[Newsclips] IETF SYN-ACK Newspack 2022-01-17

David Goldstein <david@goldsteinreport.com> Mon, 17 January 2022 05:03 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F64A3A0FCC for <newsclips@ietfa.amsl.com>; Sun, 16 Jan 2022 21:03:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.112
X-Spam-Level: *
X-Spam-Status: No, score=1.112 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_RUURL=3, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UANXuxf0v29U for <newsclips@ietfa.amsl.com>; Sun, 16 Jan 2022 21:03:40 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E9D43A0FC9 for <newsclips@ietf.org>; Sun, 16 Jan 2022 21:03:36 -0800 (PST)
Received: from David2019Desktop (unknown [144.136.3.82]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id C611B280E3C for <newsclips@ietf.org>; Mon, 17 Jan 2022 00:03:30 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 144.136.3.82) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 17 Jan 2022 16:03:27 +1100
Message-ID: <006301d80b5f$939fc630$badf5290$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0064_01D80BBB.C710DA70"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdgLX4AGuUcqz6/MTyG/+ydDQQ5GrQ==
Content-Language: en-au
X-PPP-Message-ID: <20220117050334.1649111.4192@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/EbprYnrriZw3_dsNG3dH3xts8fI>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-01-17
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jan 2022 05:03:49 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

 

**********************

IETF IN THE NEWS

**********************

Internet Governance Outlook 2022: A Global Digital Compact or a Bifurcated Cyberspace? by Wolfgang Kleinwächter

This is the 10th edition of my annual Internet Governance Outlook. The first one was published on CircleID on January 3, 2013, just a couple of weeks after ITU’s World Conference on International Telecommunications (WCIT). I wrote: “Anyone who expected that with the end of the Dubai Conference, the heated debate on the future regulation of the Internet will slow down should remember the fairytale of the knight’s battle with the seven-headed dragon. Hardly a head is cut off, another one is growing.” And I continued: “2012 did lead to a growing polarization. Now the tone of the controversy seems to become more aggressive. Almost a quarter of a century after the end of the Cold War, we witness now the emergence of a global political scenario, which more or less exactly follows this “cold war model” not along the old “isms,” but along a different understanding of freedom, human rights, innovation, control and the role of governments. Like fire and water, two incompatible ideas about how the Internet should be organized worldwide stand against each other and form two poles of a broad spectrum of different opinions.” ... To keep this in mind is important if Internet technology continues to evolve. There is a risk that different technological approaches can lead to a new “standardization war.” This would backfire on everybody. Technical Internet resources have been well managed by the technical community for more than three decades. Mistrust, that organizations like ICANN, IETF, RIRs or others will be unable to manage the public core of the Internet in the long run, as expressed by some governments from time to time, are unjustified.

< <https://circleid.com/posts/20220110-internet-governance-outlook-2022-a-global-digital-compact-or-a-bifurcated-cyberspace> https://circleid.com/posts/20220110-internet-governance-outlook-2022-a-global-digital-compact-or-a-bifurcated-cyberspace>

 

Integration of Steerable Smart Antennas to IETF 6TiSCH Protocol for High Reliability Wireless IoT Networks

Steerable directional antennas are increasingly utilised to improve the overall performance of the traditional wireless sensor networks. Steerable directional antenna based networking solutions increase the network capacity by providing a longer range of transmission and reduced interference as compared to networking solutions with omni-directional antennas. However, the use of smart antennas requires complex algorithms and such algorithms may not be easily leveraged in low power Internet of Things (IoT) networks. This study presents mechanisms for integrating low complexity smart antenna solutions into IETF 6TiSCH protocol with the aim of creating scalable and reliable industrial IoT networks. The solution defines extensions to MAC layer and scheduling mechanisms of IETF 6TiSCH protocol to enable its seamless integration with low complexity steerable smart antennas. The results of this study show that smart antenna enabled 6TiSCH protocol stack outperforms the legacy 6TiSCH stack in terms of data delivery performance especially in high density scenarios.

< <https://www.researchgate.net/publication/355862492_Integration_of_Steerable_Smart_Antennas_to_IETF_6TiSCH_Protocol_for_High_Reliability_Wireless_IoT_Networks> https://www.researchgate.net/publication/355862492_Integration_of_Steerable_Smart_Antennas_to_IETF_6TiSCH_Protocol_for_High_Reliability_Wireless_IoT_Networks>

 

Hybrid cloud demands new tools for performance monitoring

... Data is pulled from data-center components, cloud infrastructure (such as service meshes, transit and ingress gateways), internet infrastructure, campus devices, traditional WAN routers and switches, SD-WAN gateways, and IoT endpoints, to name a few. Telemetry types can include flow data exported from network devices (flow collection standards such as NetFlow, J-Flow, sFlow, the IETF’s IPFIX); cloud providers’ virtual private cloud flow logs; SNMP-based device telemetry; and event notifications sent via syslog or SNMP trap.

< <https://www.networkworld.com/article/3643028/hybrid-cloud-demands-new-tools-for-performance-monitoring.html> https://www.networkworld.com/article/3643028/hybrid-cloud-demands-new-tools-for-performance-monitoring.html>

 

Why Online Gamers Need Fiber Internet for Top Performance

... Today, the vast majority of cable networks are deployed using DOCSIS (3.0 and 3.1) standards which by their vary design have highly variable latencies depending on traffic loading from a few milliseconds to tens of milliseconds according to papers published by the Ethernet Engineering Task Force (IETF). This added latency and jitter is a large impediment to high performance and consistent broadband and prevents a cable connection from ever working as well as a fiber connection.

< <https://www.geekwire.com/sponsor-post/why-online-gamers-need-fiber-internet-for-top-performance/> https://www.geekwire.com/sponsor-post/why-online-gamers-need-fiber-internet-for-top-performance/>

 

RFC на протокол «ИнфоТеКС» IPlir размещен на IETF [RFC on iPlir InfoTeX protocol posted on IETF]

Проект RFC на протокол безопасности сетевого уровня IPlir, разработанный компанией «ИнфоТеКС», размещен на сайте IETF. В настоящий момент проект находится в стадии обсуждения и утверждения профессиональным сообществом. Авторами RFC выступила группа экспертов «ИнфоТеКС».

< <https://safe.cnews.ru/news/line/2022-01-13_rfc_na_protokol_infoteks> https://safe.cnews.ru/news/line/2022-01-13_rfc_na_protokol_infoteks>

< <https://ict-online.ru/news/n205338/> https://ict-online.ru/news/n205338/>

 

网络密码方式将发生重大改变 [The way network passwords are encrypted will change significantly]

互联网领域的标准化团体——互联网工程任务组(IETF)也宣布了将会遵从NIST决定的方针,从而成为事实上的世界标准。支持现行“RSA密码”的通信规格在网络普及的1990年代后期被广泛应用于全世界。此次改变将是世界标准的通信规格首次发生重大变化。

< <http://news.ctocio.com.cn/qydt/2022/0110/64703.html> http://news.ctocio.com.cn/qydt/2022/0110/64703.html>

 

**********************

NEWS FROM IETF PARTICIPANTS

**********************

IETF Media Ops Industry Comments to SMPTE

Abstract: The transition of the media industry to Internet Protocol (IP)-based networking protocols and workflows is well underway. Millions of users streaming audio and video daily believe that the transition and the hard work evolving to IP-based network transports is done and behind us, while the reality is that the revolution is far from over. Ongoing is the retooling of the entire content workflow of creation, editing, post-production, archiving, and delivery of professional media to leverage IP-based networks and protocols. This ongoing retooling handles networking situations and user demands that go well above the now seemingly mundane (but still surprisingly complex) task of reliably delivering prerecorded video on demand (VOD) content over well-behaved, reliable broadband that was seen as the “big” streaming challenge to achieve just a few years ago.

< <https://www.researchgate.net/publication/354647556_Internet_Engineering_Task_Force_IETF_Media_Ops_Industry_Comments_to_SMPTE> https://www.researchgate.net/publication/354647556_Internet_Engineering_Task_Force_IETF_Media_Ops_Industry_Comments_to_SMPTE>

 

**********************

SECURITY & PRIVACY

**********************

Project 25 (P25) releases P25 Steering Committee Representative Handbook

The Project 25 (P25) Steering Committee is the governing authority of P25 and has the sole authority to approve a standards proposal, telecommunications system bulletin, or white paper as a P25 standard. In 1992, a memorandum of understanding (MOU) was executed between the founding organizations (Association of Public Safety Communications Officials (APCO), National Association of State Technology Directors (NASTD), and the U.S. Federal Government) and the Telecommunications Industry Association (TIA) defining the roles, responsibilities, and authority of the Project 25 Steering Committee. In accordance with the MOU, the Steering Committee works closely with manufacturers to develop and maintain a suite of standards that best serves the continually evolving needs of the public safety community.

< <https://www.cisa.gov/blog/2022/01/06/project-25-p25-releases-p25-steering-committee-representative-handbook> https://www.cisa.gov/blog/2022/01/06/project-25-p25-releases-p25-steering-committee-representative-handbook>

 

us: The Cybersecurity and Infrastructure Security Agency (CISA) has published its Public Safety Communications Security white paper

Public safety personnel rely on their ability to share information. During critical missions, some of that information, such as messages related to tactical and investigative law enforcement operations, disaster response, and medical emergencies, can be highly sensitive and confidential. If unauthorized persons intercept or otherwise compromise such information, responders’ and citizens’ safety and privacy could be at risk.

< <https://www.cisa.gov/blog/2022/01/10/cybersecurity-and-infrastructure-security-agency-cisa-has-published-its-public-0> https://www.cisa.gov/blog/2022/01/10/cybersecurity-and-infrastructure-security-agency-cisa-has-published-its-public-0>

 

us: Hot Topics in Consumer Cybersecurity Labeling – Our December 2021 Workshop

On May 12, 2021 the White House released an Executive Order (EO) on Improving the Nation’s Cybersecurity which, among other things, tasked NIST to develop cybersecurity criteria and labeling approaches for consumer software and Internet of Things (IoT) products. Activity since then includes a call for papers, multiple workshops, draft criteria, and processing all of the feedback received. The goal of the latest workshop on December 9th was to provide the community an update, answer questions, and gather a final round of feedback which will be factored into final criteria to be released at the beginning of February 2022.

< <https://www.nist.gov/blogs/cybersecurity-insights/hot-topics-consumer-cybersecurity-labeling-our-december-2021-workshop> https://www.nist.gov/blogs/cybersecurity-insights/hot-topics-consumer-cybersecurity-labeling-our-december-2021-workshop>

 

How to analyse a cyber attack chain: A cyber drill scenario from BGD e-GOV CIRT

Nowadays it is quite impossible to defend against cyber threats with technology only. There have been far too many instances of security breaches caused by cyber attackers breaching the security perimeter and performing a lateral movement with various known and unknown (at least not published) evasion tactics. As a result, automated security systems are becoming less effective and cyber attackers remain undetected within the network while they carry out their harmful activities (for example, successful data breaches).

< <https://blog.apnic.net/2022/01/12/how-to-analyse-a-cyber-attack-chain-a-cyber-drill-scenario-from-bgd-e-gov-cirt/> https://blog.apnic.net/2022/01/12/how-to-analyse-a-cyber-attack-chain-a-cyber-drill-scenario-from-bgd-e-gov-cirt/>

 

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency

The National Vulnerability Database reported that between 2016 and 2019 the number of firmware vulnerabilities grew over 700 percent. Industry analyst group, Gartner, reports that by 2022 “70 percent of organizations that do not have a firmware upgrade plan in place will be breached due to a firmware vulnerability.”

< <https://www.cyberdefensemagazine.com/cybersecurity-alone/> https://www.cyberdefensemagazine.com/cybersecurity-alone/>

 

be: A secure internet experience is a right

It is the mission of DNS Belgium to monitor the safety, quality and reliability of the internet in our country. Our entire organisation and all our people are committed to this day in and day out. Each department does so in its own way and on the basis of its own area of specialisation.

< <https://www.dnsbelgium.be/en/news/secure-internet-experience> https://www.dnsbelgium.be/en/news/secure-internet-experience>

 

us: Readout of White House Meeting on Software Security

Today, the White House convened government and private sector stakeholders to discuss initiatives to improve the security of open source software and ways new collaboration could rapidly drive improvements. Software is ubiquitous across every sector of our economy and foundational to the products and services Americans use every day. Most major software packages include open source software – including software used by the national security community. Open source software brings unique value, and has unique security challenges, because of its breadth of use and the number of volunteers responsible for its ongoing security maintenance.

< <https://www.whitehouse.gov/briefing-room/statements-releases/2022/01/13/readout-of-white-house-meeting-on-software-security/> https://www.whitehouse.gov/briefing-room/statements-releases/2022/01/13/readout-of-white-house-meeting-on-software-security/>

 

us: Background Press Call by a Senior Administration Official on Cybersecurity

MODERATOR: Hey, everyone. Thanks for joining us closer to the end of the day on a Friday. So, as noted in the invite, this is a background call on cybersecurity. I’m going to let our speaker get into more details about that.

< <https://www.whitehouse.gov/briefing-room/press-briefings/2022/01/14/background-press-call-by-a-senior-administration-official-on-cybersecurity/> https://www.whitehouse.gov/briefing-room/press-briefings/2022/01/14/background-press-call-by-a-senior-administration-official-on-cybersecurity/>

 

us: Cybersecurity labels for consumer products could be on the way

... An obscure division of the Commerce Department is working on cracking one of the toughest problems in cybersecurity: Making consumers care whether their Internet-connected devices are hackable or not.

< <https://www.washingtonpost.com/politics/2022/01/13/cybersecurity-labels-consumer-products-could-be-way/> https://www.washingtonpost.com/politics/2022/01/13/cybersecurity-labels-consumer-products-could-be-way/>

 

us: White House Meets With Software Firms and Open Source Orgs on Security

Driven by vulnerabilities in widespread software affecting organizations worldwide, the US government met with the open source community and major software firms on Jan. 13 at the White House to find ways to support the innovative software development community, while at the same time reducing the likelihood of future security flaws in common software components.

< <https://www.darkreading.com/application-security/software-firms-open-source-orgs-meet-with-white-house-on-security> https://www.darkreading.com/application-security/software-firms-open-source-orgs-meet-with-white-house-on-security>

 

The race towards renewable energy is creating new cybersecurity risks

The shift to renewable energy is bringing benefits - but there's potential risks of security vulnerabilities in everything from industrial systems to IoT smart meters.

< <https://www.zdnet.com/article/the-race-towards-renewable-energy-is-creating-new-cybersecurity-risks/> https://www.zdnet.com/article/the-race-towards-renewable-energy-is-creating-new-cybersecurity-risks/>

 

World Economic Forum warns cyber risks add to climate threat

Cyberthreats and the growing space race are emerging risks to the global economy, adding to existing challenges posed by climate change and the coronavirus pandemic, the World Economic Forum said in a report Tuesday.

< <https://apnews.com/article/climate-technology-health-business-environment-and-nature-b2e44f9612a4bffc52a41b94dda2d6a0> https://apnews.com/article/climate-technology-health-business-environment-and-nature-b2e44f9612a4bffc52a41b94dda2d6a0>

 

Climate Failure and Social Crisis Top Global Risks 2022

Climate risks dominate global concerns as the world enters the third year of the pandemic. According to the Global Risks Report 2022, while the top long-term risks relate to climate, the top shorter-term global concerns include societal divides, livelihood crises and mental health deterioration.

< <https://www.weforum.org/press/2022/01/climate-failure-and-social-crisis-top-global-risks-2022> https://www.weforum.org/press/2022/01/climate-failure-and-social-crisis-top-global-risks-2022>

 

FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure

At a time when US-Russian diplomatic tensions are high amid another round of talks on security concerns between the nations recently concluding, the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, and National Security Agency today released a joint advisory on how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.

< <https://www.darkreading.com/threat-intelligence/fbi-nsa-cisa> https://www.darkreading.com/threat-intelligence/fbi-nsa-cisa>

 

CISA, FBI, and NSA Release Cybersecurity Advisory on Russian Cyber Threats to U.S. Critical Infrastructure

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) that provides an overview of Russian state-sponsored cyber operations, including commonly observed tactics, techniques, and procedures. The CSA also provides detection actions, incident response guidance, and mitigations. CISA, the FBI, and NSA are releasing the joint CSA to help the cybersecurity community reduce the risk presented by Russian state-sponsored cyber threats.

< <https://www.cisa.gov/uscert/ncas/current-activity/2022/01/11/cisa-fbi-and-nsa-release-cybersecurity-advisory-russian-cyber> https://www.cisa.gov/uscert/ncas/current-activity/2022/01/11/cisa-fbi-and-nsa-release-cybersecurity-advisory-russian-cyber>

 

**********************

INTERNET OF THINGS

**********************

Why IoT Sensors Need Standards: They could improve performance and spur development of new applications

Sensors traditionally have been used for camera imaging, as well as communicating information about humidity, temperature, motion, speed, proximity, and other aspects of the environment. The devices have become key enablers for a host of new technologies essential to business and to everyday life, from turning on a light switch to managing one’s health.

< <https://spectrum.ieee.org/why-iot-sensors-need-standards> https://spectrum.ieee.org/why-iot-sensors-need-standards>

 

Cities prepare for blockchain impact

Blockchain is one of the most hyped technologies around but there have been few implementations by cities to date. Interest in the distributed ledger technology is now growing due to advances in cryptocurrencies, smart contracts, digital assets, and other so-called Web 3.0 technologies.

< <https://www.itu.int/hub/2022/01/cities-prepare-blockchain-impact/> https://www.itu.int/hub/2022/01/cities-prepare-blockchain-impact/>

 

Formula 1 teams with Digital Catapult on 5G trials

Formula 1 is working with Digital Catapult to explore the potential of 5G in future events. The partnership, which also includes a cohort of small and medium-sized enterprises, aims to look at what might be possible by using 5G to enhance event experiences for Formula 1 fans. This includes making the viewing experience more inclusive and interactive for audiences inside the stadium and watching at home.

< <https://www.broadcastnow.co.uk/tech-innovation/formula-1-teams-with-digital-catapult-on-5g-trials/5166376.article> https://www.broadcastnow.co.uk/tech-innovation/formula-1-teams-with-digital-catapult-on-5g-trials/5166376.article>

 

Digital Catapult and Formula 1 join forces to shape the events of the future

Digital Catapult is working together with the pinnacle of motorsport, Formula 1 to explore the potential of 5G to revolutionise the events of the future.

< <https://www.digicatapult.org.uk/news-and-insights/press-releases/post/digital-catapult-and-formula-1-join-forces-to-shape-the-events-of-the-future/> https://www.digicatapult.org.uk/news-and-insights/press-releases/post/digital-catapult-and-formula-1-join-forces-to-shape-the-events-of-the-future/>

 

Handlungsempfehlungen zur Informationssicherheit in Smart Cities und Smart Regions veröffentlicht

Die neue Publikation „Smart Cities/Smart Regions Informationssicherheit für IoT-Infrastrukturen“ des BSI gibt Handlungsempfehlungen, um Kommunen und Städte bei dem Aufbau dieser IoT-Infrastrukturen hinsichtlich der Informationssicherheit zu unterstützen.

< <https://www.bsi.bund.de/DE/Service-Navi/Presse/Alle-Meldungen-News/Meldungen/smartcities_220114.html> https://www.bsi.bund.de/DE/Service-Navi/Presse/Alle-Meldungen-News/Meldungen/smartcities_220114.html>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

The QUIC Protocol and Quantum-Safe Cryptography - Presenting a Platform for Much-Needed Future Experiments by Igor Barshteyn

If you've been following the development of the web's architecture "under the hood", you are likely aware that the current main-stay web protocol stack, HTTP with TLS over TCP, will soon be declared an "also-ran".

< <https://www.linkedin.com/pulse/quic-protocol-quantum-safe-cryptography-presenting-future-igor/> https://www.linkedin.com/pulse/quic-protocol-quantum-safe-cryptography-presenting-future-igor/>

 

Alibaba Cloud CDN review

... There's another potential performance boost in Alibaba's support for the QUIC, the efficient transport layer protocol which powers HTTP/3. But the company hasn't forgotten more common networking standards, and Cloud CDN also uses custom congestion detection and packet loss probing algorithms to improve its regular TCP connections.

< <https://www.techradar.com/reviews/alibaba-cloud-cdn> https://www.techradar.com/reviews/alibaba-cloud-cdn>

 

Beyond QUIC v1 -- A First Look at Recent Transport Layer IETF Standardization Efforts

Abstract: The transport layer is ossified. With most of the research and deployment efforts in the past decade focussing on the Transmission Control Protocol (TCP) and its extensions, the QUIC standardization by the Internet Engineering Task Force (IETF) is to be finalized in early 2021. In addition to addressing the most urgent issues of TCP, QUIC ensures its future extendibility and is destined to drastically change the transport protocol landscape. In this work, we present a first look at emerging protocols and their IETF standardization efforts beyond QUIC v1. While multiple proposed extensions improve on QUIC itself, Multiplexed Application Substrate over QUIC Encryption (MASQUE) as well as WebTransport present different approaches to address long-standing problems, and their interplay extends on QUIC's take to address transport layer ossification challenges.

< <https://www.researchgate.net/publication/349336065_Beyond_QUIC_v1_--_A_First_Look_at_Recent_Transport_Layer_IETF_Standardization_Efforts> https://www.researchgate.net/publication/349336065_Beyond_QUIC_v1_--_A_First_Look_at_Recent_Transport_Layer_IETF_Standardization_Efforts>

 

Beyond QUIC v1: A First Look at Recent Transport Layer IETF Standardization Efforts

Abstract: The transport layer is ossified. With most of the research and deployment efforts in the past decade focusing on the Transmission Control Protocol (TCP) and its extensions, the QUIC standardization by the Internet Engineering Task Force (IETF) is to be finalized in early 2021. In addition to addressing the most urgent issues of TCP, QUIC ensures its future extendibility and is destined to drastically change the transport protocol landscape. In this work, we present a first look at emerging protocols and their IETF standardization efforts beyond QUIC v1. While multiple proposed extensions improve on QUIC itself, Multiplexed Application Substrate over QUIC Encryption (MASQUE) as well as WebTransport present different approaches to address long-standing problems, and their interplay expands on QUIC's take to address transport layer ossification challenges.

< <https://www.researchgate.net/publication/351644061_Beyond_QUIC_v1_A_First_Look_at_Recent_Transport_Layer_IETF_Standardization_Efforts> https://www.researchgate.net/publication/351644061_Beyond_QUIC_v1_A_First_Look_at_Recent_Transport_Layer_IETF_Standardization_Efforts>

 

A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer

< <https://www.researchgate.net/publication/356458263_A_Security_Model_and_Fully_Verified_Implementation_for_the_IETF_QUIC_Record_Layer> https://www.researchgate.net/publication/356458263_A_Security_Model_and_Fully_Verified_Implementation_for_the_IETF_QUIC_Record_Layer>

 

Firefox hat offenbar HTTP/3-Probleme [Firefox apparently has HTTP/3 issues]

Auf Community-Seiten wie Reddit, Hackernews oder auch Twitter häufen sich derzeit Berichte von Firefox-Nutzern, wonach diese von massiven Verbindungsproblemen betroffen sind.

< <https://www.golem.de/news/mozilla-firefox-hat-offenbar-http-3-probleme-2201-162389.html> https://www.golem.de/news/mozilla-firefox-hat-offenbar-http-3-probleme-2201-162389.html>

 

Komunikat dla wszystkich trzech użytkowników Firefoxa: wiemy, że nie działa i wiemy, jak go naprawić [Message to all three Firefox users: we know it's not working and we know how to fix it]

... Co właściwie zrobiliśmy w ustawieniach? Wyłączyliśmy w Firefoxie obsługę protokołu HTTP/3 (QUIC), czyli najnowszej wersji systemu obsługującego komunikację pomiędzy naszą przeglądarką a serwerami zawierającymi strony internetowe.

< <https://spidersweb.pl/2022/01/firefox-nie-dziala-awaria-rozwiazanie.html> https://spidersweb.pl/2022/01/firefox-nie-dziala-awaria-rozwiazanie.html>

 

Operatorzy telko w niektórych krajach Europy blokują nową funkcję ochrony prywatności Apple’a [Telko operators in some European countries block Apple's new privacy feature]

... "To rozwiązanie wygląda też niezwykle ciekawie pod względem technicznym" - mówi ekspert i wskazuje, że wykorzystano w nim w bardzo ciekawy sposób protokoły HTTP/3, QUIC oraz Oblivious-DNS-over-HTTPS.

< <https://cyberdefence24.pl/cyberbezpieczenstwo/operatorzy-telko-w-niektorych-krajach-europy-blokuja-nowa-funkcje-ochrony-prywatnosci-applea> https://cyberdefence24.pl/cyberbezpieczenstwo/operatorzy-telko-w-niektorych-krajach-europy-blokuja-nowa-funkcje-ochrony-prywatnosci-applea>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Accelerating IPv6 uptake to spur digital transformation by Majed Al Mesmar, Director General, Telecommunications and Digital Government Regulatory Authority, UAE

Across developed and emerging economies, the Internet has become a cornerstone of modern living. In the wake of COVID-19 especially, it serves as an essential means of doing business, educating and socializing.

< <https://www.itu.int/hub/2022/01/accelerating-ipv6-uptake-digital-transformation/> https://www.itu.int/hub/2022/01/accelerating-ipv6-uptake-digital-transformation/>

 

ETSI Announces Second Release on Self-Adapting Autonomous Networks

Following on from meetings conducted in late 2021, ETSI has now completed Release 2 of its Experiential Networked Intelligence (ENI) specifications with the system architecture ETSI GS ENI 005.

< <https://www.etsi.org/newsroom/press-releases/2016-2022-01-etsi-announces-second-release-on-self-adapting-autonomous-networks> https://www.etsi.org/newsroom/press-releases/2016-2022-01-etsi-announces-second-release-on-self-adapting-autonomous-networks>

 

BGP in 2021 — BGP updates

The first part of this report looked at the size of the routing table and some projections of its growth for both IPv4 and IPv6. However, the scalability of BGP as the Internet’s routing protocol is not just dependent on the number of prefixes carried in the routing table.

< <https://www.potaroo.net/ispcol/2022-01/bgpupd2021.html> https://www.potaroo.net/ispcol/2022-01/bgpupd2021.html>

< <https://blog.apnic.net/2022/01/13/bgp-updates-2021/> https://blog.apnic.net/2022/01/13/bgp-updates-2021/>

 

Web cache deception escalates!

The client-server computing model has exploded into a dauntingly complex architecture, now involving distributed processing at network edges and intermediate nodes sprinkled on the traffic path. Web caches that temporarily store and rapidly serve frequently accessed objects are a critical component in this ecosystem.

< <https://blog.apnic.net/2022/01/14/web-cache-deception-escalates/> https://blog.apnic.net/2022/01/14/web-cache-deception-escalates/>

 

APNIC Academy: 2021 in review

2021 was a busy year for APNIC Academy, with 96 instructor-led (live online, hybrid, and face-to-face) workshops and tutorials delivered to 2,382 people across the Asia Pacific region. This equated to 618 training hours over 140 days, and more than 15,300 trainee-hours.

< <https://blog.apnic.net/2022/01/12/apnic-academy-2021-in-review/> https://blog.apnic.net/2022/01/12/apnic-academy-2021-in-review/>

 

We need to rethink the resilience of the global Internet infrastructure

The Internet is a resilient distributed system that has successfully withstood several natural and human-made disasters in the past. However, today, Internet researchers and operators overlook a low-probability, high-impact event that poses a significant threat to the Internet: solar superstorms.

< <https://blog.apnic.net/2022/01/11/we-need-to-rethink-the-resilience-of-the-global-internet-infrastructure/> https://blog.apnic.net/2022/01/11/we-need-to-rethink-the-resilience-of-the-global-internet-infrastructure/>

 

Privacy Interest Group (PING) 2021 year in review and thank yous

PING performed 24 privacy reviews in 2021 and provided guidance on several other APIs. PING privacy reviews resulted in privacy improvements in proposed specifications. Some examples include:

< <https://www.w3.org/blog/2022/01/privacy-interest-group-ping-2021-year-in-review-and-thank-yous/> https://www.w3.org/blog/2022/01/privacy-interest-group-ping-2021-year-in-review-and-thank-yous/>

 

It’s Not Too Early to Prepare for 6G

With 5G still in phased stages of development and deployment, it may seem premature to plan for the next generation of wireless communication technology. But with ambitious goals that build upon the current generation, it’s not too early to begin addressing the technological, regulatory, geographical, and educational challenges that will be required to make ubiquitous 6G a reality.

< <https://www.eetasia.com/its-not-too-early-to-prepare-for-6g/> https://www.eetasia.com/its-not-too-early-to-prepare-for-6g/>

 

China to pursue major standards-setting role in 6G mobile technology amid Chinese lab’s recent breakthrough [subscription]

China will boost support for 6G research and development and “proactively take part in setting international standards” for the sixth-generation mobile communications technology, according to Beijing’s latest digital economy plan. The State Council, China’s cabinet, on Wednesday published this new digital economy development blueprint, which was drawn up in line with the country’s 14th five-year plan from 2021 to 2025. The sharpened focus on 6G reinforces a similar policy directive issued last month by the Cyberspace Administration of China. 6G represents the next-generation, global mobile network technology to succeed 5G, which is still being rolled out in many countries around the world. China, which has the world’s biggest internet and smartphone market, has also deployed the largest 5G mobile infrastructure in the industry.

< <https://www.scmp.com/tech/tech-war/article/3163261/china-pursue-major-standards-setting-role-6g-mobile-technology-amid> https://www.scmp.com/tech/tech-war/article/3163261/china-pursue-major-standards-setting-role-6g-mobile-technology-amid>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home