Home / News

IETF Looking at Technical Changes to Raise the Bar for Monitoring

During a speech last week at the Internet Governance Forum in Bali, Jari Arkko, IETF's chair, re-emphasized it's efforts to ramp up online security in light of recent revelations of mass internet surveillance. "Perhaps the notion that internet is by default insecure needs to change," Arkko said according to a Radio Netherlands Worldwide (RNW) report. Significant technical fixes "just might be possible."

While nothing is set in stone yet, Arkko sketched out a few of the IETF's ideas in his public address.

Firstly, the IETF wants to eventually apply encryption to all web traffic.

"Today, security only gets switched on for certain services like banking," Arkko explained, referring to IETF-developed standards like SSL — the little lock that appears in the upper left corner of your browser to secure online purchases. "If we work hard, we can make [the entire internet] secure by default." To this end, the IETF might make encryption mandatory for HTTP 2.0, a new version of the basic web protocol.

Secondly, the IETF plans to remove weak algorithms and strengthen existing algorithms behind encryption. This means that the US National Security Agency and other surveillors will find it harder to crack current forms of encryption.

In other words: the IETF proposes putting locks in more places and making existing locks harder to pick. If the protocols are applied, intercepting the traffic between any two points on the internet — the sender and receiver of an email, the visitor and owner of a website, the buyer and seller of a product — will be close to impossible.

Starting November 3, the IETF will begin its week-long meetings in Vancouver, Canada to continue efforts on Internet security improvements.

Related topics: Internet Governance, Internet Protocol, Privacy, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

Don't we need to diagnose and repair Karl Auerbach  –  Nov 06, 2013 1:44 PM PDT

I have spent years dealing with the isses of network diagnostics, repair, and management.  Diagnostics and repair often involve ad hoc activities that offend security policies.  Provision needs to be made to accomodate these very legitimate and very necessary activities.

Just as there is a difference between a surgeon with a scalpel and a robber with a knife we need to recognize that not every kind of penetration of the net is of ill intent or undesirable.

One of my own fears for the net is that if we lock it down very tightly that in the event of a major problem (of human cause or simply because things do break) that we will be find ourselves locked out from doing the necessary diagnosis and repair - with the possible result of wider or longer outages.

Stunning and unfortunate Anthony Rutkowski  –  Nov 07, 2013 6:12 AM PDT

...to see what powers the IETF spokespeople sometime ascribe to the organization.  In the real world, it is providers and vendors who implement capabilities pursuant to their needs, the commercial marketplace, and the many government requirements that exist in every nation, including surveillance capabilities.

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

DotConnectAfrica Contributes at the 9th IGF in Istanbul, Turkey

New gTLDs and Best Practices for Domain Management Policies (Video)

Nominum Announces Future Ready DNS

New from Verisign Labs - Measuring Privacy Disclosures in URL Query Strings

ICANN London Recap Webinar

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

Sophia Bekele Weighs in on Obama's August US-Africa Leader Summit at the NYF Africa

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

DotConnectAfrica's Expert Selected to Attend the Hague Institute of Global Justice

DotConnectAfrica Delegates Attend the KHRC Internet & Human Rights Breakfast Roundtable in Nairobi

Smokescreening: Data Theft Makes DDoS More Dangerous

Internet Business Council for Africa Participates at the EU-Africa 2014 Business Forum, Brussels

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

DotConnectAfrica Statement Regarding NTIA's Intent to Transition Key Internet Domain Name Function

Sponsored Topics