[Newsclips] IETF SYN-ACK Newspack 2023-02-06

David Goldstein <david@goldsteinreport.com> Mon, 06 February 2023 06:16 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE621C14CF01 for <newsclips@ietfa.amsl.com>; Sun, 5 Feb 2023 22:16:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.886
X-Spam-Level:
X-Spam-Status: No, score=-1.886 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 83_ie-bAgm_i for <newsclips@ietfa.amsl.com>; Sun, 5 Feb 2023 22:16:50 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D54C5C14CEF9 for <newsclips@ietf.org>; Sun, 5 Feb 2023 22:16:49 -0800 (PST)
Received: from David2019Desktop (unknown [144.136.29.115]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id D21E6E9A8C0 for <newsclips@ietf.org>; Mon, 6 Feb 2023 07:16:45 +0100 (+01)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 144.136.29.115) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 06 Feb 2023 17:16:43 +1100
Message-ID: <007e01d939f2$97fcb450$c7f61cf0$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_007F_01D93A4E.CB6FEB70"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adk58pGBfCZRug0pQn2DAe9rKiuI+A==
Content-Language: en-au
X-PPP-Message-ID: <20230206061647.3984331.15939@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/k9Rc3nBrMBlH6tUrc-W3-7yXRg8>
Subject: [Newsclips] IETF SYN-ACK Newspack 2023-02-06
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Feb 2023 06:16:54 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Global Standards Collaboration: Is It Possible?

On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world’s ICT standards bodies to collaborate on “high interest subjects.” Given that all these organisations, to a significant extent, compete against each other, the venue has always been a challenge to avoid acting as a cartel. ... Last but not least, the role of government standards-making bodies has undergone a similar whiplash—especially relating to cyber security. In 1990, the U.S. National Security Agency had, over some years, worked with the industry to produce the Secure Data Network System (SDNS) standards that were manifested through NIST, CCITT, ISO, MITRE, and IETF.

< <https://circleid.com/posts/20230203-global-standards-collaboration-is-it-possible> https://circleid.com/posts/20230203-global-standards-collaboration-is-it-possible>

 

Interesting IPv6/NDP observation

First, a quick shout out to Devendra Singh (Network Operation Centre Manager of AS132559) and the folk at ExtremeIX who have both collaborated with me in having this non-profit and non-commercial network setup and connectivity for the purpose of research, observations, and improvements. ... However, the underlying question remains — why does this behavioural difference exist? While we have not observed inter-vendor issues, we cannot entirely rule out the possibility of inter-vendor issues in certain environments or use cases. I believe that this should be documented in the IPv6 Working Group(s) at IETF and the relevant RFCs, which would give solid instructions to vendors about what to do regarding the documented behaviour and prevent possible inter-vendor incompatibility in the future.

< <https://blog.apnic.net/2023/01/30/interesting-ipv6-ndp-observation/> https://blog.apnic.net/2023/01/30/interesting-ipv6-ndp-observation/>

 

Why confidential computing will be critical to (not so distant) future data security efforts

... The consortium has established relationships with NIST, the IETF, and other groups responsible for standards definition to promote joint discussion and collaboration on future standards relevant to confidential computing, said Searle.

< <https://venturebeat.com/security/why-confidential-computing-will-be-critical-to-not-so-distant-future-data-security-efforts/> https://venturebeat.com/security/why-confidential-computing-will-be-critical-to-not-so-distant-future-data-security-efforts/>

 

Abkürzung mit Tücken: Wie die EU Google-DNS-Resolvern das Wasser abgraben will [Abbreviation with pitfalls: How the EU wants to cut off the water from Google DNS resolvers\

... Daraufhin hat unter anderem die IETF Methoden zur Verschlüsselung entwickelt, beispielsweise DNS-over-HTTPS (DoH). Browser wie Firefox und Chrome nutzen DoH, um ihre Anfragen geschützt an unzensierte Resolver von Google, Cloudflare oder anderen Anbietern zu schicken.

< <https://www.heise.de/news/Wie-und-warum-die-EU-den-Google-DNS-Resolvern-das-Wasser-abgraben-will-7467005.html> https://www.heise.de/news/Wie-und-warum-die-EU-den-Google-DNS-Resolvern-das-Wasser-abgraben-will-7467005.html>

 

全球互联网能像《流浪地球2》那样关闭或重启吗?专家为你解答所有疑惑 [Can the global internet shut down or restart like The Wandering Earth 2? Experts answer all your questions]

... 根据ICANN多利益主体参与模式,互联网治理遵循自下而上、共识驱动的多利益相关方框架。中国互联网专家、学者一直在积极参与ICANN、IETF(国际互联网工程任务组)、APNIC(亚太互联网络信息中心)等互联网国际组织,成为推动互联网发展过程中,贡献中国智慧的一支重要力量,践行“同一个世界,同一个互联网”的愿景。

< <https://tech.qianlong.com/2023/0131/7964857.shtml> https://tech.qianlong.com/2023/0131/7964857.shtml>

 

江西省:2023年开工建设神华九江电厂二期 [Jiangxi Province: The second phase of Shenhua Jiujiang Power Plant will start construction in 2023]

... 3.IPv6:“互联网协议第6版”的缩写,是互联网工程任务组(IETF)设计的用于替代IPv4的下一代IP协议。 [... 3.IPv6: Short for "Internet Protocol Version 6", it is a next-generation IP protocol designed by the IETF to replace IPv4.]

< <https://news.bjx.com.cn/html/20230202/1286147.shtml> https://news.bjx.com.cn/html/20230202/1286147.shtml>

 

《流浪地球2》的现实倒影(二):从IPv6到根服务器-面包板社区 [Realistic reflections of The Wandering Earth 2 (II): From IPv6 to the root-breadboard community]

... 2016年,互联网数字分配机构(IANA)就向国际互联网工程任务组(IETF)提出建议,新制定的国际互联网标准只支持IPv6,不再兼容IPv4。

< <https://www.eet-china.com/mp/a193335.html> https://www.eet-china.com/mp/a193335.html>

 

2023 ICT行业趋势年会在北京举办 邬贺铨院士提出十大期待 [2023 ICT Industry Trends Annual Conference Held in Beijing Academician Wu Hequan put forward ten expectations]

... “十四五”时期是加快数字化发展、建设网络强国和数字中国的重要战略机遇期,我国 IPv6 发展处于攻坚克难、跨越拐点的关键阶段。邬贺铨指出,我国与发达国家相比,IPv6 起步还不算晚,而且我国因原来使用私有地址,故相较地址数更为看重 IPv6 的可编程空间。因此,我国率先在 IETF 标准化组织倡议并积极开发“IPv6+”新功能,目前在 IETF 关于“IPv6+”新功能的文稿中,由我国提交的占 60%。由此可见,我国在“IPv6+”系统与产品开发创新的努力,为全球“IPv6+”标准发展作出了积极贡献。

< <http://network.cnw.com.cn/network/20230205/1382.html> http://network.cnw.com.cn/network/20230205/1382.html>

 

**********************

SECURITY & PRIVACY

**********************

Space and Cyber Global Governance: A View from the Global South: A CIGI Essay Series: Cybersecurity and Outer Space

This essay is part of Cybersecurity and Outer Space, an essay series that explores space governance through three themes: space security and risk, international governance challenges, and global perspectives and the pursuit of inclusivity. As outer space and cyberspace technologies become increasingly prominent in global welfare, developing countries are keen to become more active players in the governance processes that set the rules for their use. However, their perspectives on the development of such rules, which have been shaped by past political experiences including colonialism, mean that global agreement will not be easy.

< <https://www.cigionline.org/articles/space-and-cyber-global-governance-a-view-from-the-global-south/> https://www.cigionline.org/articles/space-and-cyber-global-governance-a-view-from-the-global-south/>

 

How Can Disrupting DNS Communications Thwart a Malware Attack?

Question: How does a threat actor utilize DNS communications in malware attacks? Dave Mitchell, CTO, Hyas: The idea that you can protect yourself from all malware is unrealistic, especially considering malware is an umbrella term that does not refer to any specific exploit, vector, goal, or methodology. Because the range of cyber threats is so wide and varied, there is no magic bullet that will repel every attack. So it's really only a matter of time before your network environment is compromised, forcing you to make some very hard decisions.

< <https://www.darkreading.com/edge-ask-the-experts/how-can-disrupting-dns-communications-thwart-a-malware-attack-> https://www.darkreading.com/edge-ask-the-experts/how-can-disrupting-dns-communications-thwart-a-malware-attack->

 

Preventing and Detecting BGP Route Leaks With the Help of RFC 9234

Existing approaches to prevent route leaks rely on operators marking routes with no check that the configuration corresponds to that of the eBGP neighbor, or enforcement of the two eBGP speakers agreeing on their peering relationship.

< <https://www.manrs.org/2023/01/preventing-and-detecting-bgp-route-leaks-with-the-help-of-rfc-9234/> https://www.manrs.org/2023/01/preventing-and-detecting-bgp-route-leaks-with-the-help-of-rfc-9234/>

 

Quad Senior Cyber Group Joint Cybersecurity Statement

We, the Principals of Australia, India, Japan and the United States of the Quad Senior Cyber Group (the Group) met in New Delhi, India on January 30-31, 2023. We reaffirm the Group’s commitment to advancing a free and open Indo-Pacific that is inclusive and resilient. Our meeting advanced the Group’s positive and ambitious agenda. Quad partners are working together to better secure cyberspace and foster an international digital economy that works for everyone, including regional partners in the Indo-Pacific.

< <https://www.whitehouse.gov/briefing-room/statements-releases/2023/02/02/quad-senior-cyber-group-joint-cybersecurity-statement/> https://www.whitehouse.gov/briefing-room/statements-releases/2023/02/02/quad-senior-cyber-group-joint-cybersecurity-statement/>

 

eu: Supporting Policy Developments to Achieve a High Common Level of Cybersecurity

The European Union Agency for Cybersecurity (ENISA) organised its first ever cybersecurity policy conference together with the European Commission to discuss the evolution of the EU cybersecurity policy framework.

< <https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity> https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity>

 

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention.

< <https://securityintelligence.com/news/white-house-on-quantum-encryption-iot-labels/> https://securityintelligence.com/news/white-house-on-quantum-encryption-iot-labels/>

 

Space and Cyber Global Governance: A View from the Global South: A CIGI Essay Series: Cybersecurity and Outer Space

This essay is part of Cybersecurity and Outer Space, an essay series that explores space governance through three themes: space security and risk, international governance challenges, and global perspectives and the pursuit of inclusivity. As outer space and cyberspace technologies become increasingly prominent in global welfare, developing countries are keen to become more active players in the governance processes that set the rules for their use. However, their perspectives on the development of such rules, which have been shaped by past political experiences including colonialism, mean that global agreement will not be easy.

< <https://www.cigionline.org/articles/space-and-cyber-global-governance-a-view-from-the-global-south/> https://www.cigionline.org/articles/space-and-cyber-global-governance-a-view-from-the-global-south/>

 

How Can Disrupting DNS Communications Thwart a Malware Attack?

Question: How does a threat actor utilize DNS communications in malware attacks? Dave Mitchell, CTO, Hyas: The idea that you can protect yourself from all malware is unrealistic, especially considering malware is an umbrella term that does not refer to any specific exploit, vector, goal, or methodology. Because the range of cyber threats is so wide and varied, there is no magic bullet that will repel every attack. So it's really only a matter of time before your network environment is compromised, forcing you to make some very hard decisions.

< <https://www.darkreading.com/edge-ask-the-experts/how-can-disrupting-dns-communications-thwart-a-malware-attack-> https://www.darkreading.com/edge-ask-the-experts/how-can-disrupting-dns-communications-thwart-a-malware-attack->

 

AI, hybrid architecture and the next generation of security technology

The past couple of years may have seen businesses juggle priorities as they weathered a highly changeable market, but security has remained one area of high importance. Companies still need to secure their assets — regardless of the macro trends — but how they are doing this is evolving. Increasingly, businesses are delving further into intelligent technology to accomplish their security goals, drawing on artificial intelligence (AI), deep learning software, real-time analytics, hybrid cloud architecture and new infrastructure to support their security operations.

< <https://www.technologydecisions.com.au/content/cloud-and-virtualisation/article/ai-hybrid-architecture-and-the-next-generation-of-security-technology-1381683983> https://www.technologydecisions.com.au/content/cloud-and-virtualisation/article/ai-hybrid-architecture-and-the-next-generation-of-security-technology-1381683983>

 

EU Council moves to adjust product lifecycle, reporting in new cybersecurity law

EU countries are considering adjusting the definition of product lifecycle to the specificity of the product and moving the reporting of vulnerabilities at the national level in a new compromise on the Cyber Resilience Act.

< <https://www.euractiv.com/section/cybersecurity/news/eu-council-moves-to-adjust-product-lifecycle-reporting-in-new-cybersecurity-law/> https://www.euractiv.com/section/cybersecurity/news/eu-council-moves-to-adjust-product-lifecycle-reporting-in-new-cybersecurity-law/>

 

The overwhelming threat of DNS attacks on the finance industry

The financial service industry has always been an attractive target for cybercriminals because of the volume of sensitive customer and financial data such organisations manage. The rapid digitisation of the industry and increased reliance on cloud services have expanded the digital threat landscape. Moreover, the continuous transition to distributed and remote workforces has made financial networks and IT ecosystems more complex to manage.

< <https://www.globalbankingandfinance.com/the-overwhelming-threat-of-dns-attacks-on-the-finance-industry/> https://www.globalbankingandfinance.com/the-overwhelming-threat-of-dns-attacks-on-the-finance-industry/>

 

sg: Security Bulletin 1 Feb 2023 

... A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.

< <https://www.csa.gov.sg/singcert/Alerts/sb-2023-005> https://www.csa.gov.sg/singcert/Alerts/sb-2023-005>

 

**********************

INTERNET OF THINGS

**********************

IEEE Webinar: Evolution and Impact of the Wi-Fi Technology and Applications in the Emerging Smart World and IoT: A Historical Perspective: 22 Feb

The importance of Wi-Fi as the most popular carrier of wireless IP traffic in the emerging era of IoT and 5G continues its legacy, and Wi-Fi standards are continually evolving to help implement next generation applications in the cyberspace for positioning, human computer interfacing, motion, and gesture detection, as well as authentication and security. Wi-Fi is a go-to connectivity technology that is stable, proven, easy to deploy, and desirable by a host of diversified vertical markets, including Medical, Public Safety, Offender Tracking, Industrial, PDA, Security (monitoring), and others.

< <https://event.on24.com/wcc/r/4094397/C59D7263C1361089DAB3FD501759159F> https://event.on24.com/wcc/r/4094397/C59D7263C1361089DAB3FD501759159F>

 

Chinese Internet of Things allow surveillance of cities, becomes threat to the world: Report

Chinese Internet of Things (IoT) modules in critical national infrastructure and key industries could enable espionage, allowing "detailed surveillance in smart cities"and bad actors to sabotage the systems thus making it a major threat to the world, according to Portal Plus.

< <https://www.gadgetsnow.com/tech-news/chinese-internet-of-things-allow-surveillance-of-cities-becomes-threat-to-the-world-report/articleshow/97596344.cms> https://www.gadgetsnow.com/tech-news/chinese-internet-of-things-allow-surveillance-of-cities-becomes-threat-to-the-world-report/articleshow/97596344.cms>

 

A guide to Matter, the new universal smart home standard

We’ve all been there: You’re eager to add or upgrade a device in your smart home, but the options available aren’t compatible with your other devices. Maybe you’re an Apple partisan, and you’ve signed on for HomeKit. Maybe you like Amazon’s Alexa or Google’s offerings. Or maybe you have a mishmash of devices and a folder of controller apps on your phone.

< <https://edition.cnn.com/cnn-underscored/electronics/matter-new-smart-home-standard> https://edition.cnn.com/cnn-underscored/electronics/matter-new-smart-home-standard>

 

EchoStar moves closer to global 5G satellite network

Satellite operator EchoStar announced it will start building a global network of 28 low-Earth orbit (LEO) satellites with vendor Astro Digital that will transmit signals in the company's S-band spectrum holdings. The network will initially support the LoRa protocol for Internet of Things (IoT) applications, but EchoStar said the move is part of a long-term goal to build "a global non-terrestrial 5G network."

< <https://www.lightreading.com/satellite/echostar-moves-closer-to-global-5g-satellite-network/d/d-id/783053> https://www.lightreading.com/satellite/echostar-moves-closer-to-global-5g-satellite-network/d/d-id/783053>

 

The art of masterplanning sustainable, smart cities

The inclusion of smart technology is no longer seen as an add-on to the master planning process and is now a fundamental cornerstone of any strategically planned development, either on individual developments or full city planning. Smart technology is vital to overcome the challenges that all urban planners alike face; namely traffic congestion, waste removal, the provision of energy and the environmental living conditions.

< <https://www.constructionweekonline.com/business/the-art-of-masterplanning-sustainable-smart-cities> https://www.constructionweekonline.com/business/the-art-of-masterplanning-sustainable-smart-cities>

 

**********************

OTHERWISE NOTEWORTHY

**********************

IEEE Medal of Honor Goes to Vint Cerf: He codesigned the Internet protocol and transmission control protocol

IEEE Life Fellow Vinton “Vint” Cerf, widely known as the “Father of the Internet,” is the recipient of the 2023 IEEE Medal of Honor. He is being recognized “for co-creating the Internet architecture and providing sustained leadership in its phenomenal growth in becoming society’s critical infrastructure.” ... Cerf served as its president from 1992 to 1995 and was chairman of the board of the ICANN from 2000 to 2007. ICANN works to ensure a stable, secure, and interoperable Internet by managing the assignment of unique IP addresses and domain names. It also maintains tables of registered parameters needed for the protocol standards developed by the IETF.

< <https://spectrum.ieee.org/2023-ieee-medal-of-honor> https://spectrum.ieee.org/2023-ieee-medal-of-honor>

 

W3C re-launched as a public-interest non-profit organization

The World Wide Web Consortium began the year 2023 by forming a new public-interest non-profit organization. The new entity preserves our member-driven approach, existing worldwide outreach and cooperation while allowing for additional partners around the world beyond Europe and Asia. The new organization also preserves the core process and mission of the Consortium to shepherd the web, by developing open web standards as a single global organization with contributions from W3C Members, staff, and the international community.

< <https://www.w3.org/2023/01/pressrelease-w3c-le-launched.html.en> https://www.w3.org/2023/01/pressrelease-w3c-le-launched.html.en>

 

Draft FY24–28 Operating & Financial Plan and Draft FY24 Operating Plan & Budget

What We Need Your Input On: The purpose of this Public Comment is to seek community feedback on the Draft ICANN FY24–28 Operating and Financial Plan and Draft ICANN FY24 Operating Plan and Budget.

< <https://www.icann.org/en/public-comment/proceeding/draft-fy2428-operating-financial-plan-and-draft-fy24-operating-plan-budget-14-12-2022> https://www.icann.org/en/public-comment/proceeding/draft-fy2428-operating-financial-plan-and-draft-fy24-operating-plan-budget-14-12-2022>

 

Update on ICANN Org’s Recent Milestones by Sally Costerton

As we approach the first ICANN Public Meeting of 2023, the ICANN76 Community Forum, I wanted to share an update on the ICANN organization's (org) activities since our last meeting. It's important to recognize the progress we've made so far as we consider the next steps.

< <https://www.icann.org/en/blogs/details/update-on-icann-orgs-recent-milestones-01-02-2023-en> https://www.icann.org/en/blogs/details/update-on-icann-orgs-recent-milestones-01-02-2023-en>

 

Extracting the Essential Simplicity of the Internet

Everyone knows that the Internet provides the ubiquitous connectivity on which we now rely, and many know that the underlying design was invented in the 1970s to allow computers to exchange data. However, far fewer understand the remarkable foresight that guided its design, which has remained essentially unchanged since its adoption in 1983 (see the sidebar "Brief Internet Timeline") while gracefully accommodating radical changes in applications, technologies, size, scope, and capacity. The Internet's design is underappreciated because its beauty is buried beneath an avalanche of implementation details. Most undergraduate networking courses teach students how the current Internet works, which requires they master an alphabet soup of protocols such as IP, TCP, BGP, OSPF, DVRP, DNS, STP, and ARP. These protocols are complex and riddled with details that are more historical than principled. As a result, much of the computer science community thinks that the Internet is merely a collection of complicated protocols, not a conceptually simple and brilliantly daring design.

< <https://cacm.acm.org/magazines/2023/2/268956-extracting-the-essential-simplicity-of-the-internet/fulltext> https://cacm.acm.org/magazines/2023/2/268956-extracting-the-essential-simplicity-of-the-internet/fulltext>

 

EU, US step up AI cooperation amid policy crunchtime

Washington and Brussels are stepping up their formal cooperation on Artificial Intelligence (AI) research at a crucial time for EU regulatory efforts on the emerging technology.

< <https://www.euractiv.com/section/artificial-intelligence/news/eu-us-step-up-ai-cooperation-amid-policy-crunchtime/> https://www.euractiv.com/section/artificial-intelligence/news/eu-us-step-up-ai-cooperation-amid-policy-crunchtime/>

 

IPv6 Policy Is a Community Self-Governance Success Story

IPv6 policy has gone through many refinements since it was first adopted by the RIRs 20 years ago. Is it time for a more significant change? Join the RIPE Address Policy Working Group in conversation on the next phase of IPv6 policy.

< <https://labs.ripe.net/author/leo_vegoda/ipv6-policy-is-a-community-self-governance-success-story/> https://labs.ripe.net/author/leo_vegoda/ipv6-policy-is-a-community-self-governance-success-story/>

 

NSA releases IPv6 transition guidance

Back in 2020, the US Federal Government announced that all government agencies and departments were required to transition to IPv6. The US Department of Defense (DoD) networks had already been transitioning from IPv4 to IPv6-only for several years (in fact, a Government Accountability Office report dates the DoD’s first attempt at IPv6 as 2003).

< <https://blog.apnic.net/2023/02/03/nsa-releases-ipv6-transition-guidance/> https://blog.apnic.net/2023/02/03/nsa-releases-ipv6-transition-guidance/>

 

Accessing IPv6-only resources via legacy IP: NAT46 on a FortiGate

In general, Network Address Translation (NAT) solves some problems but should be avoided wherever possible. It has nothing to do with security and is only a short-term solution on the way to IPv6. (Yes, I know, the last 20 years have proven that NAT is used everywhere every time 😉). This applies to all kinds of NATs for IPv4 (SNAT, DNAT, PAT) as well as for NPTv6 and NAT66.

< <https://blog.apnic.net/2023/02/01/accessing-ipv6-only-resources-via-legacy-ip-nat46-on-a-fortigate/> https://blog.apnic.net/2023/02/01/accessing-ipv6-only-resources-via-legacy-ip-nat46-on-a-fortigate/>

 

DARPA's quantum computing is powered by ... FOMO

Fujitsu may not be worried about encryption busting quantum computers showing up anytime soon, but that doesn’t mean the US government is willing to risk missing out.

< <https://www.theregister.com/2023/02/02/darpa_quantum_microsoft/> https://www.theregister.com/2023/02/02/darpa_quantum_microsoft/>

 

Post-Quantum Cryptography

Exchanges of digital information have long been protected by public-key cryptography, which lets senders encrypt their data with confidence that only the intended recipient could decrypt and read it. The recipient can freely share their public key for encryption because deducing the private key for decryption would require an impractically large calculation, such as factoring the product of two very large primes.

< <https://cacm.acm.org/magazines/2023/2/268944-post-quantum-cryptography/fulltext> https://cacm.acm.org/magazines/2023/2/268944-post-quantum-cryptography/fulltext>

 

2023 Technology Predictions

Technology impacts us in every way, touching our lives, businesses and communities. Over the last few years, we’ve experienced a major transformation in how we work and collaborate, which has introduced many benefits and challenges. But with adversity comes opportunity and innovation.

< <https://www.cablelabs.com/blog/2023-technology-predictions> https://www.cablelabs.com/blog/2023-technology-predictions>

 

The future of broadband service delivery

Broadband internet access is not a luxury, but a necessity for economic and human development and it acts as a powerful tool for the delivery of essential services such as education and healthcare. The COVID-19 pandemic and the increase in smart working has diversified the role of the customer, acting as both the business (smart worker) and residential user on the same broadband access via the same Customer Premises Equipment (CPE).

< <https://www.broadband-forum.org/2023-02-03-open-broadband-news> https://www.broadband-forum.org/2023-02-03-open-broadband-news>

 

Charged Up and Gaining Ground: Global PlugFest Moves Open RAN Ecosystem Closer to Commercial Deployment

Service providers constantly reconsider their network architectures in search of economies of scale and new business model opportunities, keeping a close eye on open network architectures. Taking advantage of the continuous decoupling of hardware and software, the mobile industry has been working on a software-defined open radio access network (RAN) initiative called Open RAN.

< <https://www.cablelabs.com/blog/10g-platform-milestones-in-2022> https://www.cablelabs.com/blog/10g-platform-milestones-in-2022>

 

The future of broadband service delivery

Telecoms.com periodically invites expert third parties to share their views on the industry’s most pressing issues. In this piece Craig Thomas, VP of Strategic Marketing and Business Development at Broadband Forum, looks at how fixed internet access is evolving.

< <https://telecoms.com/opinion/the-future-of-broadband-service-delivery/> https://telecoms.com/opinion/the-future-of-broadband-service-delivery/>

 

Accelerating Open RAN With the 5G Challenge, Hosted by CableLabs and Kyrio

CableLabs has been selected to serve as the host lab for the 5G Challenge for the second year. The 5G Challenge aims to accelerate the adoption of 5G open interfaces, interoperable subsystems and multivendor solutions. By fostering a large, vibrant and growing vendor community, the goal of driving 5G interoperability toward true plug-and-play operation can be achieved.

< <https://www.cablelabs.com/blog/accelerating-open-ran-with-5g-challenge> https://www.cablelabs.com/blog/accelerating-open-ran-with-5g-challenge>

 

Top 6 ways 6G will change things

The sixth generation mobile standard promises all of the capacities of 5G and more. It’s less a revolution and more a gradual move forward into faster speeds and greater connectivity. Naturally, organizations are scrambling to find new ways to use it so that they can get in on the ground floor of that elusive “faster, cheaper, better” paradox.

< <https://www.techrepublic.com/article/top-ways-6g-will-change-things/> https://www.techrepublic.com/article/top-ways-6g-will-change-things/>

 

Finland, South Korea boost cooperation to develop 6G architecture

The University of Oulu in Finland and the Electronics and Telecommunications Research Institute (ETRI) in South Korea announced a new, collaborative research project to develop an advanced system architecture for as-yet-unstandardized “6G” systems.

< <https://www.rcrwireless.com/20230131/6g/finland-south-korea-boost-cooperation-develop-6g-architecture> https://www.rcrwireless.com/20230131/6g/finland-south-korea-boost-cooperation-develop-6g-architecture>

 

IEEE RWW Keynotes: Future of RF Looks Rocky and That’s a Good Thing

At IEEE Radio and Wireless Week (RWW), keynote speakers highlighted the trends in RF and wireless technology, and how design engineers must adapt to meet the new challenges head on.

< <https://www.allaboutcircuits.com/news/ieee-rww-keynotes-future-of-rf-looks-rocky-and-thats-a-good-thing/> https://www.allaboutcircuits.com/news/ieee-rww-keynotes-future-of-rf-looks-rocky-and-thats-a-good-thing/>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home