UKNOF33 (London)

chaired by Keith Mitchell (UKNOF)
Tuesday, 19 January 2016 from to (Europe/London)
at etc Venues Bishopsgate
155 Bishopsgate Liverpool Street London EC2M 3YD

Participant Survey: (until Sunday 7 February 2016)

Presentation Videos

Live Webcast: (now ended)


IRC Chatroom:

Twitter hashtag: #UKNOF33

We are thankful to our sponsors for supporting UKNOF, enabling us to keep attendance at UKNOF meetings mainly free.




IPv4 Market group







Metaswitch      ProLabs


Bogons       Bytemark      Jump Networks     Portfast     


PINTS N' PACKETS Networking Event



ADVA Optical
     Ai Networks     AQL

     sohonet     Xantaro


Registration: Registrations are now open at the REGISTRATIONS PAGE.

Call for Presentations: Now closed.

Volunteers: We always appreciate volunteer help in setting up and running UKNOF events. If you're interested in helping at UKNOF33, please indicate this on the registration form. Our helpers always make a big difference.

Sponsors: We have the following sponsor opportunities for UKNOF33 and 2016:

  • Meeting Sponsorships
  • UKNOF Social / Pints n' Promos Sponsorships
  • Individual and Organisation Patron Sponsorships for 2016
Further details in our Call for Sponsors page. We are grateful to our sponsors, enabling us to keep attendance at the meeting mainly free.

If you are interested in supporting UKNOF, please contact us on


Floor Plan pdf file Function Sheet spreadsheet file pdf filedown arrow
Go to day
  • Tuesday, 19 January 2016
    • 09:00 - 10:00 Registration and Breakfast
    • 09:55 - 10:00 Welcome and Information 5'
      Speaker: Mr. Keith Mitchell (UKNOF)
      Material: Slides pdf file
    • 10:00 - 10:30 Network Attachment Privacy 30'
      In the process of network attachment to IEEE 802 networks a mobile device can potentially reveal a lot about where its user has been and when. The current use of an immutable link-layer address also facilitates persistent tracking. These privacy issues are firstly down to the design of the link layer addressing and protocols, and secondly due to protocols used in IP address acquisition or reacquisition (e.g. DHCP, DNA). The current situation is now starting to change, with some devices beginning to use ephemeral link-layer addressing and also improving their implementation of address acquisition protocols. Furthermore a number of standards bodies are starting to take privacy more seriously and have begun various efforts to address it.
      Speaker: Mr. Piers O'Hanlon (University of Oxford)
      Material: Presentation Video link Slides pdf file
    • 10:30 - 11:00 IPv6 Community Best Practices: Unique IPv6 Prefix Per Host 30'
      In some IPv6 environments the need has arisen for hosts to be able to utilise a unique IPv6 prefix even though the link or media may be shared.  Typically hosts subscribers) on a shared network, like Wi-Fi or Ethernet, will acquire unique IPv6 addresses from a common IPv6 prefix that is allocated or assigned for use on a specific link. Benefits of a unique IPv6 prefix compared to a unique IPv6 address from the service provider are going from enhanced subscriber management to improved isolation between subscribers.
      In most deployments today IPv6 address assignment from a single IPv6 prefix on a shared network is done by either using IPv6 stateless address auto-configuration (SLAAC) and/or stateful DHCPv6.  While this is still viable and operates as designed there are some large scale environments where this concept introduces significant   performance challenges and implications, specifically related to IPv6 router and neighbor discovery.  This presentation will provide an overview of how IPv6 community Wi-Fi best common practices documented in draft-ietf-v6ops-unique-ipv6-prefix-per-host.
      Speaker: Mr. Gunter Van de Velde (Alcatel-Lucent)
      Material: Paper pdf file Presentation Video link Slides unknown type file
    • 11:00 - 11:15 Corero Sponsor Presentation - SDN/NFV DDoS Requirements 15'
      "The Mobile Use Case – 5G"
      SP carrier architectures are changing and evolving this will drive the need for a more holistic security posture.  Security cannot be an after thought and I will use 5G a an example.
      Speaker: Bipin Mistry (Corero Network Security)
      Material: Presentation Video link Slides powerpoint file pdf file
    • 11:15 - 11:45 Morning Coffee Break
    • 11:45 - 12:00 DHCPKit: a customisable DHCPv6 server 15'
      When deploying IPv6 on a Dutch FttH network I found no open source DHCPv6 server suitable for that scenario. All of them are designed for a dynamic network, while the ISP wants to assign fixed IPv6 prefixes to customers and not assign anything else. Such a configuration was a hack as best and made the DHCPv6 server shut itself down at worst. So I wrote my own fully customisable DHCPv6 server in Python3 and made it open source. This is the result.
      Speaker: Mr. Sander Steffann (S.J.M. Steffann)
      Material: Presentation Video link Slides pdf file
    • 12:00 - 12:15 UK IPv6 Council Status Update 15'
      The global trend of exponential growth of IPv6 traffic continues and since summer 2015, the UK internet user IPv6 traffic started to grow too. Let's look at this a little bit closer and also at what we can expect in the near future. This session will cover the latest development in IPv6 deployments on global and the UK level, as well as it will update the attendees on the UK IPv6 Council and their activities.
      Speaker: Veronika McKillop (Cisco)
      Material: Presentation Video link Slides powerpoint file
    • 12:15 - 12:30 Sky Broadband IPv6 Update 15'
      A brief update on the IPv6 rollout at Sky Broadband
      Speaker: Mr. Ian Dickinson (Sky UK Ltd)
      Material: Presentation Video link Slides powerpoint file pdf file
    • 12:30 - 12:45 IPv4 Market Group Sponsor Presentation - IPv4 Price Trends 15'
      Speaker: Mrs. Sandra Brown (IPv4 Market Group)
      Material: Presentation Video link Slides powerpoint file pdf file
    • 12:45 - 14:00 Lunch Break
    • 13:00 - 13:30 PGP signing session 30'
      Speaker: Mr. Luke Sheldrick (an0key)
      Material: Slides unknown type filedown arrow
    • 14:00 - 14:50 Operational Considerations of the Investigatory Powers Bill
      Convener: Mr. Neil McRae (BT)
      • 14:00 A Telecomms Operator view of the draft Investigatory Powers Bill 20'
        In November 2015 the Government published a 299-page draft Investigatory Powers Bill for pre-legislative scrutiny. A full Bill is likely to be introduced into Parliament early in 2016. This talk will summarise the new powers the draft Bill would give the Home Secretary and suggest how telecoms operators might prepare for them.
        Speaker: Mr. Andrew Cormack (Jisc)
        Material: Presentation Video link Slides powerpoint file pdf file
      • 14:20 Investigatory Powers Panel Discussion 30'
        Speakers: Ms. Zoe O'Connell (Metail), Mr. Andrew Cormack (Jisc)
        Material: Presentation Video link
    • 14:50 - 15:00 Cambridge Cloud Cybercrime Centre 10'
      The Cambridge Cloud Cybercrime Centre is a brand new multi-disciplinary initiative combining expertise from the University of Cambridge's Computer Laboratory, Institute of Criminology and Faculty of Law. Our approach is data driven. We have already negotiated access to some very substantial datasets relating to cybercrime and we aim to leverage our neutral academic status to obtain more data and build one of the largest and most diverse data sets that any organisation holds.
      Speaker: Dr. Richard Clayton
      Material: Presentation Video link Slides pdf file
    • 15:00 - 15:30 Turris Omnia 30'
      I would like to present news from Turris Project. In the first part of the presentation I plan to mention news mainly from security area and also about our new IoT research project. Turris is acting as large honeypot and it's able to track botnets.E.g. we found a large number of ASUS devices that has a single C&C and tries to increase number of bots. The IoT research is called Turris Gadgets. And we took a similar approach as in the whole Turris project. We picked 100 most active users and gave them sensors and power relays for free and asked to created something new and innovative.
      And in the second half of the presentation I would like to introduce a new publicly available open source router Turris Omnia. It has many enhancements e.g. it smaller than previous Turris project. It has SFP cage. And of course it's a normal router, able to forward 1Gbps of traffic and supporting routing protocols (BGP/OSPF) and IPv6.
      Speaker: Mr. Ondrej Filip (CZ.NIC)
      Material: Presentation Video link Slides presentation file pdf file
    • 15:30 - 15:45 ThousandEyes Sponsor Presentation: Learning from Major Outages in 2015 15'
      Over the course of 2015, we've collected data on numerous network outages in the UK and beyond. We'll share data on several notable events including: a major DNS provider outage, a data center connectivity failure at a large gaming company, a route leak affecting a hosting provider, and availability issues that impacted a social network. This talk will provide you with new ideas on how to capture and interpret performance data, particularly as it relates to issues of DNS, routing and internetworking. 
      Speaker: Mr. Primoz Secnik Kolman (ThousandEyes)
      Material: Presentation Video link Slides powerpoint file pdf file
    • 15:45 - 16:15 Afternoon Coffee Break
    • 16:15 - 16:30 How can we work together to improve security and resilience of the global routing system? 15'
      Why and what kind of collective effort is needed to improve the security and resilience of the global Internet routing system? One of the approaches is the Routing Resilience Manifesto initiative, which features the Mutually Agreed Norms for Routing Security (MANRS) document (https: // This initiative launched last year by several leading network operators, combined public commitment, action as well as a minimum baseline for routing security.
      Speaker: Mr. Andrei Robachevsky (Internet Society)
      Material: Presentation Video link Slides pdf file
    • 16:30 - 16:45 Routing Announcement Certification & Validation with RPKI 15'
      RPKI is a protocol to help make the routing on the internet more robust and secure.  In this lightning talk I will introduce how to configure your routers to support it, and how to certify your routing announcements.
      Speaker: Mr. Massimiliano Stucchi (RIPE NCC)
      Material: Presentation Video link Slides unknown type file pdf file
    • 16:45 - 17:15 Phishing, Malware & Fraud Attacks & Countermeasures within the .NL TLD 30'
      Netcraft is positioned at the epicentre of the battle against phishing, malware, & online fraud, and, through its anti-phishing  community, has detected and blocked over 18.5 million unique phishing sites to date.
      Since late 2014, SIDN, the registry in charge of the .NL TLD, has  been using Netcraft's services to protect .NL against phishing & malware 
       This talk will provide a case study on the types of attacks  seen and the impact countermeasures has had on abuse within the TLD.
      Speaker: Mr. Jon Isbell (Netcraft)
      Material: Presentation Video link Slides pdf file
    • 17:15 - 17:45 Simple, Secure, Scalable virtual networking for the virtualised data centre 30'
      The modern data centre is now awash with virtualised and containerised workloads serving largely IP based applications.  A typical data centre might have 1000s of hosts, running 10s of thousands of VMs, 100s of thousands containers or much more.  Networking between these workloads is critical, yet many existing virtual networking technologies aren't built with this level of scale in mind.  
      This presentation introduces Project Calico, an Open Source networking project which is built using the same technologies as the Internet in order to provide the scale, security and simplicity required in the modern data centre.
      Speaker: Mr. Edward Harrison (Metaswitch Networks / Project Calico)
      Material: Presentation Video link Slides powerpoint file pdf file
    • 17:50 - 19:50 Pints n' Packets
      UKNOF33 Networking Event