From mark at duffell.net Mon Sep 1 07:13:47 2025 From: mark at duffell.net (Mark) Date: Mon, 1 Sep 2025 07:13:47 +1000 Subject: [AusNOG] APRICOT 2026: Call for Volunteers (Programme Committee) Message-ID: Hi all, The APRICOT 2026 Organising Committee would like to welcome everyone to join us in Jakarta, Indonesia, from 5th - 12th February 2026. The APRICOT 2026 PC (Programme Committee) is responsible for the solicitation and selection of suitable presentations and tutorial content for the APRICOT 2026 conference (https://2026.apricot.net/). We are now seeking VOLUNTEERS from the community to join the APRICOT 2026 PC to assist with the development of the programme for APRICOT 2026. Eligible PC candidates must have attended recent APRICOT events, be active members of their local NOG (Network Operators Group) in the Asia Pacific region, have broad technical knowledge of Internet operations, and have good familiarity with the format of APRICOT. Having constructive opinions and ideas about how the programme content might be improved is of high value too. PC members are expected to work very actively to solicit content, follow-through with speaker updates and review submissions for technical merit. The PC meets by conference call, weekly in frequency during the three months prior to APRICOT. While participation in the weekly calls is not obligatory, active participation in content reviews is required at all times to help the PC reach consensus. PC members who are unable to fully participate in the programme development will be excused from the PC. If you are interested in joining the PC and meet the above eligibility criteria, please send a brief note to "pc-chairs at apricot.net". The note must include affiliation (if any) and a brief description about why you would make a good addition to the PC. The PC Chairs will accept nominations received by 17:00hrs UTC+8 on Sunday 7th September 2025, and will announce the new PC shortly thereafter. Many thanks! Mark Tinka, Achie Atienza & Mark Duffell APRICOT 2026 Programme Committee Chairs From shiva.pokhrel at deakin.edu.au Wed Sep 3 23:32:46 2025 From: shiva.pokhrel at deakin.edu.au (Shiva Pokhrel) Date: Wed, 3 Sep 2025 13:32:46 +0000 Subject: [AusNOG] PhD Research Opportunities in AI/ML Driven Networking Message-ID: Please broadcast this to the list members. PhD Opportunities in LLM Driven Networking - Deakin University Dear All, We want to announce PhD research opportunities in LLM Driven Networking at Deakin University. Both part-time and full-time positions are available within the IoT and Engineering Research Lab for Australian citizens and permanent residents. We invite interested candidates to submit their CV along with a brief paragraph describing their research interests and areas of expertise for further discussion and consideration. Our current research portfolio includes several ongoing projects in this field, details of which are publicly available (google scholar). We look forward to hearing from motivated and experienced Australian networking experts who are passionate about innovating and expanding the horizons of AI/ML-driven networking technologies. We welcome discussions and encourage you to reach out to us: ? Dr Shiva Pokhrel (shiva.pokhrel at deakin.edu.au) ? Dr Jonathan Kua (jonathan.kua at deakin.edu.au) Snapshots of some of our research works are: i. https://www.sciencedirect.com/science/article/pii/S1389128624005036 (with COMCAST) ii. https://ieeexplore.ieee.org/abstract/document/9444785 (with Bell Labs) iii. https://arxiv.org/abs/2501.16734 (with Defence Unicorns and Columbia University) Important Notice: The contents of this email are intended solely for the named addressee and are confidential; any unauthorised use, reproduction or storage of the contents is expressly prohibited. If you have received this email in error, please delete it and any attachments immediately and advise the sender by return email or telephone. Deakin University does not warrant that this email and any attachments are error or virus free. -------------- next part -------------- An HTML attachment was scrubbed... URL: From lists+ausnog at bensley.me Mon Sep 8 19:00:56 2025 From: lists+ausnog at bensley.me (James Bensley) Date: Mon, 08 Sep 2025 09:00:56 +0000 Subject: [AusNOG] BGP Outputs Wanted Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hi All, is anyone receiving a full BGP table from any of the below ASNs and would be able to send me your equivalent of "show bgp neighbor xyx received-routes" for IPv4 and IPv6? I am doing some BGP research and can't get the data for these ASNs from RouteViews/RIPE RIS/PCH collectors. 701 - Verizon/UUNET 1239 - T-Mobile/Sprint 1273 - Vodafone 2635 - Automattic 12389 - Rostelecom 13335 - Cloudflare 23911 - China Next Generation Internet Beijing 37721 - Virtual Technologies & Solutions 38255 - China Education and Research Network 57463 - NetIX Communications Happy to put a credit to you when I present my findings. Any help here would be greatly appreciated. With kind regards, James. -----BEGIN PGP SIGNATURE----- Version: ProtonMail wsG5BAEBCgBtBYJovps7CZCoEx+igX+A+0UUAAAAAAAcACBzYWx0QG5vdGF0 aW9ucy5vcGVucGdwanMub3JnxlE3ZlTHQ0X5Pu19SooynT2HeIGSvqeskLaC jLgYDakWIQQ+k2NZBObfK8Tl7sKoEx+igX+A+wAA1FsP/AloI0QmAqAFlfPy Bq/xFCGJdOEh4afumQB6x1u65OmzYvIWyKysJZOqtAoxyng29uydb/urho50 xIx97LKUr0KXdiQJIZmIoFVmSzx6gs+DDEu7qBjqI7tkPZaxW2DhjNl71GXx tFwBM4lkA2bcMV+n+SFsT55QUhr6l5kpF+ZZcPl7weeL4VQpRm4UMX50jAT+ +vMv12rJLkKem8pUG3rwu5ibrqJRDLla72fd2Hl9CBX/is6NjIkcy6t7gQUD SdQuCh9zHEZCcflokRQGEuNkZ50L1DIxF9j/f2tzKFv9RyJShJgTRig2p3+o sWV8001DtNXThJ4vcTmbl4vyFeDL9Cr7RstFuYdhUxmNVsFlRvaXuyqsgDAa lkhwa7fA5sV/wQBsV7apvOzl5hoXa4IKp7BimpddDyR2n08/ZFC1HtdErG4G KiVoFXftE+CmWW42Vn2IZlKOHxdyDM13T5waud+d+effE9Iv6jacL2MzGBuu b00qMGywUpWZCVQVyb/FkIkmdc7pND6iuBDIUOAtAJmpfigxKWoVHMYnS/yz 2g1IuWNBoiBQj+uLhQAJPY1jVPEZHajqvyogMDmIQhkCvZvPtfcaR0K+YhOJ 0xCbtxSGMialYIXWiZwBUjTtblCiusUi0S8l8mSBvfVyz20HqfIFi9mKU8QN iVMjfSzS =21Dn -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: publickey - lists+ausnog at bensley.me - 0x3E936359.asc Type: application/pgp-keys Size: 3138 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: publickey - lists+ausnog at bensley.me - 0x3E936359.asc.sig Type: application/pgp-signature Size: 636 bytes Desc: not available URL: From spoofer-info at caida.org Tue Sep 9 03:00:32 2025 From: spoofer-info at caida.org (CAIDA Spoofer Project) Date: Mon, 8 Sep 2025 10:00:32 -0700 Subject: [AusNOG] Spoofer Report for AusNOG for Aug 2025 Message-ID: <1757350832.020621.25038.nullmailer@caida.org> In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within aus. Inferred improvements during Aug 2025: ASN Name Fixed-By 10214 PENTANET 2025-08-27 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during Aug 2025: ASN Name First-Spoofed Last-Spoofed 152107 2024-02-25 2025-08-31 150369 2025-01-30 2025-08-14 152317 2025-08-25 2025-08-25 152390 2025-08-26 2025-08-26 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=aus&no_block=1 Please send any feedback or suggestions to spoofer-info at caida.org From ltd at interlink.com.au Sat Sep 13 09:59:37 2025 From: ltd at interlink.com.au (Lincoln Dale) Date: Sat, 13 Sep 2025 09:59:37 +1000 Subject: [AusNOG] BGP Outputs Wanted In-Reply-To: References: Message-ID: On Mon, Sep 8, 2025 at 7:02?PM James Bensley wrote: > is anyone receiving a full BGP table from any of the below ASNs and would > be able to send me your equivalent of "show bgp neighbor xyx > received-routes" for IPv4 and IPv6? > I am doing some BGP research and can't get the data for these ASNs from > RouteViews/RIPE RIS/PCH collectors. > The way you've phrased this likely means that you're missing a key point in how some of these networks "route". There's not likely such a thing as a "full table" from many of these ASNs, and it's highly likely that most of them don't announce all prefixes in all places either. Put another way, you could get a routing view as viewed from some viewpoint on the internet. But its likely different in other places, and not all prefixes are announced the same way in all places. Its very unlikely you could get a "routing view" from enough places to see this, besides maybe teaming up with what bgp.tools or similar provides. But even that will have limits as e.g. I suspect most CDNs/Hyperscalers have the majority of their traffic via single-ASN-hop to most of the eyeball networks. > -------------- next part -------------- An HTML attachment was scrubbed... URL: From tijay at cs.vt.edu Thu Sep 18 23:51:47 2025 From: tijay at cs.vt.edu (Taejoong (tijay) Chung) Date: Thu, 18 Sep 2025 09:51:47 -0400 Subject: [AusNOG] Call for operator feedback on AS-to-org mapping tool (ASINT). Message-ID: Hello AusNOG. (My apologies if you have received duplicated messages) My name is Tijay Chung, and I am a researcher at Virginia Tech. Our team at Virginia Tech has been building *ASINT *, a research tool that *maps ASNs to their operating organizations* by combining Internet-routing metadata (WHOIS, PeeringDB, corp websites, M&A records, etc.) with large-language-model analysis. It is conceptually similar to CAIDA's AS2ORG, but with broader coverage. A use case is reducing false positives in BGP hijack detection by identifying when different origin ASNs actually belong to the same organization. *Please try it:* 1. AS search for AS 18733 (Microsoft and acquired ASNs): https://asint.netsecurelab.org/as-search/18733 2. Organization search for Deloitte (across multiple RIRs): https://asint.netsecurelab.org/org-search?q=deloitte *Why this might help:* Systems like Cloudflare Radar flag anomalies when the origin ASN does not match ROAs. Many of these are not hijacks but legitimate internal re-announcements between sibling ASNs. In our dataset of 17,282 such alerts (Jan 2023?Jul 2024), ASINT identified 1,621 cases (~9.4%) as likely intra-org. We sampled 100 of these and contacted operators; all 32 who replied confirmed they were internal, not hijacks. *What we need from you:* 1. Please check your org and ASNs. If you see a correct mapping, click the thumbs-up. If you see an error or a missing ASN, click the thumbs-down. After that, a short comment box appears. Any details you can share are valuable: correct legal entity name, subsidiaries, brand vs legal names, recent M&A, reseller or DDoS-scrubbing scenarios, multi-tenant NOCs, government or university structures, region-specific business units, joint ventures, or anything else that explains why two ASNs should or should not be grouped. 2. Expect errors. We know there are two classes: - False positives: we group ASNs under the same organization even though they are different. - Misses: we fail to group sibling ASNs that should be together. *If you spot either, please rate and leave a comment. We will feed your comments into the next LLM pipeline cycle to correct mappings and tune extraction rules.* 3. Any feedback is welcome: data sources we should incorporate, edge cases that keep biting you, risk of over-merges vs under-merges, UI issues, or better ways to present evidence. If you prefer email, reply here or write to our team: tijay at vt.edu, yongzhe at vt.edu, weitongli at vt.edu We aim to complement, not replace, existing datasets and community curation. If you maintain ground-truth lists for your org and are willing to share pointers, that helps everyone. If this is useful, we will report a summary of corrections learned from the community and continue iterating. Thanks for taking a look and for any time you can spare. Thanks, Tijay Chung, Associate Professor Virginia Tech | Computer Science 220 Gilbert Street, Suite 4303 Blacksburg, VA 24060 (540) 231-0667| tijay at vt.edu -------------- next part -------------- An HTML attachment was scrubbed... URL: From dazzagibbs at gmail.com Mon Sep 22 16:53:45 2025 From: dazzagibbs at gmail.com (DaZZa) Date: Mon, 22 Sep 2025 16:53:45 +1000 Subject: [AusNOG] Packet loss on Vocus? Message-ID: hey folks. Anyone seeing large packet loss on the Vocus network? I'm getting big losses on VPN's into the UK from Sydney and the culprit seems to be somewhere in Vocus Vis-a-vis Host Loss% Snt Last Avg Best Wrst StDev 1. 10.100.1.253 0.0% 81 1.9 1.3 0.9 2.7 0.1 2. e-1-1.syd-fuj-pan.ai.prod 0.0% 81 0.9 0.7 0.5 1.4 0.0 3. 202.52.142.6 0.0% 81 0.9 0.8 0.6 1.1 0.0 4. ip-229.80.254.124.vocus.net.au 0.0% 81 3.1 2.5 1.7 16.9 2.3 5. be150.cor03.syd14.nsw.vocus.network 91.2% 81 92.2 92.2 92.1 92.4 0.0 6. be203.lsr01.brdg.nsw.vocus.network 6.2% 81 94.3 94.1 93.7 95.4 0.1 7. be803.lsr01.stpk.wa.vocus.network 13.6% 81 92.8 92.6 92.2 93.1 0.0 8. be200.cor03.per04.wa.vocus.network 83.8% 81 92.3 92.0 91.9 92.3 0.0 9. be200.bdr01.sin01.sin.vocus.network 74.1% 81 92.2 92.0 91.8 92.5 0.0 10. ae7-638.rt.eqx.sin.sg.retn.net 43.2% 81 92.4 92.3 92.1 92.8 0.0 11. ae2-5.rt.irx.mrs.fr.retn.net 0.0% 81 229.4 230.5 229.2 246.6 3.4 12. ??? 13. ??? 14. 52.93.21.77 0.0% 80 231.0 232.2 230.0 245.6 2.7 15. ??? (This is to a VPN endpoint in AWS UK) Host Loss% Snt Last Avg Best Wrst StDev 1. 10.100.1.253 0.0% 32 1.5 1.4 1.0 2.4 0.0 2. e-1-1.syd-fuj-pan.ai.prod 0.0% 32 0.9 0.8 0.6 1.2 0.0 3. 202.52.142.6 0.0% 32 1.1 0.9 0.8 1.2 0.0 4. ip-229.80.254.124.vocus.net.au 0.0% 32 2.1 2.2 1.7 3.6 0.3 5. be150.cor03.syd14.nsw.vocus.network 77.4% 32 92.5 92.3 92.1 92.5 0.0 6. be203.lsr01.brdg.nsw.vocus.network 0.0% 32 94.3 94.3 93.8 94.8 0.0 7. be803.lsr01.stpk.wa.vocus.network 34.4% 32 92.7 92.7 92.4 93.1 0.0 8. be200.cor03.per04.wa.vocus.network 93.5% 32 92.1 92.1 92.0 92.1 0.0 9. be200.bdr01.sin01.sin.vocus.network 71.0% 32 92.2 92.2 92.0 92.8 0.0 10. ae7-638.rt.eqx.sin.sg.retn.net 66.7% 31 92.4 92.3 92.1 92.5 0.0 11. ae2-5.rt.irx.mrs.fr.retn.net 0.0% 31 230.7 229.9 229.2 236.6 1.3 12. ??? 13. ??? 14. 52.93.21.127 0.0% 30 230.2 232.5 229.7 253.2 5.6 15. ??? (Other VPN endpoint of the same pair into AWS). Anyone else seeing similar from Vocus, or should I look deeper into my local link? Thanks D From phil.mawson at gmail.com Mon Sep 22 17:13:31 2025 From: phil.mawson at gmail.com (Phil Mawson) Date: Mon, 22 Sep 2025 17:13:31 +1000 Subject: [AusNOG] Packet loss on Vocus? In-Reply-To: References: Message-ID: <38547C0F-F8A3-42BE-964E-AB8C3C35A4CB@gmail.com> Hi, Looking into this one now Thanks, Phil @ Vocus > On 22 Sep 2025, at 4:53?pm, DaZZa wrote: > > hey folks. > > Anyone seeing large packet loss on the Vocus network? > > I'm getting big losses on VPN's into the UK from Sydney and the > culprit seems to be somewhere in Vocus > > Vis-a-vis > > Host > Loss% > Snt Last Avg Best Wrst StDev > 1. 10.100.1.253 > 0.0% > 81 1.9 1.3 0.9 2.7 0.1 > 2. e-1-1.syd-fuj-pan.ai.prod > 0.0% > 81 0.9 0.7 0.5 1.4 0.0 > 3. 202.52.142.6 > 0.0% > 81 0.9 0.8 0.6 1.1 0.0 > 4. ip-229.80.254.124.vocus.net.au > 0.0% > 81 3.1 2.5 1.7 16.9 2.3 > 5. be150.cor03.syd14.nsw.vocus.network > 91.2% > 81 92.2 92.2 92.1 92.4 0.0 > 6. be203.lsr01.brdg.nsw.vocus.network > 6.2% > 81 94.3 94.1 93.7 95.4 0.1 > 7. be803.lsr01.stpk.wa.vocus.network > 13.6% > 81 92.8 92.6 92.2 93.1 0.0 > 8. be200.cor03.per04.wa.vocus.network > 83.8% > 81 92.3 92.0 91.9 92.3 0.0 > 9. be200.bdr01.sin01.sin.vocus.network > 74.1% > 81 92.2 92.0 91.8 92.5 0.0 > 10. ae7-638.rt.eqx.sin.sg.retn.net > 43.2% > 81 92.4 92.3 92.1 92.8 0.0 > 11. ae2-5.rt.irx.mrs.fr.retn.net > 0.0% > 81 229.4 230.5 229.2 246.6 3.4 > 12. ??? > 13. ??? > 14. 52.93.21.77 > 0.0% > 80 231.0 232.2 230.0 245.6 2.7 > 15. ??? > > (This is to a VPN endpoint in AWS UK) > > Host > Loss% > Snt Last Avg Best Wrst StDev > 1. 10.100.1.253 > 0.0% > 32 1.5 1.4 1.0 2.4 0.0 > 2. e-1-1.syd-fuj-pan.ai.prod > 0.0% > 32 0.9 0.8 0.6 1.2 0.0 > 3. 202.52.142.6 > 0.0% > 32 1.1 0.9 0.8 1.2 0.0 > 4. ip-229.80.254.124.vocus.net.au > 0.0% > 32 2.1 2.2 1.7 3.6 0.3 > 5. be150.cor03.syd14.nsw.vocus.network > 77.4% > 32 92.5 92.3 92.1 92.5 0.0 > 6. be203.lsr01.brdg.nsw.vocus.network > 0.0% > 32 94.3 94.3 93.8 94.8 0.0 > 7. be803.lsr01.stpk.wa.vocus.network > 34.4% > 32 92.7 92.7 92.4 93.1 0.0 > 8. be200.cor03.per04.wa.vocus.network > 93.5% > 32 92.1 92.1 92.0 92.1 0.0 > 9. be200.bdr01.sin01.sin.vocus.network > 71.0% > 32 92.2 92.2 92.0 92.8 0.0 > 10. ae7-638.rt.eqx.sin.sg.retn.net > 66.7% > 31 92.4 92.3 92.1 92.5 0.0 > 11. ae2-5.rt.irx.mrs.fr.retn.net > 0.0% > 31 230.7 229.9 229.2 236.6 1.3 > 12. ??? > 13. ??? > 14. 52.93.21.127 > 0.0% > 30 230.2 232.5 229.7 253.2 5.6 > 15. ??? > > (Other VPN endpoint of the same pair into AWS). > > Anyone else seeing similar from Vocus, or should I look deeper into my > local link? > > Thanks > > D > _______________________________________________ > AusNOG mailing list > AusNOG at lists.ausnog.net > https://lists.ausnog.net/mailman/listinfo/ausnog From alex at samad.com.au Wed Sep 24 12:09:17 2025 From: alex at samad.com.au (Alex Samad) Date: Wed, 24 Sep 2025 12:09:17 +1000 Subject: [AusNOG] Packet loss on Vocus? In-Reply-To: <38547C0F-F8A3-42BE-964E-AB8C3C35A4CB@gmail.com> References: <38547C0F-F8A3-42BE-964E-AB8C3C35A4CB@gmail.com> Message-ID: On my phone so terse .. Ive seen issue with vocus and mixed in ntt. Ive seen bad packet loss into eu and USA .. Some not as bad into Japan . I see packet loss from 10sec upto 70-90sec Ive been testing using TCP socket connection on port 443 and 22. Alex On Mon, 22 Sept 2025, 17:14 Phil Mawson, wrote: > Hi, > > Looking into this one now > > Thanks, > Phil @ Vocus > > > On 22 Sep 2025, at 4:53?pm, DaZZa wrote: > > > > hey folks. > > > > Anyone seeing large packet loss on the Vocus network? > > > > I'm getting big losses on VPN's into the UK from Sydney and the > > culprit seems to be somewhere in Vocus > > > > Vis-a-vis > > > > Host > > Loss% > > Snt Last Avg Best Wrst StDev > > 1. 10.100.1.253 > > 0.0% > > 81 1.9 1.3 0.9 2.7 0.1 > > 2. e-1-1.syd-fuj-pan.ai.prod > > 0.0% > > 81 0.9 0.7 0.5 1.4 0.0 > > 3. 202.52.142.6 > > 0.0% > > 81 0.9 0.8 0.6 1.1 0.0 > > 4. ip-229.80.254.124.vocus.net.au > > 0.0% > > 81 3.1 2.5 1.7 16.9 2.3 > > 5. be150.cor03.syd14.nsw.vocus.network > > 91.2% > > 81 92.2 92.2 92.1 92.4 0.0 > > 6. be203.lsr01.brdg.nsw.vocus.network > > 6.2% > > 81 94.3 94.1 93.7 95.4 0.1 > > 7. be803.lsr01.stpk.wa.vocus.network > > 13.6% > > 81 92.8 92.6 92.2 93.1 0.0 > > 8. be200.cor03.per04.wa.vocus.network > > 83.8% > > 81 92.3 92.0 91.9 92.3 0.0 > > 9. be200.bdr01.sin01.sin.vocus.network > > 74.1% > > 81 92.2 92.0 91.8 92.5 0.0 > > 10. ae7-638.rt.eqx.sin.sg.retn.net > > 43.2% > > 81 92.4 92.3 92.1 92.8 0.0 > > 11. ae2-5.rt.irx.mrs.fr.retn.net > > 0.0% > > 81 229.4 230.5 229.2 246.6 3.4 > > 12. ??? > > 13. ??? > > 14. 52.93.21.77 > > 0.0% > > 80 231.0 232.2 230.0 245.6 2.7 > > 15. ??? > > > > (This is to a VPN endpoint in AWS UK) > > > > Host > > Loss% > > Snt Last Avg Best Wrst StDev > > 1. 10.100.1.253 > > 0.0% > > 32 1.5 1.4 1.0 2.4 0.0 > > 2. e-1-1.syd-fuj-pan.ai.prod > > 0.0% > > 32 0.9 0.8 0.6 1.2 0.0 > > 3. 202.52.142.6 > > 0.0% > > 32 1.1 0.9 0.8 1.2 0.0 > > 4. ip-229.80.254.124.vocus.net.au > > 0.0% > > 32 2.1 2.2 1.7 3.6 0.3 > > 5. be150.cor03.syd14.nsw.vocus.network > > 77.4% > > 32 92.5 92.3 92.1 92.5 0.0 > > 6. be203.lsr01.brdg.nsw.vocus.network > > 0.0% > > 32 94.3 94.3 93.8 94.8 0.0 > > 7. be803.lsr01.stpk.wa.vocus.network > > 34.4% > > 32 92.7 92.7 92.4 93.1 0.0 > > 8. be200.cor03.per04.wa.vocus.network > > 93.5% > > 32 92.1 92.1 92.0 92.1 0.0 > > 9. be200.bdr01.sin01.sin.vocus.network > > 71.0% > > 32 92.2 92.2 92.0 92.8 0.0 > > 10. ae7-638.rt.eqx.sin.sg.retn.net > > 66.7% > > 31 92.4 92.3 92.1 92.5 0.0 > > 11. ae2-5.rt.irx.mrs.fr.retn.net > > 0.0% > > 31 230.7 229.9 229.2 236.6 1.3 > > 12. ??? > > 13. ??? > > 14. 52.93.21.127 > > 0.0% > > 30 230.2 232.5 229.7 253.2 5.6 > > 15. ??? > > > > (Other VPN endpoint of the same pair into AWS). > > > > Anyone else seeing similar from Vocus, or should I look deeper into my > > local link? > > > > Thanks > > > > D > > _______________________________________________ > > AusNOG mailing list > > AusNOG at lists.ausnog.net > > https://lists.ausnog.net/mailman/listinfo/ausnog > > _______________________________________________ > AusNOG mailing list > AusNOG at lists.ausnog.net > https://lists.ausnog.net/mailman/listinfo/ausnog > -------------- next part -------------- An HTML attachment was scrubbed... URL: From mark at duffell.net Thu Sep 25 18:08:11 2025 From: mark at duffell.net (Mark) Date: Thu, 25 Sep 2025 18:08:11 +1000 Subject: [AusNOG] APRICOT 2026: Call for Papers Message-ID: Hi AusNOG :) The APRICOT 2026 Program Committee chairs are pleased to announce that the Call for Papers (CfP) has been published at the below URL: https://2026.apricot.net/programme/callforpresentations We look forward to receiving your submissions, noting that the APRICOT 2026 conference in Jakarta, Indonesia will be held one month earlier than is usually the case; 9th - 11th February, 2026. The sooner you can submit your presentation, the greater the chance it could make the final agenda. Any questions regarding the CfP please feel free to reach out to the PC team. Thank you. Mark Tinka, Mark Duffell & Achie Atienza APRICOT 2026 Programme Committee Chairs