[Newsclips] IETF SYN-ACK Newspack 2022-09-26

David Goldstein <david@goldsteinreport.com> Mon, 26 September 2022 12:37 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E718C14CF03 for <newsclips@ietfa.amsl.com>; Mon, 26 Sep 2022 05:37:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.894
X-Spam-Level:
X-Spam-Status: No, score=-6.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id btaTTYEb2xrs for <newsclips@ietfa.amsl.com>; Mon, 26 Sep 2022 05:36:59 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B552C14CF10 for <newsclips@ietf.org>; Mon, 26 Sep 2022 05:36:59 -0700 (PDT)
Received: from DavidSurface4Laptop2022 (unknown [206.83.114.51]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id A66CCE81E69 for <newsclips@ietf.org>; Mon, 26 Sep 2022 13:36:55 +0100 (+01)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 206.83.114.51) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidSurface4Laptop2022
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 26 Sep 2022 22:36:52 +1000
Organization: Goldstein Report
Message-ID: <00e001d8d1a4$aa4770c0$fed65240$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00E1_01D8D1F8.7BF3F5F0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdjRpKQt5NgHuxwwSgmC6TtS7G2LPA==
Content-Language: en-au
X-PPP-Message-ID: <20220926123657.637551.3269@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/FX3xA5H5ag1AvltoEm9E68GKpIo>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-09-26
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Sep 2022 12:37:04 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

This Vote Could Change the Course of Internet History: UN countries preparing to pick a new head of the ITU. Who wins could shape the open web's future.

This week in Romania, a US State Department candidate is facing a Russian challenger in an election for the leadership of one of the most important international technology bodies in the world. ... China has acknowledged that increased central control is, in its view, an upside of these proposals. “States have the right to make ICT-related [information and communications technology] public policies consistent with national circumstances to manage their own ICT affairs and protect their citizens’ legitimate interests in cyberspace,” reads a set of 2019 submissions written by Beijing. This kind of work is, traditionally, not the purview of the ITU. Nongovernmental groups, like Icann and the IETF, tend to be more directly responsible for managing the actual protocols that govern the internet.

< <https://www.wired.com/story/2022-itu-secretary-general-election/> https://www.wired.com/story/2022-itu-secretary-general-election/>

 

A neck-and-neck election for the future of the internet [doesn't mention IETF, but related to above]

The campaign to elect the next Secretary-General of the International Telecommunication Union has entered the final stretch, with UN member states assembling in Bucharest, Romania this week to cast their votes between the Russian-supported and US-backed candidates vying for the top job.

< <https://www.lowyinstitute.org/the-interpreter/neck-neck-election-future-internet> https://www.lowyinstitute.org/the-interpreter/neck-neck-election-future-internet>

 

Can the IETF standardize in human rights?

Back in September 2018, a group of authors submitted the first IETF draft of a document discussing Internet Protocols and the Human Rights to Freedom of Association and Assembly. It is now up to its 11th version.

< <https://blog.apnic.net/2022/09/19/can-the-ietf-standardize-in-human-rights/> https://blog.apnic.net/2022/09/19/can-the-ietf-standardize-in-human-rights/>

 

Commentary: Will the Internet of tomorrow become several intranets instead? Geopolitics could be key

... Along with other organisations such as the IETF, ICANN sets technical policies and standards to keep the Internet working and evolving. For example, the IETF has set thousands of standards that have kept the Internet evolving to keep up with the times, such as developing the Internet Protocol version 6 (IPv6) address when it was discovered that IPv4 addresses were not sufficient to provide a distinct address to every Internet device.

< <https://www.todayonline.com/commentary/commentary-will-internet-tomorrow-become-several-intranets-instead-geopolitics-could-be-key-1996621> https://www.todayonline.com/commentary/commentary-will-internet-tomorrow-become-several-intranets-instead-geopolitics-could-be-key-1996621>

 

Digital Bridge: Telecom politics — Trade and Tech Council angst — Haugen’s $$

... But don’t be fooled. Despite an American likely to lead the U.N. telecom agency, the real politicking is already underway in the low-key (but very important) working groups at the ITU and other acronym-heavy standards bodies like the IETF. These committees set the road map from which global standards originate. And, quietly, Beijing has been parceling out its effort to rewrite how the internet works via these extremely wonky groups.

< <https://www.politico.eu/newsletter/digital-bridge/telecom-politics-trade-and-tech-council-angst-haugens/> https://www.politico.eu/newsletter/digital-bridge/telecom-politics-trade-and-tech-council-angst-haugens/>

 

Researchers puzzle: Who faked IPv4 addresses and for what?

Qasim Lone, an employee of RIPE Labs, shows in an analysis that has so far gone largely unnoticed by the public that an IPv4 address range that has actually been reserved for decades is secretly being used by one or more companies for their own purposes. ... Thus, the decision on the utilisation of this address block is up in the air. However, because it is known among experts that not all Internet participants always adhere to the guidelines of the IETF, and because some excluded address ranges have already been used unofficially in the past, the RIPE Lab investigated whether this is also the case with 240/4. The result was that the block is indeed in use in private networks, but without the necessary coordination with the global Internet community.

< <https://www.heise.de/hintergrund/Researchers-puzzle-Who-faked-IPv4-addresses-and-for-what-7270990.html> https://www.heise.de/hintergrund/Researchers-puzzle-Who-faked-IPv4-addresses-and-for-what-7270990.html>

 

Do I Really Need IPv6?

... The familiar IP address is defined in detail by the IETF Request for Comment (RFC) #791 finalized in 1981.

< <https://www.radioworld.com/tech-and-gear/radio-it-management/do-i-really-need-ipv6> https://www.radioworld.com/tech-and-gear/radio-it-management/do-i-really-need-ipv6>

 

Cyberspace in geopolitics – International cybersecurity agreements

We continuously bemoan the fact that Big Tech has become larger than most countries and wield global power that would be incomprehensible in the past decades. ... The IETF, the group that agrees on the technical protocols that make the Internet work, is largely run by volunteer individuals.

< <https://www.fijitimes.com/cyberspace-in-geopolitics-international-cybersecurity-agreements/> https://www.fijitimes.com/cyberspace-in-geopolitics-international-cybersecurity-agreements/>

 

Shield your data from a quantum attack: The path to PQC migration

... 4. Finally, you should consider deploying a hybrid quantum-safe VPN. The IETF has developed a set of specifications for such VPN products, recommending crypto-agile solutions that support hybrid key establishment, meaning post-quantum algorithms can work alongside today’s standards. Quantum-safe VPN products based on the IETF specification are already on the market, so upgrading is a relatively simple step you can already take.

< <https://venturebeat.com/security/shield-your-data-from-a-quantum-attack-the-path-to-pqc-migration/> https://venturebeat.com/security/shield-your-data-from-a-quantum-attack-the-path-to-pqc-migration/>

 

New paper: Wi-Fi Alliance advocates for common QoS approach across wired, Wi-Fi, and 5G networks

... To maintain consistent QoS across wired and Wi-Fi networks the IETF RFC 8325 defines a mapping between IETF’s differentiated service code point (DSCP) and IEEE 802.11’s user priority (UP), which is then mapped to Wi-Fi CERTIFIED Multimedia™ (WMM®) access categories. Wi-Fi Alliance says DSCP mapping can also act as a bridge between Wi-Fi QoS and the 5G QoS identifier (5QI) scheme defined by 3GPP by defining a mapping between 5QI to DSCP.

< <https://wifinowglobal.com/news-and-blog/new-paper-wi-fi-alliance-advocates-for-common-qos-approach-across-wired-wi-fi-and-5g-networks/> https://wifinowglobal.com/news-and-blog/new-paper-wi-fi-alliance-advocates-for-common-qos-approach-across-wired-wi-fi-and-5g-networks/>

 

how to Use GnuPG to Encrypt Files on Linux

In this article we will try to teach you how to Encrypt Sensitive Files Using GnuPG on Linux. GnuPG (better known as GPG) is an implementation of a standard known as PGP (Pretty Good Privacy). It uses a system of “public” and “private” keys to encrypt and sign messages or data. GPG is an open source standard and a strong alternative to Symantec’s official PGP software. It was developed by Werner Koch and released in 1999 as an alternative to Symantec’s software suite of encryption tools. It is available as a free software download and is based on the Open PGP encryption standards set by the IETF.

< <https://www.bollyinside.com/articles/how-to-use-gnupg-to-encrypt-files-on-linux/> https://www.bollyinside.com/articles/how-to-use-gnupg-to-encrypt-files-on-linux/>

 

Creating Quantum Network Solutions with Aliro

... We’re working with our first commercial and government customers to develop quantum network prototypes. We are developing a repeatable and scalable process that we can replicate with many other customers over the next year or so. We’re also collaborating on aspects of our work with national research labs, including the NSF’s Center for Quantum Networks and Hybrid Quantum Architectures and Networks (HQAN), as well as industry leaders including IBM, Quantinuum, Rigetti, and others. And we are leading the standards charge by working inside the QED-C and the IETF. All of these partnerships are important efforts Aliro is driving to bring together the pieces needed to build the quantum internet.

< <https://www.azoquantum.com/Article.aspx?ArticleID=368> https://www.azoquantum.com/Article.aspx?ArticleID=368>

 

Die IETF trifft sich in London zum 115. Treffen [The IETF meets in London for the 115th meeting]

Das 115. Treffen der IETF startet am 05. Dezember 2022 als Präsenzveranstaltung unter dem Titel »IETF 115 London« in London (UK). Eine Online-Teilnahme ist selbstverständlich ebenfalls möglich.

< <https://domain-recht.de/allgemein/november-die-ietf-trifft-sich-in-london-zum-115-treffen-68605.html> https://domain-recht.de/allgemein/november-die-ietf-trifft-sich-in-london-zum-115-treffen-68605.html>

 

Neue Whois-Regeln für RA- und RAA-Verträge [New Whois rules for RA and RAA contracts]

... Seit 2011, damals noch auf Betreiben des »Security and Stability Advisory Committee«, arbeitet ICANN an einer Reform des WHOIS-Systems. Fehlende Internationalisierung, mehr Sicherheit im Datenzugriff, das Bedürfnis nach gestaffelten Zugriffen sowie standardisierte Ausgabemeldungen machten eine Reform des bisherigen WHOIS-Protokolls unvermeidbar. Unter dem (Bußgeld-)Druck der Datenschutzgrundverordnung mussten diese Arbeiten intensiviert werden. Im Februar 2019 schaffte ICANN erste Fakten: bis 26. August 2019 erhielten die Domain-Registrare Zeit, das neue Registration Data Access Protocol (RDAP) zu implementieren. Das RDAP basiert auf dem WHOIS-Kompromissmodell (»Temporary Specification for gTLD Registration Data«, kurz: »temp spec«); es wurde von der IETF als potentielle Alternative zum bisherigen WHOIS-System geschaffen. Dazu liefert es die Registrierungsdaten wie das WHOIS, seine Implementierung standardisiert jedoch unter anderem den Datenzugriff. Näher beschrieben ist es in den IETF-RFCs 7480 bis 7484 sowie 8056.

< <https://domain-recht.de/domain-registrierung/whois/icann-neue-whois-regeln-fuer-ra-und-raa-vertraege-68600.html> https://domain-recht.de/domain-registrierung/whois/icann-neue-whois-regeln-fuer-ra-und-raa-vertraege-68600.html>



Forscher rätseln: Wer hat sich IPv4-Adressen erschummelt und wofür? [Forscher rätseln: Wer hat sich IPv4-Adressen erschummelt und wofür?]

... So hängt die Entscheidung über die Verwertung dieses Adressblocks in der Luft. Weil aber unter Fachleuten bekannt ist, dass sich an die Richtlinien der IETF nicht immer alle Internet-Teilnehmer halten, und manche ausgeklammerten Adressbereiche bereits in der Vergangenheit inoffiziell genutzt wurden, untersuchte das RIPE Lab, ob das auch bei 240/4 der Fall ist. Heraus kam, dass der Block tatsächlich in privaten Netzen in Gebrauch ist, aber eben ohne eine erforderliche Koordinierung mit der globalen Internet-Community.

< <https://www.heise.de/hintergrund/Forscher-Raetseln-Wer-hat-sich-IPv4-Adressen-erschummelt-und-wofuer-7267521.html> https://www.heise.de/hintergrund/Forscher-Raetseln-Wer-hat-sich-IPv4-Adressen-erschummelt-und-wofuer-7267521.html>

 

Was ist 6LoWPAN? [What is 6LoWPAN?]

6LoWPAN ist ein Standard und Kommunikationsprotokoll, mit dem sich IPv6-Daten über ein IEEE-802.15.4-basiertes Niedrigenergie-Funknetzwerk übertragen lassen. Der Standard ist überwiegend auf der Vermittlungsschicht des OSI-Referenzmodells angesiedelt und sorgt für die Anpassung des Network Layers an den Physical Layer und den Data Link Layer von IEEE 802.15.4. Bei der IETF existiert eine Arbeitsgruppe für IPv6 over Low Power Wireless Personal Area Network.

< <https://www.ip-insider.de/was-ist-6lowpan-a-7144f9b9b832d04e50a73cf30b8c881a/> https://www.ip-insider.de/was-ist-6lowpan-a-7144f9b9b832d04e50a73cf30b8c881a/>

 

Gestion technique d’Internet – Dr Yasam Ayavefe [Technical Management of the Internet – Dr Yasam Ayavefe]

... Malgré leurs limites, l’ICANN, l’IETF et le W3C, par leur combinaison, jouent un rôle important dans la gestion technique d’Internet. Cependant, il stipule en partie la régulation socio-économique des activités soutenues par le réseau.

< <https://www.miroir-mag.fr/people-news/gestion-technique-dinternet-dr-yasam-ayavefe/> https://www.miroir-mag.fr/people-news/gestion-technique-dinternet-dr-yasam-ayavefe/>

 

Du mou sur le ban de Huawei et ZTE aux Etats-Unis [Soft on the ban of Huawei and ZTE in the United States]

... Mais les sociétés américaines ne peuvent pas non plus participer à des réunions autour des futures normes technologiques, si une société bannie est présente, notamment avec l'ISO, l'IETF, l'UIT, l'IEEE et le W3C.

< <https://www.echosdunet.net/breve/du-mou-sur-le-ban-de-huawei-et-zte-aux-etats-unis> https://www.echosdunet.net/breve/du-mou-sur-le-ban-de-huawei-et-zte-aux-etats-unis>

 

Cách bật tính năng bỏ qua CAPTCHA trên iPhone [How to enable CAPTCHA bypass on iPhone]

... Tommy Pauly, chuyên gia công nghệ tại Apple, cho biết: “Mã thông báo truy cập cá nhân không hoàn toàn dành cho các thiết bị của Apple, vì chúng là một phần của tiêu chuẩn xác thực rộng hơn gọi là Thẻ bảo mật, được phát triển bởi nhóm công tác IETF, bao gồm Apple và Google.

< <https://kynguyenso.plo.vn/cach-bat-tinh-nang-bo-qua-captcha-tren-iphone-post699159.html> https://kynguyenso.plo.vn/cach-bat-tinh-nang-bo-qua-captcha-tren-iphone-post699159.html>

 

**********************

SECURITY & PRIVACY

**********************

How DKIM records reduce email spoofing, phishing and spam

Spammers, phishers and all kinds of threat actors like to forge email to seduce users into opening malicious email and letting the barbarians in the gates. Email authentication with the DomainKeys Identified Mail standard can stop -- or at least slow down -- many of these attacks using public key cryptography.

< <https://www.techtarget.com/searchsecurity/answer/How-DKIM-records-reduce-email-spoofing-phishing-and-spam> https://www.techtarget.com/searchsecurity/answer/How-DKIM-records-reduce-email-spoofing-phishing-and-spam>

 

IP fragmentation and the DNS — the state of IP fragmentation

Instances of attackers using IP fragmentation to poison the cache of the DNS have been known for almost a decade. However, until recently, no one has conclusively studied the frequency of IP fragmentation on the Internet nor how effective known mitigation strategies are to such attacks.

< <https://blog.apnic.net/2022/09/21/ip-fragmentation-and-the-dns-the-state-of-ip-fragmentation/> https://blog.apnic.net/2022/09/21/ip-fragmentation-and-the-dns-the-state-of-ip-fragmentation/>

 

EU Cybersecurity and Resilience – What challenges to create a common framework?

First announced by President von der Leyen in her State of the Union Address in September 2021, the European Commission is expected to unveil, in September 2022, a Cyber Resilience Act that aims to establish common cybersecurity rules for digital products and associated services such as software that are placed on the European single market.

< <https://www.euractiv.com/section/digital/video/eu-cybersecurity-and-resilience-what-challenges-to-create-a-common-framework/> https://www.euractiv.com/section/digital/video/eu-cybersecurity-and-resilience-what-challenges-to-create-a-common-framework/>

 

Prof. Pohlmann: Cyber Resilience Act still has room for improvement

The European Commission has presented the proposal for the Cyber Resilience Act (CRA) regulation. The proposed measures are intended to regulate that the cybersecurity of digital products is already ensured as soon as they are designed, developed, manufactured and put into circulation. Furthermore, manufacturers are to be obliged to fix vulnerabilities and to report actively exploited vulnerabilities and incidents. Market surveillance and enforcement provisions are also included in the Cyber Resilience Act.

< <https://international.eco.de/news/prof-pohlmann-cyber-resilience-act-still-has-room-for-improvement/> https://international.eco.de/news/prof-pohlmann-cyber-resilience-act-still-has-room-for-improvement/>

 

**********************

INTERNET OF THINGS

**********************

Development and application of an environment monitoring system based on IPv6

Abstract: The widespread use of the Internet of Things (Iot) makes it possible to connect everything but having enough IP addresses is a fundamental requirement of this paradigm. All previous environmental monitoring systems in China are based on IPv4. In combination with the characteristics and requirements of China's atmospheric environment monitoring system, this paper develops a monitoring system based on IPv6 technology. Users can directly access the monitoring equipment through the IPv6 website to view data and configure operations. This paper first introduces the design and implementation of the software and hardware of the system, then introduces the simplification of IPv6 protocol, the transplantation of IPv6 protocol on ARM and the design and implementation of embedded Web server system. The experimental results show that the developed atmospheric environment monitoring system can realize continuous data acquisition based on IPv6 and provide data-driven support for environmental protection management and decision-making.

< <https://www.nature.com/articles/s41598-022-19929-4> https://www.nature.com/articles/s41598-022-19929-4>

 

eu: Commission expects to set the world’s cybersecurity standards for connected devices

The European Commission contends that its new cybersecurity law will set the security bar for Internet of Things products worldwide and put European manufacturers at a competitive advantage.

< <https://www.euractiv.com/section/cybersecurity/news/commission-expects-to-set-the-worlds-cybersecurity-standards-for-connected-devices/> https://www.euractiv.com/section/cybersecurity/news/commission-expects-to-set-the-worlds-cybersecurity-standards-for-connected-devices/>

 

**********************

OTHERWISE NOTEWORTHY

**********************

A Tale Of Two Technologies: The Stories Of IPv6 And 5G

In recent times, the two technologies that jointly brought ubiquitous online connectivity to the world have confronted existential difficulties brought on by their own success. IPv4 (Internet Protocol version 4) faced address exhaustion, and 4G (the 4th generation cellular technology) encountered bandwidth exhaustion.

< <https://www.forbes.com/sites/forbestechcouncil/2022/09/20/a-tale-of-two-technologies-the-stories-of-ipv6-and-5g/> https://www.forbes.com/sites/forbestechcouncil/2022/09/20/a-tale-of-two-technologies-the-stories-of-ipv6-and-5g/>

 

Computing's Grand Challenge for Sustainability

In 2022, climate change has arrived with a vengeance, evidenced by deadly heatwaves in the U.S., U.K., and Europe. We have seen deadly and environment-destroying wildfires in France, Spain, Portugal, Hungary, and the southwestern U.S. And across the world, the increasing weather extremes due to climate change are producing both widespread droughts, and ironically, torrential flooding.

< <https://cacm.acm.org/magazines/2022/10/264841-computings-grand-challenge-for-sustainability/fulltext> https://cacm.acm.org/magazines/2022/10/264841-computings-grand-challenge-for-sustainability/fulltext>

 

Internet Society recommends development of Solar-System-scale routing framework

The Internet Society’s Interplanetary Networking Special Interest Group (IPNSIG) has called for the development of “a common, interoperable, autonomous and scalable routing framework within the Solar System Internet.”

< <https://www.theregister.com/2022/09/20/ipnsig_solar_system_routing_framework/> https://www.theregister.com/2022/09/20/ipnsig_solar_system_routing_framework/>

< <https://www.msn.com/en-us/money/other/internet-society-recommends-development-of-solar-system-scale-routing-framework/ar-AA121gWH> https://www.msn.com/en-us/money/other/internet-society-recommends-development-of-solar-system-scale-routing-framework/ar-AA121gWH>

< <https://fudzilla.com/news/55511-internet-society-wants-a-solar-system-wide-network> https://fudzilla.com/news/55511-internet-society-wants-a-solar-system-wide-network>

 

New Research: Non-governmental Governance of Trust on the Internet

IGP is pleased to report that we have received a $150,000 grant from the Internet Society Foundation to study the CA/Browser Forum and its governance of Web, Code-signing and other Public Key Infrastructures (PKI).

< <https://www.internetgovernance.org/2022/09/22/new-research-non-governmental-governance-of-trust-on-the-internet/> https://www.internetgovernance.org/2022/09/22/new-research-non-governmental-governance-of-trust-on-the-internet/>

 

Getting started with EasyDMARC: an overview of resources

Recently we have added a new product to our offer at Openprovider: EasyDMARC. This product is our newest solution to help you increase domain security by protecting your email servers and preventing hackers from sending phishing emails from your domain. EasyDMARC offers a wealth of resources for you to learn about email security and help you get started. In this article, we share some of them, so you can make the most out of it.

< <https://www.openprovider.com/blog/getting-started-with-easydmarc> https://www.openprovider.com/blog/getting-started-with-easydmarc>

 

Interdomain BGP policies — where traffic should exit a network

At the most basic level, there are only three Border Gateway Protocol (BGP) policies:

< <https://blog.apnic.net/2022/09/23/interdomain-bgp-policies-where-traffic-should-exit-a-network/> https://blog.apnic.net/2022/09/23/interdomain-bgp-policies-where-traffic-should-exit-a-network/>

 

Underload: The future of congestion control

Internet congestion control mechanisms were initially designed for scenarios where networks are overloaded, that is, sending rates would be either moderate or large compared to available link capacities. Moreover, it has been common to assume that applications produce long, ‘greedy’ flows, which are able to saturate a path’s capacity over time.

< <https://blog.apnic.net/2022/09/22/underload-the-future-of-congestion-control/> https://blog.apnic.net/2022/09/22/underload-the-future-of-congestion-control/>

 

Let go of traditional strategies when it comes to IPv6 address planning

As an enthusiastic IPv6 person who has talked passionately to customers on the subject for more than 14 years, it’s been refreshing to see that we’re moving away from the narrative of ‘nobody uses IPv6‘, which I last wrote about on this blog four years ago, to companies now seriously looking at deploying IPv6 in their networks.

< <https://blog.apnic.net/2022/09/20/let-go-of-traditional-strategies-when-it-comes-to-ipv6-address-planning/> https://blog.apnic.net/2022/09/20/let-go-of-traditional-strategies-when-it-comes-to-ipv6-address-planning/>

 

First Board of Directors to Initiate Critical Functions of W3C Inc.

The World Wide Web Consortium (W3C) is preparing to pursue 501(c)(3) non-profit status. Today, W3C is pleased to announce elections to its initial Board of Directors (Board) as the governing body of the W3C public-interest non-profit organization.

< <https://www.w3.org/blog/news/archives/9685> https://www.w3.org/blog/news/archives/9685>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home