Home / News

IETF Looking at Technical Changes to Raise the Bar for Monitoring

During a speech last week at the Internet Governance Forum in Bali, Jari Arkko, IETF’s chair, re-emphasized it’s efforts to ramp up online security in light of recent revelations of mass internet surveillance. “Perhaps the notion that internet is by default insecure needs to change,” Arkko said according to a Radio Netherlands Worldwide (RNW) report. Significant technical fixes “just might be possible.”

While nothing is set in stone yet, Arkko sketched out a few of the IETF’s ideas in his public address.

Firstly, the IETF wants to eventually apply encryption to all web traffic.

“Today, security only gets switched on for certain services like banking,” Arkko explained, referring to IETF-developed standards like SSL—the little lock that appears in the upper left corner of your browser to secure online purchases. “If we work hard, we can make [the entire internet] secure by default.” To this end, the IETF might make encryption mandatory for HTTP 2.0, a new version of the basic web protocol.

Secondly, the IETF plans to remove weak algorithms and strengthen existing algorithms behind encryption. This means that the US National Security Agency and other surveillors will find it harder to crack current forms of encryption.

In other words: the IETF proposes putting locks in more places and making existing locks harder to pick. If the protocols are applied, intercepting the traffic between any two points on the internet—the sender and receiver of an email, the visitor and owner of a website, the buyer and seller of a product—will be close to impossible.

Starting November 3, the IETF will begin its week-long meetings in Vancouver, Canada to continue efforts on Internet security improvements.

By CircleID Reporter

CircleID’s internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us.

Visit Page

Filed Under

Comments

Don't we need to diagnose and repair Karl Auerbach  –  Nov 6, 2013 8:44 PM

I have spent years dealing with the isses of network diagnostics, repair, and management.  Diagnostics and repair often involve ad hoc activities that offend security policies.  Provision needs to be made to accomodate these very legitimate and very necessary activities.

Just as there is a difference between a surgeon with a scalpel and a robber with a knife we need to recognize that not every kind of penetration of the net is of ill intent or undesirable.

One of my own fears for the net is that if we lock it down very tightly that in the event of a major problem (of human cause or simply because things do break) that we will be find ourselves locked out from doing the necessary diagnosis and repair - with the possible result of wider or longer outages.

Stunning and unfortunate Anthony Rutkowski  –  Nov 7, 2013 1:12 PM

...to see what powers the IETF spokespeople sometime ascribe to the organization.  In the real world, it is providers and vendors who implement capabilities pursuant to their needs, the commercial marketplace, and the many government requirements that exist in every nation, including surveillance capabilities.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC