{"id":108626,"date":"2019-12-11T16:21:55","date_gmt":"2019-12-11T16:21:55","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2019\/12\/linternet-security-research-group-a-decerne-le-prix-radiant-a-claudio-jeker\/"},"modified":"2025-11-27T17:42:07","modified_gmt":"2025-11-27T17:42:07","slug":"linternet-security-research-group-a-decerne-le-prix-radiant-a-claudio-jeker","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2019\/12\/linternet-security-research-group-a-decerne-le-prix-radiant-a-claudio-jeker\/","title":{"rendered":"L&rsquo;Internet Security Research Group a d\u00e9cern\u00e9 le prix Radiant a Claudio Jeker"},"content":{"rendered":"\n<p>Cette semaine, un autre prix Radiant a \u00e9t\u00e9 d\u00e9cern\u00e9 par l&rsquo;Internet Security Research Group, l&rsquo;\u00e9quipe derri\u00e8re Let&rsquo;s Encrypt. Ce prix met en lumi\u00e8re les h\u00e9ros qui rendent chaque jour l&rsquo;Internet plus s\u00fbr et plus digne de confiance.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker.jpg\" alt=\"\" class=\"wp-image-108521\" width=\"289\" height=\"289\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker.jpg 715w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/12\/claudio-jeker-600x600.jpg 600w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/www.abetterinternet.org\/post\/radiant-award-claudio-jeker\/\">Le nouveau gagnant du prix Radiant est Claudio Jeker.<\/a> Le prix lui a \u00e9t\u00e9 d\u00e9cern\u00e9 pour son travail sur une impl\u00e9mentation du BGP4 sous OpenBSD. Je suis particuli\u00e8rement enthousiaste. Pourquoi ?<\/p>\n\n\n\n<p>OpenBSD est un\nsyst\u00e8me d&rsquo;exploitation bas\u00e9 sur un logiciel ouvert qui se centre sur la s\u00e9curit\u00e9 et\ndes fonctionnalit\u00e9s compl\u00e8tes. Il est livr\u00e9 avec un ensemble d&rsquo;outils qui le rendent id\u00e9al pour\n\u00eatre d\u00e9ploy\u00e9, par exemple, comme serveur de routage s\u00e9curis\u00e9 dans un point\nd&rsquo;\u00e9change Internet (IXP). Un serveur de routage est un service qu&rsquo;un IXP peut h\u00e9berger afin de rendre\nla vie des fournisseurs de services r\u00e9seau participants un peu plus facile. Ils n&rsquo;ont pas\nbesoin d&rsquo;obtenir les informations de routage les uns des autres, mais peuvent simplement parler \u00e0 cette partie\nde l&rsquo;infrastructure centralis\u00e9e. OpenBSD permet \u00e0 ce type d&rsquo;infrastructure d&rsquo;\u00eatre\nd\u00e9velopp\u00e9e \u00e0 partir de composants de base d&rsquo;une mani\u00e8re \u00e9volutive et s\u00e9curis\u00e9e.<\/p>\n\n\n\n<p>Avec un serveur de routage en\nplace, un IXP peut prendre des mesures suppl\u00e9mentaires pour s\u00e9curiser l&rsquo;Internet, notamment <a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/manrs-fr\/\">en prenant les actions recommand\u00e9es par la MANRS<\/a>.<\/p>\n\n\n\n<p>En fin de compte, cela ne serait\npas possible si le protocole de routage Internet (BGP4) n&rsquo;\u00e9tait pas solidement ancr\u00e9 au sein d&rsquo;OpenBSD\n&#8211; et c&rsquo;est exactement ce que Claudio a d\u00e9velopp\u00e9.\nLa cerise sur le g\u00e2teau ? Son logiciel prend enti\u00e8rement en charge le filtrage authentifi\u00e9\ndes routages en utilisant un protocole appel\u00e9 l&rsquo;ICPR. L&rsquo;ICPR est un autre \u00e9l\u00e9ment essentiel de\nl&rsquo;infrastructure n\u00e9cessaire pour s\u00e9curiser le syst\u00e8me de routage Internet et un moyen de\nmettre en \u0153uvre l&rsquo;une des actions du MANRS.<\/p>\n\n\n\n<p>Le travail de Claudio s&rsquo;av\u00e9rera\n\u00eatre un \u00e9l\u00e9ment important pour une meilleure s\u00e9curit\u00e9 sur Internet.<\/p>\n\n\n\n<p><em>Vous voulez en savoir plus sur\nLet&rsquo;s Encrypt ?<a href=\"https:\/\/jhalderm.com\/pub\/papers\/letsencrypt-ccs19.pdf\">D\u00e9couvrez une<wpml_linebreak><\/wpml_linebreak>vue d&rsquo;ensemble de l&rsquo;initiative<\/a> &#8211; de l&rsquo;inspiration \u00e0 la\nmise en \u0153uvre en passant par l&rsquo;organisation et l&rsquo;ex\u00e9cution.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette semaine, un autre prix Radiant a \u00e9t\u00e9 d\u00e9cern\u00e9 par l&rsquo;Internet Security Research Group, l&rsquo;\u00e9quipe derri\u00e8re Let&rsquo;s Encrypt. Ce prix met en lumi\u00e8re les h\u00e9ros qui rendent chaque jour l&rsquo;Internet plus s\u00fbr et plus digne de confiance. Le nouveau gagnant du prix Radiant est Claudio Jeker. Le prix lui a \u00e9t\u00e9 d\u00e9cern\u00e9 pour son travail [&hellip;]<\/p>\n","protected":false},"author":866,"featured_media":92022,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6187,185,2589,169,118,4909,4775,183],"tags":[6254],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4140],"class_list":["post-108626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comment-fonctionne-internet","category-confiance","category-garantir-bgp","category-les-normes-internet-ouvertes","category-qui-sommes-nous","category-renforcer-internet","category-securite-fr","category-technologie","tag-protocole-bgp-border-gateway-protocol","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/12\/ISRG-RadiantAward.jpg",600,258,false]},"uagb_author_info":{"display_name":"Olaf Kolkman","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/kolkman\/"},"uagb_comment_info":0,"uagb_excerpt":"Cette semaine, un autre prix Radiant a \u00e9t\u00e9 d\u00e9cern\u00e9 par l&rsquo;Internet Security Research Group, l&rsquo;\u00e9quipe derri\u00e8re Let&rsquo;s Encrypt. Ce prix met en lumi\u00e8re les h\u00e9ros qui rendent chaque jour l&rsquo;Internet plus s\u00fbr et plus digne de confiance. Le nouveau gagnant du prix Radiant est Claudio Jeker. Le prix lui a \u00e9t\u00e9 d\u00e9cern\u00e9 pour son travail\u2026","authors":[{"term_id":4140,"user_id":866,"is_guest":0,"slug":"kolkman","display_name":"Olaf Kolkman","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Olaf-Kolkman.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/108626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/866"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=108626"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/108626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/92022"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=108626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=108626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=108626"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=108626"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=108626"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=108626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}