lumpur, Malaysia
http://www.apnic.net/meetings/29
Regards
--------------------------------------------------------------------
Srinivas (Sunny) Chendi email: sunny(a)apnic.net
External Relations Manager, APNIC sip: sunny(a)voip.apnic.net
http://www.apnic.net ph/fx: +61 7 3858 3100/99
____________________________________________________________________
Dear all,
We are happy to announce that OPT French Polynesia will host in Tahiti the
next PacNOG Educational workshop and Training - PacNOG 5, which is to be
held from 14th to 20th JUNE 2009.
Whilst we are finalizing logistics and details, Invitations, Regisrations
and Participant Information, a tentative agenda has been drafted based on
inputs from last PacNOG discussions and certain priorities that have been
raised in various forums.
We would like to customize this to be most relevant, and not only to meet
your needs but also on prioritisation, therefore we invite you to send us
your input for your specifics for consideration and additional thoughts for
customizing agenda to best meet your needs.. At the end of this list we list
a few that have been received, so feel free to discuss and indicate priority
or if any special needs, including ideas and suggestions. You can also send
it direct to us at coordinator(a)pita.org.fj , or pita(a)connect.com.fj
Objectives
PacNOG Education workshop and Training is aimed to provide a forum and venue
for Network and Service providers in the Pacific Network community to meet
and discuss current issues as well as receive technical training, and also
to build relationships among individual and institutional contacts in the
Pacific region. A key outcome of the workshop will be the building of
relationships with peers/colleagues in the region and among the instructors.
Sponsors; Exhibitors
Invitations to partners and supporters including sponsors are being prepared
if not, already sent. Any funding or sponsor interests are to contact
coordinator(a)pita.org.fj , or pita(a)connect.com.fj for early logistics and
promotional opportunities. To add value and being proposed, a mini
exhibition tradeshow targeting ISP-IP/IT network and services operators may
be organised based on interests. Invitations to suppliers are being
prepared. All interests to send email to coordinator(a)pita.org.fj , or
pita(a)connect.com.fj
PacNOG 5 Agenda
This is the tentative agenda and proposals for PacNOG 5. Meeting dates are
June 14th to 20th, Tahiti French Polynesia.
Saturday
10:00-18:00 - Setups and configuration by Host/Instructors
18:00-20:00 - Informal Social Activity
Sunday
17:00-18:00 - Registration
18:00-20:00 - Welcome Social Activity
Monday
09:00-10:30 - Conference Session 1
Welcome to all Delegates
Host organisation
PITA - Fred Christopher
Keynote Speaker 1
Keynote Speaker 2
10:30-11:00 - Tea Break
11:00-12:30 - Conference Session 2 - Issues and significant developments
with IP Networks
Speaker 1 - Optimising Access resources
Speaker 2 - Dealing with SPAM
Speaker 3 - Participating in Policy developments and formulations
12:30-14:00 - Lunch
14:00-15:30 - Conference Session 3 - Initiatives for future
Speaker 1 - Regional Exchange Point, Aggregations
Speaker 2 - Localising content, Local caching
Speaker 3 - International peering setups and options
15:30-16:00 - Tea Break
16:00-17:30 - Conference Session 4 - Security
Speaker 1 - Underground economy
Speaker 2 - Cyber Security issues: trends and impacts
Topic 3 - Updates & Discussion on Pacific Islands Cyber Security Forum
Evening: Set-up for Workshops
Tuesday
Track One: Systems Workshop: Introduction to Linux
Hervey Allen and Phil Regnauld
Track Two: Routing & IPv6
Philip Smith
Track Three: Cyber Cafes & Network Start ups - by PF (proposed)
Evening Social Event for all delegates
Wednesday
Track One: Network Management Workshop
Hervey Allen and Phil Regnauld
Track Two: Routing & IPv6
Philip Smith
Track Three: Cyber Cafes & Network Start ups - by PF (proposed)
Thursday
Track One: Network Management Workshop
Hervey Allen and Phil Regnauld
Track Two: Routing & IPv6
Philip Smith
Track Three: Cyber Cafes & Network Start ups - by PF (proposed)
Friday
Track One: Security Workshop
Merike Kaeo & Hervey Allen
Track Two: VoIP Workshop
Jonny Martin & Andy Linton
Track Three: Cyber Cafes & Network Start ups - by PF (proposed)
Saturday
Track One: Security Workshop
Merike Kaeo & Hervey Allen
Track Two: VoIP Workshop
Jonny Martin & Andy Linton
Evening: Closing Social Event
Some specific needs given by some members: - FEEL FREE TO SEND YOUR SPECIFIC
NEEDS
1. Systems Workshop - An introduction to Ubuntu i.e loading ubuntu, running
windows programmes on ubuntu, running an ubuntu network etc.
3. Network Management workshop - Nagios, Cricket, Netflow Analyzer, NMS
4. Security Workshop - The use of VPN's and configuration. Securing
transmission between sites
Whilst the details of each session will be released with consultations by
Instructors/ Facilitators, your own SPECIFICS can be considered to help
customize this training.
Details of this event are being finalized however, we will hear from you
soon regarding your specific needs that could be covered.
Regards
Fred Christopher
Manager PITA
pita(a)connect.com.fj
NOTE: THERE IS ALSO PLAN FOR PACNOG 6 IN NOVEMBER - FIJI.
--- alo.anesi(a)bluesky.as wrote:
From: Aloiamoa Anesi <alo.anesi(a)bluesky.as>
On another note, I played with AS prepends a while ago in order to try
and force inbound route selection over our primary link (20Mb versus
our 1.5Mb backup link). After much reading and fudging, I abandoned it
and split our allocation instead. Advertising two /21s in addition to
our /20 over the primary link and only the /20 on our backup link. The
CIDR guys probably wouldn't be too happy if we went around doing this
with anything smaller than a /23, but it's a good tradeoff IMO if you
really need to force inbound route selection.
-------------------------------------------------------
I recall that list conversation a while back and I always wondered how you resolved it... :-) I actually went the same way. I used to do AS path prepends, but it was a struggle. One of our upstreams has better paths to the destinations our customers get the most traffic from and we have smaller pipes to them. We're (Hawaiian Telcom) an eyeball network not a content network, for the most part, so our inbound traffic is way higher than our outbound traffic. The pipes to the more preferred upstream were getting saturated while the provider we had big pipes with was being underutilized. Now, I just announce our aggregates to all upstreams and a more specific to the one I want to attract the higher level of traffic from. I believe you should be able to advertise a more specific as small as a /24 and have no troubles, though, just in case you need more granularity in your traffic balancing.
scott
> =================================
> ==================================
> ================================
>
>
> _______________________________________________
> pacnog mailing list
> pacnog(a)pacnog.org
> http://mailman.apnic.net/mailman/listinfo/pacnog
--- surfer(a)mauigateway.com wrote:
From: "Scott Weeks" <surfer(a)mauigateway.com>
One thing that can be done to help something like this from spreading around the internet is filter your downstream BGP customers.
--------------------------------
I did want to add one thing. The filtering I spoke of is to limit the maximum number of AS paths that a router doing BGP will see in addition to filtering based on the prefixes you expect to see from the customer. Evidently, old cisco code and PC based bgp daemons have the most trouble. From the NANOG mailing list newer cisco code has bgp maxas-limit 75 as the default. Personally, it's hard for me to imagine a need to prepend anywhere close to 75, but it's a wild and wolly internet out there... ;-)
scott
=================================
==================================
================================
Let's not go overboard with our AS Path prepends, ok?
http://www.renesys.com/blog/2009/02/the-flap-heard-around-the-worl.shtml
-------------------------------------------------------
Aloiamoa Anesi, Jr.
Systems Engineer
Blue Sky Communications
478 Laufou Shopping Ctr
Pago Pago, American Samoa 96799
--
Ph: +1.684.699.2759 ext 1098
Cell: +1.684.258.1098
VoIP Business Hours: 1098(a)voip.bluesky.as
Hi,
The general ICANN fellowship application round to the ICANN mtg in Sydney closes on 9 March. If interested to attend that meeting the online application form is at:
http://www.icann.org/en/fellowships/
Scroll down the page for the link to this online form. Anyone with an interest is welcome to apply.
ccTLD managers from the region may also apply via the Country Code Names Supporting Organisation - ccNSO funding as described below.
Regards,
Save
_____________
> The ccNSO travel funding committee is now accepting applications to the
> ICANN meeting in Sydney 21-26 June 2009.
>
> Funding is made available for those who actively participate in the work
> of the ccNSO and make a special contribution to its projects and meetings.
> It covers an economy class ticket to the travel destination, the hotel
> costs for the time of the meeting and a per diem. All travel arrangements
> are made through specially dedicated ICANN staff.
>
> A document with background information and explanations on how the funding
> shall be distributed is available at
> http://www.ccnso.icann.org/about/ccnso-travel-funding-04nov08.pdf
>
> If you think you are eligible to receive funding for the Sydney meeting,
> please send an email to ccnso-travelfunding(a)icann.org by the 13th March
> 2009. The email must contain the name and contact details of the applicant
> as well as a short description of how you think you can contribute to the
> work to the ccNSO. You are also very welcome to suggest items that should
> be covered on the meetings agenda.
>
> Let me know if you should you have any questions, I will be happy to help!
>
> Kind regards,
>
> Gabi
Hi all,
It's that time of week where we send out the list of advisories we have
released.
Please note that there is a new zero day attack using Adobe Acrobat Reader.
See the ShadowServer write up for more information
(http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219).
Regards,
Zane.
------------------------------------------------
Web Log Entries:
----------------
Title: Small increase in port scanning
Date: 15 February 2009
URL: http://www.auscert.org.au/10508
Alerts, Advisories and Updates:
-------------------------------
Title: AA-2009.0019 -- [Win][UNIX/Linux] -- Multiple vulnerabilities
reported
in Wireshark
Date: 20 February 2009
URL: http://www.auscert.org.au/10495
Title: AA-2009.0020 -- [Win] -- Access bypass vulnerability reported in
Trend
Micro Interscan Web Security Suite
Date: 20 February 2009
URL: http://www.auscert.org.au/10496
Title: AA-2009.0034 -- [Linux] -- Linux Kernel 2.6.28.5 corrects a security
vulnerability
Date: 20 February 2009
URL: http://www.auscert.org.au/10529
Title: AA-2009.0035 -- [Win][UNIX/Linux] -- Security vulnerability corrected
in Ruby - Revision 22440
Date: 20 February 2009
URL: http://www.auscert.org.au/10530
Title: AA-2009.0031 -- [Win] -- Code execution vulnerability reported in
FeedDemon
Date: 19 February 2009
URL: http://www.auscert.org.au/10523
Title: AA-2009.0032 -- [Win][UNIX/Linux] -- Security updates released for
Symantec Veritas NetBackup
Date: 19 February 2009
URL: http://www.auscert.org.au/10524
Title: AA-2009.0033 -- [Win][UNIX/Linux] -- Security Updates released for
UltraVNC and TightVnc
Date: 19 February 2009
URL: http://www.auscert.org.au/10525
Title: AA-2008.0211 -- [Win][Appliance] -- Vulnerabilities in multiple Avaya
products
Date: 18 February 2009
URL: http://www.auscert.org.au/9959
Title: AL-2009.0013 -- [Win] -- MS09-003 - Vulnerabilities in Microsoft
Exchange Could Allow Remote Code Execution
Date: 18 February 2009
URL: http://www.auscert.org.au/10478
Title: AA-2009.0025 -- [Win][UNIX/Linux] -- MySQL Community Server 5.0.77
released
Date: 18 February 2009
URL: http://www.auscert.org.au/10515
Title: AU-2009.0009 -- AusCERT Update - [Win] - Updated - MS09-003 -
Vulnerabilities in Microsoft Exchange Could Allow Remote Code
Execution
Date: 18 February 2009
URL: http://www.auscert.org.au/10516
Title: AA-2009.0026 -- [Win][UNIX/Linux] -- Information disclosure
vulnerability in IBM WebSphere Message Broker
Date: 18 February 2009
URL: http://www.auscert.org.au/10517
Title: AA-2009.0027 -- [Win][UNIX/Linux] -- Code execution vulnerability
corrected in ffmpeg
Date: 18 February 2009
URL: http://www.auscert.org.au/10519
Title: AA-2009.0028 -- [UNIX/Linux] -- Patch released for libvirt to correct
privilege escalation vulnerability
Date: 18 February 2009
URL: http://www.auscert.org.au/10520
Title: AA-2009.0029 -- [UNIX/Linux] -- A vulnerability identified in
evolution
may allow for Man in the Middle (MITM) attacks
Date: 18 February 2009
URL: http://www.auscert.org.au/10521
Title: AA-2009.0030 -- [Linux] -- Local Denial of Service (DoS)
vulnerability
corrected in the Linux Kernel
Date: 18 February 2009
URL: http://www.auscert.org.au/10522
Title: AA-2009.0023 -- [Win][UNIX/Linux] -- Security updates available for
IBM
WebSphere Application Server
Date: 17 February 2009
URL: http://www.auscert.org.au/10513
Title: AA-2009.0024 -- [UNIX/Linux] -- ProFTPD 1.3.2 released
Date: 17 February 2009
URL: http://www.auscert.org.au/10514
Title: AA-2009.0021 -- [Win][UNIX/Linux] -- Multiple vulnerabilities
reported
in Bugzilla
Date: 16 February 2009
URL: http://www.auscert.org.au/10503
Title: AA-2009.0022 -- [Win] -- Two remote code execution vulnerabilities in
RealPlayer 11
Date: 16 February 2009
URL: http://www.auscert.org.au/10510
External Security Bulletins:
----------------------------
Title: ESB-2008.0445 -- [HP-UX] -- HP-UX running WBEM Services, Remote
Execution of Arbitrary Code, Gain Extended Privileges
Date: 16 February 2009
OS: HP-UX
URL: http://www.auscert.org.au/9205
Title: ESB-2009.0161 -- [Solaris] -- The Name Service Caching Daemon
(nscd(1M)) Does Not Cache Hosts for Cluster Nodes After Installing
Patch 120011-14 (SPARC) or 120012-14 (x86)
Date: 20 February 2009
OS: Solaris
URL: http://www.auscert.org.au/10528
Title: ESB-2009.0160 -- [RedHat] -- Important: cups security update
Date: 20 February 2009
OS: Red Hat Linux
URL: http://www.auscert.org.au/10527
Title: ESB-2009.0159 -- [RedHat] -- Moderate: imap security update
Date: 20 February 2009
OS: Red Hat Linux
URL: http://www.auscert.org.au/10526
Title: ESB-2009.0158 -- [UNIX/Linux][Ubuntu] -- fglrx-installer
vulnerability
Date: 18 February 2009
OS: Solaris, HP Tru64 UNIX, Ubuntu, Debian GNU/Linux, Other BSD Variants,
IRIX, OpenBSD, FreeBSD, Other Linux Variants, Red Hat Linux, Mac OS
X,
HP-UX, AIX
URL: http://www.auscert.org.au/10518
Title: ESB-2009.0157 -- [FreeBSD] -- telnetd code execution vulnerability
Date: 17 February 2009
OS: FreeBSD
URL: http://www.auscert.org.au/10512
Title: ESB-2009.0156 -- [Win] -- GE Fanuc Proficy HMI/SCADA iFIX uses
insecure
authentication techniques
Date: 17 February 2009
OS: Windows 2003, Windows 2000, Windows XP, Server 2008, Windows Vista
URL: http://www.auscert.org.au/10511
Title: ESB-2009.0155 -- [HP-UX] -- HP-UX Running Apache Web Server Suite,
Remote Denial of Service (DoS), Cross-site Scripting (XSS), Execution
of Arbitrary Code, Cross-Site Request Forgery (CSRF)
Date: 16 February 2009
OS: HP-UX
URL: http://www.auscert.org.au/10509
Title: ESB-2009.0154 -- [Win][Linux][HP-UX][Solaris][AIX] -- A Security
Vulnerability in the Sun Java System Server, Related to the Directory
Proxy Server, May Lead to a Denial of Service (DoS) Condition
Date: 20 February 2009
OS: Windows Vista, AIX, HP-UX, Red Hat Linux, Server 2008, Windows XP,
Other Linux Variants, Windows 2000, Windows 2003, Debian GNU/Linux,
Ubuntu, Solaris
URL: http://www.auscert.org.au/10507
Title: ESB-2009.0153 -- [Solaris] -- A Security Vulnerability in the Solaris
Kerberos PAM Module May Allow Use of a User Specified Kerberos
Configuration File, Leading to Escalation of Privileges
Date: 16 February 2009
OS: Solaris
URL: http://www.auscert.org.au/10506
Title: ESB-2009.0152 -- [Win][UNIX/Linux][Debian] -- New websvn packages fix
information leak
Date: 16 February 2009
OS: Solaris, HP Tru64 UNIX, Ubuntu, Debian GNU/Linux, Other BSD Variants,
IRIX, Windows 2003, OpenBSD, Windows 2000, FreeBSD, Other Linux
Variants, Windows XP, Server 2008, Red Hat Linux, Mac OS X, HP-UX,
AIX,
Windows Vista
URL: http://www.auscert.org.au/10505
Title: ESB-2009.0151 -- [Win][UNIX/Linux][Debian] -- New moodle packages fix
several vulnerabilities
Date: 16 February 2009
OS: Solaris, HP Tru64 UNIX, Ubuntu, Debian GNU/Linux, Other BSD Variants,
IRIX, Windows 2003, OpenBSD, Windows 2000, FreeBSD, Other Linux
Variants, Windows XP, Server 2008, Red Hat Linux, Mac OS X, HP-UX,
AIX,
Windows Vista
URL: http://www.auscert.org.au/10504
Title: ESB-2009.0146 -- [AIX] -- AIX at information disclosure vulnerability
Date: 17 February 2009
OS: AIX
URL: http://www.auscert.org.au/10497
Title: ESB-2009.0143 -- [Win][Linux][HP-UX][Solaris][AIX] -- A Security
Vulnerability in Sun Java System Directory Server May Allow Specific
Requests to Crash the Directory Server Causing a Denial of Service
(DoS)
Date: 18 February 2009
OS: Windows Vista, AIX, HP-UX, Red Hat Linux, Server 2008, Windows XP,
Other Linux Variants, Windows 2000, Windows 2003, Debian GNU/Linux,
Ubuntu, Solaris
URL: http://www.auscert.org.au/10490
Title: ESB-2009.0127 -- [Appliance] -- Certain HP Printers, and HP Digital
Senders, Remote Unauthorized Access to Files
Date: 17 February 2009
URL: http://www.auscert.org.au/10470
Title: ESB-2009.0127 -- [Win][UNIX/Linux] -- HP Storage Essentials SRM,
Remote
Unauthorized Access
Date: 16 February 2009
OS: Windows Vista, AIX, HP-UX, Red Hat Linux, Windows XP, Other Linux
Variants, Windows 2000, Windows 2003, IRIX, Debian GNU/Linux, Ubuntu,
HP Tru64 UNIX, Solaris
URL: http://www.auscert.org.au/8751
Title: ESB-2009.0126 -- [Win][UNIX/Linux][HP-UX][Solaris] -- HP OpenView
Network Node Manager (OV NNM), Remote Execution of Arbitrary Code
Date: 18 February 2009
OS: Windows Vista, HP-UX, Red Hat Linux, Server 2008, Windows XP, Other
Linux Variants, Windows 2000, Windows 2003, Debian GNU/Linux, Ubuntu,
Solaris
URL: http://www.auscert.org.au/10469
Title: ESB-2009.0110 -- [Solaris] -- Security Vulnerability in OpenSSL due
to
Improper Usage of Signature
Date: 20 February 2009
OS: Solaris
URL: http://www.auscert.org.au/10444
Title: ESB-2009.0098 -- [Solaris] -- Security Vulnerability in Solaris BIND
named(1M) due to Incorrect DNSSEC Signature Verification
Date: 16 February 2009
OS: Solaris
URL: http://www.auscert.org.au/10428
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert(a)auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
The Washington Post's Security Fix blog is reporting that Verizon, long identified as the largest ISP source of spam, is moving to require use of the submission port, 587, in outbound mail — and thus to require authentication. While spammers may still be able to relay spam through zombies in Verizon's network, if the victims let their mail clients remember their authentication credentials, at least the zombies will be easily identifiable. Verizon pledges to clean up their zombie problem quickly. We'll see.
http://it.slashdot.org/article.pl?sid=09/02/17/1927213