[Newsclips] IETF SYN-ACK Newspack 2020-08-10

David Goldstein <david@goldsteinreport.com> Mon, 10 August 2020 12:07 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 7BA323A0811 for <newsclips@ietfa.amsl.com>; Mon, 10 Aug 2020 05:07:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id C2Amp1We8H2S for <newsclips@ietfa.amsl.com>; Mon, 10 Aug 2020 05:07:05 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3FF83A151B for <newsclips@ietf.org>; Mon, 10 Aug 2020 05:07:04 -0700 (PDT)
Received: from DavidDesktop2019 (unknown []) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 3290F280AA4 for <newsclips@ietf.org>; Mon, 10 Aug 2020 08:07:01 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidDesktop2019
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 10 Aug 2020 22:06:57 +1000
Organization: Goldstein Report
Message-ID: <001a01d66f0e$c2a24cd0$47e6e670$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_001B_01D66F62.944FE370"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdZvDrSd0mObDukFRouNGdAhsPvllA==
Content-Language: en-au
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/cr5Wuv9AtQSJvkxRBPhKvYil_lE>
Subject: [Newsclips] IETF SYN-ACK Newspack 2020-08-10
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Aug 2020 12:07:09 -0000




Pushing Internet Standards Governing Body IETF to Tackle Discriminatory and Exclusionary Terminology

CDT has long been deeply involved in internet governance and internet standards issues, harkening back to our early days. The governing bodies and structures, including the IETF and others, make incredibly important technical decisions which, without exaggeration, impact every user around the world.

< <https://cdt.org/insights/pushing-internet-standards-governing-body-ietf-to-tackle-discriminatory-and-exclusionary-terminology/> https://cdt.org/insights/pushing-internet-standards-governing-body-ietf-to-tackle-discriminatory-and-exclusionary-terminology/>


5G Just Got Weird: Industry group 3GPP takes 5G in new directions in latest set of standards

The only reason you’re able to read this right now is because of the Internet standards created by the IETF. So while standards may not always be the most exciting thing in the world, they make exciting things possible. And occasionally, even the standards themselves get weird.

< <https://spectrum.ieee.org/tech-talk/telecom/standards/5g-release-16> https://spectrum.ieee.org/tech-talk/telecom/standards/5g-release-16>


Encrypting zone transfers closes one more leak left open by old DNS technology

Making the DNS more privacy friendly is the declared goal of the IETF DPRIVE Working Group (WG). As they gathered virtually for IETF108, the WG took a sharp look at the proposal to extend privacy to the technical operation of zone transfers.

< <https://www.centr.org/news/blog/encrypting-zone-transfers-closes-one-more-leak-left-open-by-old-dns-technology.html> https://www.centr.org/news/blog/encrypting-zone-transfers-closes-one-more-leak-left-open-by-old-dns-technology.html>


Report: Two new encryption standards will soon sweep away security controls

Security professionals must act before TLS 1.3 and DNS-over-HTTPS (DoH) are implemented or they won't be able to analyze network traffic and detect cyberthreats, warns Forrester Research. ... Privacy activists have gone up against the government surveillance community advocating for encryption and have been working within the IETF to provide countermeasures against eavesdropping and data collection, Holmes wrote. The latest version, TLS 1.3, and encryption of the domain name system are the results of their most recent efforts.

< <https://www.techrepublic.com/article/report-two-new-encryption-standards-will-soon-sweep-away-security-controls/> https://www.techrepublic.com/article/report-two-new-encryption-standards-will-soon-sweep-away-security-controls/>


Reaktionen zur "Great Firewall", made in the USA [Reactions to the Great Firewall, made in the USA]

Die Zusammenschaltung unterschiedlicher Netze bilde das Fundament des Internets. „Unterbindet man die Zusammenschaltung, zielt man auf das Herz der Unternehmung Internet“, schreibt Google Ingenieur Ted Hardie, ehemaliger Vorsitzender des Internet Architecture Board, des Peergremiums der IETF.

< <https://www.heise.de/news/Reaktionen-zur-Great-Firewall-made-in-the-USA-4866141.html> https://www.heise.de/news/Reaktionen-zur-Great-Firewall-made-in-the-USA-4866141.html>


Online-Workshop: Sichere Mail mit DANE und DNSSEC [Online Workshop: Secure Mail with DANE and DNSSEC]

... DANE (DNS-based Authentication of Named Entities) ist von der IETF standardisiertes Protokoll, das über die DNS-Sicherheitserweiterung DNSSEC die Identität von Mailservern sicherstellt. Damit ist eine sichere TLS/SSL-verschlüsselte Mailkommunikation möglich, die nicht durch das Unterschieben eines manipulierten X.509-Zertifikats angreifbar ist.

< <https://www.heise.de/news/Online-Workshop-Sichere-Mail-mit-DANE-und-DNSSEC-4865713.html> https://www.heise.de/news/Online-Workshop-Sichere-Mail-mit-DANE-und-DNSSEC-4865713.html>


Comment mieux faire face aux incidents de cybersécurité [How to better deal with cybersecurity incidents]

... Chaque plan est différent, en fonction des besoins spécifiques. Toutefois, ce modèle recouvre les éléments essentiels, standard, et devant figurer dans le plan de réponse à incident de toute organisation. Et les ressources et recommandations ne manquent pas pour aller plus loin. Les frameworks sont d’ailleurs nombreux, entre ceux du NIST américain, de l’ISACA, de l’ISO/IEC, ou encore de l’institut SANS, de l’IEEE, de l’IETF et de l’Enisa. Celui du NIST, par exemple, adopte une approche de cycle de vie.

< <https://www.lemagit.fr/conseil/Comment-mieux-faire-face-aux-incidents-de-cybersecurite> https://www.lemagit.fr/conseil/Comment-mieux-faire-face-aux-incidents-de-cybersecurite>


Yang Perlu Anda Ketahui tentang Keamanan Waktu Jaringan [What you need to know about network time security]

... NTS adalah pengembangan penting dari Network Time Protocol (NTP). Ini telah dikembangkan dalam IETF dan menambahkan lapisan keamanan yang sangat dibutuhkan ke protokol yang berusia lebih dari 30 tahun dan rentan terhadap jenis serangan tertentu.

< <https://eratekno.com/sains-teknologi/yang-perlu-anda-ketahui-tentang-keamanan-waktu-jaringan/> https://eratekno.com/sains-teknologi/yang-perlu-anda-ketahui-tentang-keamanan-waktu-jaringan/>


سيزيل اثنان من معايير التشفير الجديدة ضوابط الأمان قريبًا [Two of the new encryption standards will soon remove security controls]

... كتب هولمز أن نشطاء الخصوصية عارضوا مجتمع المراقبة الحكومية الذي يدعو إلى التشفير وكانوا يعملون ضمن فرقة عمل هندسة الإنترنت (IETF) لتوفير إجراءات مضادة ضد التنصت وجمع البيانات. أحدث إصدار ، TLS 1.3 ، وتشفير نظام اسم المجال هما نتيجة أحدث جهودهم.

< <https://www.saaa25.org/تقرير-سيزيل-اثنان-من-معايير-التشفير-ال/> https://www.saaa25.org/تقرير-سيزيل-اثنان-من-معايير-التشفير-ال/>





Automation helps with COVID-19, energy efficiency, robotics, non-contact motion control, STEM

Automation innovation has opportunities to help with COVID-19 pandemic response, energy efficiency, robotics, non-contact motion control using superconductivity, training and by creating increased interest in science, technology, engineering and math (STEM).

< <https://www.controleng.com/articles/automation-helps-with-covid-19-energy-efficiency-robotics-non-contact-motion-control-stem/> https://www.controleng.com/articles/automation-helps-with-covid-19-energy-efficiency-robotics-non-contact-motion-control-stem/>





How the Internet of Things Will Revolutionize Medical Research

The Internet of Things is revolutionizing the way we live and work. From tweeting refrigerators to driverless cars, a vast array of physical devices are now connected to the Web.

< <https://www.medtechintelligence.com/column/how-the-internet-of-things-will-revolutionize-medical-research/> https://www.medtechintelligence.com/column/how-the-internet-of-things-will-revolutionize-medical-research/>


Connected Devices Will Generate 79 Zettabytes of data by 2025

The Internet of Things, or IoT, is no longer in the stage of hype or anticipation that it once was. If anything, the IoT has now crossed over into mainstream commercial and business use. A recent IDC report predicts connected devices could reach almost 75 billion globally by 2025. According to the report, the lion share of these devices will be connected to IoT platforms.

< <https://iotbusinessnews.com/2020/08/10/08984-75-of-connected-devices-will-be-linked-to-an-iot-platform-by-2025/> https://iotbusinessnews.com/2020/08/10/08984-75-of-connected-devices-will-be-linked-to-an-iot-platform-by-2025/>





Everything You Need to Know about Network Time Security by Patrik Fältström

A lot of the Internet’s most important security tools are dependent on accurate time. But until recently there was no way to ensure that the time you were getting came from a trusted source. The new Network Time Security (NTS) standard has been designed to fix that. In this post, we will summarise the most important NTS developments and link to a range of recent Netnod articles providing more information on the background, the NTS standard and the latest implementations.

< <https://www.netnod.se/blog/everything-you-need-know-about-network-time-security> https://www.netnod.se/blog/everything-you-need-know-about-network-time-security>

< <https://www.internetsociety.org/blog/2020/08/everything-you-need-to-know-about-network-time-security/> https://www.internetsociety.org/blog/2020/08/everything-you-need-to-know-about-network-time-security/>


Protocol gateway flaws reveal a weak point in ICS environments

Research presented at this week's Black Hat conference highlights a new threat via protocol translation attacks and reveals 9 flaws found in protocol gateways from different vendors.

< <https://www.csoonline.com/article/3570419/protocol-gateway-flaws-reveal-a-weak-point-in-ics-environments.html> https://www.csoonline.com/article/3570419/protocol-gateway-flaws-reveal-a-weak-point-in-ics-environments.html>


INTERPOL report shows alarming rate of cyberattacks during COVID-19

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure.

< <https://www.interpol.int/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19> https://www.interpol.int/News-and-Events/News/2020/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19>


Insecure satellite Internet is threatening ship and plane safety

More than a decade has passed since researchers demonstrated serious privacy and and security holes in satellite-based Internet services. The weaknesses allowed attackers to snoop on and sometimes tamper with data received by millions of users thousands of miles away. You might expect that in 2020—as satellite Internet has grown more popular—providers would have fixed those shortcomings, but you’d be wrong.

< <https://arstechnica.com/information-technology/2020/08/insecure-satellite-internet-is-threatening-ship-and-plane-safety/> https://arstechnica.com/information-technology/2020/08/insecure-satellite-internet-is-threatening-ship-and-plane-safety/>





China is now blocking all encrypted HTTPS traffic that uses TLS 1.3 and ESNI

The Chinese government has deployed an update to its national censorship tool, known as the Great Firewall (GFW), to block encrypted HTTPS connections that are being set up using modern, interception-proof protocols and technologies.

< <https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/> https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/>


China blocks all HTTPS traffic that uses TLS 1.3

Research shows that the Chinese government has updated its Great Firewall to block ESNI (Encrypted Server Name Indication), a feature of the new TLS 1.3 which underlies HTTPS communication. Given the manner in which ESNI works, this means that China is basically blocking all web traffic that uses TLS 1.3.

< <https://www.medianama.com/2020/08/223-china-blocks-https-traffic/> https://www.medianama.com/2020/08/223-china-blocks-https-traffic/>





When it comes to the Internet, Trump prefers the Chinese model by Fareed Zakaria

This week, the Trump administration explicitly announced its intention to work toward a new bipolar world of technology, carved up between the United States and China. The administration had already made clear that it would either ban the Chinese video app TikTok or force its sale to a U.S. company. Then it announced a sweeping “Clean Network” program, which seeks to ban virtually all Chinese information technology products — phone carriers, apps, cloud servers, even undersea cables.

< <https://www.washingtonpost.com/opinions/when-it-comes-to-the-internet-trump-prefers-the-chinese-model/2020/08/06/a9298236-d823-11ea-9c3b-dfc394c03988_story.html> https://www.washingtonpost.com/opinions/when-it-comes-to-the-internet-trump-prefers-the-chinese-model/2020/08/06/a9298236-d823-11ea-9c3b-dfc394c03988_story.html>


IEEE Standards Association Marking World Standards Day With a Video Contest

Every year on 14 October the IEEE Standards Association (IEEE SA) joins the international community in celebrating the importance of standards development and honoring the collaboration of individuals and organizations across the globe that drive technological innovation.

< <https://spectrum.ieee.org/the-institute/ieee-news/ieee-standards-association-marking-world-standards-day-with-a-video-contest> https://spectrum.ieee.org/the-institute/ieee-news/ieee-standards-association-marking-world-standards-day-with-a-video-contest>


A Legislative Path to an Interoperable Internet

It’s not enough to say that the Internet is built on interoperability. The Internet is interoperability. Billions of machines around the world use the same set of open protocols—like TCP/IP, HTTP, and TLS—to talk to one another. The first Internet-connected devices were only possible because phone lines provided interoperable communication ports, and scientists found a way to send data, rather than voice, over those phone lines.

< <https://www.eff.org/deeplinks/2020/07/legislative-path-interoperable-internet> https://www.eff.org/deeplinks/2020/07/legislative-path-interoperable-internet>


A Tale of Two Internets: Internet Performance Pre and Post COVID-19

As enterprise investments in digital transformation continue to accelerate, the Internet is becoming increasingly mission-critical to worker productivity and business continuity. Cloud and SaaS consumption have increased reliance on Internet-related infrastructures so significantly that the Internet (and cloud provider networks) have essentially become the new enterprise backbone. Yet, the Internet is notoriously opaque, with IT organizations, historically, having little visibility into its inner workings—putting digital transformation investments at risk and making remote workforce management more difficult.

< <https://blog.thousandeyes.com/internet-performance-pre-post-covid-19/> https://blog.thousandeyes.com/internet-performance-pre-post-covid-19/>


On Cyber Governance by Geoff Huston

I’m not sure what “Cyber Governance” actually means! We’ve conventionally used the term governance to describe the relationship between citizens and the state, or more generally between a social group and its leaders. It’s intended to relate to the processes of decision making that reinforce societal norms and nurture a society’s institutions.

< <https://www.potaroo.net/ispcol/2020-08/cgov.html> https://www.potaroo.net/ispcol/2020-08/cgov.html>


David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home