[Newsclips] IETF SYN-ACK Newspack 2020-01-04

David Goldstein <david@goldsteinreport.com> Mon, 04 January 2021 11:30 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id CE2D93A0C2A for <newsclips@ietfa.amsl.com>; Mon, 4 Jan 2021 03:30:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.013
X-Spam-Status: No, score=0.013 tagged_above=-999 required=5 tests=[HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id Musg-Q3gG3zz for <newsclips@ietfa.amsl.com>; Mon, 4 Jan 2021 03:30:55 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D7D63A0C29 for <newsclips@ietf.org>; Mon, 4 Jan 2021 03:30:55 -0800 (PST)
Received: from DavidDesktop2019 (unknown []) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id D4B0A280127 for <newsclips@ietf.org>; Mon, 4 Jan 2021 06:30:51 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidDesktop2019
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 4 Jan 2021 22:30:53 +1100
Organization: Goldstein Report
Message-ID: <00f701d6e28d$116005a0$342010e0$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F8_01D6E2E9.44D07DA0"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-au
Thread-Index: AdbijQ9uj2q+/02yQlGqJWlT7VJweA==
X-PPP-Message-ID: <20210104113052.2545758.66104@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/Iugy9RX5rBRENmoLfdtjLH8U5JM>
Subject: [Newsclips] IETF SYN-ACK Newspack 2020-01-04
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jan 2021 11:31:00 -0000

Hi IETF and friends!


It’s not a huge news today, but rather than let it “grow”, here’s the first news of 2021! I hope all managed a safe and enjoyable festive season for those who celebrated. And just the usual reminder, the IETF SYNACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.


Happy reading all!






Smart DNS for the New Network Edge: Emerging Requirements for DNS Encryption

This blog post — the fourth in a series — will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency. Extensive publicity about the gathering and use (and misuse) of personal data by popular online services has made internet users increasingly concerned about constant inspection of their lives and trade in their personal information. As part of a broader privacy effort in late 2018, the Internet Engineering Task Force (IETF) finalized initial standards DNS over TLS (DoT) and DNS over HTTPS (DoH) to encrypt DNS traffic between clients (stub resolvers) and resolvers.

< <https://securityboulevard.com/2020/12/smart-dns-for-the-new-network-edge-emerging-requirements-for-dns-encryption/> https://securityboulevard.com/2020/12/smart-dns-for-the-new-network-edge-emerging-requirements-for-dns-encryption/>

< <https://www.publicnow.com/view/3E9BE2CF801C641E70A3ECD50FC61CC985A9C0A7> https://www.publicnow.com/view/3E9BE2CF801C641E70A3ECD50FC61CC985A9C0A7>


New Nails in the Crypto-Anarchism Containment Coffin by Anthony Rutkowski

... These three developments enabled and unleashed a 25-year period of crypto-anarchy and endless cybersecurity nightmares facilitated by the development and deployment of ever more elusive and nuanced cryptographic techniques by actors competing among each other. The pursuit of Crypto-Anarchy by Design became institutionalized and commercialized — as companies competed in a new, predominantly Silicon Valley-based, marketplace for products and services — promoted, lobbied, and sold as absolute privacy. Clever and innovative cryptographic consultants and academicians became sought-after commodities to pursue ever more extreme implementations in favoured, unfettered TCP/IP venues like the IETF.

< <http://www.circleid.com/posts/20210103-new-nails-in-the-crypto-anarchism-containment-coffin/> http://www.circleid.com/posts/20210103-new-nails-in-the-crypto-anarchism-containment-coffin/>


In the Business of News

... A big part of this project was the IP implementation, and Abdallah credits German systems integrator Qvest Media with designing and implementing a 100GBit/s-capable, all-IP media infrastructure that supports the SMPTE ST 2110, NMOS IS-04 and IS-05 standards and offers sufficient bandwidth for a future UHD/4K upgrade of the production infrastructure. The audio-over-IP implementation supports IEEE, IETF and AES67. Since the network consists of customary IT components, it forms the basis for both the redundant broadcast video network design and the seamlessly integrated office IT.

< <https://www.broadcastprome.com/case-studies/in-the-business-of-news/> https://www.broadcastprome.com/case-studies/in-the-business-of-news/>


Haivision and SRT Alliance Bring Broadcast and Cloud Leaders Together

... Highlights of the SRT InterOp Plugfest include: ... The latest SRT developments were presented, including new enhancements to the IETF Internet Draft submission.

< <https://aithority.com/video/haivision-and-srt-alliance-bring-broadcast-and-cloud-leaders-together/> https://aithority.com/video/haivision-and-srt-alliance-bring-broadcast-and-cloud-leaders-together/>


Auch das 110. Treffen der Internetingenieure findet nur online statt [Also the 110th meeting of Internet engineers takes place only online]

Die Internet Engineering Task Force (IETF), deren 108. und 109. Treffen online stattfanden, hat nun ihr 110. Treffen, das als Präsenzveranstaltung geplant war, doch auf online umgestellt. Das 110. Meeting der Organisation zur Weiterentwicklung des Internets, in dem es führende Internet-Ingenieure zusammenbringt, findet vom 06. bis 12. März 2021 statt.

< <https://domain-recht.de/domain-events/sonstige-events/ietf-auch-das-110-treffen-der-internetingenieure-findet-nur-online-statt-67737.html> https://domain-recht.de/domain-events/sonstige-events/ietf-auch-das-110-treffen-der-internetingenieure-findet-nur-online-statt-67737.html>


Umstrittener Internet-„Sicherheitsstandard“ eTLS wird umbenannt [Controversial Internet "security standard" eTLS is renamed]

Der umstrittene, weil aufgebohrte ETSI-Verschlüsselungstandard wurde von „eTLS“ auf „ETS“ umbenannt. Das hatten die Internetstandardisierer der IETF verlangt, um Verwechslungen zu ihrem sicheren Standard TLS 1.3 auszuschließen.

< <https://fm4.orf.at/stories/2961307/> https://fm4.orf.at/stories/2961307/>


EU-Richtlinie für „hochklassige Cybersicherheit“ mit Nachschlüsseln [EU directive for “high-class cybersecurity” with duplicate keys]

... 2014 „Goldene Schlüssel“ und das Crypto API des W3C: 2014 03 05 Wie das Netz gegen Überwachung gehärtet wird. Topthema auf der Vollversammlung der Internet Engineering Task Force (IETF) war, welche technischen Maßnahmen gegen die Überwachung des Internets durch die NSA und andere Geheimdienste ergriffen werden sollen. Den Auftakt dafür setzte das W3C mit einer Veranstaltung unter dem programmatischen Titel „Härtung des Internets gegen umfassende Überwachung“.

< <https://fm4.orf.at/stories/3010484/> https://fm4.orf.at/stories/3010484/>


Des références à des logiciels vieux de plusieurs décennies sont incluses dans le nouvel accord Brexit [References to decades-old software are included in new Brexit deal]

... En voici un extrait : « Le standard ouvert s/MIME en tant qu'extension du standard de messagerie électronique SMTP de facto sera déployé pour chiffrer les messages contenant des informations de profil ADN. Le protocole s/MIME (V3) autorise les reçus signés, les étiquettes de sécurité et les listes de diffusion sécurisées et repose sur la Cryptographic Message Syntax (CMS), une spécification IETF (Internet Engineering Task Force) pour les messages protégés par cryptographie. Il peut être utilisé pour signer, enregistrer, authentifier ou chiffrer numériquement toute forme de données numériques.

< <https://www.developpez.com/actu/311503/Des-references-a-des-logiciels-vieux-de-plusieurs-decennies-sont-incluses-dans-le-nouvel-accord-Brexit-ou-Netscape-Communicator-et-Mozilla-Mail-sont-presentes-comme-etant-des-services-modernes/> https://www.developpez.com/actu/311503/Des-references-a-des-logiciels-vieux-de-plusieurs-decennies-sont-incluses-dans-le-nouvel-accord-Brexit-ou-Netscape-Communicator-et-Mozilla-Mail-sont-presentes-comme-etant-des-services-modernes/>


Windows 10 21H1 prendra en charge une nouvelle fonctionnalité de sécurité [Windows 10 21H1 will support new security feature]

... L’IETF, l’organisme responsable du développement de ce protocole, continue de publier de nouvelles versions. La version TLS 1.3 réduira la latence, améliorera les performances et la sécurité des communications sur Internet. En fait, Windows 10 21H1 bénéficiera de toutes ces améliorations en le prenant en charge.

< <https://www.netcost-security.fr/actualites/2928/windows-10-21h1-prendra-en-charge-une-nouvelle-fonctionnalite-de-securite/> https://www.netcost-security.fr/actualites/2928/windows-10-21h1-prendra-en-charge-une-nouvelle-fonctionnalite-de-securite/>


L’asset management nell’industria 4.0 [Asset management in industry 4.0]

... Gli asset informatici: Oltre a standard e practice per la gestione degli asset in generale, in ambito informatico fin del 1988 è stata pubblicata dalla IETF (Internet Engineering Task Force) la prima versione del protocollo SNMP (Simply Network Management Protocol), atto a semplificare la configurazione, gestione e supervisione degli apparati di rete.

< <https://www.industry4business.it/industria-4-0/lasset-management-nellindustria-4-0/> https://www.industry4business.it/industria-4-0/lasset-management-nellindustria-4-0/>


Windows 10 21H1 dará soporte a una nueva característica de seguridad [Windows 10 21H1 will support a new security feature]

... La IETF, el organismo encargado de desarrollar este protocolo, continúa lanzando nuevas versiones. La versión TLS 1.3 reducirá la latencia, mejorará el rendimiento y la seguridad de la comunicación a través de Internet. De hecho, Windows 10 21H1 se beneficiará de todas estas mejoras al darle soporte.

< <https://microsofters.com/174592/windows-10-21h1-dara-soporte-a-una-nueva-caracteristica-de-seguridad/> https://microsofters.com/174592/windows-10-21h1-dara-soporte-a-una-nueva-caracteristica-de-seguridad/>


DNSSEC Nedir? Neden Önemli? [What is DNSSEC? Why is it important?]

... Açılımı “DNS Security Extensions” olan DNSSEC, az önceki gördüğümüz senaryo gibi senaryoların önlenmesi amacıyla, IETF tarafınca bulundu. İsminden de anlaşıldığı üzere, bu sefer asıl amaç güvenlik olarak belirlendi ve 90’lı yıllarda çalışmalara başlandı.

< <https://www.technopat.net/2020/12/25/dnssec-nedir-neden-onemlidir/> https://www.technopat.net/2020/12/25/dnssec-nedir-neden-onemlidir/>


DNSSEC Nedir? [What is DNSSEC?]

Açılımı “DNS Security Extensions” olan DNSSEC, güvenlik kayıplarının önlenmesi amacıyla IETF tarafınca bulunmuştur. İsminden de anlaşıldığı üzere asıl amaç güvenlik olarak belirlenmiş ve 90’lı yıllarda çalışmalara başlanmıştır.

< <https://teknodestek.com.tr/dnssec-nedir/> https://teknodestek.com.tr/dnssec-nedir/>


推进IPv6规模部署专家委员会副秘书长田辉:IPv6筑基,“IPv6+”强魂 [To promote the IPv6 scale deployment expert committee Deputy Secretary-General Tian Hui: IPv6 foundation, "IPv6 plus" strong soul]

... 田辉副秘书长认为,不管是在中国还是全球,“IPv6+”技术都得到了广泛的认可,海外标准组织如ETSI、IETF均启动了“IPv6+”的标准化和创新工作,在“IPv6+”技术研究与发展方面,我国已经和世界先进国家并驾齐驱。

< <https://finance.sina.com.cn/tech/2020-12-25/doc-iiznezxs8793349.shtml> https://finance.sina.com.cn/tech/2020-12-25/doc-iiznezxs8793349.shtml>


Webブラウザーで動く第4の言語“WebAssembly”はどう凄い? C++もコンパイル……~IIJがアプリケーション分野の革新を振り返る~ [How amazing is the fourth language "WebAssembly" that runs on a web browser? C ++ also compiled ...- IIJ looks back on innovations in the application field-]

... 山本(和)氏は最後にQUICで今起きていることとして、IETFでの標準化が最終段階にあること、ChromeでIETFのQUIC(GoogleのQUICではなく)がすでに利用可能なこと、GoogleやFacebokのサービスでIETFのQUICがすでに利用可能で、よいユーザー体験が報告されていることを紹介した。

< <https://internet.watch.impress.co.jp/docs/event/1296568.html> https://internet.watch.impress.co.jp/docs/event/1296568.html>


増えるgTLDの登録数、NXNSAttackやSAD DNS攻撃など2020年の「ドメイン名ニュース」 [2020 "domain name news" such as increasing number of gTLD registrations, NXNS Attack and SAD DNS attacks]

... 4位 「.org」の売却は不成立に終わる: 4位は、「.org」の売却不成立である。この話題は、.orgのレジストリであるPublic Interest Registry(PIR)を売却しようとする計画が発表されたことに対し、登録者や関係団体などから大きな懸念が示されたことが発端となっている。 PIRは、2002年にInternet Society(ISOC)の子会社として設立された組織であり、2003年1月に当時の米VeriSignから「.org」のレジストリ事業を継承した。.orgのレジストリ事業から得られる利益は、ISOCの活動(ISOC自体の活動やIETF会合の開催など)に充てられている。

< <https://ascii.jp/elem/000/004/038/4038892/> https://ascii.jp/elem/000/004/038/4038892/>





CISA Warns of Multiple Trek TCP/IP Stack Vulnerabilities

The Cybersecurity Infrastructure and Security Agency (CISA) is warning of yet another TCP/IP stack vulnerability problem that could lead to remote code execution and denial-of-service attacks.

< <https://www.bitdefender.com/box/blog/iot-news/cisa-warns-multiple-trek-tcp-ip-stack-vulnerabilities/> https://www.bitdefender.com/box/blog/iot-news/cisa-warns-multiple-trek-tcp-ip-stack-vulnerabilities/>


Confronting Heightened Cybersecurity Threats Amid COVID-19

Did you know that Americans’ private health data is estimated to be worth up to 20 times the value of financial data on the Dark Web? This makes the Health and Public Health (HPH) Sector a primary target for cybercriminals. When an HPH Sector entity is affected by a cyber event, the public may lose its ability to engage with or receive health services, putting lives at risk. The COVID-19 pandemic has raised the stakes, increasing cyber risk in the HPH Sector in proportion to the increased pace of activity amid widespread transition to remote work environments.

< <https://www.cisa.gov/blog/2020/12/29/confronting-heightened-cybersecurity-threats-amid-covid-19> https://www.cisa.gov/blog/2020/12/29/confronting-heightened-cybersecurity-threats-amid-covid-19>


CISA Releases New TIC and NCPS Guidance for Public Comment

Today, the Cybersecurity and Infrastructure Security Agency (CISA) released a draft of the Trusted Internet Connections (TIC) 3.0 Remote User Use Case and the draft National Cybersecurity Protection System (NCPS) Cloud Interface Reference Architecture (NCIRA): Volume 2.

< <https://www.cisa.gov/news/2020/12/22/cisa-releases-new-tic-and-ncps-guidance-public-comment> https://www.cisa.gov/news/2020/12/22/cisa-releases-new-tic-and-ncps-guidance-public-comment>


What Does 2021 Hold for Cybersecurity?

We can safely say the first rule of 2021 will be never talk about 2020. It has been a year of struggles, and uncertainty in ways which few would have ever predicted. Most businesses have had to adapt to a completely different working environment with very different security needs.

< <https://www.infosecurity-magazine.com/opinions/2021-hold-cybersecurity/> https://www.infosecurity-magazine.com/opinions/2021-hold-cybersecurity/>


Protecting Government’s Encrypted Data to Stay One Step Ahead of Threats

As federal agencies continue to evolve cloud infrastructures and support a work-from-anywhere workforce, they are likewise evolving security approaches. More and more data needs to be protected as it moves between on-premise data centers, clouds, applications, and endpoints. Though encrypting traffic with Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is the standard way to protect data in transit from prying eyes, encryption has, itself, become a threat across industries, including government, as cybercriminals embed malware inside encrypted traffic.

< <https://www.hstoday.us/subject-matter-areas/infrastructure-security/protecting-governments-encrypted-data-to-stay-one-step-ahead-of-threats/> https://www.hstoday.us/subject-matter-areas/infrastructure-security/protecting-governments-encrypted-data-to-stay-one-step-ahead-of-threats/>


DDoS Attacks Spiked, Became More Complex in 2020

The large-scale shift to remote work and the increased reliance on online services as the result of the global pandemic this year gave threat actors new opportunities to use distributed denial-of-service (DDoS) attacks to harass and extort organizations.

< <https://www.darkreading.com/attacks-breaches/ddos-attacks-spiked-became-more-complex-in-2020/d/d-id/1339814> https://www.darkreading.com/attacks-breaches/ddos-attacks-spiked-became-more-complex-in-2020/d/d-id/1339814>


Cybersecurity Research for the Future

The growth of myriad cyber-threats continues to accelerate, yet the stream of new and effective cyber-defense technologies has grown much more slowly. The gap between threat and defense has widened, as our adversaries deploy increasingly sophisticated attack technology and engage in cyber-crime with unprecedented power, resources, and global reach. We are in an escalating asymmetric cyber environment that calls for immediate action. The extension of cyber-attacks into the socio-techno realm and the use of cyber as an information influence and disinformation vector will continue to undermine our confidence in systems. The unknown is a growing threat in our cyber information systems.

< <https://cacm.acm.org/magazines/2021/1/249449-cybersecurity-research-for-the-future/fulltext> https://cacm.acm.org/magazines/2021/1/249449-cybersecurity-research-for-the-future/fulltext>





cn: White Paper on Internet of Things (2020)

< <http://www.caict.ac.cn/english/research/whitepapers/202012/t20201223_366678.html> http://www.caict.ac.cn/english/research/whitepapers/202012/t20201223_366678.html>


5 IoT Threats To Look Out for in 2021

As we bring 2020 to a close, it’s time to look at 2021 and a new chapter in the book of cybersecurity. While there are no doubt a multitude of possible attacks, here are six types of attacks that are becoming more popular and more common among attackers using Internet of things (IoT) threats.

< <https://securityintelligence.com/articles/iot-threats-look-out-2021/> https://securityintelligence.com/articles/iot-threats-look-out-2021/>


Five Emerging Internet Of Things Trends For 2021

2020 has proven to be a tumultuous year for everyone, and the technology industry is no different. Tech companies have scrambled to provide innovations that help us continue to function as a society given all the adjustments we’ve been forced to make.

< <https://www.forbes.com/sites/theyec/2021/12/28/five-emerging-internet-of-things-trends-for-2021/> https://www.forbes.com/sites/theyec/2021/12/28/five-emerging-internet-of-things-trends-for-2021/>


Internet-Enabled Devices Will Shape Global COVID-19 Recovery

As the world awaits a COVID-19 vaccine, attention is focused on how to track and safely deliver these temperature-sensitive vaccines to billions of people. Sensors and internet-enabled devices are expected to play a central role in this process, much as they have throughout the pandemic.

< <https://moderndiplomacy.eu/2020/12/13/internet-enabled-devices-will-shape-global-covid-19-recovery/> https://moderndiplomacy.eu/2020/12/13/internet-enabled-devices-will-shape-global-covid-19-recovery/>


Democratizing the Internet of Things

Who wins the Internet of Things? What company or demographic benefits most from the web of 30-odd billion devices that sit on dinner tables and cling to aircraft wings?

< <https://www.iotforall.com/democratizing-the-internet-of-things> https://www.iotforall.com/democratizing-the-internet-of-things>


Internet of Medical Things: Combatting Connected Health Security Threats

The healthcare industry increasingly relies on IoT networks to securely connect a growing variety of medical devices and equipment. These connected devices are transforming processes and the continuum of care in applications ranging from a hospital’s consignment inventory management to remotely controlling insulin pumps, heart-rate monitors, and other implantable devices using smartphones.

< <https://www.iotforall.com/internet-of-medical-things-combatting-connected-health-security-threats> https://www.iotforall.com/internet-of-medical-things-combatting-connected-health-security-threats>





13 tech luminaries we lost in 2020

Developers, translators, and human calculators, these 13 men and women made the world a better place through IT.

< <https://www.computerworld.com/article/3599511/tech-luminaries-we-lost-in-2020.html> https://www.computerworld.com/article/3599511/tech-luminaries-we-lost-in-2020.html>


David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home