Tuesday, February 28, 2023

Security gaps identified in Internet Protocol IPsec

 


    In collaboration with colleagues from Opole University in Poland, researchers at Horst Gorts Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable to attacks. The internet key exchange protocol IKEv1, which is part of the protocol family, has vulnerabilities that enable potential attackers to interfere with the communication process and intercept specific information.


Secure and encrypted communication

     As an enhancement of internet protocol (IP), IPsec has been developed to ensure cryptographically secure communication via publicly accessible insecure networks, such as the internet, by using encryption and authentication mechanisms. This type of communication is often used by enterprises whose employees operate from decentralised workplaces—for example, as sales reps or from a home office—and need to access company resources. The protocol can also be used to set up virtual private network (VPNs).


    "Even though the protocol is considered obsolete and a newer version, IKEv2, has been long available on the market, we see in real-life applications that IKEv1 is still being implemented in operating systems and still enjoys great popularity, even on newer devices," explains Dennis Felsch. But this protocol has vulnerabilities, as the researchers found during their analysis.


Bleichenbacher's attack successful

     In the course of their project, the researchers attacked the encryption-based logon mode of IPsec by deploying the so-called Bleichenbacher's attack, which was invented in 1998. In this attachl, errors are deliberately incorporated into an encoded message, which is then repeatedly sent to a server.


    "Thus, the attacker approaches the target step by step until he reaches his goal," says Martin Grothe. "It is like a tunnel with two ends. It's enough if one of the two parties is vulnerable. Eventually, the vulnerability permits the attacker to interfere with the communication process, to assume the identity of one of the communication partners, and to actively commit data theft."


     Bleichenbacher's attack proved effective against the hardware of four network equipment providers. The affected parties were Clavister, Zyxel, Cisco and Huawei. All four manufacturers have been notified, and have now eliminated the security gaps.


Passwords under scrutiny

    In addition to the encryption-base logon mode, the researchers have also been looking into  password-based login. "Authentication via passwords is carried out with hash values, which are similar to a fingerprint. Accordingly, a highly complex password provides the best protection if IPsec is deployed in this mode," says Grothe. The vulnerability was also communicated to the Computer Emergency Response Team (CERT), which coordinates the response to IT security incidents. CERT provided assistance to the researchers as they notified the industry about the vulnerability.


     The identified Bleichenbacher vulnerability is not a bug per se, but rather an implementation error that can be avoided—it all depends on how manufacturers integrate the protocol in their devices. Moreover, the attacker must enter the network before in order to exploit this vulnerability






#broadcasting #gigabit #routers #firewall

#servers #ethernet #bandwidth #fiberoptics
     

     

Friday, February 24, 2023

Unlocking the Potential of Magnetic Materials – A New Optical Method To Verify Topological Phases

 



Topological phases are not limited to electronic systems and can also exist in magnetic materials characterized by magnetic waves, known as magnons. While scientists have developed methods for producing and measuring magnon currents, they have yet to directly observe a magnon topological phase.

A magnon travels through a magnetic material by disturbing its magnetic order, similar to how a sound wave travels through the air.

A topological magnon phase is associated with channels that can carry a current of magnons along the edges of the sample. Researchers are hopeful that such edge channels can be utilized to carry information in future spintronics devices, analogous to how electric currents are used to transmit signals in electronic devices.

The researchers analyzed the light scattered off the material and showed that, if the scattered intensity is different for the two polarizations, the material is in a topological phase. Conversely, if there is no difference in the scattered light intensity, then the material is not in a topological phase. The properties of the scattered light thereby act as clear indicators of the topological phases in these magnetic materials.

In the long term, it is hoped that magnons can be used to construct more sustainable technological devices with a much lower energy consumption: “Utilizing topological magnon currents could potentially reduce the energy consumption of future devices by a factor of about a 1,000 compared to electronic devices – although there are plenty of issues to be resolved until we get to that point,” says Vinas Bostrom.


#broadcasting #routers #firewall

#servers #ethernet #bandwidth

Wednesday, February 22, 2023

The $4 million combined seed and pre-seed round included participation from Blockchain Capital, Maven 11 and other investors.



Super chain Network has raised $4 million in a combined seed and pre-seed fundraising round to build a decentralized blockchain data protocol.

Super chain Network, which also brands itself as the “Open Index Protocol," is a decentralized indexer. The platform organizes on-chain data and allows decentralized application developers and users to access the data in seconds.

“We believe in unconstrained ownership: no centralized entity should be involved in the relationship between humans and data,” said Maxim Legg, co-founder and chief technology officer at Super chain Network. “With Super chain there is no need to delegate custody or trust to centralized aggregators for access to decentralized data.”


 According to Super chain, applications will need a way to interpret and make use of information as demand for block space continues to grow.

“Incumbents in the indexer space are trying to decentralize Web2 APIs,” said James Corbett, co-founder and CEO at Super chain Network. “Super chain takes a fundamentally different approach. Our data is open and ownable by our users, unlocking use cases that are not possible with Graph QL.”

Tuesday, February 21, 2023

Royal Jordanian Plans Network Expansion As Losses Widen

Dusseldorf, Stockholm and Bahrain are among the new destinations planned for the summer 2023 season.



       Royal Jordanian is extending its network in Europe and the Middle East this summer with new destinations in Bahrain, Germany, Saudi Arabia and Sweden set to join the airline’s route map.

The carrier, which is celebrating its 60th anniversary this year, has confirmed the launch of flights between Amman (AMM) and Stockholm Arlanda (ARN) from May 29 using Airbus A319 aircraft. The 3381-km (1,826-nm) route will be served twice a week.

Royal Jordanian last served the Stockholm market in 2017 and 2018 with a route from Aqaba (AQJ), but the Swedish city has remained absent from its network ever since. Data provided by OAG Schedules Analyzer shows that Dusseldorf will be Royal Jordanian’s second point in Germany alongside Frankfurt (FRA). The carrier previously offered flights to Berlin (BER) but the last of those operated in October 2022.



“The fleet renewal plan also includes growing the current fleet of widebody aircraft, followed by the scheduled replacement of the existing fleet in the near future," he added. "We plan to increase the total fleet size from today’s 24 to over 40 aircraft in the coming 3-5 years.”

CAPA Fleet Database shows Royal Jordanian operates 13 A320-family aircraft, seven Boeing 787-8s, two Embraer E175s and two E195s.
The network plans came as the carrier posted a full-year net loss of JD79.1 million ($112 million) for 2022, compared with a loss of JD74.3 million during the previous 12 months. Management blamed the result on a 69% increase in fuel prices, accounting for a JD97.8 million rise in fuel expenditure.

  
 


However, the number of passengers carried in 2022 reached 3 million, compared with 1.6 million in 2021. Load factors increased from 68% to 77% over the same time period. Revenues also rose JD357 million in 2021 to JD612 million last year.








#ethernet #fiberoptics #topology

#protocols #gigabit #bluetooth



Trump Calls Fox News ‘The RINO Network’ Over DeSantis Coverage And 2020 Election Revelations

TOPLINE 

Former President Donald Trump attacked Fox News on Tuesday, calling it “the RINO Network,”— referring to the moniker Republicans In Name Only—following allegations made public last week that Fox News hosts and executives privately rejected Trump’s claims of fraud in the 2020 election, despite hosting a steady stream of election deniers who promoted Trump’s unfounded allegations.



KEY FACTS

Trump, in a post on Truth Social, took issue with Fox’s coverage of a Staten Island event hosted Monday by his likely opponent in the 2024 GOP presidential primary, Florida Gov. Ron DeSantis.
Trump encouraged CNN to pick up the perceived Trump-coverage gap left by Fox, a move he predicted would make the network a “ratings juggernaut.”
The remarks are the strongest of several criticisms Trump has issued against Fox since a new court filing revealed that a number of anchors who parroted Trump’s false claims of a stolen 2020 presidential election were allegedly in wide agreement that there was no evidence of fraud.



BIG NUMBER

139. That’s the number of people Trump said were at what he described as a “small and unenthusiastic” DeSantis event on Staten Island Monday, where the Florida governor delivered a tough-on-crime message to members of law enforcement. While it’s unclear how many were in attendance, the Prive catering hall that hosted the event states on its website that its capacity is 140 people. ABC 7 described the event as “packed.” Forbes has reached out to DeSantis’ campaign for comment.


KEY BACKGROUND

DeSantis delivered pro-law enforcement messages in New York, Philadelphia and Chicago on Monday, though he has yet to formally announce a run for president, a decision some politicos speculate will come after the Florida legislature concludes for the year in May.
  

TANGENT

Trump has faced a string of controversies that have prompted many in GOP circles to distance themselves from the former president since announcing his third run for the White House—the latest of which came Friday in court papers filed by Dominion Voting Systems in its billion-dollar defamation suit against Fox News. The company alleged that Fox personalities and executives denied, in testimonies and internal communications, the far-right conspiracy aired by the network that linked its voting systems to widespread fraud.



WHAT TO WATCH FOR

Trump on Wednesday will visit East Palestine, Ohio, where a train carrying hazardous materials derailed more than two weeks ago, leading to reports of health issues among residents. Some Republicans have criticized President Joe Biden for visiting Ukraine—where an estimated 40,000 civilians have died over the past year as a result of its war with Russia—instead of East Palestine. Biden made an impromptu stop in Kyiv on Monday days before the February 24 anniversary of Russia’s invasion of Ukraine.

The Federal Emergency Management Agency announced it would send a team to East Palestine on Friday, hours after Gov. Mike DeWine (R ) said the agency had deemed the town ineligible for the FEMA relief. Trump suggested, without evidence, FEMA’s decision was prompted by his announcement that he would visit the site of the derailment. “As soon as I announced that I’m going, [Biden] announced a team will go,” Trump wrote on Truth Social.



Monday, February 20, 2023

VPN installations skyrocket over seven times since Dec

 

      
Virtual Private Network (VPN) adoption jumped manifold in India in the first half of 2021 as companies moved to secure communication networks as more employees worked from home.

The number of VPN installations soared to 348.7 million as at June-end 2021 against 45.24 million as at December-end 2020, according to Atlas VPN’s Global VPN Adoption Index.

VPN installation penetration went up from only 3.28 per cent population in 2020 to 25.27 per cent in the first six months of 2021.

The VPN download data was extracted from Google Play Store and Apple App Store using Sensor Tower service and includes the 45 biggest VPN providers globally.
Though Qatar, the UAE and Singapore held the first three positions, respectively, in terms of overall penetration, India surpassed all the countries on the list by the volume of downloads.



#ethernet #fiberoptics #topology

#gigabit #bluetooth #webs


Monday, February 13, 2023

Saturday, February 11, 2023

NETWORK PROTOCOLS


Facebook: https://www.facebook.com/profile.php?id=100088202987384

You tube: https://studio.youtube.com/video/PImFBBvbce8/edit


 #broadcasting #routers #firewall

#ethernet  #Bandwidth  #fiberoptics


Thursday, February 9, 2023

International Research Awards on Network Protocols

 





Facebook: https://www.facebook.com/profile.php?id=100088202987384

You tube: https://studio.youtube.com/video/PImFBBvbce8/edit


 #broadcasting #routers #firewall

#ethernet  #Bandwidth  #fiberoptics

Friday, February 3, 2023