this post was submitted on 07 Jun 2024
222 points (99.1% liked)

Technology

59207 readers
3007 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 5 months ago

This is the best summary I could come up with:


The Federal Communications Commission wants to verify that Internet service providers are strengthening their networks against attacks that take advantage of vulnerabilities in Border Gateway Protocol (BGP).

"We propose that all providers of broadband Internet access service prepare and update confidential BGP security risk management plans.

The FCC said the initial design of BGP that remains widely deployed today "does not include intrinsic security features to ensure trust in the information that is relied upon to exchange traffic among independently managed networks on the Internet."

The FCC will take public comments on its proposed rulemaking for 45 days after it is published in the Federal Register, and it could finalize the regulations in the coming months.

The draft said the stricter reporting requirements would apply to AT&T, Altice, Charter, Comcast, Cox, Lumen (aka CenturyLink), T-Mobile, TDS (including subsidiary US Cellular), and Verizon.

The large providers would be allowed to stop submitting annual plans once they "attest that they are maintaining ROAs covering at least 90 percent of originated routes for IP address prefixes under their control."


The original article contains 631 words, the summary contains 176 words. Saved 72%. I'm a bot and I'm open source!