[Newsclips] IETF SYN-ACK Newspack 2024-02-05

David Goldstein <david@goldsteinreport.com> Mon, 05 February 2024 04:24 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02159C14F5F8 for <newsclips@ietfa.amsl.com>; Sun, 4 Feb 2024 20:24:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=goldsteinreport.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xBod_q-gqwLb for <newsclips@ietfa.amsl.com>; Sun, 4 Feb 2024 20:23:55 -0800 (PST)
Received: from mars.atomiclayer.com (mars.atomiclayer.com [66.85.142.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57D9CC14F60C for <newsclips@ietf.org>; Sun, 4 Feb 2024 20:23:55 -0800 (PST)
Received: from David2019Desktop (unknown [101.190.18.154]) by mars.atomiclayer.com (Postfix) with ESMTPSA id CB0A0652789 for <newsclips@ietf.org>; Sun, 4 Feb 2024 23:23:53 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=goldsteinreport.com; s=default; t=1707107034; bh=hp3EUQXtVEH/HBq/R5nridqeJHHeWk4Z87tHbRfTaqc=; h=From:To:Subject; b=Tl74Wdhmxy778GtU3KL1prOjIzypZjKFH6j+g7WqZvtxTFBKKpL0gKkFckX1gZIWV JUW4M+s6Fu0vw57WqjjHsf+YKR0eT3dURGVyUsoNpyhlkgdyz5wxIBFCCdr5Dr4Diw FC/Szbj88ZodwUZPIzQQUyxgtx940bLKZgeoUyDs=
Authentication-Results: mars.atomiclayer.com; spf=pass (sender IP is 101.190.18.154) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (mars.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 05 Feb 2024 15:23:51 +1100
Message-ID: <00d501da57eb$213df2d0$63b9d870$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00D6_01DA5847.54AF2E20"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdpX6wrsQgJiQsV5QGKgJMGaOEpz2A==
Content-Language: en-au
X-PPP-Message-ID: <170710703457.4165562.9479713535254869787@mars.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/OhqcEJ5_A3Nb4pQc1tHQniod-Ws>
Subject: [Newsclips] IETF SYN-ACK Newspack 2024-02-05
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2024 04:24:00 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Can the Internet Be Governed? Amid worries about what Big Tech is doing to our privacy, politics, and psyches, many stakeholders—from activists to technocrats—are calling for a new rule book.

On a cold night in February of 1996, John Perry Barlow found himself at a party in Davos. It was the closing event of the World Economic Forum, and the ballroom was filled with besuited masters of the universe and students from the University of Geneva. He danced with them, a little inebriated. But a thought nagged at him. ... As an analytical framework, this categorization is compelling, though it has worrisome implications. For years, opponents of regulation have warned about the dangers of a Splinternet—the prospect that state assertions of digital sovereignty could Balkanize the network into incompatible fiefdoms. Their dire predictions have mostly not been borne out; the core architecture of the network, its ability to transport data packets around the world, has remained essentially intact, governed by technocratic consensus in international standards bodies like the IETF and the ITU. But, as the Internet becomes increasingly intertwined with the unstable geopolitics of our era, the future appears more perilous.

< <https://www.newyorker.com/magazine/2024/02/05/can-the-internet-be-governed> https://www.newyorker.com/magazine/2024/02/05/can-the-internet-be-governed>

 

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

... The new draft practice guide, Addressing Visibility Challenges with TLS 1.3 within the Enterprise (NIST Special Publication (SP) 1800-37), was developed over the past several years at the NIST National Cybersecurity Center of Excellence (NCCoE) with the extensive involvement of technology vendors, industry organizations and other stakeholders who participate in the IETF.

< <https://www.nist.gov/news-events/news/2024/01/new-nccoe-guide-helps-major-industries-observe-incoming-data-while-using> https://www.nist.gov/news-events/news/2024/01/new-nccoe-guide-helps-major-industries-observe-incoming-data-while-using>

 

How not to write about network security – and I'm speaking from experience

In 1996, Larry Peterson and I published the first edition of Computer Networks: A Systems Approach in the hope that it would become a widely adopted textbook in networking classes. Our draft manuscripts had been reviewed by a number of professors so we had a decent amount of feedback regarding the content and overall structure of the book. ... The way I recall learning about security was from attending IETF meetings in the early-mid 1990s. (In retrospect this is a poor way to learn about almost anything other than the standards process.) The IETF was in the midst of defining the requirements for “IP Next Generation (IPng)” or what would become IPv6. (Thirty years later IPv6 is, er, well on its way to widespread adoption.) For example, noted security expert Steve Bellovin in 1994 contributed RFC 1675 to the IPng process, which contains the following:

< <https://www.theregister.com/2024/02/01/systems_approach_security/> https://www.theregister.com/2024/02/01/systems_approach_security/>

< <https://www.msn.com/en-us/news/technology/how-not-to-write-about-network-security-and-yes-im-speaking-from-experience/ar-BB1hAUgG> https://www.msn.com/en-us/news/technology/how-not-to-write-about-network-security-and-yes-im-speaking-from-experience/ar-BB1hAUgG>

 

**********************

SECURITY & PRIVACY

**********************

NIST NCCoE Offers Draft Guide on Monitoring Internet Data on TLS 1.3

The National Institute of Standards and Technology’s National Cybersecurity Center of Excellence has released a new draft practice guide to help organizations monitor incoming internet data for evidence of malware and insider threats while using the latest version of the TLS protocol.

< <https://executivegov.com/2024/01/nist-nccoe-offers-draft-guide-on-monitoring-internet-data-on-tls-1-3/> https://executivegov.com/2024/01/nist-nccoe-offers-draft-guide-on-monitoring-internet-data-on-tls-1-3/>

 

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks. The latest internet security protocol, known as TLS 1.3, provides state-of-the-art protection, but complicates the performance of these required data audits. The National Institute of Standards and Technology (NIST) has released a practice guide describing methods that are intended to help these industries implement TLS 1.3 and accomplish the required network monitoring and auditing in a safe, secure and effective fashion.

< <https://www.nist.gov/news-events/news/2024/01/new-nccoe-guide-helps-major-industries-observe-incoming-data-while-using> https://www.nist.gov/news-events/news/2024/01/new-nccoe-guide-helps-major-industries-observe-incoming-data-while-using>

 

Towards SSH3: How HTTP/3 improves secure shells

What would the SSH protocol look like if it was made today with recent network technologies? This is the question Olivier Bonaventure and I from UCLouvain asked ourselves when writing our latest research article.

< <https://blog.apnic.net/2024/02/02/towards-ssh3-how-http-3-improves-secure-shells/> https://blog.apnic.net/2024/02/02/towards-ssh3-how-http-3-improves-secure-shells/>

 

Google and Yahoo Set a Short Timeline to Meet New DMARC Requirements. Are You Ready?

If you have a Gmail or Yahoo account, you probably know how cluttered your inbox can get with unsolicited email and other email that is clearly trying to defraud you. If you have ever thought to yourself “Why can’t these companies do a better job blocking these fraudulent messages and make it easier for me to receive less unsolicited mail?”, you are not alone.

< <https://www.proofpoint.com/us/blog/email-and-cloud-threats/google-and-yahoo-set-new-email-authentication-requirements> https://www.proofpoint.com/us/blog/email-and-cloud-threats/google-and-yahoo-set-new-email-authentication-requirements>

 

Gmail, Yahoo, and Others Embrace Stricter Email Authentication Standards in 2024

Google and Yahoo recently announced that they will be enforcing stricter email standards for bulk senders in 2024. Google’s requirements will go into effect in February, with Yahoo following suit shortly after, in Q1.

< <https://blog.101domain.com/corporate-service-series/2024-email-standards> https://blog.101domain.com/corporate-service-series/2024-email-standards>

 

**********************

QUANTUM NETWORKING

**********************

Europe’s quantum tech sees rosy outlook for 2024, report says

A new report published on Tuesday (30 January) by three leading European firms sheds light on several quantum trends for 2024, pointing to steady growth of investments in Europe’s quantum start-ups. With insights from HSBC, Dell, Federal Reserve, Citi and Moderna, the ‘State of Quantum 2024’ report reveals that Europe was the only region that saw consistent growth in venture capital investment into companies related to quantum technologies.

< <https://www.euractiv.com/section/industrial-strategy/news/europes-quantum-tech-sees-rosy-outlook-for-2024-report-says/> https://www.euractiv.com/section/industrial-strategy/news/europes-quantum-tech-sees-rosy-outlook-for-2024-report-says/>

 

Cisco and Nu Quantum collaborate on quantum networking

University of Cambridge spin out Nu Quantum is collaborating with telecommunications equipment giant Cisco to advance quantum networking technology.

< <https://optics.org/news/15/1/39> https://optics.org/news/15/1/39>

 

Nu Quantum wins contract to create modular and scalable quantum network

Nu Quantum, the Cambridge-based quantum networking company, has won a contract from the UK government to deliver a world-first modular, rack-mounted and scalable quantum data centre prototype under the ‘SBRI: Quantum Networks, Enabling Components & Systems’ competition.

< <https://www.newelectronics.co.uk/content/news/nu-quantum-wins-contract-to-create-modular-and-scalable-quantum-network> https://www.newelectronics.co.uk/content/news/nu-quantum-wins-contract-to-create-modular-and-scalable-quantum-network>

 

AFRL, Brookhaven National Laboratory to Establish Empire State Quantum Network in New York

The Department of Energy’s Brookhaven National Laboratory revealed that it is working with the U.S. Air Force Research Laboratory to build the Empire State Quantum Network, a quantum computing hub.

< <https://executivegov.com/2024/01/afrl-brookhaven-national-lab-to-establish-empire-state-quantum-network/> https://executivegov.com/2024/01/afrl-brookhaven-national-lab-to-establish-empire-state-quantum-network/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Keysight Gains Validation for First 3GPP Release 16 16/32 Transmitter Performance Enhancement Test Cases [news release]

Keysight Technologies, Inc. gained approval for the industry's first 3GPP Release 16 (Rel-16) 5G New Radio (NR) single and multiple precoding matrix indicator (PMI) test cases for 16 and 32 element transmitters operating on the frequency-division duplexing (FDD) and time-division duplexing (TDD) bands.

< <https://www.keysight.com/us/en/about/newsroom/news-releases/2024/0129-pr24-037-keysight-gains-validation-for-first-3gpp-release-1.html> https://www.keysight.com/us/en/about/newsroom/news-releases/2024/0129-pr24-037-keysight-gains-validation-for-first-3gpp-release-1.html>

 

**********************

OTHERWISE NOTEWORTHY

**********************

W3C Invites Implementations of Verifiable Credentials Data Model v2.0

The Verifiable Credentials Working Group invites implementations of the Verifiable Credentials Data Model v2.0 Candidate Recommendation Snapshot. Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries. This specification provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable. The group is actively seeking comments and implementation feedback for this specification as issues raised in the document's Github repository by 01 April 2024.

< <https://www.w3.org/news/2024/w3c-invites-implementations-of-verifiable-credentials-data-model-v2-0/> https://www.w3.org/news/2024/w3c-invites-implementations-of-verifiable-credentials-data-model-v2-0/>

 

ITU’s AI for Good Global Summit 2024 puts tech to the test for people and planet

​​​​​​​​Global leaders and innovators in artificial intelligence (AI) will join the humanitarian community at the AI for Good Global Summit 2024 in Geneva, Switzerland on 30-31 May to explore how new technology can drive sustainable development.

< <https://www.itu.int/en/mediacentre/Pages/PR-2024-02-01-AI-for-good-global-summit-media-accreditation-registration.aspx> https://www.itu.int/en/mediacentre/Pages/PR-2024-02-01-AI-for-good-global-summit-media-accreditation-registration.aspx>

 

SAC123 - SSAC Report on the Evolution of Internet Name Resolution by Warren Kumari

Abstract: New technologies are changing how name resolution happens on the Internet. The DNS remains the prominent, or default, naming system for the Internet, but alternative naming systems are in use as well. This is nothing particularly new, as there have always been naming systems besides the DNS in use throughout the Internet’s history. These alternative naming systems use the same syntax as the DNS, dot-separated labels.

< <https://research.google/pubs/sac123-ssac-report-on-the-evolution-of-internet-name-resolution/> https://research.google/pubs/sac123-ssac-report-on-the-evolution-of-internet-name-resolution/>

 

Internationalization (I18N) leadership change and goals for the future

At the end of 2023 W3C staff members Richard Ishida and Fuqiao Xue were running the internationalization work of the Consortium. When Richard transitioned to semi-retirement on 1 January, 2024, Fuqiao Xue took over the role of Internationalization Lead, and is now the contact point for all internationalization related activity at W3C. Richard has reduced his time commitment, and will focus largely on the aspects of the work related to Language Enablement.

< <https://www.w3.org/blog/2024/internationalization-i18n-leadership-change-and-goals-for-the-future/> https://www.w3.org/blog/2024/internationalization-i18n-leadership-change-and-goals-for-the-future/>

 

Excluding China from 6G standard development risks fragmentation [subscription]

As the latest 5G standard, Release 18 (R18), is set to be officially frozen by the global mobile communication standards organization 3GPP in March 2024, it can be expected that 5G-Advanced will enter commercial use.

< <https://www.digitimes.com/news/a20240202PD202/3gpp-6g-china-huawei-space-tech.html> https://www.digitimes.com/news/a20240202PD202/3gpp-6g-china-huawei-space-tech.html>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home