[Newsclips] IETF SYN-ACK Newspack 2021-05-10

David Goldstein <david@goldsteinreport.com> Mon, 10 May 2021 13:07 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 311E93A1BFC for <newsclips@ietfa.amsl.com>; Mon, 10 May 2021 06:07:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.795
X-Spam-Level:
X-Spam-Status: No, score=-1.795 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTML_OBFUSCATE_10_20=0.093, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TMADyrz4ctO5 for <newsclips@ietfa.amsl.com>; Mon, 10 May 2021 06:06:55 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC8313A1C13 for <newsclips@ietf.org>; Mon, 10 May 2021 06:06:54 -0700 (PDT)
Received: from DGSurfaceBook (unknown [101.184.0.94]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 7973328009A for <newsclips@ietf.org>; Mon, 10 May 2021 09:06:50 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 101.184.0.94) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DGSurfaceBook
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 10 May 2021 23:06:48 +1000
Message-ID: <017c01d7459d$5801e460$0805ad20$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_017D_01D745F1.29AF7B00"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AddFnVVXrDRXJs5WSwmystUChnXsAw==
Content-Language: en-au
X-PPP-Message-ID: <20210510130652.1441472.98513@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/_6Mvz_t-lQRzyskhKKaYNZBK5hU>
Subject: [Newsclips] IETF SYN-ACK Newspack 2021-05-10
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 May 2021 13:07:00 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Full speed ahead for low-latency DOCSIS

... But to support high data rates (think multi-Gigabit links) paired with lower latencies, there's need for a different congestion control algorithm. For that, CableLabs has hung its hat on Low-Latency Low-Loss Scalable Throughput (L4S), a technology that originated at (and is still being defined by) the Internet Engineering Task Force (IETF). L4S dynamically monitors bottlenecks and congestion in a way that adjusts sending rates before they start to lose traffic.

< <https://www.lightreading.com/cable-tech/docsis/full-speed-ahead-for-low-latency-docsis-/d/d-id/769288?> https://www.lightreading.com/cable-tech/docsis/full-speed-ahead-for-low-latency-docsis-/d/d-id/769288?>

 

Final Results of the 2021 Internet Society Board of Trustees Elections and IETF Selections

The Internet Society Elections Committee is pleased to announce the final results of the 2021 elections and the IETF selections for the Internet Society Board of Trustees.

< <https://www.internetsociety.org/blog/2021/05/final-results-of-the-2021-internet-society-board-of-trustees-elections-and-ietf-selections/> https://www.internetsociety.org/blog/2021/05/final-results-of-the-2021-internet-society-board-of-trustees-elections-and-ietf-selections/>

 

Columna 7. Por El comercio de los datos [Column 7. By Trading Data]

... ¿Quién protege a los ciudadanos acerca de las asimetrías de poder cuando hay un gobierno que pretende obtener elementos de privacidad que son inmutables? Así, el pretexto de las llamadas de extorsión se vuelve inútil cuando vemos que hay países que utilizan las matemáticas para pedir llaves de autorización y evitar dichas llamadas —con responsabilidad a los operadores. Es el caso de la iniciativa de identidad segura del cuerpo de estandarización de Internet (IETF) y en E.U. de la aplicación de la iniciativa de “Stir&Shaken” programada para junio de 2021.

< <https://www.yucatan.com.mx/internacional/columna-7-por-el-comercio-de-los-datos> https://www.yucatan.com.mx/internacional/columna-7-por-el-comercio-de-los-datos>

 

Vulnerabilidad en la biblioteca ‘ipaddress’ de Python [Vulnerability in python 'ipaddress' library]

... La especificación del IETF declara que en el caso de las direcciones IP ambiguas, es decir, cuyos fragmentos se puedan interpretar con múltiples formatos; las secciones de una IPv4 precedidas de un «0» se deben analizar como octal.

< <https://unaaldia.hispasec.com/2021/05/vulnerabilidad-en-la-biblioteca-ipaddress-de-python.html> https://unaaldia.hispasec.com/2021/05/vulnerabilidad-en-la-biblioteca-ipaddress-de-python.html>

 

Estos son todos los ataques a las redes que existen y cómo evitarlos [These are all attacks on the networks that exist and how to avoid them]

... La IETF en 2012 lanzó un nuevo estándar para establecer un algoritmo mejorado, y evitar que un atacante pueda adivinar el número de secuencia inicial en las comunicaciones TCP.

< <https://www.redeszone.net/tutoriales/seguridad/listado-completo-ataques-redes-como-evitarlos/> https://www.redeszone.net/tutoriales/seguridad/listado-completo-ataques-redes-como-evitarlos/>

 

一文看懂5G承载网络技术发展的三大趋势 [A paper understands the three major trends of the development of 5G hosting network technology]

... 由于5G+垂直行业存在多种应用场景,且通常是eMBB、uRLLC和mMTC的融合应用,同时对SLA的需求也存在较大差异,因此提供性能有界保障的确定性网络成为关键使能技术。就目前现状来看,3GPP R17和R18标准将重点增强支撑uRLLC、网络切片的RAN和SA的定制化服务能力;ITU-T、IEEE802.1和IETF等多个国际标准化组织正分别开展L1-L3的确定性承载技术标准研究和定制;我国CCSA、5G推进组下属5G承载工作组、未来网络等多个产业联盟也都在积极开展相关技术标准和产业应用研究,如5GDNA已发布了5G确定性网络在电力行业的需求、技术和实践等系列白皮书。

< <https://finance.sina.com.cn/tech/2021-05-06/doc-ikmyaawc3746305.shtml> https://finance.sina.com.cn/tech/2021-05-06/doc-ikmyaawc3746305.shtml>

 

日銀が分散型金融「DeFi」のレポートを公開、メリットとリスクを指摘 [BoJ releases report on decentralized financial 'DeFi', points to benefits and risks]

... レポートでもガバナンストークンについては言及されており、インターネットのガバナンスに関連した国際機関の例を出してこれらに学ぶ必要があるとしている。具体的には、IETFやICANN、W3Cといった組織だ。

< <https://news.yahoo.co.jp/articles/2b5304946893115b3349d5531841f5b65f87a8db> https://news.yahoo.co.jp/articles/2b5304946893115b3349d5531841f5b65f87a8db>

 

今さら聞けないNFT:「コンテンツ大国」日本のクリエイターが真剣になる理由 [NFT: Why Japanese creators are serious about "content powerhouses"]

... NFTの普及拡大のきっかけになったのは、2017年にEthereum規格の1つである「ERC-721」(Ethereum Request for Comments 721)がリリースされたことです。ERC-721の登場でNFTの作成は容易になりました。この「ERC」文書とは、インターネット関連の技術標準化団体IETF(Internet Engineering Task Force)におけるRFC(Request for Comments)文書のようなイメージで、技術仕様として公開されています。

< <https://jp.techcrunch.com/2021/05/07/whatisnft/> https://jp.techcrunch.com/2021/05/07/whatisnft/>

 

【重要ニュースまとめ(4/29~5/5)】日銀がDeFi分析レポートを公開。PayPalとマスターカードがステーブルコインとCBDCの調査を加速 [【Summary of Important News (April 29-5)】The Bank of Japan releases a DeFi analysis report. PayPal and Mastercard accelerate Stablecoin and CBDC investigations]

... ガバナンストークンによる分散型組織を考察する上では、インターネットのガバナンスに関連した国際機関の例を出してこれらに学ぶ必要があるとしました。具体的には、IETFやICANN、W3Cといった組織です。

< <https://hedge.guide/feature/blockchain-weekly-report-0506-bc202105.html> https://hedge.guide/feature/blockchain-weekly-report-0506-bc202105.html>

 

**********************

SECURITY & PRIVACY

**********************

New Report: A Decade of Passive DNS: A Snapshot of TLD Traffic

Farsight is pleased to be able to share a free new report entitled "A Decade of Passive DNS: A Snapshot of Top-Level Domain Traffic". ... This document summarizes what Farsight has seen in its global sensor network (plus ICANN zone files) for over 1500 IANA-recognized TLDs from 2010 to 2019, including classic gTLDs, ccTLDs, new gTLDs, and IDNs.

< <https://www.farsightsecurity.com/blog/txt-record/TLDReport-20210504/> https://www.farsightsecurity.com/blog/txt-record/TLDReport-20210504/>

 

Ten Years of Passive DNS by Paul Vixie

The report, "A Decade of Passive DNS" provides a longitudinal analysis of the use and popularity of TLDs over a ten-year period. The findings are based on what Farsight Security has seen in passive DNS from 2010-2019 based on a ten-year data rollup, excluding DNSSEC-related records. This study allows us to report on four measures for that period for each of the 1,576 IANA-recognized TLDs.

< <https://www.circleid.com/posts/20210504-ten-years-of-passive-dns/> https://www.circleid.com/posts/20210504-ten-years-of-passive-dns/>

 

**********************

INTERNET OF THINGS

**********************

Spy bosses warn of cyber-attacks on smart cities

Smart cities will be a target for hackers, and councils need to be prepared, the National Cyber Security Centre (NCSC) has warned. Sensors and internet-connected devices may improve urban services, but could also be used by hackers and foreign states to disrupt or spy.

< <https://www.bbc.com/news/technology-57012725> https://www.bbc.com/news/technology-57012725>

 

Cyber experts set out blueprint to secure smart cities of the future

Local and national authorities are being offered expert guidance to protect their citizens by making their connected places – often known as ‘smart cities’ – resilient to cyber attacks, it was announced today (Friday 7 May).

< <https://www.ncsc.gov.uk/news/cyber-experts-set-out-blueprint-to-secure-smart-cities-of-the-future> https://www.ncsc.gov.uk/news/cyber-experts-set-out-blueprint-to-secure-smart-cities-of-the-future>



**********************

NEW TRANSPORT PROTOCOLS

**********************

W3C начал подготовку стандарта WebTransport [W3C has started preparing the WebTransport standard]

Консорциум W3C представил первый черновой вариант спецификации WebTransport, определяющей протокол и сопутствующий JavaScript API для отправки и приёма данных между браузером и сервером. Канал связи организуется поверх HTTP/3 с использованием в качестве транспорта протокола QUIC, который, в свою очередь, представляет собой надстройку над протоколом UDP, поддерживающую мультиплексирование нескольких соединений и обеспечивающую методы шифрования, эквивалентные TLS/SSL.

< <http://rosinvest.com/novosti/1440733> http://rosinvest.com/novosti/1440733>

 

**********************

OTHERWISE NOTEWORTHY

**********************

The West’s Wakeup Call on Digital Tech Standards

What is it with technical standards these days? Suddenly, this closed and unwelcoming world populated by guys with shirt-pocket protectors working on incomprehensible documents thick with unexplained acronyms—as well as not-so-hilarious racism and misogyny under the flimsy cover of April Fool’s Day jokes—is today’s hot internet governance topic.

< <https://www.worldpoliticsreview.com/articles/29624/to-prevent-a-splinternet-the-west-doubles-down-on-digital-standards> https://www.worldpoliticsreview.com/articles/29624/to-prevent-a-splinternet-the-west-doubles-down-on-digital-standards>

 

Study on the Internet’s technical success factors

The success of the Internet has been built on protocols, standards and operational practices that have collectively evolved over the past 50 years. Throughout this period questions have been raised about the viability of the Internet, yet it continues to grow, evolve, and succeed in supporting a wide range of increasingly important applications and services.

< <https://blog.apnic.net/2021/05/06/study-on-the-internets-technical-success-factors/> https://blog.apnic.net/2021/05/06/study-on-the-internets-technical-success-factors/>

 

OARC 35 is coming to APAC

The DNS Operations, Analysis, and Research Center (DNS-OARC) is a non-profit, membership-based organization that seeks to improve the security, stability, and understanding of the Internet’s DNS infrastructure. These aims are partly achieved through workshops. DNS-OARC Workshops are open to all OARC members and other parties interested in DNS operations and research. Now, DNS-OARC 35 is coming to the Asia Pacific region!

< <https://blog.apnic.net/2021/05/04/oarc-35-is-coming-to-apac/> https://blog.apnic.net/2021/05/04/oarc-35-is-coming-to-apac/>

 

Russia’s plot to control the Internet is no longer a secret

Russia’s campaign to control the Internet isn’t just a secret intelligence gambit any longer. It’s an explicit goal, proclaimed by Russian President Vladimir Putin as a key element of the Kremlin’s foreign policy.

< <https://www.washingtonpost.com/opinions/2021/05/04/russias-plot-control-internet-is-no-longer-secret/> https://www.washingtonpost.com/opinions/2021/05/04/russias-plot-control-internet-is-no-longer-secret/>

 

Leaked Documents Reveal Xi Jinping's Communist Chinese Plan to Control the Internet's Root by Greg Thomas

Yesterday, The Epoch Times reported on leaked internal Chinese government documents revealing that premier Xi Jinping has "personally directed the communist regime to focus its efforts to control the global Internet, displacing the influential role of the United States." Xi's ultimate aim is for the Chinese Communist Party (CCP) to wield "discourse power" over communications and discussions on the global geopolitical stage by controlling content on the Internet.

< <https://www.circleid.com/posts/20210503-leaked-documents-reveal-chinas-plan-to-control-internet-root/> https://www.circleid.com/posts/20210503-leaked-documents-reveal-chinas-plan-to-control-internet-root/>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home