[Newsclips] IETF SYN-ACK Newspack 2022-04-19

David Goldstein <david@goldsteinreport.com> Tue, 19 April 2022 06:25 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82FCC3A0CB3 for <newsclips@ietfa.amsl.com>; Mon, 18 Apr 2022 23:25:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7t9XucofyFq7 for <newsclips@ietfa.amsl.com>; Mon, 18 Apr 2022 23:25:21 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B8663A0D76 for <newsclips@ietf.org>; Mon, 18 Apr 2022 23:25:20 -0700 (PDT)
Received: from David2019Desktop (unknown [101.190.66.79]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id BBE2229733B for <newsclips@ietf.org>; Tue, 19 Apr 2022 02:25:16 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 101.190.66.79) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Tue, 19 Apr 2022 16:25:15 +1000
Message-ID: <00a801d853b6$3dad9910$b908cb30$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00A9_01D8540A.0F5B56C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdhTtjY0I3TM7Kp9SwK7WTmEuP3/qQ==
Content-Language: en-au
X-PPP-Message-ID: <20220419062517.3889849.22593@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/yR3_pL1FEkaQF0XG5Plq8RnXkVo>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-04-19
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2022 06:25:28 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Final Results of the 2022 Internet Society Board of Trustees Elections and IETF Selection

The Internet Society Elections Committee is pleased to announce the final results of the 2022 elections and the IETF selection for the Internet Society Board of Trustees.

< <https://www.internetsociety.org/blog/2022/04/final-results-of-the-2022-internet-society-board-of-trustees-elections-and-ietf-selection/> https://www.internetsociety.org/blog/2022/04/final-results-of-the-2022-internet-society-board-of-trustees-elections-and-ietf-selection/>

 

Google Still Does Not Support WebSocket Connections In Googlebot

... WebSocket is a computer communications protocol, providing full-duplex communication channels over a single TCP connection. The WebSocket protocol was standardized by the IETF as RFC 6455 in 2011. The current specification is known as the HTML Living Standard. It is maintained by the Web Hypertext Application Technology Working Group (WHATWG), a consortium of the major browser vendors (Apple, Google, Mozilla, and Microsoft).

< <https://www.seroundtable.com/google-websocket-connections-googlebot-33233.html> https://www.seroundtable.com/google-websocket-connections-googlebot-33233.html>

 

Evolving From an Internet Registry to IoT Registry

... As discussed earlier, the security fabric in IoT involving multi-stakeholders using Pre-Shared Keys is challenging to scale dynamically. Asymmetric Keys using Public Key Infrastructure (PKI), have worked well for secure Internet communication and cannot be used in IoT due to the size of the certificates and the cost involved. It is impossible to send X.509 digital certificate (Around 2000 bytes) over a LoRaWAN Communication, whose maximum frame size could be 51 bytes. With its project partners (Figure 1), Afnic is experimenting IETF Standards to compress X.509 certificates with Concise Binary Object Representation (CBOR) for IoT end devices and use the DANE Transport Layer Security Authentication (TLSA) records that store a SHA 256 certificate fingerprint rather than the whole certificate.

< <https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry> https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry>

 

Announcing FusionAuth 1.36

... SCIM 2 (System for Cross-domain Identity Management), a standardized API for identity management sponsored by the IETF, allows user records to be read, written, and shared via HTTP using a simple JSON schema. In a long-awaited feature, FusionAuth now supports SCIM formats and operations as well as our own API.

< <https://securityboulevard.com/2022/04/announcing-fusionauth-1-36/> https://securityboulevard.com/2022/04/announcing-fusionauth-1-36/>

 

Five Best SSL Certificate Providers To Consider in 2022

... SSL was replaced by TLS (Transit Layer Security), released in 1999 by the IETF. It utilizes a more secure security hashing process. Versions 1.0 and 1.1 have been deprecated due to vulnerabilities. The latest version, 1.3, was released back in 2018.

< <https://www.toolbox.com/it-security/cyber-risk-management/articles/best-ssl-certificate-providers/> https://www.toolbox.com/it-security/cyber-risk-management/articles/best-ssl-certificate-providers/>

 

URL: cos'è, come funziona e quali sono i pericoli [URL: what it is, how it works and what are the dangers]

... A stretto rigore lo schema pubblicato da IETF che vede tra gli autori anche la firma di Tim-Berners Lee, padre del World Wide Web, parla di URI (Uniform Resource Identifier) e non di URL.

< <https://www.ilsoftware.it/articoli.asp?tag=URL-cos-e-come-funziona-e-quali-sono-i-pericoli_24386> https://www.ilsoftware.it/articoli.asp?tag=URL-cos-e-come-funziona-e-quali-sono-i-pericoli_24386>

 

DHCP Sunucusu Nedir? Ne İşe Yarar? [What is a DHCP Server? What's the Use?]

... RFC 2131 ve 2132 (standart belirleyiciler), DHCP’yi birçok uygulama detayını paylaştığı bir protokol olan Bootstrap Protokolüne (BOOTP) dayalı bir İnternet Mühendisliği Görev Gücü (IETF) standardı olarak tanımlar. DHCP, ana bilgisayarların bir DHCP sunucusundan gerekli TCP/IP yapılandırma bilgilerini almasına izin verir.

< <https://www.technopat.net/2022/04/13/dhcp-sunucusu-nedir-ne-ise-yarar/> https://www.technopat.net/2022/04/13/dhcp-sunucusu-nedir-ne-ise-yarar/>

 

“IPv6+”智能云网,构建算力时代的联接底座 ["IPv6+" intelligent cloud network to build a connection base in the era of computing power]

... 随着网络与计算的融合,算力资源由“端”变“网”,未来在用户的不同距离上会遍布许多不同规模的算力,通过网络为用户提供各类个性化的服务。如何保障用户体验一致性?如何实现服务灵活动态部署?这些挑战只在“计算域” 内是无法解决的,需要考虑“网络域” 与“计算域”如何协同。为了攻克这些技术难题,包括算力感知网络(CAN)、应用感知网络(APN)等新技术应运而生 ,通过网络、存储、算力等多维度资源的统一管理和协同调度,实现连接和算力在网络的全局优化,达成业务与资源的最优配置。相关标准也在国内外多个标准组织获得了广泛的关注和实质性的进展,其工作组成立预讨论会(BoF),吸引了业界200余位专家积极参与讨论,华为与业界伙伴在IETF已经合作发布了10余篇APN相关技术文稿。这些工作都为推进相关技术的标准化工作奠定了坚实的基础。

< <https://tech.huanqiu.com/article/47adjt0P3T8> https://tech.huanqiu.com/article/47adjt0P3T8>

 

**********************

SECURITY & PRIVACY

**********************

Routing Security Goes to Washington

A month ago, the United States Federal Communications Commission (FCC) published a “Notice of Inquiry” (NOI) around a subject close to our hearts: secure Internet routing. In this NOI, the FCC asked a series of questions to the public about how data is routed around the Internet, and what kinds of security controls, standards, and efforts exist to protect those routes. (Note that the FCC is not proposing regulations currently, just asking for more information.)

< <https://www.internetsociety.org/blog/2022/04/routing-security-goes-to-washington/> https://www.internetsociety.org/blog/2022/04/routing-security-goes-to-washington/>

 

APNIC moves to block BGP fat-thumb outages

Network routes in the Asia-Pacific region are to be better protected against accidental bad route propagation, with APNIC turning on a feature to pre-validate route information before it can be propagated across the Internet.

< <https://www.itnews.com.au/news/apnic-moves-to-block-bgp-fat-thumb-outages-578644> https://www.itnews.com.au/news/apnic-moves-to-block-bgp-fat-thumb-outages-578644>

 

Route management prevalidation

The Registry team at APNIC is currently working on route management prevalidation, a feature designed to prevent users from inadvertently causing routing problems for their announcements in BGP.

< <https://blog.apnic.net/2022/04/08/route-management-prevalidation/> https://blog.apnic.net/2022/04/08/route-management-prevalidation/>

 

**********************

INTERNET OF THINGS

**********************

An Internet of Things Future Means Securing Entire Supply-Chains by Nils Gerhardt, Chief Technology Officer for Utimaco

The ‘Internet of Things’ (or IoT) is far more than smart speakers and app-connected lightbulbs: in less than a decade it has gone from a buzzword to a vital part of tens of thousands of businesses, and by 2030 the industry could be worth $12.6 globally.

< <https://www.cyberdefensemagazine.com/an-internet-of-things/> https://www.cyberdefensemagazine.com/an-internet-of-things/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Why businesses should patch the latest critical Windows RPC vulnerability right now

Among the over 100 vulnerabilities fixed by Microsoft during the past week in its monthly patch cycle is one that has the security community very worried. It's a critical remote code execution (RCE) vulnerability located in the Windows Remote Procedure Call (RPC) runtime. ... Others wondered if TCP port 139, also associated with SMB and NetBIOS, might also be an avenue of attack, as well as other technologies such as SMB over QUIC, which tunnels SMB traffic over TLS-encrypted UDP port 443. Blocking that port at the network perimeter wouldn't be feasible since it would essentially block all HTTPS traffic.

< <https://www.csoonline.com/article/3657750/why-you-should-patch-the-latest-critical-windows-rpc-vulnerability-right-now.html> https://www.csoonline.com/article/3657750/why-you-should-patch-the-latest-critical-windows-rpc-vulnerability-right-now.html>

< <https://www.arnnet.com.au/article/697253/why-businesses-should-patch-latest-critical-windows-rpc-vulnerability-right-now/> https://www.arnnet.com.au/article/697253/why-businesses-should-patch-latest-critical-windows-rpc-vulnerability-right-now/>

 

**********************

OTHERWISE NOTEWORTHY

**********************

IEEE Standard Will Make Autonomous Vehicles Safer: Industry expert on how automated driving systems will be improved

Advancing automated driving systems (ADS) technology found in autonomous vehicles can save lives and prevent injuries, reduce costs associated with car accidents, lessen traffic, and cut down on the environmental impact of vehicles. But to encourage consumer acceptance, developing industry-wide safety guidelines is key.

< <https://spectrum.ieee.org/ieee-standard-for-autonomous-vehicles> https://spectrum.ieee.org/ieee-standard-for-autonomous-vehicles>

 

W3C TPAC 2022 will be a hybrid meeting

TPAC generic logoWe are able today to confirm that W3C’s annual conference, the Technical Plenary and Advisory Committee meeting known as “TPAC” will be held as a hybrid meeting on 12-16 September 2022.

< <https://www.w3.org/blog/news/archives/9503> https://www.w3.org/blog/news/archives/9503>

 

Evolving From an Internet Registry to IoT Registry

As the name indicates, the Internet of Things (IoT) should be an extension of the Internet. However, in reality, most IoT applications are Siloed infrastructures. We will analyse the main challenges in the IoT and explain how an Internet registry could be evolved to provide a secure and privacy integrated Identity and access management service for IoT.

< <https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry> https://circleid.com/posts/20220413-evolving-from-an-internet-registry-to-iot-registry>

 

US, EU, and G7 Commitment Will Slow the Splinternet, But More Work Needed

The Internet Society welcomes the US, EU, and G7 commitment to exempt telecommunications services that support Internet access and the flow of information from their sanctions against Russia on 6 April.

< <https://www.internetsociety.org/blog/2022/04/us-eu-and-g7-commitment-will-slow-the-splinternet-but-more-work-needed/> https://www.internetsociety.org/blog/2022/04/us-eu-and-g7-commitment-will-slow-the-splinternet-but-more-work-needed/>

 

Wireless Worries Overshadow Triumphs of RF Research: A leading expert in radio-frequency dosimetry dissects distress over 5G—and the differences between exposure and dosage

Kenneth R. Foster has decades of experience researching radio frequency (RF) radiation and its effects on biological systems. And now he’s coauthored a recent survey on the subject with two other researchers—Marvin Ziskin and Quirino Balzano. Collectively, the three of them (all IEEE Life Fellows) have more than a century of experience on the subject.

< <https://spectrum.ieee.org/foster-qa-hed-tk> https://spectrum.ieee.org/foster-qa-hed-tk>

 

Creating an Extensible Internet

The Internet architecture, by which I mean the layered arrangement of Internet functionality and its basic service model of best-effort packet delivery, has remained almost completely unchanged since its introduction. However, to accommodate an increasingly stringent set of application requirements — including lower latency, higher reliability, tighter security, and improved privacy — we are amid an historic reshaping of our Internet infrastructure.

< <https://blog.apnic.net/2022/04/14/creating-an-extensible-internet/> https://blog.apnic.net/2022/04/14/creating-an-extensible-internet/>

 

OMNI: Integrity, efficiency and security

The Overlay Multilink Network Interface (OMNI) connects the IP layer to a new layer in the Internet architecture termed the (OMNI) Adaptation Layer (OAL). The OAL logically occurs below the IP layer (Layer 3) and above the data link layer (Layer 2) but does not have an associated layer number itself. The OAL performs encapsulation, segmentation, and reassembly as necessary at its own layer to adapt the IP layer to inter-networked paths that may include many heterogeneous data links.

< <https://blog.apnic.net/2022/04/13/omni-integrity-efficiency-and-security/> https://blog.apnic.net/2022/04/13/omni-integrity-efficiency-and-security/>

 

Notes from AusNOG 2021

AUSNOG 2021 was held in April 2022 in Sydney over two days. Here are a few notes from presentations at the meeting that I found interesting.

< <https://www.potaroo.net/ispcol/2022-04/ausnog21.html> https://www.potaroo.net/ispcol/2022-04/ausnog21.html>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home