[Newsclips] IETF SYN-ACK Newspack 2022-05-30

David Goldstein <david@goldsteinreport.com> Mon, 30 May 2022 05:59 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3904C14F738 for <newsclips@ietfa.amsl.com>; Sun, 29 May 2022 22:59:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.637
X-Spam-Level:
X-Spam-Status: No, score=-1.637 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iXiLMi0YCNl2 for <newsclips@ietfa.amsl.com>; Sun, 29 May 2022 22:59:33 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C1AEC14F73B for <newsclips@ietf.org>; Sun, 29 May 2022 22:59:32 -0700 (PDT)
Received: from David2019Desktop (unknown [101.190.2.60]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 29AC3298124 for <newsclips@ietf.org>; Mon, 30 May 2022 01:59:27 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 101.190.2.60) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 30 May 2022 15:59:29 +1000
Message-ID: <00f801d873ea$6e891a10$4b9b4e30$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F9_01D8743E.40374CF0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adhz6mmyXkU1dOB4QkqO+iji6VwhjQ==
Content-Language: en-au
X-PPP-Message-ID: <20220530055929.338921.65725@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/tntNaR-yQZfJLqwYFMD0Pv3Klb0>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-05-30
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 May 2022 05:59:37 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Orange Tunisia announces IPv6 transition for end of 2022

IPv6 is the latest internet layer protocol introduced by the Internet Engineering Task Force (IETF). Like many operators, Orange is preparing for its transition to that new protocol amid accelerated digital transformation in Africa.

< <https://www.ecofinagency.com/telecom/2705-43628-orange-tunisia-announces-ipv6-transition-for-end-of-2022> https://www.ecofinagency.com/telecom/2705-43628-orange-tunisia-announces-ipv6-transition-for-end-of-2022>

 

TCPLS: Modern Transport Services with TCP and TLS

TCPLS is an intertwined TLS1.3/TCP design that we developed with colleagues from UCLouvain and ULiege. If you have never heard about TCPLS, the first thing that might come to your mind is “What does the acronym mean?” Much like QUIC, TCPLS is not an acronym. It simply conveys the idea that bringing TCP and TLS closer brings benefits to network applications. Some of the features of TCPLS can be found in QUIC, yet the two protocols have significant differences. ... QUIC was designed at Google and has evolved with the involvement of many actors through the IETF standardization process. QUIC is great. Everything is implemented in userspace, which means that QUIC’s lifecycle can follow the application’s lifecycle that embeds it.

< <https://blog.apnic.net/2022/05/24/tcpls-modern-transport-services-with-tcp-and-tls/> https://blog.apnic.net/2022/05/24/tcpls-modern-transport-services-with-tcp-and-tls/>

 

Heroku Breach Update, Opsera Delivers Devops Secrets Management

... Heroku opened the post by focusing on the scope of an OAuth token’s access to user data. Heroku said that while they don’t need the entire repo scope from GitHub, that is what they have been requesting. Apparently, this has something to do with the breach, because they further stated that they intend to implement IETF RFC8705 to restrict access in conjunction with GitHub.

< <https://salesforcedevops.net/index.php/2022/05/23/heroku-breach-update-opsera-delivers-devops-secrets-management/> https://salesforcedevops.net/index.php/2022/05/23/heroku-breach-update-opsera-delivers-devops-secrets-management/>

 

What is DHCP? Dynamic Host Configuration Protocol Guide

... DHCP stands for Dynamic Host Configuration Protocol. A network management protocol allows computers to automatically obtain IP addresses (Internet Protocol) and other basic configuration information when they connect to a network. DHCP enables devices on IP networks to be connected remotely and easily, without any manual intervention or changes required by the administrator. IETF (Internet Engineering Task Force) standardised DHCP in 1993.

< <https://thecyphere.com/blog/what-is-dhcp/> https://thecyphere.com/blog/what-is-dhcp/>

< <https://securityboulevard.com/2022/05/what-is-dhcp-dynamic-host-configuration-protocol-guide/> https://securityboulevard.com/2022/05/what-is-dhcp-dynamic-host-configuration-protocol-guide/>

 

JSONとは?概要からJSONファイルフォーマットまで解説! [What is JSON? Explanation from overview to JSON file format!]

... JSONとはJavaScript Object Notationの略で、テキスト形式を用いたデータ記述言語の1つです。JavaScriptで定義されているオブジェクト表記法となります。JSONの仕様は、RFCおよびIETFの標準規格で規定されています。同様にECMAでも仕様化されています。

< <https://and-engineer.com/articles/YfOfnBAAACEASwoR> https://and-engineer.com/articles/YfOfnBAAACEASwoR>

 

互联网治理与中文域名系列讲座(北师专场) 成功举办 [Internet Governance and Chinese Domain Name Lecture Series (Beishi Special Session) was successfully held]

... 中国信息通信研究院政策与经济研究所副总工程师郭丰以“互联网资源与互联网治理”为主题,介绍了互联网的架构和理念、域名体系以及ICANN、ISOC、IETF、RIR、IGF等涉及互联网治理的相关国际机构概况。

< <https://www.isc.org.cn/article/12590372921012224.html> https://www.isc.org.cn/article/12590372921012224.html>

 

专访新华三何宁:从“云网融合”到“算网融合”,助力数字经济迈入新阶段 [Interview with Xinhuasan He Ning: From "cloud-network integration" to "computing network integration", helping the digital economy enter a new stage]

... 更为重要的是,数字经济的蓬勃发展,背后依靠的是科技创新。近年来运营商高度重视科技创新,新华三在诸多领域与运营商都有深厚的合作。何宁表示,这几年新华三与运营商在IETF、BBF、CCSA等国内国际标准组织,携手合作,快速推动算网相关的标准的成熟度,共同实现了运营商网络先进性提升。

< <https://finance.sina.com.cn/tech/2022-05-25/doc-imizmscu3343010.shtml> https://finance.sina.com.cn/tech/2022-05-25/doc-imizmscu3343010.shtml>

 

IPv6网络的作用是什么呢 一起来看一下吧 [What is the role of IPv6 networks Let's take a look]

... IPv6是Internet Protocol Version 6的缩写,其中Internet Protocol译为“互联网协议”。IPv6是IETF(互联网工程任务组,Internet Engineering Task Force)设计的用于替代现行版本IP协议(IPv4)的下一代IP协议。目前IP协议的版本号是4(简称为IPv4),它的下一个版本就是IPv6。

< <http://zixun.shbear.com/zixun/2022/0523/29288.html> http://zixun.shbear.com/zixun/2022/0523/29288.html>

 

**********************

SECURITY & PRIVACY

**********************

New code of practice puts cyber security at heart of built environment

The Institution of Engineering & Technology (IET) has called for a systematic approach to cyber security across the lifespan of built assets in an updated code of practice.

< <https://www.pinsentmasons.com/out-law/news/new-code-practice-cyber-security-built-environment> https://www.pinsentmasons.com/out-law/news/new-code-practice-cyber-security-built-environment>

 

The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year Evolution

In today’s connected digital world, cryptographic algorithms are implemented in every device and applied to every link to protect information in transmission and in storage. Over the past 50 years, the use of cryptographic tools has expanded dramatically, from limited environments like ATM encryption to every digital application used today. Throughout this long journey, NIST has played a unique leading role in developing critical cryptographic standards.

< <https://www.nist.gov/blogs/cybersecurity-insights/cornerstone-cybersecurity-cryptographic-standards-and-50-year-evolution> https://www.nist.gov/blogs/cybersecurity-insights/cornerstone-cybersecurity-cryptographic-standards-and-50-year-evolution>

 

CISA, DHS S&T, DoD Introduce Results of an Assessment into the 5G Security Evaluation Process 

Federal agencies, along with many other organizations across the public and private sectors, are expected to adopt 5G technology that will provide new features, capabilities and services to transform their mission and business operations.

< <https://www.cisa.gov/blog/2022/05/26/cisa-dhs-st-dod-introduce-results-assessment-5g-security-evaluation-process> https://www.cisa.gov/blog/2022/05/26/cisa-dhs-st-dod-introduce-results-assessment-5g-security-evaluation-process>

 

DNSAI Releases First-Ever Annual Report

The DNS Abuse Institute has published its 2021 Annual Report. As detailed in the Report, 2021 marked an impressive milestone year—noteworthy in the fact that it was the Institute’s first year in operation. The Report captures activities and objectives met during the time period of February 2021 to March 2022.

< <https://dnsabuseinstitute.org/dnsai-releases-first-ever-annual-report/> https://dnsabuseinstitute.org/dnsai-releases-first-ever-annual-report/>

 

Anatomy of a DDoS amplification attack

Amplification attacks are one of the most common DDoS attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where the attacker succeeds in generating more traffic than the target can process, resulting in exhausting its resources due to the amount of traffic it receives.

< <https://www.microsoft.com/security/blog/2022/05/23/anatomy-of-ddos-amplification-attacks/> https://www.microsoft.com/security/blog/2022/05/23/anatomy-of-ddos-amplification-attacks/>

 

**********************

INTERNET OF THINGS

**********************

Top 5 Benefits of the Internet of Things to Businesses

Durable goods, trucks and cars, consumer products, sensors, utility and industrial components, along with other everyday objects are being equipped with Internet connectivity and powerful data analytic capabilities aimed at transforming how we live, work, and play.

< <https://bmmagazine.co.uk/business/top-5-benefits-of-the-internet-of-things-to-businesses/> https://bmmagazine.co.uk/business/top-5-benefits-of-the-internet-of-things-to-businesses/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

EMQ Attends 2022 Code BEAM Europe Conference in Stockholm [news release]

... During the conference, William Yang, software engineer at EMQ, presented an enlightening keynote, entitled, " QUICER: next-generation transport protocol library for BEAM.” The QUIC protocol, which was originally proposed by Google, has recently gained a remarkable presence.

< <https://www.emqx.com/en/news/emq-attends-2022-code-beam-europe-conference-in-stockholm> https://www.emqx.com/en/news/emq-attends-2022-code-beam-europe-conference-in-stockholm>

 

Comment Windows Server 2022 améliore la sécurité réseau [How Windows Server 2022 improves network security]

... HTTP/3 est encore en cours de développement, mais il est déjà utilisé par Google et Facebook. HTTP/3 utilise le protocole de transport QUIC basé sur le protocole UDP. Outre de meilleures performances, HTTP/3 utilise le chiffrement par défaut pour maintenir une connexion sécurisée.

< <https://www.lemagit.fr/conseil/Comment-Windows-Server-2022-ameliore-la-securite-reseau> https://www.lemagit.fr/conseil/Comment-Windows-Server-2022-ameliore-la-securite-reseau>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Podcast: Why a resolverless DNS makes sense

In this episode, Geoff Huston joins PING to discuss the contradictory theory of a resolverless DNS. It’s contradictory because the DNS is reliant on resolvers by nature.

< <https://blog.apnic.net/2022/05/26/podcast-why-a-resolverless-dns-makes-sense/> https://blog.apnic.net/2022/05/26/podcast-why-a-resolverless-dns-makes-sense/>

 

Tech Conference Working to ‘Build the Internet of Tomorrow’ Coming to Montréal [NANOG news release]

The North American Network Operators’ Group’s (NANOG) 85th community-wide gathering: NANOG 85, hosted by Team Cymru, will take place June 6-8, 2022, in person at the Hotel Fairmont, The Queen Elizabeth in Montréal, Québec, and virtually.

< <https://www.digitaljournal.com/pr/tech-conference-working-to-build-the-internet-of-tomorrow-coming-to-montreal> https://www.digitaljournal.com/pr/tech-conference-working-to-build-the-internet-of-tomorrow-coming-to-montreal>

 

What Is Wi-Fi 7? Great capacity, less latency—here's how IEEE 802.11be achieves both

New generations of Wi-Fi have sprung onto the scene at a rapid pace in recent years. After a storied five-year presence, Wi-Fi 5 was usurped in 2019 by Wi-Fi 6, only for the latter to be toppled a year later in 2020 by an intermediate generation, Wi-Fi 6E. And now, just a couple years later, we’re on the verge of Wi-Fi 7.

< <https://spectrum.ieee.org/what-is-wifi-7> https://spectrum.ieee.org/what-is-wifi-7>

 

“Old Rules in New Regulations” – Why “Sender Pays” Is a Direct Threat to the Internet

This month, we published a new Internet Impact Brief on “South Korea’s Interconnection Rules”. Our technical analysis concluded that existing rules and newly proposed legislation will slow the country’s digital development and cause a direct threat to the Internet. The analysis focused on mandatory rules around a very particular interconnection regime of business arrangements between telecom operators and Internet service providers referred to as “Sender Pays”. A similar interconnection regime is being re-discussed in Europe, due to the insistence of telecom operators, despite it being analyzed and rejected a few years ago.

< <https://www.internetsociety.org/blog/2022/05/old-rules-in-new-regulations-why-sender-pays-is-a-direct-threat-to-the-internet/> https://www.internetsociety.org/blog/2022/05/old-rules-in-new-regulations-why-sender-pays-is-a-direct-threat-to-the-internet/>

 

Tackling the digital gender divide in Asia

The ability to own a mobile device and access the Internet can be life-changing. The information, services, and learning tools available online are benefitting billions of people worldwide, and the number of mobile users and people connected to the worldwide web keeps growing each year.

< <https://www.itu.int/hub/2022/05/digital-gender-divide-asia-unicef-rosa/> https://www.itu.int/hub/2022/05/digital-gender-divide-asia-unicef-rosa/>

 

Generation Connect gets ready for first-ever Global Youth Summit

Tomorrow’s technology movers and shakers are preparing to gather at the inaugural Generation Connect Global Youth Summit, taking place online and in person in Kigali, Rwanda, from 2 to 4 June. Young delegates from over 100 countries representing regions worldwide will discuss and debate a Call to Action for sustainable, inclusive digital transformation policies.

< <https://www.itu.int/hub/2022/05/generation-connect-youth-summit/> https://www.itu.int/hub/2022/05/generation-connect-youth-summit/>

 

ICANN Publishes Root Zone Label Generation Rules Version 5 (RZ-LGR-5)

ICANN has published the Root Zone Label Generation Rules Version 5 (RZ-LGR-5). Root Zone Label Generation Rules define a set of parameters that determine valid IDN labels and their variant labels for the root zone of the DNS.

< <https://www.icann.org/en/announcements/details/icann-publishes-root-zone-label-generation-rules-version-5-rz-lgr-5-26-05-2022-en> https://www.icann.org/en/announcements/details/icann-publishes-root-zone-label-generation-rules-version-5-rz-lgr-5-26-05-2022-en>

 

The Return of Gopher: Pre-web hypertext service is still around

An announcement about a new handheld games console a few days ago caused confusion, because it was online but not on the web. It was published on Gopher.

< <https://www.theregister.com/2022/05/23/the_return_of_the_gopher/> https://www.theregister.com/2022/05/23/the_return_of_the_gopher/>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home