[Newsclips] IETF SYN-ACK Newspack 2021-05-17

David Goldstein <david@goldsteinreport.com> Mon, 17 May 2021 10:52 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 84D4B3A32C1 for <newsclips@ietfa.amsl.com>; Mon, 17 May 2021 03:52:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id gGosAQXvNEAk for <newsclips@ietfa.amsl.com>; Mon, 17 May 2021 03:52:38 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D56163A32C0 for <newsclips@ietf.org>; Mon, 17 May 2021 03:52:37 -0700 (PDT)
Received: from DavidDesktop2019 (unknown []) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 524E829936D for <newsclips@ietf.org>; Mon, 17 May 2021 06:52:34 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidDesktop2019
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 17 May 2021 20:52:33 +1000
Organization: Goldstein Report
Message-ID: <008001d74b0a$bf832c80$3e898580$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0081_01D74B5E.912FB1B0"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-au
Thread-Index: AddLCrnozhQbU58GStWZrFOJpVaXhQ==
X-PPP-Message-ID: <20210517105235.1778599.27704@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/HQwUSqVyrpiMNWAutC0FqKuhqSs>
Subject: [Newsclips] IETF SYN-ACK Newspack 2021-05-17
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 May 2021 10:52:44 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.





On digital opportunities by Vinton G. Cerf, Internet Pioneer

The Internet and the World Wide Web application have transformed daily life and work for more than half of the world’s population. And the actions of those who are online increasingly affect everyone, including the 3.7 billion who are not yet connected. ... Constructive objectives should keep the International Telecommunication Union (ITU) and other organizations, such as the Internet Engineering Task Force (IETF), International Organization for Standardization (ISO), European Telecommunications Standards Institute (ETSI) and national and private sector standards groups, busy over the decade ahead.

< <https://www.itu.int/en/myitu/News/2021/05/11/16/36/Standards-digital-opportunities-Vint-Cerf> https://www.itu.int/en/myitu/News/2021/05/11/16/36/Standards-digital-opportunities-Vint-Cerf>


Transport protocols and the network by Geoff Huston

One of the basic tools in network design is the so-called "stacked" protocol model. This model was developed in the late 1970s as part of a broader effort to develop general standards and methods of networking. In 1983, the efforts of the CCITT and ISO were merged to form The Basic Reference Model for Open Systems Interconnection, usually referred to as the Open Systems Interconnection Reference Model or the "OSI model." This model included a seven-layer abstract model of networking that defined standard behaviors both of the overall network functionality and the various components of the network. ... If it's a self-limiting action to use a novel transport protocol in the public Internet, then why are we even considering the option of encrypting transport protocols to make all transport headers opaque to the network? One answer is "Edward Snowden." In response to these pervasive monitoring revelations [RFC 7624] the Internet Engineering Task Force (IETF) responded in what could be called a "like for like" reaction and came to a consensus position that "Pervasive Monitoring is an Attack" [RFC 7258]. 

< <https://www.potaroo.net/ispcol/2021-05/headers.html> https://www.potaroo.net/ispcol/2021-05/headers.html>

< <https://blog.apnic.net/2021/05/11/transport-protocols-and-the-network/> https://blog.apnic.net/2021/05/11/transport-protocols-and-the-network/>

< <https://www.circleid.com/posts/20210511-transport-vs-network/> https://www.circleid.com/posts/20210511-transport-vs-network/>


National security agencies warn of 5G network vulnerabilities, adversary influence

... Standards-setting bodies, such as Internet Engineering Task Force and the International Telecommunication Union, set technical standards and security controls that would impact the design and architecture of emerging technologies, including autonomous vehicles and edge computing, technologies that the military needs for future wars.

< <https://www.c4isrnet.com/battlefield-tech/it-networks/5g/2021/05/10/national-security-agencies-warn-of-5g-network-vulnerabilities-adversary-influence/> https://www.c4isrnet.com/battlefield-tech/it-networks/5g/2021/05/10/national-security-agencies-warn-of-5g-network-vulnerabilities-adversary-influence/>


Beyond Software By Mark Stone, Director of Technical Project Management at Etsy

... Since 2005 we've shifted away from "shrink-wrapped" software to software as a service. This, in turn, has ushered in a new era of proprietary lock-in. Since the open source software that drives so many service platforms is never technically distributed, modifications to that software avoid any distribution requirements of open source licensing. The larger problem is the move away from open standards and interoperability, as pioneered by the IETF, that enabled the Internet and Web in the first place.

< <https://www.cioreview.com/news/beyond-software-nid-33617-cid-98.html> https://www.cioreview.com/news/beyond-software-nid-33617-cid-98.html>


Was ist der WebRTC-Standard? [What is the WebRTC standard?]

... Die Technik hinter WebRTC wurde ursprünglich von einer Firma namens Global IP Solutions entwickelt. Google kaufte das Unternehmen im Jahr 2010 und überließ die Weiterentwicklung der Technologie dem World Wide Web Consortium (W3C). Die Internet Engineering Task Force (IETF) schloss sich diesem Vorhaben an. Beide arbeiten seit 2011 an dem Standard. Die Rechte liegen allerdings weiterhin bei Google. Das Unternehmen beschränkt sich aber darauf, nur die kommerzielle Vermarktung durch andere Firmen zu verbieten.

< <https://www.dev-insider.de/was-ist-der-webrtc-standard-a-1012379/> https://www.dev-insider.de/was-ist-der-webrtc-standard-a-1012379/>


No solo cupos: tener mujeres en puestos de poder requiere un cambio cultural [Not just quotas: having women in positions of power requires a cultural change]

... El paper analiza el caso inédito del Grupo de Trabajo de Ingeniería de Internet (IETF, su sigla en inglés), organización de ingeniería -rubro que tradicionalmente tiene baja presencia de mujeres en liderazgos- que desarrolla estándares de interoperabilidad para hardware y software, y cuyo Comité de Nominaciones se conforma al azar.

< <https://www.df.cl/noticias/internacional/economia/no-solo-cupos-tener-mujeres-en-puestos-de-poder-requiere-un-cambio/2021-05-07/185127.html> https://www.df.cl/noticias/internacional/economia/no-solo-cupos-tener-mujeres-en-puestos-de-poder-requiere-un-cambio/2021-05-07/185127.html>





us: CISA Launches a Space Systems Critical Infrastructure Working Group

The Cybersecurity and Infrastructure Security Agency (CISA) today announced the formation of a Space Systems Critical Infrastructure Working Group, a mix of government and industry members that will identify and develop strategies to minimize risks to space systems that support the nation’s critical infrastructure. The Working Group will operate under the Critical Infrastructure Partnership Advisory Council (CIPAC) framework, bringing together space system critical infrastructure stakeholders.

< <https://www.cisa.gov/news/2021/05/13/cisa-launches-space-systems-critical-infrastructure-working-group> https://www.cisa.gov/news/2021/05/13/cisa-launches-space-systems-critical-infrastructure-working-group>


Vulnerable Protocols Leave Firms Open to Further Compromises

Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.

< <https://www.darkreading.com/risk/vulnerable-protocols-leave-firms-open-to-further-compromises/d/d-id/1340993> https://www.darkreading.com/risk/vulnerable-protocols-leave-firms-open-to-further-compromises/d/d-id/1340993>


Biden Plans an Order to Strengthen Cyberdefenses. Will It Be Enough?

A pipeline that provides the East Coast with nearly half its gasoline and jet fuel remained shuttered on Sunday after yet another ransomware attack, prompting emergency White House meetings and new questions about whether an executive order strengthening cybersecurity for federal agencies and contractors goes far enough even as President Biden prepares to issue it.

< <https://www.nytimes.com/2021/05/09/us/politics/biden-cyberattack-response.html> https://www.nytimes.com/2021/05/09/us/politics/biden-cyberattack-response.html>


Colonial Pipeline’s Ransomware Attack Sparks Emergency Declaration

The Biden administration has declared a state of emergency that covers 17 states and Washington D.C. in the wake of the ransomware attack on the Colonial Pipeline Co., and is working with Colonial to restart operations.

< <https://threatpost.com/colonial-pipeline-ransomware-emergency-declaration/165977/> https://threatpost.com/colonial-pipeline-ransomware-emergency-declaration/165977/>


Back to normal: Despite a spike in January, DDoS attacks in Q1 2021 return to pre-lockdown numbers

In Q1 2021, the number of DDoS attacks dropped by 29% compared to the same period in 2020, but increased by 47% compared to Q4 2020, according to data from Kaspersky DDoS Prevention. However, this growth is explained by an unusual spike in January – that month accounted for 43% of all attacks in the quarter – while the other two months remained quiet.

< <https://www.kaspersky.com/about/press-releases/2021_back-to-normal-despite-a-spike-in-january-ddos-attacks-in-q1-2021-return-to-pre-lockdown-numbers> https://www.kaspersky.com/about/press-releases/2021_back-to-normal-despite-a-spike-in-january-ddos-attacks-in-q1-2021-return-to-pre-lockdown-numbers>


CISA Launches a Space Systems Critical Infrastructure Working Group

The Cybersecurity and Infrastructure Security Agency (CISA) today announced the formation of a Space Systems Critical Infrastructure Working Group, a mix of government and industry members that will identify and develop strategies to minimize risks to space systems that support the nation’s critical infrastructure. The Working Group will operate under the Critical Infrastructure Partnership Advisory Council (CIPAC) framework, bringing together space system critical infrastructure stakeholders.

< <https://www.cisa.gov/news/2021/05/13/cisa-launches-space-systems-critical-infrastructure-working-group> https://www.cisa.gov/news/2021/05/13/cisa-launches-space-systems-critical-infrastructure-working-group>





How the Internet of Things is building smart cities

Urban populations are multiplying across the world, but cities are experiencing certain challenges in terms of keeping up with the demands from an increasing population. As the silent force that has transformed and developed our world, technology is now being leveraged to better deal with the growing urbanization and to build smarter cities.

< <https://gulfnews.com/business/company-releases/how-the-internet-of-things-is-building-smart-cities-1.1621237689461> https://gulfnews.com/business/company-releases/how-the-internet-of-things-is-building-smart-cities-1.1621237689461>





Wie das Web nachhaltiger werden kann [How the web can become more sustainable]

Der Datenverkehr auf den Autobahnen des World Wide Web explodiert. Dazu tragen nicht nur Videoanrufe, sondern auch Onlineshopping und die Nutzung verschiedenster digitaler Dienste bei. Höchste Zeit, sich mit dem ökologischen Fussabdruck von digitalen Dienstleistungen auseinanderzusetzen. ... ... Der zentralste, aber in vielen Fällen wohl auch der schwierigste Punkt dabei ist, das Hosting mittels erneuerbarer Energie zu betreiben. Wenn diese Umstellung nicht unmittelbar realisierbar ist, stehen uns verschiedenste Massnahmen zur Verfügung, um die Effizienz unserer Website zu verbessern und die CO2-Emissionen dadurch zu verringern Die Liste zeigt einen Auszug und ist nicht abschliessend zu verstehen: Aktivierung von HTTP/2, bald HTTP/3 auf dem Webserver. Hierbei gilt es zu beachten, dass die Datei-Priorisierung richtig konfiguriert ist. Dank Multiplexing und komprimierten Headern erfolgt die Auslieferung der Website in den allermeisten Fällen ohne zusätzliche Optimierungen schneller. Die richtige Priorisierung wiederum hilft, dass die Rendering-kritischen Dateien zuerst ausgeliefert werden.

< <https://www.netzwoche.ch/news/2021-05-12/wie-das-web-nachhaltiger-werden-kann> https://www.netzwoche.ch/news/2021-05-12/wie-das-web-nachhaltiger-werden-kann>


Je nutno poskytnout SSL certifikáty pro https provoz? Jaké jsou podporované další protokoly? [Is it necessary to provide SSL certificates for https traffic? What other protocols are supported?]

Ano, je nutné správně nastavit certifikáty SSL, aby byla pro uživatele komunikace vždy důvěryhodná a bezpečná. Cloudflare však umí tuto práci s certifikáty výrazně zjednodušit a převzít roli správce certifikátů SSL. Podporována je celá škála protokolů, včetně těch moderních jako je HTTP/3 s podporou Quic.

< <https://www.itbiz.cz/clanky/pracka-sitoveho-provozu-cloudflare-/> https://www.itbiz.cz/clanky/pracka-sitoveho-provozu-cloudflare-/>


ExTiX 21.05: Linux 5.12 läuft komplett im Arbeitsspeicher [ExTiX 21.05: Linux 5.12 runs completely in the main memory]

... Neben dem speziell für das Betriebssystem angepassten Systemkernel Linux 5.12.4 mit dem Suffix „exton“, kommen aktuelle Anwendungen wie der Mozilla Firefox 88.0.1 mit Unterstützung für QUIC und HTTP/3 sowie Spotify, Skype und LibreOffice zum Einsatz.

< <https://www.computerbase.de/2021-05/extix-21.05-linux-5.12-laeuft-komplett-im-arbeitsspeicher/> https://www.computerbase.de/2021-05/extix-21.05-linux-5.12-laeuft-komplett-im-arbeitsspeicher/>





ETSI releases a white paper on future ICT technology trends

“Information and Communications Technology (ICT) is an exciting and dynamic area, that is in constant innovation, through the evolution of existing concepts and technologies but also through the emergence of disruptive technologies and even sometimes unexpected new use cases”. So begins the ETSI White Paper describing the ETSI Technology Radar, that highlights the probable technology trends that may influence ETSI’s quest to remain at the forefront of ICT standardization. The document is intended to promote the awareness and discussion of the impact and evolution of such technology trends among ETSI members and the ICT community as a whole.

< <https://www.etsi.org/newsroom/press-releases/1925-etsi-releases-a-white-paper-on-future-ict-technology-trends> https://www.etsi.org/newsroom/press-releases/1925-etsi-releases-a-white-paper-on-future-ict-technology-trends>


NIST RPKI Deployment Monitor

The NIST RPKI Monitor is a test and measurement tool designed to monitor the dynamics of the global Resource Public Key Infrastructure (RPKI) and the impact of RPKI Route Origin Validation (ROV) on Internet routing. Its purpose is to provide measurement data and analyses to the research, standardization, and operations communities necessary to improve the trust and confidence in the underlying technologies.

< <https://blog.apnic.net/2021/05/14/nist-rpki-deployment-monitor/> https://blog.apnic.net/2021/05/14/nist-rpki-deployment-monitor/>


DNS Engineering Practice and community engagement by Brett Carr, Manager DNS Engineering 

At Nominet, as the registry for the UK’s national namespace, we are experts in the DNS that underpins the internet. I’ve spent my whole career engaged with DNS but working at Nominet continues to be a particular pleasure; I relish being part of the deep dive into this complex but critical system and finding ways to optimise it.

< <https://www.nominet.uk/dns-engineering-practice-and-community-engagement/> https://www.nominet.uk/dns-engineering-practice-and-community-engagement/>


2020 Impact Report: The Internet Is a Lifeline: Try to imagine living through 2020 without the Internet.

Medical researchers, loved ones, and even work acquaintances would have been hard to reach, or even worse, cut off. There would have been a total stop to education, with young people losing a crucial year. Our society would have been faced with a terrible choice between economic or medical collapse. The Internet did not make everything perfect. This year has shown us that nothing could. But without it, we would have fared much worse. The Internet is a force for good in society, for sure.

< <https://www.internetsociety.org/impact-report/2020/> https://www.internetsociety.org/impact-report/2020/>


David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home