On 10/31/07, <b class="gmail_sendername">Vitaliy Gladkevitch</b> <<a href="mailto:vitaliy@gmail.com">vitaliy@gmail.com</a>> wrote:<div><span class="gmail_quote"></span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
During Gene Cronk's presentation he has mentioned some of the<br>difficulties network administrators will have monitoring traffic on<br>networks in IPv6 world because of end-to-end IPsec connections. One<br>method mentioned was firewall sending signals to each client, similar
<br>to enterprise AV's, can someone please discuss this method and<br>implementation in greater detail? And if you have any other ideas to<br>address this problem, please do share.<br><br>Thanks,<br>Vitaliy<br></blockquote>
</div><br>Bear in mind that the scenario and software I was discussing at the meeting is theoretical. I know of no implementation of it as of yet.<br><br>That being said, essentially what would be needed is a piece of software running on a client machine that communicates with a server to get statical information, blacklist information, malware information, or a combination thereof. Then, as the machine decrypts the traffic, it is routed directly through the software "filter" and the proper packets are dropped/scrubbed before they hit the rest of the system.
<br><br>It's a man in the middle attack taking place on localhost if you think about it. The client software alerts the server of malicious traffic and the server take appropriate action for the rest of the network, sending updates via a push method. Again, all theoretical.
<br><br>Anyway, hope this clears the air a little. If not, I'll be more than happy to explain in depth.<br><br>--Gene<br>