Re: [saag] draft-mm-wg-effect-encrypt-03

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 18 October 2016 02:18 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 061411294F3 for <saag@ietfa.amsl.com>; Mon, 17 Oct 2016 19:18:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52MQnqKNuUnN for <saag@ietfa.amsl.com>; Mon, 17 Oct 2016 19:18:35 -0700 (PDT)
Received: from mail-vk0-x235.google.com (mail-vk0-x235.google.com [IPv6:2607:f8b0:400c:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D0B4129498 for <saag@ietf.org>; Mon, 17 Oct 2016 19:18:35 -0700 (PDT)
Received: by mail-vk0-x235.google.com with SMTP id q126so147232217vkd.2 for <saag@ietf.org>; Mon, 17 Oct 2016 19:18:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=CQ0vlNT9drJR2fTOEOkr2JWRaDRRe9vJjOAYgRpXgTg=; b=ffUf/0oflmrgBdrEcH+K4PHSpvacJoAGzlOV6MV1X+u0maYv0S6sfqqCKiaTr4A6gK UxOgcsIOi7Ikb+3QtQitEXCcbXRaCF++Lz718yiJ29h/kq4RLU2K43fj099KyEBAFKrG in9pbkp5yroFhPRHDzJRqJX3j/f1IklKXcwLrbN6k4I6BEIh9zpgvTcuu+aTjqdefwAR wngtgpOFmK9GsYC9NuoLEtNDIClMeLAsKAa6ptOyVY63NhrmQDRCw0hkkaRVISjTENjZ 3wFCjYP2fewSwMpznghQYcSo7x//G/CH+g/Ewz/ajl+rm/FxQkocuoFXXXk/Kn5lp+f/ ZGYA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=CQ0vlNT9drJR2fTOEOkr2JWRaDRRe9vJjOAYgRpXgTg=; b=NahhmHuFs+7wCyT8devvwMdf4xSy5vwpGd0q6FYfcYq63LXeIGzi1Zi1+BsRC6arsC ARXZDlsvk5+ifcyQpLM3Q8yWeN4t1SCky6Ha36nvKIbpY84YIRrNUYmO5kFhHC3TfInC 1EK1pck5Ot7/3YpRwANa32iZm7TYxIaZDeThQtw+YkBIl3EsOeU3iS1pYqAFGKoEU6+K 2f21N+Yg0lK60oVmINUeSP+ReqoW+9IEjIvqsSS1uH2VP5sSu8FHAeRUPQw6bNWydHMe ATHCKRmM1rWqej7AKT5VOnV4y2F0t3ofo+e19S++RMmbl+TXdgdJCzmRztxbvdRRqjQS FkFw==
X-Gm-Message-State: AA6/9RkzIY30yEzTZx9ABHX1fCc7ikaA2bkjdqR8iXj+Ri9ZtGOkQDZFPTfJre5XPTVbt5YQr0BfP1WNIzb67Q==
X-Received: by 10.31.215.67 with SMTP id o64mr519455vkg.92.1476757113990; Mon, 17 Oct 2016 19:18:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.176.82.68 with HTTP; Mon, 17 Oct 2016 19:18:33 -0700 (PDT)
In-Reply-To: <4AF73AA205019A4C8A1DDD32C034631D45A1F2E5A4@NJFPSRVEXG0.research.att.com>
References: <1901933387.417923.1476328888389.ref@mail.yahoo.com> <1901933387.417923.1476328888389@mail.yahoo.com> <2122275166.97735.1476361683603@mail.yahoo.com> <4AF73AA205019A4C8A1DDD32C034631D45A1F2E5A4@NJFPSRVEXG0.research.att.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Mon, 17 Oct 2016 22:18:33 -0400
Message-ID: <CAHbuEH4Dw1=Wxbbez+j+a3xCcsPLvm65acGWuJe=YE_pmTkYcw@mail.gmail.com>
To: "MORTON, ALFRED C (AL)" <acmorton@att.com>
Content-Type: multipart/alternative; boundary="94eb2c07c97232f15a053f1a4fe7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/F1uEPPVOM1MzyCyty1pXqb8Zw90>
Cc: "saag@ietf.org" <saag@ietf.org>
Subject: Re: [saag] draft-mm-wg-effect-encrypt-03
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2016 02:18:41 -0000

Hello,

Nalini, thank you very much for your suggested text, this is helpful to
fill a gap in the draft and is much appreciated.  Al had provided a text
diff file from your proposed text, so I used that to edit a little further
and provide additional edit suggestions on your text.  I also inserted a
note.  I hope it's easy enough to see the changes although I am afraid it
may be a little tougher.  Here's the suggested changes:


Section 4., paragraph 2:
OLD:

 For each type of monitoring, different techniques and parts of the data
stream may be necessary.  As we transition to an increased use of
encryption that is increasingly harder to break, alternate methods of
monitoring for operational purposes may be necessary to prevent the need to
break encryption and thus privacy of users (which may not apply in a
corporate setting by policy).

NEW:

 For each type of monitoring, different techniques and access to parts of
the data stream are part of current practice.  As we transition to an
increased use of encryption that is increasingly harder to break, alternate
methods of monitoring for operational purposes may be necessary to prevent
the need to break encryption and thus privacy of users (other policies may
apply in some enterprise settings).

Section 4.1, paragraph 2:
OLD:
In each of the above areas, technical support teams utilize collection,
monitoring, and diagnostic systems that in some organizations currently use
static RSA private keys to decrypt
passively monitored copies of encrypted TLS packet streams.

NEW:
In each of the above areas, technical support teams utilize collection,
monitoring, and diagnostic systems.  Some organizations currently use
attack methods such as static RSA private keys to decrypt
passively monitored copies of encrypted TLS packet streams.

Section 7., paragraph 2:
OLD:

 To an enterprise (and the customers that it serves), the cost of network
and/or application down time can be great.  The focus of enterprises in
their private data centers is to deliver expected levels of service,
performance, protection, and availability. AND this can be accomplished
using some form of traffic analysis sometimes including examination of the
payload.

NEW:

 For an enterprise to avoid costly application down time and deliver
expected levels of performance, protection, and availability, some form of
traffic analysis sometimes including examination of packet payloads can be
a valuable asset.

Section 4.1.1, 4.1.2
Note: I'm not thrilled with the proposed headings for each bullet as I
don't think they are really needed, but will go with consensus if others
really think it's helpful.  Some have a subheading now and others don't.
The headings are technology specific, whereas the previous bullets were
just covering the functions without naming technologies.

I'm fine with the additional bullets, but would like the technologies
removed.


Section 4.1.2, paragraph 1:
OLD:

 1.  Assess traffic volume on a per-application basis, for billing,
capacity planning, optimization of geographical location for servers or
proxies, and other needs,

NEW:

 There are two main goals of monitoring:


Section 4.1.2, paragraph 2:
OLD:

 2.  Assess performance in terms of application response time and user
perceived response time,

NEW:

 1.  Assess traffic volume on a per-application basis, for billing,
capacity planning, optimization of geographical location for servers or
proxies, and other needs.

 2.  Assess performance in terms of application response time and user
perceived response time


Section 4.1.3.1, paragraph 2:
OLD:

 NAT is also frequently used by lower layers of the data center
infrastructure.  Firewalls, Load Balancers, Web Servers, App Servers, and
Middleware servers all regularly NAT the source IP of packets. Combine this
with the fact that users are often sprayed randomly by load balancers to
all these devices, the network troubleshooter is often left with no option
in today's environment except to trace all packets at a particular layer,
decrypt them all, and look at the payload to find a user session.

NEW:

 NAT is also frequently used by lower layers of the data center
infrastructure.  Firewalls, Load Balancers, Web Servers, App Servers, and
Middleware servers all regularly NAT the source IP of packets. Combine this
with the fact that users are often allocated randomly by load balancers to
all these devices, the network troubleshooter is often left with no option
in today's environment except to trace all packets at a particular layer,
decrypt them all, and look at the payload to find a user session.


Section 4.1.3.1, paragraph 3:
OLD:

 This kind of bulk packet capture and bulk decryption is frequently
required when troubleshooting a large and complex application. Endpoints
typically don't have the capacity to handle this level of network packet
capture, so out-of-band networks of robust packet brokers and network
sniffers, which depend on static RSA private  keys, have evolved to fill
this need.

NEW:

This kind of bulk packet capture and bulk decryption is frequently used
when troubleshooting a large and complex application. Endpoints typically
don't have the capacity to handle this level of network packet capture, so
out-of-band networks of robust packet brokers and network sniffers that
utilize static RSA private keys to accomplish this task today.

Thank you,
Kathleen

On Sun, Oct 16, 2016 at 10:36 AM, MORTON, ALFRED C (AL) <acmorton@att.com>
wrote:

> Hi Nalini,
>
>
>
> Thanks for your many suggestions.
>
>
>
> As a first step, I edited your suggested
>
> text for sections 4 and 4.1, below and
>
> attached. See what you think.
>
>
>
> Al
>
>
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-
>
>
>
> 4.  Encryption for Enterprise Users
>
>
>
> Encryption of network traffic within the private enterprise is a growing
> trend, particularly in industries with audit and regulatory requirements.
> Some enterprise internal networks are almost completely TLS and/or IPsec
> encrypted.
>
>
>
> For each type of monitoring, different techniques and access to parts of
> the data stream may be necessary.  As we transition to an increased use of
> encryption that is increasingly harder to break, alternate methods of
> monitoring for operational purposes may be necessary to prevent the need to
> break encryption and thus privacy of users (other policies may apply in
> some enterprise settings).
>
>
>
>
>
> 4.1.  Monitoring Needs of the Enterprise
>
>
>
> Large corporate enterprises are the owners of the platforms, data, and
> network infrastructure that provide critical business services to their
> user communities.  As such, these enterprises are responsible for all
> aspects of the performance, availability, security, and quality of
> experience for all user sessions. These responsibilities break down into
> three basic areas:
>
>
>
>           1. Security Monitoring and Control
>
>           2. Application Performance Monitoring and Reporting
>
>           3. Network Diagnostics and Troubleshooting
>
>
>
> In each of the above areas, technical support teams utilize collection,
> monitoring, and diagnostic systems that in some organizations currently use
> static RSA private keys to decrypt
>
> passively monitored copies of encrypted TLS packet streams.
>
>
>
>
>
> To an enterprise (and the customers that it serves), the cost of network
> and/or application down time can be great.  The focus of enterprises in
> their private data centers is to deliver expected levels of service,
> performance, protection, and availability.
>
>
>
>
>
> 4.1.1 Security Monitoring in the Enterprise
>
>
>
> Enterprise Security Monitoring breaks down into the following areas:
>
>
>
> 1.  Data Loss Prevention - intercept outbound session traffic to monitor
> for intellectual property leakage (by users or more likely these days
> through malware and trojans),
>
>
>
> 2.  Intrusion Detection/Intrusion Prevention - detect viruses/malware
> entering the network via email or web traffic,
>
>
>
> 3.  Malware Detection - detect malware/Trojans in action, possibly
> connecting to remote hosts,
>
>
>
> 4.  Security Analytics - detect attacks (Cross site scripting and other
> common web related attacks),
>
>
>
> 5.  Track misuse and abuse by employees,
>
>
>
> 6.  Restrict the types of protocols permitted to/from the corporate
> environment,
>
>
>
> 7.  DDoS Prevention - detect and defend against Internet DDoS attacks,
> including both volumetric and layer 7 attacks.
>
>
>
> A significant portion of malware hides its activity within TLS or other
> encrypted protocols.  This includes lateral movement, Command and Control,
> and Data Exfiltration.  These functions are critical to security and fraud
> monitoring.
>
>
>
> For an enterprise to avoid costly application down time and deliver
> expected levels of performance, protection, and availability, some form of
> traffic analysis sometimes including examination of packet payloads can be
> a valuable asset.
>
>
>
>
>
>
>
> 4.1.2 Application Performance Monitoring in the Enterprise
>
>
>
> There are two main goals of monitoring:
>
>
>
> 1.  Assess traffic volume on a per-application basis, for billing,
> capacity planning, optimization of geographical location for servers or
> proxies, and other needs.
>
>
>
> 2.  Assess performance in terms of application response time and user
> perceived response time
>
>
>
> Network-based Application Performance Monitoring tracks application
> response time by user and by URL, which is the information that the
> application owners and the lines of business need. Content Delivery
> Networks (CDNs) add complexity in determining the ultimate endpoint
> destination.  By their very nature, such information is obscured by CDNs
> and encrypted protocols -- adding a new challenge for troubleshooting
> network and application problems. URL identification allows the application
> support team to do granular, code level troubleshooting at multiple tiers
> of an application.
>
>
>
> New methodologies to monitor user perceived response time and to separate
> network from server time are evolving.  For example, the IPv6 Destination
> Option implementation of Performance and Diagnostic Metrics (PDM) will
> provide this. [draft-ietf-ippm-6man-pdm-option-06]
>
>
>
>
>
>
>
> 4.1.3 Enterprise Network Diagnostics and Troubleshooting
>
>
>
> One primary key to network troubleshooting is the ability to follow a
> transaction through the various tiers of an application in order to isolate
> the fault domain.  A variety of factors relating to the structure of the
> modern data center and the modern multi-tiered application have made it
> impossible to follow a transaction in network traces without the ability to
> examine some of the packet payload.
>
>
>
>
>
> 4.1.3.1 NAT
>
>
>
> Content Delivery Networks (CDNs) and NATs obscure the ultimate endpoint
> designation.  Troubleshooting a problem for a specific end user requires
> finding information such as the IP address and other identifying
> information so that their problem can be resolved in a timely manner.
>
>
>
> NAT is also frequently used by lower layers of the data center
> infrastructure.  Firewalls, Load Balancers, Web Servers, App Servers, and
> Middleware servers all regularly NAT the source IP of packets. Combine this
> with the fact that users are often allocated randomly by load balancers to
> all these devices, the network troubleshooter is often left with no option
> in today's environment except to trace all packets at a particular layer,
> decrypt them all, and look at the payload to find a user session.
>
>
>
>
>
> This kind of bulk packet capture and bulk decryption is frequently
> required when troubleshooting a large and complex application. Endpoints
> typically don't have the capacity to handle this level of network packet
> capture, so out-of-band networks of robust packet brokers and network
> sniffers that depend on static RSA private keys have evolved to fill this
> need.
>
>
>
> 4.1.3.2 TCP Pipelining/Session Multiplexing
>
>
>
> When TCP Pipelining/Session Multiplexing is used, usually by Middle boxes
> today, multiple end user sessions share the same TCP connection.  Today's
> network troubleshooter often relies upon session decryption to tell which
> packet belongs to which end user.
>
>
>
> With the advent of HTTP2, session multiplexing will be used ubiquitously,
> both on the Internet and in the private data center.
>
>
>
>
>
> 4.1.3.3 HTTP Service Calls
>
>
>
> When an application server makes an HTTP service call to back end services
> on behalf of a user session, it uses a completely different URL and a
> completely different TCP connection.  It must be possible  to match up the
> user request above with the HTTP service call below.  Today, this is done
> by decrypting the TLS packet and inspecting the payload.
>
>
>
>
>
> 4.1.3.4 Application Layer Data
>
>
>
> Modern applications often use XML structures in the payload of the data to
> store application level information.  When the network and application
> teams must work together, each has a different view of the transaction
> failure. It is important to be able to correlate the network packet with
> the actual problem experienced by an application.
>
>
>
> *From:* nalini.elkins@insidethestack.com [mailto:nalini.elkins@
> insidethestack.com]
> *Sent:* Thursday, October 13, 2016 8:28 AM
> *To:* saag@ietf.org
> *Cc:* MORTON, ALFRED C (AL); Kathleen Moriarty
> *Subject:* Re: draft-mm-wg-effect-encrypt-03
>
>
>
> Kathleen and Al,
>
>
>
>
> The "Effect of Ubiquitous Encryption" draft is an excellent summary of the
> impact on operations and network management posed by the changes to the
> security environment.
>
>
>
> Great work, guys!!!
>
> I wanted to comment on a few things as far as they impact private
> enterprises.
>
>
> 1. In the Abstract: we may want to remind the reader that network
> management includes troubleshooting because a number of changes will need
> to be made in how troubleshooting is done.  I would suggest the following:
>
> Old: This draft includes a collection of current security and network
> management functions that may be impacted by this shift to increased use of
> encryption.
>
>
> New: This draft includes a collection of current security and network
> management (including troubleshooting) functions that may be impacted by
> this shift to increased use of encryption.
>
>
>
> 2.  At the end of section 1, we might want to add that private enterprises
> are also considered.
>
> Suggested words:
>
> "We will also consider the situation of the private enterprise, where IP
> packet transport, applications, and infrastructure are privately owned and
> contained within or interconnect private data centers."
>
>
>
> 3.  Then, I would suggest replacing Sections 4 and 4.1 of the draft in its
> entirety with the words below:
>
> ********************************************
>
> 4.  Encryption for Enterprise Users
>
> Encryption of network traffic within the private enterprise is a growing
> trend, particularly in industries with audit and regulatory requirements.
> Some enterprise internal networks are almost completely TLS and/or IPsec
> encrypted.
>
> For each type of monitoring, different techniques and parts of the data
> stream may be necessary.  As we transition to an increased use of
> encryption that is increasingly harder to break, alternate methods of
> monitoring for operational purposes may be necessary to prevent the need to
> break encryption and thus privacy of users (which may not apply in a
> corporate setting by policy).
>
>
> 4.1.  Monitoring Needs of the Enterprise
>
> Large corporate enterprises are the owners of the platforms, data, and
> network infrastructure that provide critical business services to their
> user communities.  As such, these enterprises are responsible for all
> aspects of the performance, availability, security, and quality of
> experience for all user sessions. These responsibilities break down into
> three basic areas:
>
>           1. Security Monitoring and Control
>           2. Application Performance Monitoring and Reporting
>           3. Network Diagnostics and Troubleshooting
>
> In each of the above areas, technical support teams utilize collection,
> monitoring, and diagnostic systems that in some organizations currently use
> static RSA private keys to decrypt
> passively monitored copies of encrypted TLS packet streams.
>
>
> To an enterprise (and the customers that it serves), the cost of network
> and/or application down time can be great.  The focus of enterprises in
> their private data centers is to deliver expected levels of service,
> performance, protection, and availability.
>
>
> 4.1.1 Security Monitoring in the Enterprise
>
> Enterprise Security Monitoring breaks down into the following areas:
>
> 1.  Data Loss Prevention - intercept outbound session traffic to monitor
> for intellectual property leakage (by users or more likely these days
> through malware and trojans),
>
> 2.  Intrusion Detection/Intrusion Prevention - detect viruses/malware
> entering the network via email or web traffic,
>
> 3.  Malware Detection - detect malware/Trojans in action, possibly
> connecting to remote hosts,
>
> 4.  Security Analytics - detect attacks (Cross site scripting and other
> common web related attacks),
>
> 5.  Track misuse and abuse by employees,
>
> 6.  Restrict the types of protocols permitted to/from the corporate
> environment,
>
> 7.  DDoS Prevention - detect and defend against Internet DDoS attacks,
> including both volumetric and layer 7 attacks.
>
> A significant portion of malware hides its activity within TLS or other
> encrypted protocols.  This includes lateral movement, Command and Control,
> and Data Exfiltration.  These functions are critical to security and fraud
> monitoring.
>
> To an enterprise (and the customers that it serves), the cost of network
> and/or application down time can be great.  The focus of enterprises in
> their private data centers is to deliver expected levels of service,
> performance, protection, and availability. AND this can be accomplished
> using some form of traffic analysis sometimes including examination of the
> payload.
>
>
>
> 4.1.2 Application Performance Monitoring in the Enterprise
>
>
> 1.  Assess traffic volume on a per-application basis, for billing,
> capacity planning, optimization of geographical location for servers or
> proxies, and other needs,
>
> 2.  Assess performance in terms of application response time and user
> perceived response time,
>
> Network-based Application Performance Monitoring tracks application
> response time by user and by URL, which is the information that the
> application owners and the lines of business need. Content Delivery
> Networks (CDNs) add complexity in determining the ultimate endpoint
> destination.  By their very nature, such information is obscured by CDNs
> and encrypted protocols -- adding a new challenge for troubleshooting
> network and application problems. URL identification allows the application
> support team to do granular, code level troubleshooting at multiple tiers
> of an application.
>
> New methodologies to monitor user perceived response time and to separate
> network from server time are evolving.  For example, the IPv6 Destination
> Option implementation of Performance and Diagnostic Metrics (PDM) will
> provide this. [draft-ietf-ippm-6man-pdm-option-06]
>
>
>
> 4.1.3 Enterprise Network Diagnostics and Troubleshooting
>
> One primary key to network troubleshooting is the ability to follow a
> transaction through the various tiers of an application in order to isolate
> the fault domain.  A variety of factors relating to the structure of the
> modern data center and the modern multi-tiered application have made it
> impossible to follow a transaction in network traces without the ability to
> examine some of the packet payload.
>
>
> 4.1.3.1 NAT
>
> Content Delivery Networks (CDNs) and NATs obscure the ultimate endpoint
> designation.  Troubleshooting a problem for a specific end user requires
> finding information such as the IP address and other identifying
> information so that their problem can be resolved in a timely manner.
>
> NAT is also frequently used by lower layers of the data center
> infrastructure.  Firewalls, Load Balancers, Web Servers, App Servers, and
> Middleware servers all regularly NAT the source IP of packets. Combine this
> with the fact that users are often sprayed randomly by load balancers to
> all these devices, the network troubleshooter is often left with no option
> in today's environment except to trace all packets at a particular layer,
> decrypt them all, and look at the payload to find a user session.
>
>
> This kind of bulk packet capture and bulk decryption is frequently
> required when troubleshooting a large and complex application. Endpoints
> typically don't have the capacity to handle this level of network packet
> capture, so out-of-band networks of robust packet brokers and network
> sniffers, which depend on static RSA private  keys, have evolved to fill
> this need.
>
> 4.1.3.2 TCP Pipelining/Session Multiplexing
>
> When TCP Pipelining/Session Multiplexing is used, usually by Middle boxes
> today, multiple end user sessions share the same TCP connection.  Today's
> network troubleshooter often relies upon session decryption to tell which
> packet belongs to which end user.
>
> With the advent of HTTP2, session multiplexing will be used ubiquitously,
> both on the Internet and in the private data center.
>
>
> 4.1.3.3 HTTP Service Calls
>
> When an application server makes an HTTP service call to back end services
> on behalf of a user session, it uses a completely different URL and a
> completely different TCP connection.  It must be possible  to match up the
> user request above with the HTTP service call below.  Today, this is done
> by decrypting the TLS packet and inspecting the payload.
>
>
> 4.1.3.4 Application Layer Data
>
> Modern applications often use XML structures in the payload of the data to
> store application level information.  When the network and application
> teams must work together, each has a different view of the transaction
> failure. It is important to be able to correlate the network packet with
> the actual problem experienced by an application.
>
>
>
> Thanks,
>
> Nalini Elkins
> Inside Products, Inc.
> www.insidethestack.com
> (831) 659-8360
>
>


-- 

Best regards,
Kathleen