Levels
TCP (Transmission Control Protocol) works on top of IP (Internet Protocol). Such a stack is independent of the physical data medium. If we draw analogies with the basic OSI model, then such a set of protocols occupies three layers of seven: from physical to network. It is also interesting that the protocol stack in question is itself divided into four layers - again when compared with OSI.
The TCP/IP protocol stack can be divided into four layers (not counting the physical) if you try to fit the model into the OSI categorization:
Level 0. Physical. Describes the media and physical characteristics of the media.
Level 1. Channel. This layer describes the format of data transmission through the physical layer, including some coding.
Level 2. Internetwork. Designed to transfer data from one subnet to another. The OSI model does not have an analogue to the firewall layer, therefore it is quite difficult to compare these two models.
Level 3. Transport. Solves the delivery of messages with an unconfirmed warranty.
Level 4. Applied. Ensures that most network applications work.
2023: Putin approves creation of Russian counterpart of TCP/IP protocol
At the end of April 2023, Russian President Vladimir Putin approved the development of the Russian analogue of TCP/IP - the basic protocol of the modern Internet. This is a network model that describes how information is transferred from source to destination. Read more here.
2021: Vulnerabilities in TCP/IP stacks affect millions of industrial and IoT devices
On April 13, 2021, it became known that researchers safety from the company ForeScout , together with JSOF experts, discovered a number of vulnerabilities in stacks/affecting TCPIP millions of servers industrial and smart devices.
The vulnerabilities, called NAME: WRECK, are related to the way TCP/IP stacks handle DNS traffic. Exploitation of vulnerabilities allows you to cause a denial of service (DoS) state or remotely execute code (RCE). Thus, attackers can disable target devices or seize control.
In total, experts have identified nine vulnerabilities in seven of the fifteen TCP/IP stacks. Analysis of the other eight stacks showed that FNET, cycloneTCP, uC/TCP-IP, FreeRTOS + TCP, Zephyr and OpenThread safely implement message compression, while Nut/Net and lwIP did not support message compression at all, and were not vulnerable by default.
Experts reported their findings to stack developers, but only FreeBSD, Nucleus NET and NetX received fixes. IPNet still contains the NAME: WRECK vulnerabilities.
According to experts, although the release of fixes may seem encouraging, in fact the situation is not simple. Installing fixes for smart devices and industrial equipment usually entails a long waiting period during which device manufacturers will have to integrate fixes and release their own firmware updates.
Most of the equipment may be located in remote places and may not support the firmware-over-the-air (FOTA) mechanism. Many devices that use vulnerable TCP/IP stacks are likely to remain vulnerable to attacks for years, while other hardware can remain vulnerable until it is decommissioned, experts say.[1]
2020
Hundreds of millions of devices at risk due to "holes" in the TCP/IP variety
JSOF experts have identified almost two dozen vulnerabilities in the high-speed Treck TCP/IP protocol, designed specifically for embedded devices. As a result, a colossal amount of IoT equipment is at risk, including what is intended for use in corporate environments[2].
Among the vulnerabilities under the general name Ripple20, there are several critical and highly dangerous ones that allow you to seize control of devices. They allow, among other things, to run arbitrary code remotely, disable data or disable devices.
In most cases, sending IP packets or DNS requests to the target devices is sufficient for operation.
Experts did not specify how many devices could be attacked with these vulnerabilities, but apparently we are talking about hundreds of millions of devices from a variety of manufacturers in the range from nameless workshops to giants like HP, Schneider Electric, Intel, Rockwell, etc. Track TCP/IP is actively used in this area.
As the researchers noted, there can be many options for exploiting these vulnerabilities - from relatively harmless data theft from a printer to deadly ones, for example, remotely reconfiguring a medical pump connected to the Network or sabotaging industrial controllers. At the same time, sleeping malicious code can be hidden in a vulnerable Internet of Things device for many years.
European Telecommunications Standards Institute develops TCP/IP replacement for 5G networks
The European Standards Institute telecommunication (ETSI) in April 2020 announced the creation of a new industry working group to create specifications for cellular networks without TCP/IP - ISG NIN protocols. John Grant of Building Solution International (BSI) was elected chairman of the group, his deputy was Kevin Smith of. Vodafone
The group should issue specifications applicable to 5G networks, allowing them to be simpler and more efficient to manage. Initially, the operation of ISG NIN is expected to be applicable to private mobile networks such as production automation networks. These technologies will then have to extend to public systems and will be used on both the core of the network and in the elements of the access network.
The first result of the group should be a report that will detail the shortcomings of TCP/IP and how the new alternative system will overcome these shortcomings. ISG NIN will also work to determine how the requirements originally developed, previously operated by the group - ISG NGP, will become the basis of new protocols and to create a basis for testing the effectiveness and effectiveness of new protocols, including on the radio interface.
I am very glad that I was entrusted with the chairmanship of this group. Finding new protocols for the internet more suitable for the 5G era was essential. BIG DATA and critical systems such as industrial management, intelligent vehicles and telemedicine cannot work best with modern TCP/IP-based networks John Grant, Chairman of ISG NIN
|
China introduced to the world a new Internet protocol New IP, facilitating total censorship
Main article: New IP (Internet Protocol)
At the end of March 2020, China introduced a new Internet protocol to the International Telecommunication Union (ITU), which, according to its creators, has many advantages. However, the standard opens up more opportunities for the authorities to completely censor the network.
The protocol is called New IP and is intended to replace the outdated TCP/IP. It was presented by Huawei and telecommunications operators from the Middle Kingdom, the Financial Times reports with reference to the materials of the presentation.
2015: Telecom operators identify problems with TCP/IP-based solutions in 4G networks
In 2015, several mobile operators identified problems with TCP/IP-based technologies used in 4G. Difficulties are associated with inefficient use of spectrum as a result of adding mobility, security, quality of service, and others to a protocol that has never been developed for them. Subsequent fixes and workarounds designed to address these problems have themselves resulted in increased costs, delays, and more power consumption. Therefore, TCP/IP was considered not optimal for more advanced 5G services.
The Next Generation Protocols Group (ISG NGP) analyzed the problems and proposed alternative solutions. Based on the results of the work, the requirements for candidate technologies were determined, which consisted in a strong reduction in the size of headers, packet processing time and network latency, but, in addition, in compatibility with current TCP/IP, SDN and MPLS networks.
1996: TCP/IP takes the lead
Until 1996, the undisputed leader was the company's IPX/SPX stack, Novell but then TCP/IP became much ahead of other stacks in terms of the growth rate of the number of installations, and since 1998 it has become an absolute leader. The TCP/IP stack itself was developed before OSI.
1977: The first test of the network according to the scenario: the USSR attacks Europe
From Yasha Levine's "The Internet as a Weapon" (2019):
The first successful test of a network with the TCP/IP protocol, held on November 22, 1977, imitated a military scenario: using satellite, cable and radio networks, communication was maintained with an active mobile unit fighting against conditional Soviet troops invading Europe. The old GMC delivery van, which Stanford specialists stuffed with radio equipment, played the role of a NATO motorized division and traveled back and forth along the highway near Stanford, sending data through the ARPANET radio network. Then they were transported via the ARPA satellite network to Europe - through Sweden and London, after which they returned to the United States, to the University of California, Los Angeles, on ARPA satellite and cable channels.