Re: [AusNOG] Potential Issue(s) in Syd via Telstra

2020-08-20 Thread Martin Hepworth
We’ve been seeing packet loss most of the day Sydney timezone to the Uk
offices, but been fine for out Wellington and Palmerston North offices

Interestingly now telia seem to be routing us via Perth to get to Singapore
for the across the Pacific Libkto the USA




On Thu, 20 Aug 2020 at 05:56, Nathan Brookfield <
nathan.brookfi...@simtronic.com.au> wrote:

>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hi Sean,
>
>
>
>
>
> No unusual issues or behaver on Telstra Wholesale service in Equinix SY1
> to Global Switch (Layer 2) at least.  Might be a Layer 3 issue though
> possibly.
>
>
>
>
>
>
>
> Kindest Regards,
>
>
>
>
>
> Nathan Brookfield (VK2NAB)
>
>
> Network Operations Manager
>
>
> Simtronic Technologies Pty Ltd
>
>
>
>
>
> *Local:* (02) 4749 4949 *|* *Fax:* (02)
>
> 4749 4950 *|* *Direct:* (02) 4749 4951
>
>
> *Web*: http://www.simtronic.com.au *|* *E-mail*:
> nathan.brookfi...@simtronic.com.au
>
>
>
>
>
>
>
>
>
>
> CONFIDENTIALITY & PRIVILEGE NOTICE
>
>
>
>
>
> The information contained in this email and any attached files is strictly
> private and confidential. The intended recipient of this email may only use,
>
> reproduce, disclose or distribute the information contained in this email
> and any attached files with Simtronic Technologies Pty Ltd’s permission. If
> you are not the intended recipient, you are strictly prohibited from using,
> reproducing, adapting, disclosing
>
> or distributing the information contained in this email and any attached
> files or taking any action in reliance on it. If you have received this
> email in error, please email the sender by replying to this message,
> promptly delete and destroy any copies of
>
> this email and any attachments.
>
>
>
>
>
> It is your responsibility to scan this communication and any files
> attached for computer viruses and other defects and recommend that you
> subject these to your virus checking procedures prior to use. Simtronic
> Technologies Pty Ltd does NOT accept liability
>
> for any loss or damage (whether direct, indirect, consequential, economic
> or other) however caused, whether by negligence or otherwise, which may
> result directly or indirectly from this communication or any files attached.
>
>
>
>
>
>
>
>
>
>
>
> *From:* AusNOG 
>
> *On Behalf Of *Sean Agius
>
>
> *Sent:* Thursday, 20 August 2020 2:53 PM
>
>
> *To:* ausnog@lists.ausnog.net
>
>
> *Subject:* [AusNOG] Potential Issue(s) in Syd via Telstra
>
>
>
>
>
>
>
>
>
> Hi Guys,
>
>
>
>
>
> Happy Thursday.
>
>
> Just putting the feelers out there; we are seeing some odd behaviour for
> our customers who are on Telstra specifically. Just wondering if anyone
> else in Sydney (S1/2, SY1 etc.), are experiencing any connectivity issues
> via Telstra? We are
>
> raising a case as I write this but just curious. Traceroutes from clients
> thus far see packets dropping before reaching us.
>
>
>
>
>
> Thanks in advance.
>
>
>
>
>
>
>
>
> Regards,
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> *Sean Agius*
>
>
> Senior Engineer
>
>
>
>
>
> *p:*
>
>
>
>
>
> *+61 3 8592 8866 <+61385928866>*
>
>
> *+61 431 236 571 <+61431236571>*
>
>
>
>
>
>
> *u:*
>
>
>
>
>
> *http://www.pingco.com.au/ <http://www.pingco.com.au/>*
>
>
>
>
>
>
> <https://www.google.com/maps/search/Suite%0D%0A+114,+189E+S+Centre+Rd,+%0D%0A+Tullamarine%0D%0A+VIC+3043?entry=gmail&source=g>
>
>
>
> *a:*
>
>
>
>
>
>
>
> *Suite 114, 189E S Centre Rd, <https://goo.gl/maps/TKYaStRjEQEettUC7>*
>
>
>
>
> *Tullamarine VIC 3043 <https://goo.gl/maps/TKYaStRjEQEettUC7>*
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> ___
>
> AusNOG mailing list
>
> AusNOG@lists.ausnog.net
>
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>



-- 
-- 
Martin Hepworth, CISSP
Oxford, UK
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] microsoft online service Telstra DNS issues.

2019-01-29 Thread Martin Hepworth
Global azure /365 issue ongoing

Latest ms twitter is blaming level3 DNS for the issue

On Tue, 29 Jan 2019 at 22:18, simon thomason  wrote:

> Is anyone else having issues with getting to MS online service using
> Telstra DNS?
>
> We have had issues this morning with resolving DNS using Telstra DNS for
> only MS service but have pointed our upsteam DNS to alternative providers
> which have fixed the problem.
>
> I have been told MS are having a major outage but just interested to see
> why it is only on Telstra for us.
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
-- 
-- 
Martin Hepworth, CISSP
Oxford, UK
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] Dutton decryption bill

2018-09-04 Thread Martin Hepworth
ffort to fill it.
>>>>>
>>>>>
>>>>>
>>>>> Kind Regards,
>>>>>
>>>>> Jim.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> *From:* AusNOG  *On Behalf Of *Paul
>>>>> Brooks
>>>>> *Sent:* Tuesday, 4 September 2018 12:05 AM
>>>>> *To:* ausnog@lists.ausnog.net
>>>>> *Subject:* Re: [AusNOG] Dutton decryption bill
>>>>>
>>>>>
>>>>>
>>>>> On 3/09/2018 11:47 AM, Chris Ford wrote:
>>>>>
>>>>> Paul,
>>>>>
>>>>>
>>>>>
>>>>> I agree with you in general as to the point that if we are happy with
>>>>> the premise of the current TIA Act that LEAs should be able to intercept
>>>>> communications with a duly authorised warrant, then extending that to
>>>>> encrypted services seems a reasonable extension to keep up with 
>>>>> technology.
>>>>>
>>>>>
>>>>>
>>>>> However, the current intercept regime is very difficult if not
>>>>> impossible for a bad actor to exploit. The intercept points are within the
>>>>> Carrier and CSP networks, out of reach of most people. When we move to
>>>>> intercept end-to-end encrypted services you either need to break the
>>>>> encryption (which thankfully does not seem to be the path anybody is
>>>>> proposing), OR, you need to access the clear text at the end point itself.
>>>>> The problem I have with this is that the end point is out in user land,
>>>>> often accessible to anyone on the internet, and now exposed to exploit by
>>>>> bad actors.
>>>>>
>>>>> ..And this is it. The new legislation is NOT about encryption,
>>>>> primarily, despite what we thought before the draft was released.
>>>>> They've explicitly acknowledged they can't 'break' encryption, and do
>>>>> not want to weaken encryption. They want the sent and received message
>>>>> text, stored in the device after/before the encrypted transport.
>>>>>
>>>>> Its actually a 'device malware' bill - a bill to enable general police
>>>>> forces to achieve things that previously only shadowy four-letter agencies
>>>>> could do - implant malware and modify the function of any end-user device,
>>>>> handset, modem, laptop, tablet, printer, connected TV, Amazon Alexa/Google
>>>>> Home/etc. Actually it goes further - rather than implant the malware
>>>>> themselves once they've achieved physical access, this 'device malware'
>>>>> bill enables them to ask nicely for assistance, and then to require, the
>>>>> device suppliers and manufacturers to build and implant the exploit for
>>>>> them. Why should AS** develop an exploit, when they can ask Apple or
>>>>> Netgear or Samsung nicely to develop and install the exploit for them.
>>>>>
>>>>> We've spent decades educating users that the green padlock on a
>>>>> website means something, and that 'IOT devices' such as your average Smart
>>>>> TV might be easily hijacked and be recording and watching the home through
>>>>> its microphone and embedded webcam. This bill makes government-authorised
>>>>> modified firmware with exploits that the network and software industry 
>>>>> have
>>>>> spent billions developing virus scanning apps to detect and eradicate.
>>>>>
>>>>> Paul.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>>
>>>>> Chris Ford | CTO
>>>>>
>>>>> Inabox Group Limited
>>>>>
>>>>>
>>>>>
>>>>> Ph: + 61 2 8275 6871
>>>>>
>>>>> Mb: +61 401 988 844
>>>>>
>>>>> Em: chris.f...@inaboxgroup.com.au
>>>>> --
>>>>>
>>>>> *From:* AusNOG 
>>>>>  on behalf of Paul Wilkins
>>>>>  
>>>>> *Sent:* Monday, 3 September 2018 11:31:14 AM
>>>>> *To:* AusNOG@lists.ausnog.net
>>>>> *Subject:* Re: [AusNOG] Dutton decryption bill
>&

Re: [AusNOG] How can I make myself more employable? What do you, as an employer, want?

2017-08-22 Thread Martin Hepworth
What self training and you been doing in the last few months? Doing this
shows youre keen to keep going through the rough patches

How about codeclubs or similar to help out the kids in yr area

Also don't push yourself too hard, work life balance is a thing, and
something alot of people struggle with then burnout

On Tue, 22 Aug 2017 at 16:40, Barry Raveendran Greene 
wrote:

>
> I don’t open attached word documents.
>
> are you this https://www.linkedin.com/in/rory-jones-847910aa/?
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
-- 
-- 
Martin Hepworth, CISSP
Oxford, UK
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] Government intends to pass TSSR this parliament

2017-06-13 Thread Martin Hepworth
We'll see how it does once they get to use WhatsApp like the UK
Conservative Party and realise the political fallout if the newpapers are
able to break this along with the voicemail!

-- 
Martin Hepworth, CISSP
Oxford, UK

On 13 June 2017 at 08:57, Nathanael Bettridge 
wrote:

> That’s the most terrifying line in his speech tbh. The privacy of someone
> who has not been found guilty of a crime should only be overridden by a
> judge, considering all the factors.
>
> Also, https://xkcd.com/538/ comes to mind J
>
>
>
> [image: https://imgs.xkcd.com/comics/security.png]
>
>
>
> *From:* AusNOG [mailto:ausnog-boun...@lists.ausnog.net] *On Behalf Of *Phillip
> Grasso
> *Sent:* Tuesday, 13 June 2017 5:34 PM
> *To:* Mark Newton 
> *Cc:* ausnog@lists.ausnog.net
> *Subject:* Re: [AusNOG] Government intends to pass TSSR this parliament
>
>
>
> "The privacy of a terrorist can never be more important than public
> safety. Never."
>
>
>
> Is it a question of privacy or cost? The means exist to decrypt, its just
> more expensive.
>
>
>
> On 13 June 2017 at 00:16, Mark Newton  wrote:
>
> Brandis: "Trust me, we only want the envelope, not the content."
>
>  laughs>
>
> Brandis: "Actually, we want the content too."
>
> 
>
>
>   - mark
>
>
> On 06/13/2017 04:16 PM, James Andrewartha wrote:
>
> https://www.pm.gov.au/media/2017-06-13/national-security-statement
>
> Also includes the usual BS about breaking encryption in the name of
> national security, aka the war on maths.
>
> "However encrypted messaging applications are also used by criminals and
> terrorists - at the moment much of this traffic is difficult for our
> security agencies to decrypt, and indeed for our Five Eyes partners as
> well.
>
> Most of the major platforms of this kind are based in the United States
> where a strong libertarian tradition resists Government access to private
> communications as the FBI found when Apple would not help unlock the
> iPhone of the dead San Bernardino terrorist.
>
> The privacy of a terrorist can never be more important than public safety.
> Never."
>
>
>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
> --
>
> *Total Control Panel*
>
> Login <https://antispam.avgcloud.net/login?domain=prodigy.com.au>
>
> To: nathan...@prodigy.com.au
> <https://antispam.avgcloud.net/address-properties?aID=1106235830&domain=prodigy.com.au>
>
> From: ausnog-boun...@lists.ausnog.net
>
> Remove
> <https://antispam.avgcloud.net/FooterAction?ver=3&un-wl-sender-domain=1&hID=1998783075&domain=prodigy.com.au>
> lists.ausnog.net from my allow list
>
> *You received this message because the domain lists.ausnog.net
> <http://lists.ausnog.net> is on your allow list.*
>
>
>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog