Yessir! It definitely takes a village, and NANOG is mostly certainly that village! On Tue, Mar 24, 2026, 10:35 AM Scott Fisher <sfisher@cymru.com> wrote:
The takedown was also due to the help of network operators, many of whom are on this list. Huzzah!
Thanks, Scott
On Mar 24, 2026, at 1:27 PM, cosmo via NANOG <nanog@lists.nanog.org> wrote:
The news is likely a response to recent events. Props go to the FBI Alaska field office!
District of Alaska | Authorities disrupt world’s largest IoT DDoS botnets responsible for record breaking attacks targeting victims worldwide | United States Department of Justice https://share.google/oNBQGeRtp05TtSbMI
On Tue, Mar 24, 2026, 10:05 AM John Levine via NANOG < nanog@lists.nanog.org> wrote:
It appears that Saku Ytti via NANOG <nanog@lists.nanog.org> said:
Relevant URLs are
https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf https://www.fcc.gov/supplychain/coveredlist
'Routers^ produced in a foreign country, except routers which have been granted a Conditional Approval by DoW or DHS.'
I wonder what 'Routers^' are 'produced' in the US, in such a way that it meaningfully improves security posture.
As far as I know, the answer is none. There are plenty of routers designed in the US but they're all built offshore. It would make sense to ask where the software is written, but they don't do that.
The conditional approval procedure is absurd. It requires the vendor to commit to manufacture in the U.S.
R's, John _______________________________________________ NANOG mailing list
https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/FSHMKN36...
_______________________________________________ NANOG mailing list
https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/N4WOGJW3...