[Newsclips] IETF SYN-ACK Newspack 2022-10-03

David Goldstein <david@goldsteinreport.com> Mon, 03 October 2022 03:22 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9935DC14CF0C for <newsclips@ietfa.amsl.com>; Sun, 2 Oct 2022 20:22:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_AFFORDABLE=1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4pHRYmQxdgPZ for <newsclips@ietfa.amsl.com>; Sun, 2 Oct 2022 20:22:00 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0226C14CF09 for <newsclips@ietf.org>; Sun, 2 Oct 2022 20:22:00 -0700 (PDT)
Received: from DavidSurface4Laptop2022 (unknown [206.83.114.50]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id BA24FE99951 for <newsclips@ietf.org>; Mon, 3 Oct 2022 04:21:56 +0100 (+01)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 206.83.114.50) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidSurface4Laptop2022
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 03 Oct 2022 14:21:53 +1100
Organization: Goldstein Report
Message-ID: <00a801d8d6d7$4b46e640$e1d4b2c0$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00A9_01D8D733.7EB75E40"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdjW10RoofJxgMueSdOqjkMUn8vwIg==
Content-Language: en-au
X-PPP-Message-ID: <20221003032158.3432670.98341@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/d1qu1XimZ2P7E4-3G7npD_vHVMM>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-10-03
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2022 03:22:05 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Digital sovereignty and Internet standards: normative implications of public-private relations among Chinese stakeholders in the IETF

ABSTRACT: (How) are Chinese actors contributing to increased state influence in Internet standard-making? In its open and private-based dimension, the Internet is possibly the twenty-first century’s epitome of the liberal international order in its global spatial dimension. Therefore, many see deep normative challenges deriving from the rise of powerful, non-liberal actors such as China. In particular, China and Chinese stakeholders are often portrayed as supporters and promoters of a multilateral Internet governance model based on digital sovereignty aimed at completely replacing the existing multistakeholder, private-based model. Academic views on this topic have become less dichotomous throughout the years, especially as China’s position on it has become more nuanced. However, this academic and policy debate is still open. This article analyses Chinese stakeholder actions in the IETF, the key venue for Internet standard-making. Through network analysis, this article maps the engagement of Chinese stakeholders in selected working groups of the IETF over time. Through expert interviews, this article interprets the drivers, evolution, and impact of such engagement. This research yields two main findings: first, it shows that the Chinese government does not have full control of its domestic private actors, among which there is both collaboration and conflict. Second, it concludes that Chinese stakeholders have increasingly accepted the existing functioning of IETF standard-making as they grew influential within it.

< <https://www.tandfonline.com/doi/abs/10.1080/1369118X.2022.2129270> https://www.tandfonline.com/doi/abs/10.1080/1369118X.2022.2129270>

 

RFC 9307 on Report from the IAB Workshop on Analyzing IETF Data (AID) 2021

Abstract: The “Show me the numbers: Workshop on Analyzing IETF Data (AID)” workshop was convened by the Internet Architecture Board (IAB) from November 29 to December 2, 2021 and hosted by the IN-SIGHT.it project at the University of Amsterdam; however, it was converted to an online-only event. The workshop was organized into two discussion parts with a hackathon activity in between. This report summarizes the workshop’s discussion and identifies topics that warrant future work and consideration.

< <https://www.iab.org/2022/09/27/rfc-9307-on-report-from-the-iab-workshop-on-analyzing-ietf-data-aid-2021/> https://www.iab.org/2022/09/27/rfc-9307-on-report-from-the-iab-workshop-on-analyzing-ietf-data-aid-2021/>

 

DNS evolution: Innovation or fragmentation?

There is no single name system that is necessarily bound to the Internet. Unlike IP addresses, which are in every IP packet, names are an application construct, and, in theory, applications have considerable latitude in how they handle such names. There could be many name systems that could coexist within the Internet — in theory. ... The use of a trigger top-level domain label to signal a switch of content to a different resolution protocol has the consideration that if the ‘mainstream’ DNS name space were to also delegate this label then the conflicting results would be less than ideal. For this reason, the IETF requested IANA to open up a ‘Special Use Domain Name Registry’ (RFC 6761) and populated this registry with such trigger names and related special-use domain names.

< <https://www.potaroo.net/ispcol/2022-09/evodns.html> https://www.potaroo.net/ispcol/2022-09/evodns.html>

< <https://blog.apnic.net/2022/09/30/dns-evolution-innovation-or-fragmentation/> https://blog.apnic.net/2022/09/30/dns-evolution-innovation-or-fragmentation/>

 

The Thorny Problem of Keeping the Internet’s Time: An obscure software system synchronizes the network’s clocks. Who will keep it running?

In 1977, David Mills, an eccentric engineer and computer scientist, took a job at COMSAT, a satellite corporation headquartered in Washington, D.C. Mills was an inveterate tinkerer: he’d once built a hearing aid for a girlfriend’s uncle, and had consulted for Ford on how paper-tape computers might be put into cars. Now, at COMSAT, Mills became involved in the ARPANET, the computer network that would become the precursor to the Internet. A handful of researchers were already using the network to connect their distant computers and trade information. But the fidelity of that exchanged data was threatened by a distinct deficiency: the machines did not share a single, reliable synchronized time. ... There has not been a fully new version of N.T.P. since its fourth iteration, which was published in 2010. Now a subgroup of about two dozen contributors within the IETF, the Internet’s principal standards body, is working toward version five. It may prove to be a dramatic departure from what currently exists. When the I.E.T.F. was created, decades ago, it was inspired by an early working group chaired by Mills. But his role in and influence over the N.T.P. community has waned. In the fall of 2020, Mills e-mailed the paper I’d seen him working on to the subgroup and received no substantive response for months. He wasn’t surprised.

< <https://www.newyorker.com/tech/annals-of-technology/the-thorny-problem-of-keeping-the-internets-time> https://www.newyorker.com/tech/annals-of-technology/the-thorny-problem-of-keeping-the-internets-time>

 

Why Biden and Blinken Are Backing a Candidate for a Little-Known U.N. Internet Agency

A little-known U.N. agency that develops worldwide technical standards for the internet will gain unfamiliar geopolitical attention as scientists, engineers, and government officials descend on Bucharest, Romania, this week.

< <https://www.lawfareblog.com/why-biden-and-blinken-are-backing-candidate-little-known-un-internet-agency> https://www.lawfareblog.com/why-biden-and-blinken-are-backing-candidate-little-known-un-internet-agency>

 

This Vote Could Change the Course of Internet History

This week in Romania, a US State Department candidate is facing a Russian challenger in an election for the leadership of one of the most important international technology bodies in the world. ... This kind of work is, traditionally, not the purview of the ITU. Nongovernmental groups, like Icann and the IETF, tend to be more directly responsible for managing the actual protocols that govern the internet.

< <https://www.wired.co.uk/article/2022-itu-secretary-general-election> https://www.wired.co.uk/article/2022-itu-secretary-general-election>

< <https://www.wired.it/article/internet-elezione-segretario-generale-itu/> https://www.wired.it/article/internet-elezione-segretario-generale-itu/> [Italian]

 

UN's ITU election may spell the end of our open internet

... The US has put forward Doreen Bogdan-Martin for the gig. She's an ITU veteran with years of experience working with global telecoms regulators. She also believes that current internet governance models need not change – bodies like the IETF should be left to work on standards and technologies pertaining to the 'net, and the ITU should do its thing regarding international co-operation.

< <https://www.theregister.com/2022/09/29/itu_plenipotentiary_open_internet_fight/> https://www.theregister.com/2022/09/29/itu_plenipotentiary_open_internet_fight/>

 

Challenged by CAPTCHAs? Cloudflare thinks it has a solution

... Cloudflare has spent a year working with Apple, Google and other tech companies to create PATs as an extension to an IETF draft standard, The Privacy Pass HTTP Authentication Scheme.

< <https://www.itnews.com.au/news/challenged-by-captchas-cloudflare-thinks-it-has-a-solution-585836> https://www.itnews.com.au/news/challenged-by-captchas-cloudflare-thinks-it-has-a-solution-585836>

 

GROUNDBREAKING (IN A BAD WAY): New FCC NPRM Asks Whether SHAKEN/STIR Framework Can/Should be Applied to Texts and We ALL Just Rolled Our Eyes

... 29. Industry technologists developed caller ID authentication—specifically, the STIR/SHAKEN framework for IP networks—to combat spoofing of voice calls. We seek comment on the progress of efforts to extend authentication to text messages. A working group of the IETF is currently considering a draft standard regarding application of some components of the STIR/SHAKEN framework to text messages. What additional work needs to be done on the draft standard currently under consideration? How long might it take to complete such work? Beyond that document, what if any additional standards work is necessary before authentication for text messages is operational?

< <https://www.natlawreview.com/article/groundbreaking-bad-way-new-fcc-nprm-asks-whether-shakenstir-framework-canshould-be> https://www.natlawreview.com/article/groundbreaking-bad-way-new-fcc-nprm-asks-whether-shakenstir-framework-canshould-be>

 

The SIP Forum Announces STIR/SHAKEN ENTERPRISE SUMMIT Webinar Series Registrations Are Open

... The event will also include a special celebration of the 20th Anniversary of the publication of the Session Initiation Protocol (IETF RFC 3261). The SUMMIT will feature a number of very special keynotes and panel sessions that will include many of the original developers and pioneering implementers of the SIP standard, including Vint Cerf, Heinrich Sinnreich, Henning Schulzrinne, David Gurle, Jon Peterson, Jonathan Rosenberg, and Brian Rosen, among others!

< <https://www.sipforum.org/2022/09/the-sip-forum-announces-stir-shaken-enterprise-summit-webinar-series-registrations-are-open/> https://www.sipforum.org/2022/09/the-sip-forum-announces-stir-shaken-enterprise-summit-webinar-series-registrations-are-open/>

 

IBM, Vodaphone, GSMA form group to promote quantum-safe networks

... The task force expects other players to join its standards-setting efforts, and it expects to work with standards-setting groups such as the IETF and U.S. National Institute of Standards and Technology (NIST) in the future.

< <https://www.networkworld.com/article/3675370/ibm-vodaphone-gsma-form-group-to-promote-quantum-safe-networks.html> https://www.networkworld.com/article/3675370/ibm-vodaphone-gsma-form-group-to-promote-quantum-safe-networks.html>

 

Security and Client-to-Cloud Integration to Shape the SD-WAN Market

... An SD-WAN solution is a long-term investment that takes years to implement, so selecting a vendor can feel like placing a big bet. Gone are the days when Cisco had a monopoly, and you could take a Cisco router, have it directly connected, and work with a Juniper or other vendor’s routers. In the SD-WAN world, an SD-WAN router from one vendor cannot talk to another vendor. Even within Cisco, their Meraki SD-WAN solution cannot interconnect with their Viptela solution. SD-WAN is a proprietary technology that will never have an IETF protocol standard. Once an enterprise chooses a vendor, it is hard to go back.

< <https://www.nojitter.com/sd-wan/security-and-client-cloud-integration-shape-sd-wan-market> https://www.nojitter.com/sd-wan/security-and-client-cloud-integration-shape-sd-wan-market>

 

What Is CIDR? (Advantages And Disadvantages Of CIDR)

... What Is CIDR? Classless Inter-Domain Routing (CIDR) is a network concept used to manage IP address assignment instead of the antiquated method of using classful addressing. The IETF created this addressing method in 1993 to reduce IPv4 address waste and simplify routing table construction.

< <https://trendingwork.com/2022/10/01/what-is-cidr/> https://trendingwork.com/2022/10/01/what-is-cidr/>

 

Ondřej Malý: Hledá se nový šéf ITU. Jde o důležité rozhodnutí o budoucnosti internetu [Ondřej Malý: A new head of ITU is being sought. This is an important decision on the future of the Internet]

... ITU je extrémně důležitou organizací, půjde tak o zásadní volbu. Fungování internetu z historických důvodů neřídí žádný stát, ale je založené na dobrovolných standardech, spolupráci a na důvěře. Klíčové technické aspekty tak řeší neziskové organizace – ICANN, který spravuje doménová jména a adresy, je kalifornskou neziskovkou. Komise pro technickou stránku internetu (IETF), která vyvíjí internetové standardy a protokoly, je otevřená organizace, která ani nemá vlastní právní subjektivitu a zastřešuje ji další neziskovka Internet Society. Standardy jsou tak vyvíjené zdola. Americká kandidátka určitě nebude chtít měnit tento status quo, který západním demokraciím vyhovuje.

< <https://www.e15.cz/byznys/technologie-a-media/ondrej-maly-hleda-se-novy-sef-itu-jde-o-dulezite-rozhodnuti-o-budoucnosti-internetu-1393520> https://www.e15.cz/byznys/technologie-a-media/ondrej-maly-hleda-se-novy-sef-itu-jde-o-dulezite-rozhodnuti-o-budoucnosti-internetu-1393520>

 

El rastro que dejamos cuando usamos wifi aunque ni nos conectemos [The trail we leave when we use wifi even if we don't even connect]

... En la actualidad se está investigando el impacto que puede tener el uso de direcciones MAC aleatorias en las aplicaciones que usamos y en las redes a las que nos conectamos. Existen escenarios en los que es necesario que la red identifique a un dispositivo de forma anónima a pesar de que emplee direcciones aleatorias. Este es el objetivo del grupo de trabajo MADINAS del IETF, principal organismo de estandarización de protocolos de internet.

< <https://theconversation.com/el-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nos-conectemos-176933> https://theconversation.com/el-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nos-conectemos-176933>

< <https://www.eleconomista.com.mx/tecnologia/El-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nosconectemos-20221002-0034.html> https://www.eleconomista.com.mx/tecnologia/El-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nosconectemos-20221002-0034.html>

< <https://www.20minutos.es/tecnologia/una-amenaza-para-nuestra-privacidad-y-dinero-el-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nos-conectemos-5065173/> https://www.20minutos.es/tecnologia/una-amenaza-para-nuestra-privacidad-y-dinero-el-rastro-que-dejamos-cuando-usamos-wifi-aunque-ni-nos-conectemos-5065173/>

 

De telecomchef van de VN is straks mogelijk een Rus [The telecom chief of the UN may soon be a Russian]

... De ITU buigt zich van oudsher over de koppeling van nationale telefoonnetwerken en de verdeling van het radiofrequentiespectrum om storing te voorkomen. Tegenwoordig rekent ze ook technische specificaties voor glasvezelkabels en 5G (mobiele telefonie) tot haar werkterrein. Zouden de ITU-landen meer betrokken zijn bij het beheer van het internet, dan zou dat nationale regeringen meer zeggenschap geven over het wereldwijde netwerk, waarin een centrale autoriteit nu ontbreekt. Het beheer van de technische standaarden die voorschrijven hoe internet werkt, zoals het netwerkprotocol TCP/IP of het Domain Name System (het ‘telefoonboek’ van internet), berust vooralsnog bij een internationale gemeenschap van overheden, bedrijven, onderzoekers en vrijwilligers. Ze zijn verenigd in organisaties als de IETF en ICANN.

< <https://www.nrc.nl/nieuws/2022/09/28/telecomchef-vn-mogelijk-een-rus-a4143523> https://www.nrc.nl/nieuws/2022/09/28/telecomchef-vn-mogelijk-een-rus-a4143523>

 

Kemenkominfo Ingatkan Pentingnya Berekspresi di Media Sosial, Bebas Namun Terbatas [Ministry of Communication and Informatics Reminds the Importance of Expression on Social Media, Free but Limited]

... "Sebenarnya Nettiquette ini adalah hal yang umum dan biasa, sama halnya dengan aturan-aturan biasa ketika kita memasuki komunitas umum di mana informasi sangat banyak dan terbuka. Kebanyakan nitiket yang sering digunakan mengacu pada standar nitiket yang ditetapkan oleh IETF (The Internet Engineering Tasking Force)," terang Fithrianti.

< <https://www.liputan6.com/news/read/4691479/kemenkominfo-ingatkan-pentingnya-berekspresi-di-media-sosial-bebas-namun-terbatas> https://www.liputan6.com/news/read/4691479/kemenkominfo-ingatkan-pentingnya-berekspresi-di-media-sosial-bebas-namun-terbatas>

 

Про одну з найважливіших битв між демократіями та диктаторами – контроль над Інтернетом [About one of the most important battles between democracies and dictators – control over the Internet]

... Така робота традиційно не входить до компетенції МСЕ. Неурядові групи, такі як Icann та IETF, зазвичай несуть прямішу відповідальність за управління протоколами, регулюючими роботу інтернету.

< <https://nashigroshi.org/2022/09/27/pro-odnu-z-nayvazhlyvishykh-bytv-mizh-demokratiiamy-ta-dyktatoramy-kontrol-nad-internetom/> https://nashigroshi.org/2022/09/27/pro-odnu-z-nayvazhlyvishykh-bytv-mizh-demokratiiamy-ta-dyktatoramy-kontrol-nad-internetom/>

 

**********************

SECURITY & PRIVACY

**********************

us: Cybersecurity at Scale: Piercing the Fog of More

When it comes to scaling cybersecurity programs, the last thing organizations want to do is create more work for themselves. Doing so could not only prevent them from adapting to security requirements but also hurt their existing security efforts. Such is the danger when attempting to navigate through a phenomenon called the "Fog of More."

< <https://www.cisecurity.org/insights/blog/cyber-at-scale-piercing-the-fog-of-more> https://www.cisecurity.org/insights/blog/cyber-at-scale-piercing-the-fog-of-more>

 

Combatting the Problem of Domain Name Abuse: Highlights from a Conversation with Graeme Bunton

DNS abuse is a persistent and growing internet security concern—87 percent of organizations suffered a DNS attack between 2020–21. What’s being done to address this rising tide of online abuse? On this episode, we interviewed Graeme Bunton, Executive Director of the DNS Abuse Institute (DSNAI)—an initiative dedicated to developing collaborative and innovative methods of reducing technical online harm. We discussed how the complexity, volume, and inaccuracy of the methods of redress make internet harm reduction excessively difficult to accomplish and how the Domain Name Abuse Institute’s work is enabling a more effective process for abuse claims.

< <https://www.aei.org/technology-and-innovation/combatting-the-problem-of-domain-name-abuse-highlights-from-a-conversation-with-graeme-bunton/> https://www.aei.org/technology-and-innovation/combatting-the-problem-of-domain-name-abuse-highlights-from-a-conversation-with-graeme-bunton/>

 

European Cybersecurity Month 2022: Ten Years of Raising Cyber Awareness Throughout Europe

The European Union Agency for Cybersecurity (ENISA) launches the activities of the European Cybersecurity Month (ECSM) awareness campaign and announces the winners of three ECSM awards for best video, best infographics, and best teaching material.

< <https://www.enisa.europa.eu/news/european-cybersecurity-month-2022-ten-years-of-raising-cyber-awareness-throughout-europe> https://www.enisa.europa.eu/news/european-cybersecurity-month-2022-ten-years-of-raising-cyber-awareness-throughout-europe>

 

Launch of the 10th anniversary of the European Cybersecurity Month

The 10th edition of the European Cybersecurity Month, this year titled “Think Before U click – I choose to be safe online”, starts today. The European Cybersecurity Month runs throughout October with tips and tricks on practicing cyber hygiene and identifying cyber threats, such as ransomware and phishing.

< <https://digital-strategy.ec.europa.eu/en/news/launch-10th-anniversary-european-cybersecurity-month> https://digital-strategy.ec.europa.eu/en/news/launch-10th-anniversary-european-cybersecurity-month>

 

us: Cybersecurity at Scale: Piercing the Fog of More

When it comes to scaling cybersecurity programs, the last thing organizations want to do is create more work for themselves. Doing so could not only prevent them from adapting to security requirements but also hurt their existing security efforts. Such is the danger when attempting to navigate through a phenomenon called the "Fog of More."

< <https://www.cisecurity.org/insights/blog/cyber-at-scale-piercing-the-fog-of-more> https://www.cisecurity.org/insights/blog/cyber-at-scale-piercing-the-fog-of-more>

 

us: The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”

Today’s blog will jumpstart NIST’s celebration of Cybersecurity Awareness Month 2022! We have a lot in store for October and are looking forward to sharing our work, progress, events, and news with you. This year’s theme is "See Yourself In Cyber" and will cover four key behaviors:

< <https://www.nist.gov/blogs/cybersecurity-insights/final-countdown-cybersecurity-awareness-month-2022-its-easy-stay-safe> https://www.nist.gov/blogs/cybersecurity-insights/final-countdown-cybersecurity-awareness-month-2022-its-easy-stay-safe>

 

us: CISA launches DNS resolution shared service

The Cybersecurity and Infrastructure Security Agency (CISA) is officially rolling out its Protective Domain Name System to all federal civilian agencies to help mitigate emerging internet traffic risks while bolstering government-wide cyber posture amid an evolving threat landscape, according to an announcement the agency published this week.

< <https://fcw.com/security/2022/09/cisa-launches-dns-resolution-shared-service/377769/> https://fcw.com/security/2022/09/cisa-launches-dns-resolution-shared-service/377769/>

 

us: CISA Launches its Protective DNS Resolver with General Availability for Federal Agencies

Every day, our federal government faces malicious cyber activity that could result in impacts to essential services or unauthorized access to sensitive data. At CISA, we work hand-in-hand with federal agencies and the private sector to ensure that the best possible capabilities are in place to reduce the likelihood of damaging incidents. A key aspect to this approach is our provision of shared services that allow CISA to offer agencies best-in-class, affordable, and scalable capabilities that address significant threats while providing CISA with visibility into cybersecurity threats facing the federal civilian executive branch (FCEB).

< <https://www.cisa.gov/blog/2022/09/27/cisa-launches-its-protective-dns-resolver-general-availability-federal-agencies> https://www.cisa.gov/blog/2022/09/27/cisa-launches-its-protective-dns-resolver-general-availability-federal-agencies>

 

**********************

INTERNET OF THINGS

**********************

New European Union cybersecurity proposal takes aim at cybercrime

Lawmakers are seeking to strengthen cybersecurity requirements across the European Union, advancing new legislation to bolster security requirements for all digital hardware and software products. The proposed law, titled the Cyber Resilience Act, would cover everything from computers and mobile phones to smart kitchen appliances and digital children’s toys.

< <https://www.weforum.org/agenda/2022/09/new-european-union-cybersecurity-proposal-takes-aim-at-cybercrimes/> https://www.weforum.org/agenda/2022/09/new-european-union-cybersecurity-proposal-takes-aim-at-cybercrimes/>

 

nl: Thesis: Device type classification of IoT devices on low-end dedicated hardware devices

The rise of the Internet of Things (IoT) has been a hot topic for several years. Many people use IoT devices for the convenience they bring to everyday life. However, many users do not realise what kind of privacy and security impact IoT devices can have on their lives. Researchers have found many privacy and security problems with such devices in the last few years.

< <https://www.sidnlabs.nl/en/news-and-blogs/device-type-classification-of-iot-devices-on-low-end-hardware-devices> https://www.sidnlabs.nl/en/news-and-blogs/device-type-classification-of-iot-devices-on-low-end-hardware-devices>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

SOL developments: Short-term plan or long-term fix to boost investor morale?

... The Solana team also upgraded their QUIC protocol. In the coming future, Anatoly stated that wallets, users, and bots would start increasing prioritization fees for transactions. However, despite these developments, can Solana move on from its downtime ridden past?

< <https://ambcrypto.com/sol-developments-short-term-plan-or-long-term-fix-to-boost-investor-morale/> https://ambcrypto.com/sol-developments-short-term-plan-or-long-term-fix-to-boost-investor-morale/>

 

Caddy 2.6 lançado com suporte a HTTP/3 por padrão [Caddy 2.6 released with HTTP/3 support by default]

E o servidor web Caddy 2.6 foi lançado com suporte a HTTP/3 por padrão. Confira os detalhes dessa importante atualização. ... Além disso, deve-se notar que o HTTP/3 faz uso do transporte QUIC, que requer UDP. Em outras palavras, as conexões HTTP/3 falharão se sua configuração de rede ou firewall habilitar apenas TCP, e os clientes retornarão para HTTP/2.

< <https://www.edivaldobrito.com.br/caddy-2-6-lancado-com-suporte-a-http-3-por-padrao/> https://www.edivaldobrito.com.br/caddy-2-6-lancado-com-suporte-a-http-3-por-padrao/>

 

Internet Infrastructure Review (IIR) vol.56 発行のご挨拶 [Issuance Greetings]

... 1章の「定期観測レポート」は、IIJの固定ブロードバンドとモバイルのトラフィックに関する定期的な分析です。過去から継続的に分析しているものですが、トラフィックの増加、固定ブロードバンドのPPPoEからIPoEへのシフトが続いていることが数字に現れています。ポート別使用量の分析においては、http(TCP/80)→ https(TCP/443)→ QUIC(UDP/443)へのシフトが数字から読み取れます。

< <https://eng-blog.iij.ad.jp/archives/15063> https://eng-blog.iij.ad.jp/archives/15063>

 

**********************

OTHERWISE NOTEWORTHY

**********************

UN elects first female tech agency secretary-general

Doreen Bogdan-Martin has become the first woman to be elected as secretary-general of the International Telecommunication Union (ITU).

< <https://www.bbc.com/news/technology-63074895> https://www.bbc.com/news/technology-63074895>

 

US defeats Russia in a battle to control the future of the global internet

The United States has soundly defeated Russia in an election to control a United Nations body responsible for shaping global internet development, a contest viewed as geopolitically symbolic amid wider US-Russia tensions and an answer to fears of growing censorship online by authoritarian regimes.

< <https://edition.cnn.com/2022/09/29/tech/us-russia-internet-future> https://edition.cnn.com/2022/09/29/tech/us-russia-internet-future>

 

Why Biden and Blinken Are Backing a Candidate for a Little-Known U.N. Internet Agency

A little-known U.N. agency that develops worldwide technical standards for the internet will gain unfamiliar geopolitical attention as scientists, engineers, and government officials descend on Bucharest, Romania, this week.

< <https://www.lawfareblog.com/why-biden-and-blinken-are-backing-candidate-little-known-un-internet-agency> https://www.lawfareblog.com/why-biden-and-blinken-are-backing-candidate-little-known-un-internet-agency>

 

Member States elect Doreen Bogdan-Martin as ITU Secretary-General

In historic elections, Bogdan-Martin received the majority of Member State votes, pledging meaningful connectivity as her goal. She will be the first woman to lead the UN specialized agency in its 157-year history

< <https://www.itu.int/en/mediacentre/Pages/PR-2022-09-29-ITU-SG-elected-Doreen-Bogdan-Martin.aspx> https://www.itu.int/en/mediacentre/Pages/PR-2022-09-29-ITU-SG-elected-Doreen-Bogdan-Martin.aspx>

< <https://www.itu.int/hub/2022/09/itu-secretary-general-elected-pp22/> https://www.itu.int/hub/2022/09/itu-secretary-general-elected-pp22/>

 

Member States elect ITU’s next Deputy Secretary-General

​​​Member States today elected Tomas Lamanauskas of Lithuania as the next Deputy Secretary-General of the ITU, the United Nations specialized agency for information and communication technologies.

< <https://www.itu.int/en/mediacentre/Pages/PR-2022-09-29-ITU-DSG-elected-Tomas-Lamanauskas.aspx> https://www.itu.int/en/mediacentre/Pages/PR-2022-09-29-ITU-DSG-elected-Tomas-Lamanauskas.aspx>

< <https://www.itu.int/hub/2022/09/itu-deputy-secretary-general-elected-pp22/> https://www.itu.int/hub/2022/09/itu-deputy-secretary-general-elected-pp22/>

 

Next ITU leadership team in place: Member States have completed elections for the five leaders at the UN specialized agency entrusted with driving digital transformation

​​​​Member States of the ITU today concluded elections for the organization’s top five management posts, with voting for the bureau directors responsible for the three main areas of ITU’s work.​

< <https://www.itu.int/en/mediacentre/Pages/PR-2022-09-30-ITU-PP22-Bureau-Directors.aspx> https://www.itu.int/en/mediacentre/Pages/PR-2022-09-30-ITU-PP22-Bureau-Directors.aspx>

< <https://www.itu.int/hub/2022/09/itu-bureaux-directors-elected-pp22/> https://www.itu.int/hub/2022/09/itu-bureaux-directors-elected-pp22/>

 

Member States elect ITU Bureau Directors

Member States of the ITU today concluded elections for the organization’s top five management posts, with voting for the Bureau Directors responsible for the three main areas of ITU’s work.

< <https://www.itu.int/hub/2022/09/itu-bureaux-directors-elected-pp22/> https://www.itu.int/hub/2022/09/itu-bureaux-directors-elected-pp22/>

 

Statement by President Joe Biden on the ITU Secretary General Candidacy of Doreen Bogdan-Martin

I strongly support Doreen Bogdan-Martin for the next Secretary-General of the International Telecommunication Union. Ms. Bogdan-Martin possesses the integrity, experience, and vision necessary to transform the digital landscape.

< <https://www.whitehouse.gov/briefing-room/statements-releases/2022/09/20/statement-by-president-joe-biden-on-the-itu-secretary-general-candidacy-of-doreen-bogdan-martin/> https://www.whitehouse.gov/briefing-room/statements-releases/2022/09/20/statement-by-president-joe-biden-on-the-itu-secretary-general-candidacy-of-doreen-bogdan-martin/>

 

Statement of Assistant Secretary Davidson on the Election of Doreen Bogdan-Martin as Secretary General of the ITU

In response to the election of Doreen Bogdan-Martin as Secretary General of the ITU at the 2022 ITU Plenipotentiary Conference in Bucharest, Romania, the following statement can be attributed to Alan Davidson, Assistant Secretary of Commerce for Communications and Information and NTIA Administrator:

< <https://www.ntia.gov/press-release/2022/statement-assistant-secretary-davidson-election-doreen-bogdan-martin-secretary> https://www.ntia.gov/press-release/2022/statement-assistant-secretary-davidson-election-doreen-bogdan-martin-secretary>

 

Towards a brighter digital future for all: My message to the Plenipotentiary Conference by Houlin Zhao, ITU Secretary-General

On Monday, I had the honour of opening the 2022 Plenipotentiary Conference (PP-22) of the ITU in Bucharest.

< <https://www.itu.int/hub/2022/09/plenipotentiary-conference-houlin-zhao-pp-22/> https://www.itu.int/hub/2022/09/plenipotentiary-conference-houlin-zhao-pp-22/>

 

Women ICT leaders connect and unite at PP-22 networking breakfast

The day after the first woman was elected as Secretary-General of the ITU, women at the organization’s Plenipotentiary Conference (PP-22) gathered for a networking breakfast and high-level panel.

< <https://www.itu.int/hub/2022/09/women-ict-leaders-connect-pp22-networking-breakfast/> https://www.itu.int/hub/2022/09/women-ict-leaders-connect-pp22-networking-breakfast/>

 

Toward an ITU Renaissance

For nearly fifty years now, a significant portion of my professional engineering and lawyering life has been threaded through the ITU. It has included all of its multiple sectors, working on the inside for two Secretary-Generals and running its Relations between Members and Regulations Division, writing two books including “The ITU in a Changing World” with the late George Codding, representing the U.S. at several conferences, teaching its public international law as an LLM graduate course, writing dozens of ITU technical standards in leadership roles, and producing many hundreds of published articles.

< <https://circleid.com/posts/20221001-toward-an-itu-renaissance> https://circleid.com/posts/20221001-toward-an-itu-renaissance>

 

The Splinternet is Here: How to Make the Most of it

The Open Internet turned out to be an illusion. Tech giants created a commercial space, not a public commons, more like a shopping mall than a public park. In this “space,” the public discourse is owned by corporations accountable to a different set of interests than democratically elected governments.

< <https://cepa.org/article/the-splinternet-is-here-how-to-make-the-most-of-it/> https://cepa.org/article/the-splinternet-is-here-how-to-make-the-most-of-it/>

 

Critical Technology Standards Metric

The development and use of critical technologies such as artificial intelligence (AI), quantum computing, and cloud computing are increasingly a focus of government policy, R&D budgets, and investment. This reflects the critical role of technology in relation to economic growth, jobs, and national security. Critical technologies are also central to the intensifying strategic competition between the West and China, given the importance of technology for developing and sustaining leading-edge economies and the dual-use potential of many critical technologies with implications for national security.

< <https://www.brookings.edu/interactives/critical-technology-standards-metric/> https://www.brookings.edu/interactives/critical-technology-standards-metric/>

 

Tim Cook: 'No good excuse' for lack of women in tech

Apple chief executive Tim Cook says there are still "not enough women at the table" at the world's tech firms - including his own.

< <https://www.bbc.com/news/technology-63033078> https://www.bbc.com/news/technology-63033078>

 

The Thorny Problem of Keeping the Internet’s Time: An obscure software system synchronizes the network’s clocks. Who will keep it running?

In 1977, David Mills, an eccentric engineer and computer scientist, took a job at COMSAT, a satellite corporation headquartered in Washington, D.C. Mills was an inveterate tinkerer: he’d once built a hearing aid for a girlfriend’s uncle, and had consulted for Ford on how paper-tape computers might be put into cars. Now, at COMSAT, Mills became involved in the ARPANET, the computer network that would become the precursor to the Internet. A handful of researchers were already using the network to connect their distant computers and trade information. But the fidelity of that exchanged data was threatened by a distinct deficiency: the machines did not share a single, reliable synchronized time.

< <https://www.newyorker.com/tech/annals-of-technology/the-thorny-problem-of-keeping-the-internets-time> https://www.newyorker.com/tech/annals-of-technology/the-thorny-problem-of-keeping-the-internets-time>

 

The Splinternet is Here: How to Make the Most of it

The Open Internet turned out to be an illusion. Tech giants created a commercial space, not a public commons, more like a shopping mall than a public park. In this “space,” the public discourse is owned by corporations accountable to a different set of interests than democratically elected governments.

< <https://cepa.org/article/the-splinternet-is-here-how-to-make-the-most-of-it/> https://cepa.org/article/the-splinternet-is-here-how-to-make-the-most-of-it/>

 

us: As LEO Industry Grows, FCC Adopts Rule to Limit Space Debris

The Federal Communications Commission on Thursday unanimously adopted an order that requires operators of low-Earth orbit satellites to dispose of their spacecraft within five years of mission completion.

< <https://broadbandbreakfast.com/2022/09/as-leo-industry-grows-fcc-adopts-rule-to-limit-space-debris/> https://broadbandbreakfast.com/2022/09/as-leo-industry-grows-fcc-adopts-rule-to-limit-space-debris/>

 

Interdomain BGP policies — do not transit

Following on my posts on Interdomain BGP policies looking at where traffic should enter and exit a network, in this post — the last post in this series — I’m going to cover the do not transit options from the perspective of AS65001 in the following network:

< <https://blog.apnic.net/2022/09/30/interdomain-bgp-policies-do-not-transit/> https://blog.apnic.net/2022/09/30/interdomain-bgp-policies-do-not-transit/>

 

Address space fragmentation

One of the discussion topics at the recent ICANN 75 meeting was an old favourite of mine, namely the topic of Internet Fragmentation. Here, I’d like to explore this topic in a little more detail and look behind the knee-jerk response of declaiming fragmentation as bad under any and all circumstances. Perhaps there are more subtleties in this topic than simple judgements of good or bad.

< <https://blog.apnic.net/2022/09/27/address-space-fragmentation/> https://blog.apnic.net/2022/09/27/address-space-fragmentation/>

 

DNS evolution: Innovation or fragmentation?

There is no single name system that is necessarily bound to the Internet. Unlike IP addresses, which are in every IP packet, names are an application construct, and, in theory, applications have considerable latitude in how they handle such names. There could be many name systems that could coexist within the Internet — in theory.

< <https://www.potaroo.net/ispcol/2022-09/evodns.html> https://www.potaroo.net/ispcol/2022-09/evodns.html>

 

IP fragmentation and the DNS — Vulnerable DNS servers

In the first post of this series, we discussed how ‘natural fragmentation’ (UDP DNS fragmentation not triggered by malicious attacks) can appear in the Internet, but it is rare and does not create problems for DNS infrastructure.

< <https://blog.apnic.net/2022/09/29/ip-fragmentation-and-the-dns-vulnerable-dns-servers/> https://blog.apnic.net/2022/09/29/ip-fragmentation-and-the-dns-vulnerable-dns-servers/>

 

IP fragmentation and the DNS — Vulnerable DNS servers

In the first post of this series, we discussed how ‘natural fragmentation’ (UDP DNS fragmentation not triggered by malicious attacks) can appear in the Internet, but it is rare and does not create problems for DNS infrastructure.

< <https://blog.apnic.net/2022/09/29/ip-fragmentation-and-the-dns-vulnerable-dns-servers/> https://blog.apnic.net/2022/09/29/ip-fragmentation-and-the-dns-vulnerable-dns-servers/>

 

Self-Taught AI May Have a Lot in Common With the Human Brain

For a decade now, many of the most impressive artificial intelligence systems have been taught using a huge inventory of labeled data. An image might be labeled “tabby cat” or “tiger cat,” for example, to “train” an artificial neural network to correctly distinguish a tabby from a tiger. The strategy has been both spectacularly successful and woefully deficient.

< <https://www.wired.com/story/self-taught-ai-may-have-a-lot-in-common-with-the-human-brain/> https://www.wired.com/story/self-taught-ai-may-have-a-lot-in-common-with-the-human-brain/>

 

Reverse DNS queries may reveal too much, computer scientists argue

Computer scientists at the University of Twente in the Netherlands have found the interplay between the internet and local networks can be analyzed to reveal private data and facilitate tracking. In a study titled, "Saving Brian’s Privacy: the Perils of Privacy Exposure through Reverse DNS," Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, and Mattijs Jonker look at how DNS interacts with DHCP and find that some of the data exchanged can be exposed by Reverse DNS (rDNS) queries.

< <https://www.theregister.com/2022/09/29/reverse_dns_queries_reveal_too/> https://www.theregister.com/2022/09/29/reverse_dns_queries_reveal_too/>

 

nl: Outbound DANE validation support added to Exchange Online

In spring of this year, Microsoft enabled DANE validationfor outbound mail traffic. Exchange Online users don't need to change any settings or actively enable the feature. The security check is performed automatically whenever mail is delivered to external mail servers (MX gateways).

< <https://www.sidn.nl/en/news-and-blogs/outbound-dane-validation-support-added-to-exchange-online> https://www.sidn.nl/en/news-and-blogs/outbound-dane-validation-support-added-to-exchange-online>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home