On 16 Jan 2014, at 20.24, Chris Cappuccio <ch...@nmedia.net> wrote:
> 
> Block traffic with specific ciphers from traversing the network? That's sci.fi
> 

You’re right again - this stuff is futuristic but could potentially be 
accomplished via inspection of unencrypted packet headers, etc (i.e. via 
packet-pattern/flow  analysis). However, it could likely be accomplished for 
things that access the machine itself.

We are getting into the realm of wirespeed DPI now. If we won’t be doing it, 
somebody else will. What are our efforts worth if the crypto exists in silos 
and is vulnerable to side channel attacks? Is it really worth delegating these 
sorts of things to ports?

Reply via email to