Hi all, I'd be interested in knowing if this document specifies any retention capabilities / requirements. My concern is with DPI appliances like the Bivio NetFalcon which promise much great and actionable traffic logging for lawful access, see: http://www.cert.org/flocon/2011/presentations/Ebrahimi_DataCollection.pdf page 15
Best, Fenwick On Wed, Dec 5, 2012 at 11:54 AM, Julian Oliver <[email protected]> wrote: > ..on Wed, Dec 05, 2012 at 11:37:16AM -0800, Wayne Moore wrote: >> Well perhaps I'm over my head here, not really my field but it seems >> that with the exception of some forms of abuse all these can be done by >> inspecting the packet headers. My understanding of DPI, as Deep Packet >> Inspection was looking at the content not just the routing and protocol >> information. > > Yes, that's the point of DPI, to traverse the packet and inspect its payload. > This can be done already at the firewall with many existing libpcap-based > tools > and is something that each network administrator should determine as necessary > or not. There are steps that can be taken to make it harder for DPI of course, > from VPNs to payload nested in ZIP/tarballs (albeit something Deep Content > Inspection (DCI) proposes to overcome). > > In any case, Pettter's right, it has no place in core networking and it > certainly shouldn't be forced upon infrastructure providers as it's imposes a > severe breach to basic rights. Next we'll be handing in our SSH keys at the > local police station. > > Cheers, > > Julian > >> >> On 12/5/2012 11:28, Petter Ericson wrote: >> > Transparent IPv4-to-IPv6 tunneling, detection of certain >> > forms of abuse, QoS modificaton, traffic monitoring and >> > shaping. >> > >> > Obviouly, these are mostly happening at a firewall or >> > equivalent, which is kind of the point. Very little DPI >> > is legitimate in core networking. >> > >> > /P >> > >> > On 05 December, 2012 - Wayne Moore wrote: >> > >> >> What legitimate uses do you see? >> >> >> >> On 12/5/2012 10:34, Petter Ericson wrote: >> >>> There are legitimate uses for DPI, >> >> -- >> >> Necessity is the plea for every infringement of human freedom. >> >> It is the argument of tyrants; it is the creed of slaves. >> >> >> >> William Pitt (1759-1806) >> >> >> >> -- >> >> Unsubscribe, change to digest, or change password at: >> >> https://mailman.stanford.edu/mailman/listinfo/liberationtech >> >> -- >> Necessity is the plea for every infringement of human freedom. >> It is the argument of tyrants; it is the creed of slaves. >> >> William Pitt (1759-1806) >> >> -- >> Unsubscribe, change to digest, or change password at: >> https://mailman.stanford.edu/mailman/listinfo/liberationtech > > -- > Julian Oliver > http://julianoliver.com > http://criticalengineering.org > -- > Unsubscribe, change to digest, or change password at: > https://mailman.stanford.edu/mailman/listinfo/liberationtech -- --------------------------------------------------------------------------------------------------- I try to respond to emails at 9:30 and 1:30pm daily (PST). --------------------------------------------------------------------------------------------------- Fenwick McKelvey Postdoctoral Fellow Visiting Scholar, University of Washington http://fenwickmckelvey.com -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech
