Re: [bmwg] draft-green-bmwg-seceff-bench-meth-00

Kenneth Green <KGreen@ixiacom.com> Fri, 11 November 2011 02:27 UTC

Return-Path: <KGreen@ixiacom.com>
X-Original-To: bmwg@ietfa.amsl.com
Delivered-To: bmwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2350C11E808E for <bmwg@ietfa.amsl.com>; Thu, 10 Nov 2011 18:27:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.399
X-Spam-Level:
X-Spam-Status: No, score=-5.399 tagged_above=-999 required=5 tests=[AWL=1.200, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EMjPAA3hhvh5 for <bmwg@ietfa.amsl.com>; Thu, 10 Nov 2011 18:27:11 -0800 (PST)
Received: from TX2EHSOBE005.bigfish.com (tx2ehsobe003.messaging.microsoft.com [65.55.88.13]) by ietfa.amsl.com (Postfix) with ESMTP id 5A88611E8080 for <bmwg@ietf.org>; Thu, 10 Nov 2011 18:27:11 -0800 (PST)
Received: from mail25-tx2-R.bigfish.com (10.9.14.252) by TX2EHSOBE005.bigfish.com (10.9.40.25) with Microsoft SMTP Server id 14.1.225.22; Fri, 11 Nov 2011 02:26:45 +0000
Received: from mail25-tx2 (localhost.localdomain [127.0.0.1]) by mail25-tx2-R.bigfish.com (Postfix) with ESMTP id 921E3A100AB; Fri, 11 Nov 2011 02:27:20 +0000 (UTC)
X-SpamScore: -23
X-BigFish: PS-23(zz9371Kzz1202hzz1033IL8275dhz2fh2a8h668h839h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: CIP:157.55.61.13; KIP:(null); UIP:(null); IPVD:NLI; H:CH1PRD0604HT005.namprd06.prod.outlook.com; RD:none; EFVD:NLI
Received-SPF: pass (mail25-tx2: domain of ixiacom.com designates 157.55.61.13 as permitted sender) client-ip=157.55.61.13; envelope-from=KGreen@ixiacom.com; helo=CH1PRD0604HT005.namprd06.prod.outlook.com ; .outlook.com ;
Received: from mail25-tx2 (localhost.localdomain [127.0.0.1]) by mail25-tx2 (MessageSwitch) id 1320978440326446_19050; Fri, 11 Nov 2011 02:27:20 +0000 (UTC)
Received: from TX2EHSMHS027.bigfish.com (unknown [10.9.14.241]) by mail25-tx2.bigfish.com (Postfix) with ESMTP id 44D601238050; Fri, 11 Nov 2011 02:27:20 +0000 (UTC)
Received: from CH1PRD0604HT005.namprd06.prod.outlook.com (157.55.61.13) by TX2EHSMHS027.bigfish.com (10.9.99.127) with Microsoft SMTP Server (TLS) id 14.1.225.22; Fri, 11 Nov 2011 02:26:45 +0000
Received: from CH1PRD0604MB113.namprd06.prod.outlook.com ([169.254.2.18]) by CH1PRD0604HT005.namprd06.prod.outlook.com ([10.42.110.234]) with mapi id 14.15.0009.003; Fri, 11 Nov 2011 02:27:09 +0000
From: Kenneth Green <KGreen@ixiacom.com>
To: "bmwg@ietf.org" <bmwg@ietf.org>, Dennis Cox <dcox@breakingpoint.com>
Thread-Topic: draft-green-bmwg-seceff-bench-meth-00
Thread-Index: AcySvqGwCJ5Y0rbNQRKjBrQFDORCwQDd8AjiAi7FZLAASPM28A==
Date: Fri, 11 Nov 2011 02:27:08 +0000
Message-ID: <D9D031B5F8793F4292136C1E841B62FD03A235@CH1PRD0604MB113.namprd06.prod.outlook.com>
References: <1113A19AC2AB4C4FB562BDA89BAD1606057F2490@SN2PRD0604MB119.namprd06.prod.outlook.com>
In-Reply-To: <1113A19AC2AB4C4FB562BDA89BAD1606057F2490@SN2PRD0604MB119.namprd06.prod.outlook.com>
Accept-Language: en-AU, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.42.110.8]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossPremises-AuthAs: Internal
X-MS-Exchange-CrossPremises-AuthMechanism: 04
X-MS-Exchange-CrossPremises-AuthSource: CH1PRD0604HT005.namprd06.prod.outlook.com
X-MS-Exchange-CrossPremises-SCL: -1
X-MS-Exchange-CrossPremises-messagesource: StoreDriver
X-MS-Exchange-CrossPremises-BCC:
X-MS-Exchange-CrossPremises-processed-by-journaling: Journal Agent
X-MS-Exchange-CrossPremises-ContentConversionOptions: False; 00160000; True; ; iso-8859-1
X-OrganizationHeadersPreserved: CH1PRD0604HT005.namprd06.prod.outlook.com
X-OriginatorOrg: ixiacom.com
Subject: Re: [bmwg] draft-green-bmwg-seceff-bench-meth-00
X-BeenThere: bmwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Benchmarking Methodology Working Group <bmwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bmwg>, <mailto:bmwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/bmwg>
List-Post: <mailto:bmwg@ietf.org>
List-Help: <mailto:bmwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bmwg>, <mailto:bmwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Nov 2011 02:27:12 -0000

Dennis,

Thank you for your comments and my apologies for the delayed response, I never saw this message in my email but fortunately a colleague recently forwarded a copy to me.

Selecting attacks 
=============
This is indeed a pivotal issue and probably the most difficult to resolve.  To a degree the same issue challenges the security performance ID both in terms of the attacks and the background traffic mix. 

>From a purist benchmark perspective a statically defined set of attacks is the best way to ensure apples-to-apples comparisons between test results. However, the very nature of this security effectiveness testing requires the set of attacks to be appropriately current or else there will be limited value to the measured outcome in terms of relevance to operation in the contemporary threat environment.

Even if we cannot be totally prescriptive about the list of attacks, the document will define how the measurements are made and how traffic and results are to reported and this will underpin the validity of comparisons between test runs.

Addressing the problem of attack list definition is work-in-progress and it is early days.

Mechanisms for distinguishing between legal and illegal traffic
================================================
My premise is that it is central to the role of all defensive devices that they must have one or more mechanisms to distinguish between legal and illegal traffic. You correctly point out that there are a variety of mechanisms (signature/pattern recognition, reputation etc.) but that does not change the fact that discrimination is the task at hand.

It is possible that not all features or all classes of defensive box will fall under the umbrella of this draft. The goal is to define tests that are broadly applicable.

Evasions
=======
Yes, evasions are on the list of aspects to cover as we write the scenarios.

Not evil but illegal
==============
After reviewing the definitions in RFC2647 my conclusion at this time is that "Illegal" is the appropriate term since it can encompass the concepts of both malicious traffic and banned traffic.

Regards,
Kenneth

Kenneth Green
Solution Architect
Ixia

From: bmwg-bounces@ietf.org [mailto:bmwg-bounces@ietf.org] On Behalf Of Dennis Cox
Sent: Saturday, October 29, 2011 5:50 AM
To: Kenneth Green; bmwg@ietf.org
Subject: Re: [bmwg] draft-green-bmwg-seceff-bench-meth-00

Kenneth, 

 I read the draft you provided. Some questions and suggestions since you are soliciting for them.

How will you select the attacks? Will you leverage CVEs? Or is this draft meant to be away of measuring two different flows? The reason I ask is that one companies data leakage is another companies standard traffic. You state that "all of these defensive solutions have in common ... distinguish between evil ... and good traffic". With the list such as anti-virus and anti-spam to data leakage listed, I would have to disagree. Solutions such as these at the eye of the beholder and each users requirements and each technologies inspection is quite different. 

One example: Anti-Spam companies use technologies from reputation based (Cisco IronPort) to RBL. 

How about evasions? Quite a large number of evasion techniques are used by people how attack networks. Will the draft take into account multiple language evasions? Or fragmentation and reassembly evasions? Will you rate the effectiveness of the device in handling attacks each type of evasion?

In order to test security effectiveness it comparing between "good" traffic and "evil" traffic, I would think that whatever application protocol the "evil" traffic uses the good traffic would need to use as well. That should make section 3.1 easy to determine. 

Also, evil may not be the best word, perhaps malicious might be a bit used instead.

Dennis