[Newsclips] IETF SYN-ACK Newspack 2020-08-24

David Goldstein <david@goldsteinreport.com> Mon, 24 August 2020 13:17 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id A319F3A0DC2 for <newsclips@ietfa.amsl.com>; Mon, 24 Aug 2020 06:17:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.012
X-Spam-Status: No, score=0.012 tagged_above=-999 required=5 tests=[HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id HSlmqSQ5A8ja for <newsclips@ietfa.amsl.com>; Mon, 24 Aug 2020 06:17:28 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0A633A0DC0 for <newsclips@ietf.org>; Mon, 24 Aug 2020 06:17:28 -0700 (PDT)
Received: from DavidDesktop2019 (unknown []) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 12C0E280A41 for <newsclips@ietf.org>; Mon, 24 Aug 2020 09:17:24 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidDesktop2019
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 24 Aug 2020 23:17:25 +1000
Organization: Goldstein Report
Message-ID: <000701d67a18$eb382f60$c1a88e20$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0008_01D67A6C.BCE48D80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdZ6GOSy+jZPAH3ETA699ju67FkLCw==
Content-Language: en-au
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/72-br-7V2OUQ4rlS9N4enVBqBw8>
Subject: [Newsclips] IETF SYN-ACK Newspack 2020-08-24
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Aug 2020 13:17:33 -0000




Welcoming the New IETF Executive Director

IETF are delighted to announce today that Jay Daley has joined the IETF as their first permanent IETF Executive Director!

< <https://huntscanlon.com/welcoming-the-new-ietf-executive-director/> https://huntscanlon.com/welcoming-the-new-ietf-executive-director/>


Privatsphärenschutz: Verschlüsselte Domainanfragen auf dem Vormarsch [Privacy protection: Encrypted domain requests on the rise]

... DNSCrypt war bisher kein großer Erfolg beschieden. Doch die Verbreitung der beiden jüngeren Protokolle, die die IETF spezifiziert hat, nahm zuletzt merklich zu. Das berichtete Lu Chaoyi von der Tshinghua University beim Treffen der Internet Research Task Force (IRTF), der Forschungsschwester der IETF. In einer groß angelegten Studie haben die Forscher die Zunahme verschlüsselter Verbindungen dokumentiert. Wie erwartet, dauert die Auflösung von Domainnamen zu IP-Adressen bei verschlüsselter Kommunikation ein paar Millisekunden mehr. Auf den ersten Blick unerwartet war jedoch der Befund, dass bei verschlüsselten Anfragen weniger Fehlermeldungen auftreten.

< <https://www.heise.de/news/Privatsphaerenschutz-Verschluesselte-Domainanfragen-auf-dem-Vormarsch-4864255.html> https://www.heise.de/news/Privatsphaerenschutz-Verschluesselte-Domainanfragen-auf-dem-Vormarsch-4864255.html>


Frankreich listet die einflussreichsten Stakeholder des Internets [France lists the internet's most influential stakeholders]

... Für zentral erachtet Frankreich drei technische Organisationen, nämlich ICANN, die IETF und ISOC. Sie kümmern sich um die Infrastruktur des Internets. Für nicht minder wichtig hält man in Frankreich aber auch private Unternehmen wie zum Beispiel Internet Service Provider und soziale Netzwerke.

< <https://domain-recht.de/internet-politik/egovernment/internet-governance-frankreich-listet-die-einflussreichsten-stakeholder-des-internets-67579.html> https://domain-recht.de/internet-politik/egovernment/internet-governance-frankreich-listet-die-einflussreichsten-stakeholder-des-internets-67579.html>





Internet Of Things: How Smart Poles Are Lighting up Smart Cities

Get ready to see an influx of smart technology from your home to the street corner. Take Smart Poles for instance. This is a catchy marketing name for an electrical pole with added technology.

< <https://womenlovetech.com/internet-of-things-how-smart-poles-are-lighting-up-smart-cities/> https://womenlovetech.com/internet-of-things-how-smart-poles-are-lighting-up-smart-cities/>





Statement on Establishing a Global Cyber Security Assurance System

As a global leading telecom solutions provider, Huawei Technologies Co. Ltd. is fully aware of the importance of cyber security and understands the concerns of various governments and customers about security. With the constant evolution and development of the telecom industry and information technology, security threats and challenges are increasing, which intensify our concerns about cyber security. Huawei will therefore pay a great deal more attention to this issue and has long been dedicated to adopting feasible and effective measures to improve the security of its products and services, thus helping customers to reduce and avoid security risks and building trust and confidence in Huawei’s business. Huawei believes that the establishment of an open, transparent and visible security assurance framework will be conducive to the sound and sustainable development of industry chains and technological innovation; it will also facilitate smooth and secure communications among people.

< <https://www.huawei.com/au/declarations/cyber-security> https://www.huawei.com/au/declarations/cyber-security>


How Can Greater Security, Safety and Trust in the Internet Be Created? by Wout de Natris

In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The following is an invitation to participate, share ideas and best practices, the willingness to take on a new approach towards mass deployment of internet standards and ICT best practices. Feel free to reach out to us and start working towards a kick-off meeting at the global, virtual Internet Governance Forum in November.

< <http://www.circleid.com/posts/20200820-greater-security-safety-and-trust-in-the-internet/> http://www.circleid.com/posts/20200820-greater-security-safety-and-trust-in-the-internet/>


Working Collaboratively to Improve Emerging Network Time Security Implementations

Accurate and secure time is essential for the security and trustworthiness of the Internet. Many systems that we regularly interact with rely on accurate time to function properly. Accurate time also provides an essential foundation for online security, and many security mechanisms, such as digital certificates used for Transport Layer Security (TLS), depend on accurate timekeeping. The Network Time Protocol (NTP) provides time synchronization for clocks on computer networks.

< <https://www.internetsociety.org/blog/2020/08/working-collaboratively-to-improve-emerging-network-time-security-implementations/> https://www.internetsociety.org/blog/2020/08/working-collaboratively-to-improve-emerging-network-time-security-implementations/>


State project launched to protect Korea’s 5G network with an extra security system

To complete 5G wireless network proliferating fast in South Korea, state-run Electronics and Telecommunications Research Institute (ETRI) will come up with extra security system. ... The existing 4G network provides internet services through a centralized core network, which means security management is relatively simple, but 5G is vulnerable to elevated security threats partly because of its connection to a huge number of connected devices including the internet of things (IoT), through which adversaries can attack.

< <https://pulsenews.co.kr/view.php?sc=30800019&year=2020&no=853161> https://pulsenews.co.kr/view.php?sc=30800019&year=2020&no=853161>


Partnering with Euro-IX on Infrastructure Development, Routing Security, and More

We can only be successful in creating an Internet for everyone if everyone is part of the effort. That’s why the Internet Society is thrilled to be entering into a partnership with the European Internet Exchange Association (Euro-IX).

< <https://www.internetsociety.org/blog/2020/08/partnering-with-euro-ix-on-infrastructure-development-routing-security-and-more/> https://www.internetsociety.org/blog/2020/08/partnering-with-euro-ix-on-infrastructure-development-routing-security-and-more/>


Network-layer DDoS attack trends for Q2 2020

In the first quarter of 2020, within a matter of weeks, our way of life shifted. We’ve become reliant on online services more than ever. Employees that can are working from home, students of all ages and grades are taking classes online, and we’ve redefined what it means to stay connected. The more the public is dependent on staying connected, the larger the potential reward for attackers to cause chaos and disrupt our way of life. It is therefore no surprise that in Q1 2020 (January 1, 2020 to March 31, 2020) we reported an increase in the number of attacks—especially after various government authority mandates to stay indoors—shelter-in-place went into effect in the second half of March.

< <https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q2-2020/> https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q2-2020/>





Microsoft enables TLS 1.3 by default in latest Windows 10 builds

Microsoft says that TLS 1.3 will be enabled by default in all Windows 10 Insider Preview builds beginning with Build 20170 as the start of a wider rollout to all Windows 10 systems.

< <https://www.bleepingcomputer.com/news/security/microsoft-enables-tls-13-by-default-in-latest-windows-10-builds/> https://www.bleepingcomputer.com/news/security/microsoft-enables-tls-13-by-default-in-latest-windows-10-builds/>


Taking Transport Layer Security (TLS) to the next level with TLS 1.3

Transport Layer Security (TLS) 1.3 is now enabled by default on Windows 10 Insider Preview builds, starting with Build 20170, the first step in a broader rollout to Windows 10 systems. TLS 1.3 is the latest version of the internet’s most deployed security protocol, which encrypts data to provide a secure communication channel between two endpoints. TLS 1.3 eliminates obsolete cryptographic algorithms, enhances security over older versions, and aims to encrypt as much of the handshake as possible.

< <https://www.microsoft.com/security/blog/2020/08/20/taking-transport-layer-security-tls-to-the-next-level-with-tls-1-3/> https://www.microsoft.com/security/blog/2020/08/20/taking-transport-layer-security-tls-to-the-next-level-with-tls-1-3/>





It’s Not Too Late to Save the Internet

The Trump administration has done enormous damage to the free and open internet worldwide. Here’s what would need to happen to reboot it.

< <https://slate.com/technology/2020/08/save-the-internet.html> https://slate.com/technology/2020/08/save-the-internet.html>


How hate speech reveals the invisible politics of internet infrastructure

Infrastructure that works well rarely stands out. The internet infrastructure provided by Cloudflare, which provides a content delivery network that safeguards millions of sites online, is a notable exception. Last year, Cloudflare came under intense pressure to stop providing its services to 8chan, the online message board popular among white supremacists, after the gunmen in three separate shootings posted manifestos on the site prior to their attacks. 8chan had relied on the company’s content delivery network to keep its message board online and accessible. After initially saying it had no legal obligation to do so, the company eventually relented and denied 8chan the use of its services.

< <https://www.brookings.edu/techstream/how-hate-speech-reveals-the-invisible-politics-of-internet-infrastructure/> https://www.brookings.edu/techstream/how-hate-speech-reveals-the-invisible-politics-of-internet-infrastructure/>


5G Drives the Distributed Edge Featured

After years of anticipation, 2019 saw some of the first rollouts of 5G, with deployments growing significantly this year and continuing to increase in 2021. At the same time, according to the Linux Foundation’s State of the Edge 2020 report, by 2028, edge infrastructure will have a power footprint of 102,000 MW, and over $700 billion in cumulative CAPEX would have been spent within the next decade on edge IT infrastructure and data center facilities.

< <https://www.thefastmode.com/expert-opinion/17835-5g-drives-the-distributed-edge> https://www.thefastmode.com/expert-opinion/17835-5g-drives-the-distributed-edge>


Are you ready for 6G revolution?

Amid a 5G rollout that has faced its fair share of challenges, it might seem somewhat premature to start looking ahead at 6G, the next generation of mobile communications. But 6G development is happening now, and it's being pursued in earnest by both industry and academia.

< <https://www.khaleejtimes.com/business-and-technology-review/are-you-ready-for-6g-revolution> https://www.khaleejtimes.com/business-and-technology-review/are-you-ready-for-6g-revolution>


Understanding DNS—anatomy of a BIND zone file

If you want to be a sysadmin or network administrator of any kind, there's a fundamental technology you really need to understand—DNS, the Domain Name Service. There was a time when a sysadmin with no aspirations to managing Internet-accessible services might have gotten by without understanding DNS, but that time is long, long gone.

< <https://arstechnica.com/gadgets/2020/08/understanding-dns-anatomy-of-a-bind-zone-file/> https://arstechnica.com/gadgets/2020/08/understanding-dns-anatomy-of-a-bind-zone-file/>


What is the role of IXPs in Oceania?

The cost of transit between networks in Oceania, coupled with the high cost of international bandwidth, are likely to be driving factors behind the rise in Internet Exchanges Points (IXPs) in the region, according to Narelle Clark, CEO of the Internet Association of Australia (IAA).

< <https://blog.apnic.net/2020/08/20/what-is-the-role-of-ixps-in-oceania/> https://blog.apnic.net/2020/08/20/what-is-the-role-of-ixps-in-oceania/>


The internet could regain the openness envisioned for it

When Tim Berners-Lee invented the World Wide Web, the internet was just a network of computers housed in universities and other academic institutions. Many have said that his idea of building connections using a hypertext markup to connect different pages of content gave us the web of information we rely on so heavily today. While that may be the case, the internet would never have grown to what it has had it not been for the fact that he chose to build it as an open and decentralized system.

< <https://www.livemint.com/opinion/columns/the-internet-could-regain-the-openness-envisioned-for-it-11597762508989.html> https://www.livemint.com/opinion/columns/the-internet-could-regain-the-openness-envisioned-for-it-11597762508989.html>


David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home