[Newsclips] IETF SYN-ACK Newspack 2023-03-06

David Goldstein <david@goldsteinreport.com> Mon, 06 March 2023 02:29 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47AFAC14CF09 for <newsclips@ietfa.amsl.com>; Sun, 5 Mar 2023 18:29:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.825
X-Spam-Level:
X-Spam-Status: No, score=-1.825 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=goldsteinreport.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7kuod-t8jJ4q for <newsclips@ietfa.amsl.com>; Sun, 5 Mar 2023 18:29:43 -0800 (PST)
Received: from mars.atomiclayer.com (mars.atomiclayer.com [66.85.142.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65234C14E514 for <newsclips@ietf.org>; Sun, 5 Mar 2023 18:29:43 -0800 (PST)
Received: from David2019Desktop (unknown [144.136.29.115]) by mars.atomiclayer.com (Postfix) with ESMTPSA id A1F19145E60 for <newsclips@ietf.org>; Sun, 5 Mar 2023 21:29:35 -0500 (EST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=goldsteinreport.com; s=default; t=1678069782; bh=xQRBbylDbsobLyVNtH84V2BZ6qiHMSdTTeRDuBAaLlA=; h=From:To:Subject; b=UwG6uTh/lHEHUkmbNgj5HMIBvhQKX4afirsDnqRxvlzTrQ6h+l8wgkzzVp+K2uWK1 HM2W+OSZ6g+V1JdBNTgY6vXOmZs5z/YiX65w91gS5gM3rRUUUO6gHHqMDlFxgmi/vx jLYrgUJHTdyMKhgVCk50vxgiNXhVXLY6JQXsKL5U=
Authentication-Results: mars.atomiclayer.com; spf=pass (sender IP is 144.136.29.115) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (mars.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 06 Mar 2023 13:29:33 +1100
Message-ID: <00d601d94fd3$80086d70$80194850$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00D7_01D9502F.B379A8C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdlP03QeGrRx1XdcSbOQqZ2YnxVDGg==
Content-Language: en-au
X-PPP-Message-ID: <167806978262.3129873.13993193698725087711@mars.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/XWddKNSTNsrfGSLQUKBB-ZOzn9A>
Subject: [Newsclips] IETF SYN-ACK Newspack 2023-03-06
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Mar 2023 02:29:48 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

IETF roundup for the APNIC community

Bob Kahn famously said “The Internet is built on standards. Without standards, there would be chaos.” The IETF is the premier Internet standards body with an open process and freely available standards for all. The IETF’s mission is to produce high-quality and relevant technical and engineering documents that influence the way people design, use, and manage the Internet in such a way as to make the Internet work better.

< <https://blog.apnic.net/2023/02/27/ietf-roundup-for-the-apnic-community/> https://blog.apnic.net/2023/02/27/ietf-roundup-for-the-apnic-community/>

 

Troubleshooting the other half

You should know the operational state of your network because there really is no reason why you should not. The IETF and your hardware vendor of choice have worked hard to give you a whole fleet of protocols and machinery to assess all aspects of the pieces of the Internet that are under your direct control. ... We have proposed a reverse traceroute mechanism to the IETF, more specifically, we have submitted an Internet draft to the Internet Area Working Group of the IETF. We have also implemented that mechanism as an eBPF program (server) and in Python (client). There are even a few endpoints (servers) already online, so everybody can play around with it. And it works for both IPv4 and IPv6.

< <https://blog.apnic.net/2023/03/01/troubleshooting-the-other-half/> https://blog.apnic.net/2023/03/01/troubleshooting-the-other-half/>

 

5.5G becomes industry consensus and clear trend, says Huawei

... IETF and the IEEE have begun working on the first phase of Net5.5G standardisation mainly in Segment Routing over IPv6 (SRv6), Wi-Fi 7, 800GE, and other subjects, with an aim to release the standard in 2024.

< <https://www.gulf-times.com/article/656662/business/55g-becomes-industry-consensus-and-clear-trend-says-huawei> https://www.gulf-times.com/article/656662/business/55g-becomes-industry-consensus-and-clear-trend-says-huawei>

 

Teledriving on the 5G network at the MWC is signed by Ericsson, Deutsche Telekom and Vay

... L4S supports the function of marking the momentary congestion on the cells, thus informing a time-critical application that it is necessary to adapt the speed to avoid congestion situations. L4S is based on an IETF standard and is currently in the process of standardizing 3GPP as a work item for release 18.

< <https://www.breakinglatest.news/world/teledriving-on-the-5g-network-at-the-mwc-is-signed-by-ericsson-deutsche-telekom-and-vay/> https://www.breakinglatest.news/world/teledriving-on-the-5g-network-at-the-mwc-is-signed-by-ericsson-deutsche-telekom-and-vay/>

 

Intelligent IP Networks Facilitate Connectivity Upgrade, Inspiring New Growth for Carriers Featured

... IETF IAB member Li Zhenbin noted that SRv6 is an inevitable trend of IP network protocol evolution, and related standards are ready for use.

< <https://www.thefastmode.com/expert-opinion/30798-intelligent-ip-networks-facilitate-connectivity-upgrade-inspiring-new-growth-for-carriers> https://www.thefastmode.com/expert-opinion/30798-intelligent-ip-networks-facilitate-connectivity-upgrade-inspiring-new-growth-for-carriers>

 

Vircom, Red Sift Partner for Email Security for MSPs

Vircom, an email security company, will distribute the Red Sift OnDMARC solution through its MSPs, VARs and other channel partners, according to a prepared statement. In doing so, Vircom is helping its partners implement and manage Domain-based Message Authentication, Reporting, and Conformance (DMARC) email authentication, policy and reporting protocol. ... DMARC builds on the DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) specifications that the IETF is currently developing.

< <https://www.msspalert.com/cybersecurity-services-and-products/vircom-red-sift-partner-for-email-security-for-msps/> https://www.msspalert.com/cybersecurity-services-and-products/vircom-red-sift-partner-for-email-security-for-msps/>

 

Call for Applications: ARTICLE 19 Internet of Rights Fellowship

... Censorship: This track focuses on participation in the development of technical standards and policies that improve resilience to censorship and communications security. IoR fellow(s) may engage in technical discussions related to routing protocols that determine how data moves from source to destination within and across IP-enabled networks, contribute to networking protocols to address vulnerabilities exploited by censors, or work with internet infrastructure providers such as internet registries to address content moderation issues at the DNS level. Fellows may participate in the Internet Corporation for Assigned Names and Numbers (ICANN), the IETF, or the 3rd Generation Partnership Project (3GPP).

< <https://www2.fundsforngos.org/fellowships/call-for-applications-article-19-internet-of-rights-fellowship-2/> https://www2.fundsforngos.org/fellowships/call-for-applications-article-19-internet-of-rights-fellowship-2/>

 

Intelligent IP Networks Facilitate Connectivity Upgrade, Inspiring New Growth for Carriers Featured

... IETF IAB member Li Zhenbin noted that SRv6 is an inevitable trend of IP network protocol evolution, and related standards are ready for use.

< <https://www.thefastmode.com/expert-opinion/30798-intelligent-ip-networks-facilitate-connectivity-upgrade-inspiring-new-growth-for-carriers> https://www.thefastmode.com/expert-opinion/30798-intelligent-ip-networks-facilitate-connectivity-upgrade-inspiring-new-growth-for-carriers>

 

What Is Tunneling in Networking? Definition and How It Works

... Generic Network Virtualization Encapsulation (Geneve) is an overlay network encapsulation protocol developed by the IETF. It supports multiple encapsulation methods, including VXLAN and NVGRE. It also offers features such as per-packet load balancing, policy-based routing, and quality of service control.

< <https://www.enterprisenetworkingplanet.com/standards-protocols/what-is-tunneling/> https://www.enterprisenetworkingplanet.com/standards-protocols/what-is-tunneling/>

 

Référentiel des exigences IPsec DR à destination des industriels – Version 1.0 [IPsec DR Requirements Framework for Manufacturers – Version 1.0]

Le protocole IPsec est une solution de protection des flux réseaux standardisée par l’IETF. Le présent référentiel est destiné en premier lieu aux industriels de produits implémentant le protocole IPsec à des fins de protection de réseaux de niveau Diffusion Restreinte (DR).

< <https://www.ssi.gouv.fr/guide/referentiel-des-exigences-ipsec-dr-a-destination-des-industriels-version-1-0/> https://www.ssi.gouv.fr/guide/referentiel-des-exigences-ipsec-dr-a-destination-des-industriels-version-1-0/>

 

Huawei propose la certitude dans le développement de l’industrie pour passer ensemble à l’ère de la 5.5G [Huawei offers certainty in industry development to move together to the era of 5.5G]

... 1. Des feuilles de route claires pour la normalisation de l’industrie: La normalisation 5.5G a démarré, avec ses spécifications techniques à définir dans les versions 18, 19 et 20 du 3GPP. La version 18 du 3GPP sera gelée au premier semestre 2024. F5.5G a progressé des propositions à la conception des spécifications. En septembre dernier, l’ETSI a publié son livre blanc avancé F5G et a dirigé la formulation de la première version de F5.5G, la version 3, qui sera gelée au premier semestre 2024. L’IETF et l’IEEE ont commencé à travailler sur la première phase de Net5 Normalisation .5G principalement dans Segment Routing over IPv6 (SRv6), Wi-Fi 7, 800GE et d’autres sujets, dans le but de publier la norme en 2024.

< <https://fr.techtribune.net/smartphones/huawei-propose-la-certitude-dans-le-developpement-de-lindustrie-pour-passer-ensemble-a-lere-de-la-5-5g/607418/> https://fr.techtribune.net/smartphones/huawei-propose-la-certitude-dans-le-developpement-de-lindustrie-pour-passer-ensemble-a-lere-de-la-5-5g/607418/>

 

Teledriving: la mobilità porta a porta parte dal Mobile World Congress 2023 [Teledriving: door-to-door mobility starts from Mobile World Congress 2023]

... L4S supporta la funzione di marcatura della congestione momentanea sulle celle di, informando così un’applicazione time-critical che è necessario adattare la velocità per evitre situazioni di congestione. L4S si basa su uno standard IETF ed è attualmente in fase di standardizzazione 3GPP come elemento di lavoro per la release 18.

< <https://www.bitmat.it/blog/vertical/smart-home-city/teledriving-la-mobilita-porta-a-porta-parte-dal-mobile-world-congress-2023/> https://www.bitmat.it/blog/vertical/smart-home-city/teledriving-la-mobilita-porta-a-porta-parte-dal-mobile-world-congress-2023/>

 

MWC Mobile World Congress: Von Barcelona aus wird live ein Auto in Berlin gesteuert! [MWC Mobile World Congress: From Barcelona, a car will be controlled live in Berlin!]

... L4S nutzt eine Markierung der Datenpakete bei einer temporären Stauung (Warteschlange) und informiert damit eine zeitkritische Anwendung darüber, dass eine Anpassung der Datenrate erforderlich ist, um die Stauung zu beseitigen. L4S basiert auf einem IETF-Standard und wird derzeit von 3GPP als Arbeitspunkt für Version 18 standardisiert. 

< <https://www.speed-magazin.de/cars/news/mwc-mobile-world-congress-von-barcelona-aus-wird-live-ein-auto-in-berlin-gesteuert_87615.html> https://www.speed-magazin.de/cars/news/mwc-mobile-world-congress-von-barcelona-aus-wird-live-ein-auto-in-berlin-gesteuert_87615.html>

 

Cuatro investigadores de la UOC figuran entre el 2 % de académicos más citados en artículos científicos en 2021 [Four UOC researchers are among the 2% of academics most cited in scientific articles in 2021]

... Vilajosana, que aparece en el ranquin como experto de las tecnologías de la información y la comunicación, coordina el grupo de investigación Wireless Networks (WINE), del IN3, que trabaja en el estudio y el desarrollo de tecnologías para mejorar la forma como los dispositivos electrónicos y digitales captan la información y la comunican. El catedrático es autor de estándares de internet: entre los años 2018 y 2022, el IETF, órgano abierto de estandarización, publicó varios documentos impulsados por el investigador para estandarizar aspectos de control de las redes inalámbricas de bajo consumo energético. Además, como muestra, entre sus publicaciones científicas se encuentra un artículo realizado con compañeros de los Estudios de Informática, Multimedia y Telecomunicación que ha sido citado más de 1.300 veces.

< <https://www.uoc.edu/portal/es/news/actualitat/2023/047-stanford-ranking-2022.html> https://www.uoc.edu/portal/es/news/actualitat/2023/047-stanford-ranking-2022.html>

 

Outline gratis para PC, Mac, iOS, Android APK [Outline Free Para PC, Mac, iOS, Android APK]

... ¿Cuáles son las características clave de Outline? Encriptado: Outline encripta las comunicaciones entre tu dispositivo y el servidor utilizando el cifrado AEAD Chacha2020 IETF Poly 1305 de 256 bits. Los cifrados AEAD ofrecen confidencialidad, integridad y autenticidad, además de brindar un rendimiento excelente.

< <https://es.ccm.net/descargas/seguridad-y-mantenimiento/10832-outline/> https://es.ccm.net/descargas/seguridad-y-mantenimiento/10832-outline/>

 

ファーウェイは、5.5G時代に向けて共に前進するため、業界発展の確実な方法を提案 [Huawei proposes a sure way for industry development to move forward together towards the 5.5G era]

... 業界標準化の明確なロードマップ: 5.5G標準化が開始され、その技術仕様は3GPPリリース18、19、20で定義されます。3GPPリリース18は2024 年上半期に凍結されます。F5.5Gは提案から仕様設計へと進みました。昨年9月、ETSIはF5G-Advancedホワイトペーパーを発表し、F5.5Gの最初のリリースであるリリース3の策定を主導してきました。これは2024年上半期に凍結される予定です。IETFとIEEEは、Net5.5G標準化の第1フェーズに取り組み始めました。主にセグメントルーティンオーバーIPv6 (SRv6)、Wi-Fi 7、800GEなどを対象としており、2024年の標準リリースを目指しています。

< <https://www.huawei.com/jp/news/jp/2023/mwc2023-5-point-5g-era-huawei> https://www.huawei.com/jp/news/jp/2023/mwc2023-5-point-5g-era-huawei>

 

华为:5.5G是5G网络下一步升级演进的必由之路 [Huawei: 5.5G is the only way to upgrade and evolve 5G networks]

... 据介绍,5.5G 已经开启标准化的进程,将通过 3GPP Release18、Release19、Release20 三个版本定义 5.5G 技术规范,持续丰富 5.5G 的技术内涵,Release18 版本将于 2024 年 H1 冻结;F5.5G 已经从产业倡议落地标准设计,ETSI 在去年 9 月份发布了 F5G Advanced 的白皮书,牵头定义的 F5.5G 第一个标准版本 Release3 将于 2024 年 H1 冻结。IETF、IEEE 也全面开展 SRv6、Wi-Fi 7、800GE 等 Net5.5G 第一阶段相关的标准工作,相关标准将在 2024 年全面发布。

< <http://digi.hsw.cn/system/2023/0302/164688.shtml> http://digi.hsw.cn/system/2023/0302/164688.shtml>

 

数字中国重磅文件出炉 将深入推进IPv6规模部署和应用 [Digital China blockbuster document released will further promote the large-scale deployment and application of IPv6]

... IPv6是英文“Internet Protocol Version 6”(互联网协议第6版)的缩写,是互联网工程任务组(IETF)设计的用于替代IPv4的下一代IP协议,在未来万物互联的世界里,5G和IPV6是密不可分的重要底层技术,很多掌握5G技术的公司,同时储备IPV6技术。预计到2025年,将累计实现市场规模约8648.5亿元。受益于政策的影响,近年来“IPV6+”的市场规模增速明显。

< <https://wap.stockstar.com/detail/IG2023022800000523> https://wap.stockstar.com/detail/IG2023022800000523>

 

华为鲁驰:iMaster NCE-T三个赋能新动向,助力自智网络迈向L4 [Huawei Luchi: iMaster NCE-T enables three new trends to help self-intelligent networks move towards L4]

... 网络运维及业务运营的闭环自动化,需要全光网的能力开放及其与O/B域系统的集成对接。IETF ACTN汇聚了12家运营商,39家设备商的60多名顶尖专家,紧扣光网络产业演进,已经成为产业中最高质量的北向标准。

< <https://finance.sina.com.cn/tech/roll/2023-03-03/doc-imyiqhav4492068.shtml> https://finance.sina.com.cn/tech/roll/2023-03-03/doc-imyiqhav4492068.shtml>

 

**********************

SECURITY & PRIVACY

**********************

New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms

The Biden administration issued a new cybersecurity strategy on Thursday that calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked, while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world.

< <https://www.nytimes.com/2023/03/02/us/politics/biden-cybersecurity-strategy.html> https://www.nytimes.com/2023/03/02/us/politics/biden-cybersecurity-strategy.html>

 

U.S. unveils new cybersecurity strategy with tighter regulations

The White House on Thursday announced a new cybersecurity strategy in the latest effort by the U.S. government to bolster its cyber defenses amid a steady increase in hacking and digital crimes targeting the country.

< <https://www.reuters.com/technology/us-unveils-new-cybersecurity-strategy-with-tighter-regulations-2023-03-02/> https://www.reuters.com/technology/us-unveils-new-cybersecurity-strategy-with-tighter-regulations-2023-03-02/>

 

Highlights from the New U.S. Cybersecurity Strategy

The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. The White House’s new national cybersecurity strategy also envisions a more active role by cloud providers and the U.S. military in disrupting cybercriminal infrastructure, and it names China as the single biggest cyber threat to U.S. interests.

< <https://krebsonsecurity.com/2023/03/highlights-from-the-new-u-s-cybersecurity-strategy/> https://krebsonsecurity.com/2023/03/highlights-from-the-new-u-s-cybersecurity-strategy/>

 

Cybersecurity’s Third Rail: Software Liability

The Biden administration’s cybersecurity strategy calls for placing responsibility for buggy software on those best positioned to reduce risk. It’s high time, but it won’t be easy.

< <https://www.lawfareblog.com/cybersecuritys-third-rail-software-liability> https://www.lawfareblog.com/cybersecuritys-third-rail-software-liability>

 

The Biden-Harris Administration Releases New National Cybersecurity Strategy

The long-awaited National Cybersecurity Strategy seeks to make fundamental changes to underlying dynamics of the digital ecosystem.

< <https://www.lawfareblog.com/biden-harris-administration-releases-new-national-cybersecurity-strategy> https://www.lawfareblog.com/biden-harris-administration-releases-new-national-cybersecurity-strategy>

 

FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy

Today, the Biden-Harris Administration released the National Cybersecurity Strategy to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this decisive decade, the United States will reimagine cyberspace as a tool to achieve our goals in a way that reflects our values: economic security and prosperity; respect for human rights and fundamental freedoms; trust in our democracy and democratic institutions; and an equitable and diverse society. To realize this vision, we must make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace.

< <https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/> https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/>

 

us: National Cybersecurity Strategy

< <https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf> https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf>

 

Background Press Call by Senior Administration Officials Previewing the Biden-⁠Harris Administration’s National Cyber Strategy

MODERATOR: Hi everyone. And thanks for joining. This is [Moderator] from NSC. Before we get started, a quick housekeeping: Everyone on this call should have received the embargoed copy of the factsheet and an embargoed version of the strategy. All of that is embargoed until 5:00 a.m. tomorrow for reference. If you haven’t, please reach out to Michael Morris from ONCD, and he’ll be able to help you out. But with that, I guess we’ll get to it.

< <https://www.whitehouse.gov/briefing-room/press-briefings/2023/03/02/background-press-call-by-senior-administration-officials-previewing-the-biden-harris-administrations-national-cyber-strategy/> https://www.whitehouse.gov/briefing-room/press-briefings/2023/03/02/background-press-call-by-senior-administration-officials-previewing-the-biden-harris-administrations-national-cyber-strategy/>

 

us: CISA director calls on tech companies to build security into products

A top cybersecurity official said in a speech Monday it's long past time for technology companies to build cybersecurity into their product design.

< <https://www.axios.com/2023/02/28/cisa-jen-easterly-cybersecurity-tech-products> https://www.axios.com/2023/02/28/cisa-jen-easterly-cybersecurity-tech-products>

 

What is WolfSSL?

The fundamentals of WolfSSL lie in Secure Sockets Layer (SSL), an internet security protocol capable of establishing encrypted connections between computers on a network. The OpenSSL Project was founded back in 1998 to develop a free, versatile set of encryption tools for online use. Amongst other things this includes open source versions of both the SSL and Transport Layer Security (TLS) protocols.

< <https://www.techradar.com/vpn/what-is-wolfssl> https://www.techradar.com/vpn/what-is-wolfssl>

 

**********************

INTERNET OF THINGS

**********************

Fending off Cyberattacks on Collaborative Robots

Collaborative robots, or cobots, count on Internet of Things (IoT) devices, telemetry data, software programming, and remote control for operation, productivity, and safety. These systems and devices present unique opportunities for attack.

< <https://cacm.acm.org/news/270427-fending-off-cyberattacks-on-collaborative-robots/fulltext> https://cacm.acm.org/news/270427-fending-off-cyberattacks-on-collaborative-robots/fulltext>

 

How operators can secure value from a managed connected home

The number of smart homes is forecast to grow and surpass the 350 million mark in 2023 with the newest technologies becoming a necessity. With more devices comes more complexity for home and SOHO networks and difficulties for users trying to get the most out of them. End users are also becoming more aware of the threat landscape that comes with more IoT devices. This puts operators in a unique position to gain new revenue streams through the management of the connected home.

< <https://www.broadband-forum.org/how-operators-can-secure-value-from-a-managed-connected-home> https://www.broadband-forum.org/how-operators-can-secure-value-from-a-managed-connected-home>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Xbox Live is responsible for around 3% of worldwide internet traffic, according to statistics

... Netflix took the first place in terms of traffic usage, and Youtube is in second place, and Generic QUIC (a network protocol designed to speed up online applications) closes the top three. There were places in this list for gaming services.

< <https://list23.com/1243385-xbox-live-is-responsible-for-around-3-of-worldwide-internet-traffic-according-to-statistics/> https://list23.com/1243385-xbox-live-is-responsible-for-around-3-of-worldwide-internet-traffic-according-to-statistics/>

 

Netflix Maintains Strong 15% Control Over All Internet Traffic

... Gaming also takes up a solid chunk of internet traffic. Xbox Live and PlayStation game downloads comprise around 2.9% and 3% of the total data downloaded from the internet. Generic Quic and HTTP Media Stream round off the list with 5.9% and 3.7% respectively.

< <https://www.digitalinformationworld.com/2023/03/netflix-maintains-strong-15-control.html> https://www.digitalinformationworld.com/2023/03/netflix-maintains-strong-15-control.html>

 

Netflix est désormais responsable de 15 % du trafic internet mondial [Netflix is now responsible for 15% of global internet traffic]

... QUIC est un protocole expérimental, créé par le moteur de recherche Google. HTTP media stream représente d’autres façons de regarder en direct du contenu sur internet.

< <https://www.lanouvellerepublique.fr/a-la-une/netflix-est-desormais-responsable-de-15-du-trafic-internet-mondial> https://www.lanouvellerepublique.fr/a-la-une/netflix-est-desormais-responsable-de-15-du-trafic-internet-mondial>

 

Sandvine's 2023 Global Internet Phenomena Report Shows 24% Jump in Video Traffic, with Netflix Volume Overtaking YouTube [news release]

Sandvine's 2023 Global Internet Phenomena Report, the recognized authoritative source for global application usage and internet traffic trends, shows that global internet traffic volume increased 23%, due in large part to surging streaming video usage and continued growth in traffic across app categories, including gaming, cloud, VPNs, marketplaces, and conferencing.

< <https://www.sandvine.com/press-releases/sandvines-2023-global-internet-phenomena-report-shows-24-jump-in-video-traffic-with-netflix-volume-overtaking-youtube> https://www.sandvine.com/press-releases/sandvines-2023-global-internet-phenomena-report-shows-24-jump-in-video-traffic-with-netflix-volume-overtaking-youtube>

 

Solana proposes network upgrade changes following recent outage

... Yakovenko said over the past 12 months, Solana was already working on improving network stability through various initiatives, including building a second validator client, better tooling, upgrading the network communication protocol to “QUIC,” and improvements to the RPC infrastructure.

< <https://cryptoslate.com/solana-proposes-network-upgrade-changes-following-recent-outage/> https://cryptoslate.com/solana-proposes-network-upgrade-changes-following-recent-outage/>

 

Solana Labs announces review of update process

... Solana Labs has changed the communication protocol from UDP to QUIC to avoid network delays derived from these bots. In the future, we have indicated a policy to introduce measures such as (1) addition of stake weight QoS for prioritizing transactions, (2) a “fee market” that raises fees as demand increases, and (3) improvements to reduce the load on RPC infrastructure.

< <https://ourbitcoinnews.com/solana-labs-announces-review-of-update-process/> https://ourbitcoinnews.com/solana-labs-announces-review-of-update-process/>

 

**********************

OTHERWISE NOTEWORTHY

**********************

China's efforts to influence standards are mostly fake – and flopping

China's attempts to influence technical standards groups have mostly been uncoordinated, unsophisticated and unsuccessful – but the US needs to keep watch on Beijing's activities, especially at the International Telecommunications Union.

< <https://www.theregister.com/2023/03/02/carnegie_endowment_us_china_standards/> https://www.theregister.com/2023/03/02/carnegie_endowment_us_china_standards/>

< <https://www.msn.com/en-us/news/opinion/chinas-efforts-to-influence-standards-are-mostly-fake-and-flopping/ar-AA187ln5> https://www.msn.com/en-us/news/opinion/chinas-efforts-to-influence-standards-are-mostly-fake-and-flopping/ar-AA187ln5>

 

How an Unknown Election Determined the Future of Cyberspace

One of the most underexploited and unknown tools in international relations could be one of the most important. Elections within international organisations rarely attract significant attention, but last year’s election for Secretary-General of the UN’s International Telecommunication Union (ITU) revealed the true importance of this leadership. The ITU has been called ‘the most important UN body you’ve never heard of.’ In September 2022, the United States and Russia faced off for control of the organisation. This wasn’t an election of symbolic importance or another United States/Russia showdown. It determined the future of cyberspace.

< <https://www.foreignaffairsreview.com/home/how-an-unknown-election-determined-the-future-of-cyberspace> https://www.foreignaffairsreview.com/home/how-an-unknown-election-determined-the-future-of-cyberspace>

 

New report claims Beijing tries to “manipulate” the ITU

Washington DC-based international affairs thinktank the Carnegie Endowment has published what, in some parts of the world, will be regarded as a contentious paper, as it argues that while China's serial efforts to influence comms technical standards groups have, to date, been generally “un-coordinated, unsophisticated and unsuccessful”, a small number of interventions are serious, determined and dangerous. The article says the US must keep a close eye on Beijing's activities in general and in particular on its actions at, and the “manipulation” of, the Geneva-based International Telecommunications Union (ITU).

< <https://www.telecomtv.com/content/access-evolution/new-report-claims-beijing-tries-to-manipulate-the-itu-46851/> https://www.telecomtv.com/content/access-evolution/new-report-claims-beijing-tries-to-manipulate-the-itu-46851/>

 

IAB Responds to Call for Input on “The relationship between human rights and technical standard-setting processes for new and emerging digital technologies”

On 3 March 2023, the IAB responded to the Office of the High Commissioner for Human Rights Call for Input on “The relationship between human rights and technical standard-setting processes for new and emerging digital technologies.”

< <https://www.iab.org/2023/03/03/iab-responds-to-call-for-input-on-the-relationship-between-human-rights-and-technical-standard-setting-processes-for-new-and-emerging-digital-technologies/> https://www.iab.org/2023/03/03/iab-responds-to-call-for-input-on-the-relationship-between-human-rights-and-technical-standard-setting-processes-for-new-and-emerging-digital-technologies/>

 

Misguided Policies the World over Are Slowly Killing the Open Internet

Wherever we live, there is plenty to be afraid of. Wars are raging on. Authoritarians are on the rise. The climate is changing so fast that we are unable to keep up. And yet, we seem unable to do anything about it. With all that on our minds, it is not surprising another threat is being overlooked: the global drift toward “splinternet.”

< <https://www.internetsociety.org/blog/2023/03/misguided-policies-the-world-over-are-slowly-killing-the-open-internet/> https://www.internetsociety.org/blog/2023/03/misguided-policies-the-world-over-are-slowly-killing-the-open-internet/>

 

IEEE President’s Note: Making IEEE a Force for Change: The key is community, relevance, and resource sharing

As 2023 IEEE president, it is my goal to work with all members—particularly our students, young professionals, and affinity committee members—to make IEEE a more successful and resilient global technical organization and for there to be global recognition of IEEE as a force for change.

< <https://spectrum.ieee.org/ieee-presidents-note-march-2023> https://spectrum.ieee.org/ieee-presidents-note-march-2023>

 

IEEE Is Realigning Its Geographic Regions: 6 U.S. regions will be consolidated into 5 and IEEE Region 10 will split into 2

A major step in restructuring IEEE’s regions was taken during the November IEEE Board of Directors meeting, in which the Board approved the proposed region realignment as outlined in The Institute’s September article “IEEE Is Working to Reconfigure Its Geographic Regions”.

< <https://spectrum.ieee.org/realigning-ieee-geographic-regions> https://spectrum.ieee.org/realigning-ieee-geographic-regions>

 

W3C launches beta of its new website

Today we launched a beta version of the redesign of our website.

< <https://www.w3.org/blog/2023/02/w3c-launches-beta-of-its-new-website/> https://www.w3.org/blog/2023/02/w3c-launches-beta-of-its-new-website/>

 

First Public Working Draft: CSS Animations Level 2

The CSS Working Group has published a First Public Working Draft of CSS Animations Level 2. This CSS module describes a way for authors to animate the values of CSS properties over time, using keyframes.

< <https://www.w3.org/blog/news/archives/9854> https://www.w3.org/blog/news/archives/9854>

 

Advancing accountability in AI: Governing and managing risks throughout the lifecycle for trustworthy AI

This report presents research and findings on accountability and risk in AI systems by providing an overview of how risk-management frameworks and the AI system lifecycle can be integrated to promote trustworthy AI. It also explores processes and technical attributes that can facilitate the implementation of values-based principles for trustworthy AI and identifies tools and mechanisms to define, assess, treat, and govern risks at each stage of the AI system lifecycle.

< <https://www.oecd-ilibrary.org/science-and-technology/advancing-accountability-in-ai_2448f04b-en> https://www.oecd-ilibrary.org/science-and-technology/advancing-accountability-in-ai_2448f04b-en>

 

A blueprint for building national compute capacity for artificial intelligence

Countries are responding with national AI strategies to capitalise on AI and how it is transforming our economies. However, no country today has data on, or a targeted plan for, national AI compute capacity. This policy blind-spot may jeopardise domestic economic goals.

< <https://oecd.ai/en/compute-report> https://oecd.ai/en/compute-report>

 

Catalogue of AI Tools & Metrics

This is an interactive collection of tools and metrics to help AI actors develop and use AI systems and applications that are trustworthy e.g. that respect human rights and are fair, transparent, explainable, robust, secure and safe.

< <https://oecd.ai/en/catalogue/contribute> https://oecd.ai/en/catalogue/contribute>

 

Operationalizing IPv6: From Theoretical to Practical

In the period leading up to the year 2000, the definition of IPv6 was barely complete, with non-production, experimental academic applications abounding. This is not unlike how many new technologies begin their life cycle. What would happen over the next decade — the explosive adoption and growth of broadband, web-scalers, and the cloud — would unfortunately distract most would-be adopters of IPv6 from continuing their journeys. That is, of course, apart from a handful of commercial adopters who truly had no good alternatives to support growth.

< <https://www.arin.net/blog/2023/03/02/ipv6-lets-grow-business-case-pt2/> https://www.arin.net/blog/2023/03/02/ipv6-lets-grow-business-case-pt2/>

 

APNIC 2022 Annual Report now available

The report provides an overview of APNIC’s performance in 2022, and compares the work undertaken by the Secretariat with the planned activities that were set out in the 2022 Activity Plan and Budget. Details of APNIC’s financial performance are also included.

< <https://blog.apnic.net/2023/03/02/apnic-2022-annual-report-now-available/> https://blog.apnic.net/2023/03/02/apnic-2022-annual-report-now-available/>

 

APOPS 1 at APRICOT 2023 / APNIC 55

The APOPS 1 session at APRICOT 2023/APNIC 55 kicked off on Monday, 27 February 2023 with a cracker of a session. Here’s my hot take on the presentations. Gautam Akiwate presented on attacks on the DNS infrastructure. The risks of operating DNS services have now been magnified by the ‘DNS query verification’ path for certification, which allows an attacker to leverage registry process (‘supply chain’ in logistical terms) attacks bypassing low-barrier walls, to get a TLS certificate issued for their bogus web or another service, which leapfrogs the usual ‘this certificate looks suspicious’ protections. This is a sophisticated attack process that targets high-value enterprises, often state or national infrastructure. It’s high-risk, high-value, high-consequence stuff.

< <https://blog.apnic.net/2023/03/01/apops-1-at-apricot-2023-apnic-55/> https://blog.apnic.net/2023/03/01/apops-1-at-apricot-2023-apnic-55/>

 

RPKI Publication as a Service Available

We are pleased to announce that our RPKI Publication as a Service is now available to RPKI users to run their CAs in "hybrid RPKI" mode. The RPKI Publication as a Service has been publicly available since December 2022 in beta-testing mode, and has been stable throughout the testing period.

< <https://www.ripe.net/publications/news/announcements/rpki-publication-as-a-service-available> https://www.ripe.net/publications/news/announcements/rpki-publication-as-a-service-available>

 

Broadband Innovation Begins With State-of-the-Art Labs

Innovation is unleashed in an environment of collaboration, experimentation and expertise. By guiding early-stage ideas from concept to real-world deployment, the industry and end users benefit. CableLabs has a range of labs designed to strengthen and support collaboration and broadband innovation. Members, vendors and other collaborators can join forces to create a multitude of network architectures and scenarios to explore and test new solutions. With this degree of interaction and cooperation, innovation is amplified.

< <https://www.cablelabs.com/blog/broadband-innovation-begins-with-state-of-the-art-labs> https://www.cablelabs.com/blog/broadband-innovation-begins-with-state-of-the-art-labs>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home