Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-12 Thread Bhatia, Manav (Manav)
BTW, insider threats are on the rise according to various public reports, so should not be discounted. This is one of the motivations of employing security, even within the Enterprise. Yes, but I do not really think people are going to solve those using ESP-NULL. I think they must move

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-11 Thread Tero Kivinen
Grewal, Ken writes: Are QOS and auditing devices really stateless? I would expect QOS devices to have all kind of reservation systems and so on and for those I would expect them to be keeping state? [Ken] QoS may be applied on the need of the underlying service. E.g. A static rule that

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-10 Thread Yoav Nir
gabriel montenegro wrote: I'll just comment on one item below: As the draft says this is mostly meant for stateful devices, and that has been the main goal for the document. The charter says: A standards-track mechanism that allows an intermediary device, such as a firewall or intrusion

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-09 Thread Tero Kivinen
Grewal, Ken writes: [Ken] This may be feasible for stateful devices, but does not work for stateless devices (QOS/Statistics/auditing functions). Even in stateful devices, it requires coupling between observation on flows and the associated heuristics cache engine, which creates an additional

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-06 Thread Grewal, Ken
Additional comment below... ...Snip... Cache eviction - how will this work? We can keep adding SAs (based on heuristics), but how do we decide when a given SA is no longer needed? This compounds the issues with keeping state, as in the best case, cache eviction will likely be policy based.

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Tero Kivinen
Grewal, Ken writes: The 'bait and switch' attack where a connection uses ESP-NULL and then at a later stage uses ESP-Encrypted may also be possible unintentionally. E.g. Connection to a server (cluster / farm) to gain access to a 'normal' service uses ESP-NULL and then at a later stage, where

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Grewal, Ken
; ipsec@ietf.org Subject: RE: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments Hi Ken, Yoav, I agree with Ken that the policy needs not be black and white, but for a different reason. Some people will treat deep packet inspection by middleboxes as an optional service: you want it for most

Re: [IPsec] draft-kivinen-ipsecme-esp-null-heuristics comments

2009-02-05 Thread Dragan Grebovich
I looked for some traffic stats in a real, large enterprise network and I found that UDP comprises 25-30% vs. TCP 70-75% of all traffic. The stats were measured on multiple places in the network, and multiple samples were taken over the past 6 weeks. Also, there is a slow but consistent growth