Send sanog mailing list submissions to
        sanog@sanog.org

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sanog.org/mailman/listinfo/sanog
or, via email, send a message with subject or body 'help' to
        sanog-requ...@sanog.org

You can reach the person managing the list at
        sanog-ow...@sanog.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of sanog digest..."


Today's Topics:

   1. IANA AS Numbers Registry Update (Selina Harrington)
   2. Spoofer Report for SANOG for Nov 2021 (CAIDA Spoofer Project)


----------------------------------------------------------------------

Message: 1
Date: Wed, 8 Dec 2021 16:42:03 +0000
From: Selina Harrington <selina.harring...@iana.org>
To: "sanog@sanog.org" <sanog@sanog.org>
Subject: [SANOG] IANA AS Numbers Registry Update
Message-ID: <6d46ddf5-1288-485c-8f5d-875e1b512...@iana.org>
Content-Type: text/plain; charset="utf-8"

Hi,

The IANA AS Numbers registry has been updated to reflect the allocation of the 
following block to LACNIC:

272797-273820    Assigned by LACNIC    2021-12-07

You can find the registry at:

https://www.iana.org/assignments/as-numbers/

The allocation was made in accordance with the Policy for Allocation of ASN 
Blocks to Regional Internet Registries:

https://www.icann.org/resources/pages/global-policy-asn-blocks-2010-09-21-en

Best Regards,

--
Selina Harrington
Lead IANA Services Specialist





------------------------------

Message: 2
Date: Wed, 8 Dec 2021 10:00:22 -0800
From: CAIDA Spoofer Project <spoofer-i...@caida.org>
To: sanog@sanog.org
Subject: [SANOG] Spoofer Report for SANOG for Nov 2021
Message-ID: <1638986422.028466.28174.nullmai...@caida.org>
Content-Type: text/plain; charset="us-ascii"

In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within afg, bgd, btn, lka, mdv, npl, pak.

Inferred improvements during Nov 2021:
 none inferred

Source Address Validation issues inferred during Nov 2021:
ASN    Name                           First-Spoofed Last-Spoofed
45650  VIANET-NP                         2020-09-23   2021-11-26
38712  TELNET-AS-BD-AP                   2020-10-21   2021-11-25
23955  TASHICELL-DOMESTIC                2021-01-17   2021-11-24
23923  AGNI                              2021-03-21   2021-11-21
136969 KKNETWROK                         2021-03-30   2021-11-24
132480 NTPL                              2021-09-11   2021-11-17
134153 XPLORECYBERNET                    2021-11-01   2021-11-01
63851  BANKALFALAHLTD                    2021-11-02   2021-11-02
139697 MIKROGATE                         2021-11-13   2021-11-13

Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=afg,bgd,btn,lka,mdv,npl,pak&no_block=1

Please send any feedback or suggestions to spoofer-i...@caida.org


------------------------------

Subject: Digest Footer

_______________________________________________
sanog mailing list
sanog@sanog.org
https://lists.sanog.org/mailman/listinfo/sanog


------------------------------

End of sanog Digest, Vol 119, Issue 3
*************************************

Reply via email to