Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Tero Kivinen
Bhatia, Manav (Manav) writes: > > You gave reasons why ESP-NULL is needed, not why ESP-NULL visibility > > is needed. > > One might want to filter OSPFv3 packets coming from outside the domain. It is much better to do that check on the OSPFv3 receiver end where the packet is actually authenticat

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Bhatia, Manav (Manav)
> > > Yes, but I do not really think people are going to solve > those using > > > ESP-NULL. I think they must move to encrypted ESP to provide > > > confidentiality also, and that makes the need for > ESP-NULL visibility > > > even less. > > > > I disagree. With AH as a MAY and ESP as MUST in I

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-13 Thread Tero Kivinen
Bhatia, Manav (Manav) writes: > > > > > BTW, insider threats are on the rise according to various public > > > reports, so should not be discounted. This is one of the motivations > > > of employing security, even within the Enterprise. > > > > Yes, but I do not really think people are going to s

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-12 Thread Bhatia, Manav (Manav)
> > > BTW, insider threats are on the rise according to various public > > reports, so should not be discounted. This is one of the motivations > > of employing security, even within the Enterprise. > > Yes, but I do not really think people are going to solve those using > ESP-NULL. I think they

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-11 Thread Tero Kivinen
Grewal, Ken writes: > >Are QOS and auditing devices really stateless? > > > >I would expect QOS devices to have all kind of reservation systems and > >so on and for those I would expect them to be keeping state? > > [Ken] QoS may be applied on the need of the underlying service. E.g. > A static ru

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-11 Thread Tero Kivinen
Grewal, Ken writes: > [Ken] In some cases, the certainty must be 100%, otherwise there is > no control. E.g. A new exploit has just been published for certain > types of traffic - published vulnerability where a virus/worm can > exploit a 'buffer overrun/stack overflow' condition for a given > piec

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Grewal, Ken
>> [Ken] This may be feasible for stateful devices, but does not work >> for stateless devices (QOS/Statistics/auditing functions). Even in >> stateful devices, it requires coupling between observation on flows >> and the associated heuristics cache engine, which creates an >> additional overhead.

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Grewal, Ken
>At 2:33 PM -0700 2/10/09, Grewal, Ken wrote: >>Stateless firewalls are commonly employed for efficiency and as a crude >method for cutting off access to certain services - these are useful for >basic access control in cost effective, high bandwidth, network scenarios. >E.g. Corporations may not wa

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Paul Hoffman
At 2:33 PM -0700 2/10/09, Grewal, Ken wrote: >Stateless firewalls are commonly employed for efficiency and as a crude method >for cutting off access to certain services - these are useful for basic access >control in cost effective, high bandwidth, network scenarios. E.g. >Corporations may not w

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Grewal, Ken
>-Original Message- >From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of >Yoav Nir >Sent: Tuesday, February 10, 2009 11:52 AM >To: gabriel montenegro; Tero Kivinen; Grewal, Ken >Cc: ipsec@ietf.org; Dragan Grebovich >Subject: Re: [IPsec] draft

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Yoav Nir
gabriel montenegro wrote: >I'll just comment on one item below: > >> As the draft says this is mostly meant for stateful devices, and that >> has been the main goal for the document. The charter says: >> >> "A standards-track mechanism that allows an intermediary device, such >> as a firewall or i

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread gabriel montenegro
ing stateless). The above was just an example. Gabriel - Original Message > From: Tero Kivinen > To: "Grewal, Ken" > Cc: "ipsec@ietf.org" ; Dragan Grebovich > Sent: Monday, February 9, 2009 6:19:54 AM > Subject: Re: [IPsec] draft-kivinen-ipsecme-e

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-09 Thread Tero Kivinen
Grewal, Ken writes: > [Ken] This may be feasible for stateful devices, but does not work > for stateless devices (QOS/Statistics/auditing functions). Even in > stateful devices, it requires coupling between observation on flows > and the associated heuristics cache engine, which creates an > additi

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-07 Thread Yaron Sheffer
turday, February 07, 2009 1:53 > To: Paul Hoffman; Yaron Sheffer; Dragan Grebovich; Yoav Nir; > ipsec@ietf.org > Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments > > Thanks for the clarification. If I could ask for further clarification > here: is there much su

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-06 Thread Grewal, Ken
Additional comment below... ...Snip... >> Cache eviction - how will this work? >> We can keep adding SAs (based on heuristics), but how do we decide >> when a given SA is no longer needed? This compounds the issues with >> keeping state, as in the best case, cache eviction will likely be >> poli

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-06 Thread Tero Kivinen
Dragan Grebovich writes: > I looked for some traffic stats in a real, large enterprise network and > I found that UDP comprises 25-30% vs. TCP 70-75% of all traffic. The > stats were measured on multiple places in the network, and multiple > samples were taken over the past 6 weeks. Also, there i

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Dragan Grebovich
I looked for some traffic stats in a real, large enterprise network and I found that UDP comprises 25-30% vs. TCP 70-75% of all traffic. The stats were measured on multiple places in the network, and multiple samples were taken over the past 6 weeks. Also, there is a slow but consistent growth of

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Grewal, Ken
Grebovich; ipsec@ietf.org Subject: RE: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Hi Ken, Yoav, I agree with Ken that the policy needs not be black and white, but for a different reason. Some people will treat deep packet inspection by middleboxes as an optional service: you want i

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Paul Hoffman
At 9:52 AM +0200 2/5/09, Yaron Sheffer wrote: >Hi Gabriel, > >This thread is precisely the discussion that Paul mentions. > >The two alternatives I see on the table right now (Paul might have different >opinions) are: > >- Publish a modified/wrapped ESP as Standards Track, and heuristi

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Tero Kivinen
Grewal, Ken writes: > The 'bait and switch' attack where a connection uses ESP-NULL and > then at a later stage uses ESP-Encrypted may also be possible > unintentionally. E.g. Connection to a server (cluster / farm) to > gain access to a 'normal' service uses ESP-NULL and then at a later > stage, w

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Tero Kivinen
Grewal, Ken writes: > Cache eviction - how will this work? > We can keep adding SAs (based on heuristics), but how do we decide > when a given SA is no longer needed? This compounds the issues with > keeping state, as in the best case, cache eviction will likely be > policy based. How is the policy

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Yaron Sheffer
ipsec@ietf.org Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Quote ... "Our use case is an edge device that inspects all traffic, and drops things it doesn't understand, such as non-NULL ESP and possibly SSL (they might make an exception for HTTPS, but do a MiTM at

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread Yaron Sheffer
le in all cases. From: Dragan Grebovich To: Yoav Nir ; ipsec@ietf.org Sent: Wednesday, February 4, 2009 11:24:20 AM Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Hi Yoav As per #4, I did not elaborate what the policy should be, because it is network-specific, howe

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread gabriel montenegro
le in all cases. From: Dragan Grebovich To: Yoav Nir ; ipsec@ietf.org Sent: Wednesday, February 4, 2009 11:24:20 AM Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments draft-kivinen-ipsecme-esp-null-heuristics comments Hi Yoav As per #4, I did not elaborate what the po

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread Dragan Grebovich
AM To: Grebovich, Dragan (BL60:SF00); ipsec@ietf.org Subject: RE: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Dragan Grebovich wrote: Yoav I apologize for not being clearer earlier. I was not suggesting any new/different policy enforc

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread Grewal, Ken
av Nir Sent: Wednesday, February 04, 2009 12:04 AM To: Dragan Grebovich; ipsec@ietf.org Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Dragan Grebovich wrote: Yoav I apologize for not being clearer earlier. I was not suggesting any new/different policy enforcement.

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread Grewal, Ken
Some comments inline... Thanks, Ken >-Original Message- >From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf Of >Tero Kivinen >Sent: Tuesday, February 03, 2009 5:12 AM >To: Dragan Grebovich >Cc: ipsec@ietf.org >Subject: [IPsec] draft-kiv

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-04 Thread Yoav Nir
Dragan Grebovich wrote: Yoav I apologize for not being clearer earlier. I was not suggesting any new/different policy enforcement. I believe/agree that traffic visibility will matter only to a subset of traffic, but that is enforced at each appliance level, or on a more granular (per interfac

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-03 Thread Dragan Grebovich
g] On Behalf Of Yoav Nir Sent: Tuesday, February 03, 2009 5:16 AM To: Grebovich, Dragan (BL60:SF00); ipsec@ietf.org Subject: Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Dragan Grebovich wrote: Hi Tero I reviewed your heuristics draft and I believe it is in

[IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-03 Thread Tero Kivinen
Dragan Grebovich writes: > Hi Tero > I reviewed your heuristics draft and I believe it is interesting and > doable, however: > > 1) I believe the actual implementation would require more code than > current front-end hardware allows. The hardware we work with have a > limited space for that much

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-03 Thread Yoav Nir
Dragan Grebovich wrote: Hi Tero I reviewed your heuristics draft and I believe it is interesting and doable, however: 1) I believe the actual implementation would require more code than current front-end hardware allows. The hardware we work with have a limited space for that much heuristics

[IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-02 Thread Dragan Grebovich
Hi Tero I reviewed your heuristics draft and I believe it is interesting and doable, however: 1) I believe the actual implementation would require more code than current front-end hardware allows. The hardware we work with have a limited space for that much heuristics code. Our preference is to