| rfc8903.original | rfc8903.txt | |||
|---|---|---|---|---|
| DOTS R. Dobbins | Internet Engineering Task Force (IETF) R. Dobbins | |||
| Internet-Draft Arbor Networks | Request for Comments: 8903 Netscout, Inc. | |||
| Intended status: Informational D. Migault | Category: Informational D. Migault | |||
| Expires: January 6, 2021 Ericsson | ISSN: 2070-1721 Ericsson | |||
| R. Moskowitz | R. Moskowitz | |||
| HTT Consulting | HTT Consulting | |||
| N. Teague | N. Teague | |||
| Iron Mountain Data Centers | Iron Mountain Data Centers | |||
| L. Xia | L. Xia | |||
| Huawei | Huawei | |||
| K. Nishizuka | K. Nishizuka | |||
| NTT Communications | NTT Communications | |||
| July 05, 2020 | May 2021 | |||
| Use cases for DDoS Open Threat Signaling | Use Cases for DDoS Open Threat Signaling | |||
| draft-ietf-dots-use-cases-25 | ||||
| Abstract | Abstract | |||
| The DDoS Open Threat Signaling (DOTS) effort is intended to provide | The DDoS Open Threat Signaling (DOTS) effort is intended to provide | |||
| protocols to facilitate interoperability across disparate DDoS | protocols to facilitate interoperability across disparate DDoS | |||
| mitigation solutions. This document presents sample use cases which | Mitigation solutions. This document presents sample use cases that | |||
| describe the interactions expected between the DOTS components as | describe the interactions expected between the DOTS components as | |||
| well as DOTS messaging exchanges. These use cases are meant to | well as DOTS messaging exchanges. These use cases are meant to | |||
| identify the interacting DOTS components, how they collaborate, and | identify the interacting DOTS components, how they collaborate, and | |||
| what are the typical information to be exchanged. | what the typical information to be exchanged is. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Not all documents | |||
| approved by the IESG are candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on January 6, 2021. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc8903. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 2. Terminology and Acronyms . . . . . . . . . . . . . . . . . . 3 | 2. Terminology and Acronyms | |||
| 3. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 3. Use Cases | |||
| 3.1. Upstream DDoS Mitigation by an Upstream Internet Transit | 3.1. Upstream DDoS Mitigation by an Upstream Internet Transit | |||
| Provider . . . . . . . . . . . . . . . . . . . . . . . . 4 | Provider | |||
| 3.2. DDoS Mitigation by a Third Party DDoS Mitigation Service | 3.2. DDoS Mitigation by a Third-Party DDoS Mitigation Service | |||
| Provider . . . . . . . . . . . . . . . . . . . . . . . . 7 | Provider | |||
| 3.3. DDoS Orchestration . . . . . . . . . . . . . . . . . . . 10 | 3.3. DDoS Orchestration | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 13 | 4. Security Considerations | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 | 5. IANA Considerations | |||
| 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13 | 6. Informative References | |||
| 7. Informative References . . . . . . . . . . . . . . . . . . . 13 | Acknowledgments | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| At the time of writing, distributed denial-of-service (DDoS) attack | At the time of writing, distributed denial-of-service (DDoS) attack | |||
| mitigation solutions are largely based upon siloed, proprietary | mitigation solutions are largely based upon siloed, proprietary | |||
| communications schemes with vendor lock-in as a side-effect. This | communications schemes with vendor lock-in as a side effect. This | |||
| can result in the configuration, provisioning, operation, and | can result in the configuration, provisioning, operation, and | |||
| activation of these solutions being a highly manual and often time- | activation of these solutions being a highly manual and often time- | |||
| consuming process. Additionally, coordinating multiple DDoS | consuming process. Additionally, coordinating multiple DDoS | |||
| mitigation solutions simultaneously is fraught with both technical | Mitigation solutions simultaneously is fraught with both technical | |||
| and process-related hurdles. This greatly increases operational | and process-related hurdles. This greatly increases operational | |||
| complexity which, in turn, can degrade the efficacy of mitigations | complexity, which in turn can degrade the efficacy of mitigations | |||
| that are generally highly dependent on a timely reaction by the | that are generally highly dependent on a timely reaction by the | |||
| system. | system. | |||
| The DDoS Open Threat Signaling (DOTS) effort is intended to specify | The DDoS Open Threat Signaling (DOTS) effort is intended to specify | |||
| protocols that facilitate interoperability between diverse DDoS | protocols that facilitate interoperability between diverse DDoS | |||
| mitigation solutions and ensure greater integration in term of attack | Mitigation solutions and ensure greater integration in terms of | |||
| detection, mitigation requests, and attack characterization patterns. | attack detection, mitigation requests, and attack characterization | |||
| patterns. | ||||
| As DDoS solutions are broadly heterogeneous among vendors, the | As DDoS solutions are broadly heterogeneous among vendors, the | |||
| primary goal of DOTS is to provide high-level interaction amongst | primary goal of DOTS is to provide high-level interaction amongst | |||
| differing DDoS solutions, such as detecting DDoS attacks, initiating/ | differing DDoS solutions, such as detecting DDoS attacks, initiating/ | |||
| terminating DDoS mitigation assistance, or requesting the status of a | terminating DDoS Mitigation assistance, or requesting the status of a | |||
| DDoS mitigation. | DDoS Mitigation. | |||
| This document provides sample use cases that provided input for the | This document provides sample use cases that provided input for the | |||
| requirements [RFC8612] and design of the DOTS protocols | requirements [RFC8612] and design of the DOTS protocols | |||
| [RFC8782][RFC8783]. The use cases are not exhaustive and future use | [RFC8782][RFC8783]. The use cases are not exhaustive, and future use | |||
| cases are expected to emerge as DOTS is adopted and evolves. | cases are expected to emerge as DOTS is adopted and evolves. | |||
| 2. Terminology and Acronyms | 2. Terminology and Acronyms | |||
| This document makes use of the same terminology and definitions as | This document makes use of the same terminology and definitions as | |||
| [RFC8612]. In addition it uses the terms defined below: | [RFC8612]. In addition, it uses the terms defined below: | |||
| o DDoS Mitigation System (DMS): A system that performs DDoS | DDoS Mitigation System (DMS): | |||
| mitigation. The DDoS Mitigation System may be composed of a | A system that performs DDoS Mitigation. The DDoS Mitigation | |||
| cluster of hardware and/or software resources, but could also | System may be composed of a cluster of hardware and/or software | |||
| involve an orchestrator that may take decisions such as | resources but could also involve an orchestrator that may make | |||
| outsourcing some or all of the mitigation to another DDoS | decisions, such as outsourcing some or all of the mitigation to | |||
| Mitigation System. | another DDoS Mitigation System. | |||
| o DDoS Mitigation: The action performed by the DDoS Mitigation | DDoS Mitigation: | |||
| System. | The action performed by the DDoS Mitigation System. | |||
| o DDoS Mitigation Service: designates a service provided to a | DDoS Mitigation Service: | |||
| customer to mitigate DDoS attacks. Each service subscription | Designates a service provided to a customer to mitigate DDoS | |||
| usually involve Service Level Agreement (SLA) that has to be met. | attacks. Each service subscription usually involve Service Level | |||
| It is the responsibility of the DDoS Service provider to | Agreement (SLA) that has to be met. It is the responsibility of | |||
| instantiate the DDoS Mitigation System to meet these SLAs. | the DDoS Service provider to instantiate the DDoS Mitigation | |||
| System to meet these SLAs. | ||||
| o DDoS Mitigation Service Provider: designates the administrative | DDoS Mitigation Service Provider: | |||
| entity providing the DDoS Mitigation Service. | Designates the administrative entity providing the DDoS Mitigation | |||
| Service. | ||||
| o Internet Transit Provider (ITP): designates the entity that | Internet Transit Provider (ITP): | |||
| delivers the traffic to a customer network. It can be an Internet | Designates the entity that delivers the traffic to a customer | |||
| Service Provider (ISP), or an upstream entity delivering the | network. It can be an Internet Service Provider (ISP) or an | |||
| traffic to the ISP. | upstream entity delivering the traffic to the ISP. | |||
| 3. Use Cases | 3. Use Cases | |||
| 3.1. Upstream DDoS Mitigation by an Upstream Internet Transit Provider | 3.1. Upstream DDoS Mitigation by an Upstream Internet Transit Provider | |||
| This use case describes how an enterprise or a residential customer | This use case describes how an enterprise or a residential customer | |||
| network may take advantage of a pre-existing relation with its ITP in | network may take advantage of a pre-existing relation with its ITP in | |||
| order to mitigate a DDoS attack targeting its network. | order to mitigate a DDoS attack targeting its network. | |||
| For clarity of discussion, the targeted network is indicated as an | For clarity of discussion, the targeted network is indicated as an | |||
| enterprise network, but the same scenario applies to any downstream | enterprise network, but the same scenario applies to any downstream | |||
| network, including residential and cloud hosting networks. | network, including residential and cloud hosting networks. | |||
| skipping to change at page 4, line 16 ¶ | skipping to change at line 151 ¶ | |||
| This use case describes how an enterprise or a residential customer | This use case describes how an enterprise or a residential customer | |||
| network may take advantage of a pre-existing relation with its ITP in | network may take advantage of a pre-existing relation with its ITP in | |||
| order to mitigate a DDoS attack targeting its network. | order to mitigate a DDoS attack targeting its network. | |||
| For clarity of discussion, the targeted network is indicated as an | For clarity of discussion, the targeted network is indicated as an | |||
| enterprise network, but the same scenario applies to any downstream | enterprise network, but the same scenario applies to any downstream | |||
| network, including residential and cloud hosting networks. | network, including residential and cloud hosting networks. | |||
| As the ITP provides connectivity to the enterprise network, it is | As the ITP provides connectivity to the enterprise network, it is | |||
| already on the path of the inbound and outbound traffic of the | already on the path of the inbound and outbound traffic of the | |||
| enterprise network and well aware of the networking parameters | enterprise network and is well aware of the networking parameters | |||
| associated to the enterprise network WAN connectivity. This eases | associated with the enterprise network WAN connectivity. This eases | |||
| both the configuration and the instantiation of a DDoS Mitigation | both the configuration and the instantiation of a DDoS Mitigation | |||
| Service. | Service. | |||
| This section considers two kinds of DDoS Mitigation Service between | This section considers two kinds of DDoS Mitigation Service between | |||
| an enterprise network and an ITP: | an enterprise network and an ITP: | |||
| o The upstream ITP may instantiate a DDoS Mitigation System (DMS) | * The upstream ITP may instantiate a DMS upon receiving a request | |||
| upon receiving a request from the enterprise network. This | from the enterprise network. This typically corresponds to a case | |||
| typically corresponds to the case when the enterprise network is | when the enterprise network is under attack. | |||
| under attack. | ||||
| o On the other hand, the ITP may identify an enterprise network as | * On the other hand, the ITP may identify an enterprise network as | |||
| the source of an attack and send a mitigation request to the | the source of an attack and send a mitigation request to the | |||
| enterprise DMS to mitigate this at the source. | enterprise DMS to mitigate this at the source. | |||
| The two scenarios, though different, have similar interactions | The two scenarios, though different, have similar interactions | |||
| between the DOTS client and server. For the sake of simplicity, only | between the DOTS client and server. For the sake of simplicity, only | |||
| the first scenario will be detailed in this section. Nevertheless, | the first scenario will be detailed in this section. Nevertheless, | |||
| the second scenario is also in scope for DOTS. | the second scenario is also in scope for DOTS. | |||
| In the first scenario, as depicted in Figure 1, an enterprise network | In the first scenario, as depicted in Figure 1, an enterprise network | |||
| with self-hosted Internet-facing properties such as Web servers, | with self-hosted Internet-facing properties such as web servers, | |||
| authoritative DNS servers, and VoIP servers has a DMS deployed to | authoritative DNS servers, and Voice over IP (VoIP) servers has a DMS | |||
| protect those servers and applications from DDoS attacks. In | deployed to protect those servers and applications from DDoS attacks. | |||
| addition to on-premise DDoS defense capability, the enterprise has | In addition to on-premise DDoS defense capabilities, the enterprise | |||
| contracted with its ITP for DDoS Mitigation Services when attacks | has contracted with its ITP for DDoS Mitigation Services when attacks | |||
| threaten to overwhelm the bandwidth of their WAN link(s). | threaten to overwhelm the bandwidth of their WAN link(s). | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| | Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| | Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | | Provider | | | | | Provider | | |||
| | +--------+ | | DDoS Attack | | +--------+ | | DDoS Attack | |||
| | | DDoS | | <================================= | | | DDoS | | <================================= | |||
| | | Target | | <================================= | | | Target | | <================================= | |||
| | +--------+ | | +------------+ | | | +--------+ | | +------------+ | | |||
| skipping to change at page 5, line 30 ¶ | skipping to change at line 205 ¶ | |||
| | +------------+ | | | | | | +------------+ | | | | | |||
| | | DDoS |<---+ | | | | | DDoS |<---+ | | | |||
| | | Mitigation |C | | | | | | Mitigation |C | | | | |||
| | | System | | | | | | | System | | | | | |||
| | +------------+ | | | | | +------------+ | | | | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| * C is for DOTS client functionality | * C is for DOTS client functionality | |||
| * S is for DOTS server functionality | * S is for DOTS server functionality | |||
| Figure 1: Upstream Internet Transit Provider DDoS Mitigation | Figure 1: Upstream Internet Transit Provider DDoS Mitigation | |||
| The enterprise DMS is configured such that if the incoming Internet | The enterprise DMS is configured such that if the incoming Internet | |||
| traffic volume exceeds 50% of the provisioned upstream Internet WAN | traffic volume exceeds 50% of the provisioned upstream Internet WAN | |||
| link capacity, the DMS will request DDoS mitigation assistance from | link capacity, the DMS will request DDoS Mitigation assistance from | |||
| the upstream transit provider. More sophisticated detection means | the upstream transit provider. More sophisticated detection means | |||
| may be considered as well. | may be considered as well. | |||
| The requests to trigger, manage, and finalize a DDoS Mitigation | The requests to trigger, manage, and finalize a DDoS Mitigation | |||
| between the enterprise DMS and the ITP is performed using DOTS. The | between the enterprise DMS and the ITP are made using DOTS. The | |||
| enterprise DMS implements a DOTS client while the ITP implements a | enterprise DMS implements a DOTS client while the ITP implements a | |||
| DOTS server which is integrated with their DMS in this example. | DOTS server, which is integrated with their DMS in this example. | |||
| When the enterprise DMS locally detects an inbound DDoS attack | When the enterprise DMS locally detects an inbound DDoS attack | |||
| targeting its resources (e.g., servers, hosts, or applications), it | targeting its resources (e.g., servers, hosts, or applications), it | |||
| immediately begins a DDoS Mitigation. | immediately begins a DDoS Mitigation. | |||
| During the course of the attack, the inbound traffic volume to the | During the course of the attack, the inbound traffic volume to the | |||
| enterprise network exceeds the 50% threshold and the enterprise DMS | enterprise network exceeds the 50% threshold, and the enterprise DMS | |||
| escalates the DDoS mitigation. The enterprise DMS DOTS client | escalates the DDoS Mitigation. The enterprise DMS DOTS client | |||
| signals to the DOTS server on the upstream ITP to initiate DDoS | signals to the DOTS server on the upstream ITP to initiate DDoS | |||
| Mitigation. The DOTS server replies to the DOTS client that it can | Mitigation. The DOTS server replies to the DOTS client that it can | |||
| serve this request, and mitigation is initiated on the ITP network by | serve this request, and mitigation is initiated on the ITP network by | |||
| the ITP DMS. | the ITP DMS. | |||
| Over the course of the attack, the DOTS server of the ITP | Over the course of the attack, the DOTS server of the ITP | |||
| periodically informs the DOTS client on the mitigation status, | periodically informs the DOTS client on the mitigation status, | |||
| statistics related to DDoS attack traffic mitigation, and related | statistics related to DDoS attack traffic mitigation, and related | |||
| information. Once the DDoS attack has ended, or decreased to a | information. Once the DDoS attack has ended or decreased to a | |||
| certain level that the enterprise DMS might handle by itself, the | certain level that the enterprise DMS might handle by itself, the | |||
| DOTS server signals the enterprise DMS DOTS client that the attack | DOTS server signals the enterprise DMS DOTS client that the attack | |||
| has subsided. | has subsided. | |||
| The DOTS client on the enterprise DMS then requests the ITP to | The DOTS client on the enterprise DMS then requests that the ITP | |||
| terminate the DDoS Mitigation. The DOTS server on the ITP receives | terminate the DDoS Mitigation. The DOTS server on the ITP receives | |||
| this request and once the mitigation has ended, confirms the end of | this request and, once the mitigation has ended, confirms the end of | |||
| upstream DDoS Mitigation to the enterprise DMS DOTS client. | upstream DDoS Mitigation to the enterprise DMS DOTS client. | |||
| The following is an overview of the DOTS communication model for this | The following is an overview of the DOTS communication model for this | |||
| use-case: | use case: | |||
| 1. A DDoS attack is initiated against resources of a network | 1. A DDoS attack is initiated against resources of a network | |||
| organization (here, the enterprise) which has deployed a DOTS- | organization (here, the enterprise), which has deployed a DOTS- | |||
| capable DMS - typically a DOTS client. | capable DMS -- typically a DOTS client. | |||
| 2. The enterprise DMS detects, classifies, and begins the DDoS | 2. The enterprise DMS detects, classifies, and begins the DDoS | |||
| Mitigation. | Mitigation. | |||
| 3. The enterprise DMS determines that its capacity and/or capability | 3. The enterprise DMS determines that its capacity and/or capability | |||
| to mitigate the DDoS attack is insufficient, and sends via its | to mitigate the DDoS attack is insufficient and sends a DOTS DDoS | |||
| DOTS client a DOTS DDoS Mitigation request to one or more DOTS | Mitigation request via its DOTS client to one or more DOTS | |||
| servers residing on the upstream ITP. | servers residing on the upstream ITP. | |||
| 4. The DOTS server which receives the DOTS Mitigation request | 4. The DOTS server, which receives the DOTS Mitigation request, | |||
| determines that it has been configured to honor requests from the | determines that it has been configured to honor requests from the | |||
| requesting DOTS client, and honors the request by orchestrating | requesting DOTS client and does so by orchestrating its own DMS. | |||
| its own DMS. | ||||
| 5. While the DDoS Mitigation is active, the DOTS server regularly | 5. While the DDoS Mitigation is active, the DOTS server regularly | |||
| transmits DOTS DDoS Mitigation status updates to the DOTS client. | transmits DOTS DDoS Mitigation status updates to the DOTS client. | |||
| 6. Informed by the DOTS server status update that the attack has | 6. Informed by the DOTS server status update that the attack has | |||
| ended or subsided, the DOTS client transmits a DOTS DDoS | ended or subsided, the DOTS client transmits a DOTS DDoS | |||
| Mitigation termination request to the DOTS server. | Mitigation termination request to the DOTS server. | |||
| 7. The DOTS server terminates DDoS Mitigation, and sends the | 7. The DOTS server terminates DDoS Mitigation and sends the | |||
| notification to the DOTS client. | notification to the DOTS client. | |||
| Note that communications between the enterprise DOTS client and the | Note that communications between the enterprise DOTS client and the | |||
| upstream ITP DOTS server may take place in-band within the main | upstream ITP DOTS server may take place in band within the main | |||
| Internet WAN link between the enterprise and the ITP; out-of-band via | Internet WAN link between the enterprise and the ITP; out of band via | |||
| a separate, dedicated wireline network link utilized solely for DOTS | a separate, dedicated wireline network link utilized solely for DOTS | |||
| signaling; or out-of-band via some other form of network connectivity | signaling; or out of band via some other form of network connectivity | |||
| such as a third-party wireless 4G network connectivity. | such as third-party wireless 4G network connectivity. | |||
| Note also that a DOTS client that sends a DOTS Mitigation request may | Note also that a DOTS client that sends a DOTS Mitigation request may | |||
| be also triggered by a network admin that manually confirms the | also be triggered by a network admin that manually confirms the | |||
| request to the upstream ITP, in which case the request may be sent | request to the upstream ITP, in which case the request may be sent | |||
| from an application such as a web browser or a dedicated mobile | from an application such as a web browser or a dedicated mobile | |||
| application. | application. | |||
| Note also that when the enterprise is multihomed and connected to | Note also that when the enterprise is multihomed and connected to | |||
| multiple upstream ITPs, each ITP is only able to provide a DDoS | multiple upstream ITPs, each ITP is only able to provide a DDoS | |||
| Mitigation Service for the traffic it transits. As a result, the | Mitigation Service for the traffic it transits. As a result, the | |||
| enterprise network may be required to coordinate the various DDoS | enterprise network may be required to coordinate the various DDoS | |||
| Mitigation Services associated to each link. More multi-homing | Mitigation Services associated with each link. More multihoming | |||
| considerations are discussed in [I-D.ietf-dots-multihoming]. | considerations are discussed in [DOTS-MULTIHOMING]. | |||
| 3.2. DDoS Mitigation by a Third Party DDoS Mitigation Service Provider | 3.2. DDoS Mitigation by a Third-Party DDoS Mitigation Service Provider | |||
| This use case differs from the previous use case described in | This use case differs from the previous use case described in | |||
| Section 3.1 in that the DDoS Mitigation Service is not provided by an | Section 3.1 in that the DDoS Mitigation Service is not provided by an | |||
| upstream ITP. In other words, as represented in Figure 2, the | upstream ITP. In other words, as represented in Figure 2, the | |||
| traffic is not forwarded through the DDoS Mitigation Service Provider | traffic is not forwarded through the DDoS Mitigation Service Provider | |||
| by default. In order to steer the traffic to the DDoS Mitigation | by default. In order to steer the traffic to the DDoS Mitigation | |||
| Service Provider, some network configuration changes are required. | Service Provider, some network configuration changes are required. | |||
| As such, this use case is likely to apply to large enterprises or | As such, this use case is likely to apply to large enterprises or | |||
| large data centers, but as for the other use cases is not exclusively | large data centers but, as for the other use cases, is not | |||
| limited to them. | exclusively limited to them. | |||
| Another typical scenario for this use case is for there to be a | Another typical scenario for this use case is for there to be a | |||
| relationship between DDoS Mitigation Service Providers, forming an | relationship between DDoS Mitigation Service Providers, forming an | |||
| overlay of DMS. When a DDoS Mitigation Service Provider mitigating a | overlay of DMS. When a DDoS Mitigation Service Provider mitigating a | |||
| DDoS attack reaches its resources capacity, it may chose to delegate | DDoS attack reaches its resource capacity, it may choose to delegate | |||
| the DDoS Mitigation to another DDoS Mitigation Service Provider. | the DDoS Mitigation to another DDoS Mitigation Service Provider. | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| | Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| | Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | | Provider | | | | | Provider | | |||
| | +--------+ | | DDoS Attack | | +--------+ | | DDoS Attack | |||
| | | DDoS | | <================================= | | | DDoS | | <================================= | |||
| | | Target | | <================================= | | | Target | | <================================= | |||
| | +--------+ | | | | | +--------+ | | | | |||
| skipping to change at page 8, line 30 ¶ | skipping to change at line 335 ¶ | |||
| | +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
| | | DDoS |<------------>| DDoS | | | | | DDoS |<------------>| DDoS | | | |||
| | | Mitigation |C | | S| Mitigation | | | | | Mitigation |C | | S| Mitigation | | | |||
| | | System | | | | System | | | | | System | | | | System | | | |||
| | +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| * C is for DOTS client functionality | * C is for DOTS client functionality | |||
| * S is for DOTS server functionality | * S is for DOTS server functionality | |||
| Figure 2: DDoS Mitigation between an Enterprise Network and Third | Figure 2: DDoS Mitigation between an Enterprise Network and a | |||
| Party DDoS Mitigation Service Provider | Third-Party DDoS Mitigation Service Provider | |||
| In this scenario, an enterprise network has entered into a pre- | In this scenario, an enterprise network has entered into a | |||
| arranged DDoS mitigation assistance agreement with one or more third- | prearranged DDoS Mitigation assistance agreement with one or more | |||
| party DDoS Mitigation Service Providers in order to ensure that | third-party DDoS Mitigation Service Providers in order to ensure that | |||
| sufficient DDoS mitigation capacity and/or capabilities may be | sufficient DDoS Mitigation capacity and/or capabilities may be | |||
| activated in the event that a given DDoS attack threatens to | activated in the event that a given DDoS attack threatens to | |||
| overwhelm the ability of the enterprise's or any other given DMS to | overwhelm the ability of the enterprise or any other given DMS to | |||
| mitigate the attack on its own. | mitigate the attack on its own. | |||
| The pre-arrangement typically includes agreement on the mechanisms | The prearrangement typically includes agreement on the mechanisms | |||
| used to redirect the traffic to the DDoS Mitigation Service Provider, | used to redirect the traffic to the DDoS Mitigation Service Provider, | |||
| as well as the mechanism to re-inject the traffic back to the | as well as the mechanism to re-inject the traffic back to the | |||
| Enterprise Network. Redirection to the DDoS Mitigation Service | Enterprise Network. Redirection to the DDoS Mitigation Service | |||
| Provider typically involves BGP prefix announcement or DNS | Provider typically involves BGP prefix announcement or DNS | |||
| redirection, while re-injection of the scrubbed traffic to the | redirection, while re-injection of the scrubbed traffic to the | |||
| enterprise network may be performed via tunneling mechanisms (e.g., | enterprise network may be performed via tunneling mechanisms (e.g., | |||
| GRE). The exact mechanisms used for traffic steering are out of | GRE). The exact mechanisms used for traffic steering are out of | |||
| scope of DOTS, but will need to be pre-arranged, while in some | scope of DOTS but will need to be prearranged, while in some contexts | |||
| contexts such changes could be detected and considered as an attack. | such changes could be detected and considered as an attack. | |||
| In some cases the communication between the enterprise DOTS client | In some cases, the communication between the enterprise DOTS client | |||
| and the DOTS server of the DDoS Mitigation Service Provider may go | and the DOTS server of the DDoS Mitigation Service Provider may go | |||
| through the ITP carrying the DDoS attack, which would affect the | through the ITP carrying the DDoS attack, which would affect the | |||
| communication. On the other hand, the communication between the DOTS | communication. On the other hand, the communication between the DOTS | |||
| client and DOTS server may take a path that is not undergoing a DDoS | client and DOTS server may take a path that is not undergoing a DDoS | |||
| attack. | attack. | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| | Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| | Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | | Provider | | | | | Provider | | |||
| skipping to change at page 9, line 37 ¶ | skipping to change at line 389 ¶ | |||
| | +------------+ | | +------------+ | || || | | +------------+ | | +------------+ | || || | |||
| | | DDoS |<------------>| DDoS | | || || | | | DDoS |<------------>| DDoS | | || || | |||
| | | mitigation |C | |S | mitigation |<===++ || | | | mitigation |C | |S | mitigation |<===++ || | |||
| | | system | | | | system |<======++ | | | system | | | | system |<======++ | |||
| | +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
| +------------------+ +------------------+ | +------------------+ +------------------+ | |||
| * C is for DOTS client functionality | * C is for DOTS client functionality | |||
| * S is for DOTS server functionality | * S is for DOTS server functionality | |||
| Figure 3: Redirection to a DDoS Mitigation Service Provider | Figure 3: Redirection to a DDoS Mitigation Service Provider | |||
| When the enterprise network is under attack or at least is reaching | When the enterprise network is under attack or at least is reaching | |||
| its capacity or ability to mitigate a given DDoS attack, the DOTS | its capacity or ability to mitigate a given DDoS attack, the DOTS | |||
| client sends a DOTS request to the DDoS Mitigation Service Provider | client sends a DOTS request to the DDoS Mitigation Service Provider | |||
| to initiate network traffic diversion - as represented in Figure 3 - | to initiate network traffic diversion -- as represented in Figure 3 | |||
| and DDoS mitigation activities. Ongoing attack and mitigation status | -- and DDoS Mitigation activities. Ongoing attack and mitigation | |||
| messages may be passed between the enterprise network and the DDoS | status messages may be passed between the enterprise network and the | |||
| Mitigation Service Provider using DOTS. If the DDoS attack has | DDoS Mitigation Service Provider using DOTS. If the DDoS attack has | |||
| stopped or the severity of the attack has subsided, the DOTS client | stopped or the severity of the attack has subsided, the DOTS client | |||
| can request the DDoS Mitigation Service Provider to terminate the | can request that the DDoS Mitigation Service Provider terminate the | |||
| DDoS Mitigation. | DDoS Mitigation. | |||
| 3.3. DDoS Orchestration | 3.3. DDoS Orchestration | |||
| In this use case, one or more DDoS telemetry systems or monitoring | In this use case, one or more DDoS telemetry systems or monitoring | |||
| devices monitor a network - typically an ISP network, an enterprise | devices monitor a network -- typically an ISP network, an enterprise | |||
| network, or a data center. Upon detection of a DDoS attack, these | network, or a data center. Upon detection of a DDoS attack, these | |||
| DDoS telemetry systems alert an orchestrator in charge of | DDoS telemetry systems alert an orchestrator in charge of | |||
| coordinating the various DMS's within the domain. The DDoS telemetry | coordinating the various DMSs within the domain. The DDoS telemetry | |||
| systems may be configured to provide required information, such as a | systems may be configured to provide required information, such as a | |||
| preliminary analysis of the observation, to the orchestrator. | preliminary analysis of the observation, to the orchestrator. | |||
| The orchestrator analyses the various sets of information it receives | The orchestrator analyzes the various sets of information it receives | |||
| from DDoS telemetry systems, and initiates one or more DDoS | from DDoS telemetry systems and initiates one or more DDoS Mitigation | |||
| mitigation strategies. For example, the orchestrator could select | strategies. For example, the orchestrator could select the DMS in | |||
| the DDoS mitigation system in the enterprise network or one provided | the enterprise network or one provided by the ITP. | |||
| by the ITP. | ||||
| DDoS Mitigation System selection and DDoS Mitigation techniques may | DMS selection and DDoS Mitigation techniques may depend on the type | |||
| depend on the type of the DDoS attack. In some case, a manual | of the DDoS attack. In some cases, a manual confirmation or | |||
| confirmation or selection may also be required to choose a proposed | selection may also be required to choose a proposed strategy to | |||
| strategy to initiate a DDoS Mitigation. The DDoS Mitigation may | initiate a DDoS Mitigation. The DDoS Mitigation may consist of | |||
| consist of multiple steps such as configuring the network, or of | multiple steps such as configuring the network or updating already- | |||
| updating already instantiated DDoS mitigation functions. Eventually, | instantiated DDoS Mitigation functions. Eventually, the coordination | |||
| the coordination of the mitigation may involve external DDoS | of the mitigation may involve external DDoS Mitigation resources such | |||
| mitigation resources such as a transit provider or a Third Party DDoS | as a transit provider or a third-party DDoS Mitigation Service | |||
| Mitigation Service Provider. | Provider. | |||
| The communication used to trigger a DDoS Mitigation between the DDoS | The communication used to trigger a DDoS Mitigation between the DDoS | |||
| telemetry and monitoring systems and the orchestrator is performed | telemetry and monitoring systems and the orchestrator is performed | |||
| using DOTS. The DDoS telemetry system implements a DOTS client while | using DOTS. The DDoS telemetry system implements a DOTS client while | |||
| the orchestrator implements a DOTS server. | the orchestrator implements a DOTS server. | |||
| The communication between a network administrator and the | The communication between a network administrator and the | |||
| orchestrator is also performed using DOTS. The network administrator | orchestrator is also performed using DOTS. The network administrator | |||
| uses, for example, a web interface which interacts with a DOTS | uses, for example, a web interface that interacts with a DOTS client, | |||
| client, while the orchestrator implements a DOTS server. | while the orchestrator implements a DOTS server. | |||
| The communication between the orchestrator and the DDoS Mitigation | The communication between the orchestrator and the DMSs is performed | |||
| Systems is performed using DOTS. The orchestrator implements a DOTS | using DOTS. The orchestrator implements a DOTS client while the DMSs | |||
| client while the DDoS Mitigation Systems implement a DOTS server. | implement a DOTS server. | |||
| The configuration aspects of each DDoS Mitigation System, as well as | The configuration aspects of each DMS, as well as the instantiations | |||
| the instantiations of DDoS mitigation functions or network | of DDoS Mitigation functions or network configuration, are not part | |||
| configuration is not part of DOTS. Similarly, the discovery of | of DOTS. Similarly, the discovery of available DDoS Mitigation | |||
| available DDoS mitigation functions is not part of DOTS; and as such | functions is not part of DOTS and, as such, is out of scope. | |||
| is out of scope. | ||||
| +----------+ | +----------+ | |||
| | network |C (Enterprise Network) | | network |C (Enterprise Network) | |||
| | adminis |<-+ | | admini- |<-+ | |||
| | trator | | | | strator | | | |||
| +----------+ | | +----------+ | | |||
| | | | | |||
| +----------+ | S+--------------+ +-----------+ | +----------+ | S+--------------+ +-----------+ | |||
| |telemetry/| +->| |C S| DDoS |+ | |telemetry/| +->| |C S| DDoS |+ | |||
| |monitoring|<--->| Orchestrator |<--->| mitigation|| | |monitoring|<--->| Orchestrator |<--->| mitigation|| | |||
| |systems |C S| |<-+ | systems || | |systems |C S| |<-+ | systems || | |||
| +----------+ +--------------+C | +-----------+| | +----------+ +--------------+C | +-----------+| | |||
| | +----------+ | | +----------+ | |||
| -----------------------------------|----------------- | -----------------------------------|----------------- | |||
| | | | | |||
| | | | | |||
| (Internet Transit Provider) | | (Internet Transit Provider) | | |||
| | +-----------+ | | +-----------+ | |||
| | S| DDoS |+ | | S| DDoS |+ | |||
| +->| mitigation|| | +->| mitigation|| | |||
| | systems || | | systems || | |||
| +-----------+| | +-----------+| | |||
| * C is for DOTS client functionality +----------+ | * C is for DOTS client functionality +----------+ | |||
| * S is for DOTS server functionality | * S is for DOTS server functionality | |||
| Figure 4: DDoS Orchestration | Figure 4: DDoS Orchestration | |||
| The DDoS telemetry systems monitor various aspects of the network | The DDoS telemetry systems monitor various aspects of the network | |||
| traffic and perform some measurement tasks. | traffic and perform some measurement tasks. | |||
| These systems are configured so that when an event or some | These systems are configured so that when an event or some | |||
| measurement indicators reach a predefined level their associated DOTS | measurement indicators reach a predefined level, their associated | |||
| client sends a DOTS mitigation request to the orchestrator DOTS | DOTS client sends a DOTS mitigation request to the orchestrator DOTS | |||
| server. The DOTS mitigation request may be associated with some | server. The DOTS mitigation request may be associated with some | |||
| optional mitigation hints to let the orchestrator know what has | optional mitigation hints to let the orchestrator know what has | |||
| triggered the request. In particular, it is possible for something | triggered the request. In particular, it is possible for something | |||
| that locally to one telemetry system looks like an attack is not | that looks like an attack locally to one telemetry system is not | |||
| actually an attack when seen from the broader scope (e.g., of the | actually an attack when seen from the broader scope (e.g., of the | |||
| orchestrator) | orchestrator). | |||
| Upon receipt of the DOTS mitigation request from the DDoS telemetry | Upon receipt of the DOTS mitigation request from the DDoS telemetry | |||
| system, the orchestrator DOTS server responds with an acknowledgment, | system, the orchestrator DOTS server responds with an acknowledgment | |||
| to avoid retransmission of the request for mitigation. The | to avoid retransmission of the request for mitigation. The | |||
| orchestrator may begin collecting additional fine-grained and | orchestrator may begin collecting additional fine-grained and | |||
| specific information from various DDoS telemetry systems in order to | specific information from various DDoS telemetry systems in order to | |||
| correlate the measurements and provide an analysis of the event. | correlate the measurements and provide an analysis of the event. | |||
| Eventually, the orchestrator may ask for additional information from | Eventually, the orchestrator may ask for additional information from | |||
| the DDoS telemetry system; however, the collection of this | the DDoS telemetry system; however, the collection of this | |||
| information is out of scope of DOTS. | information is out of scope of DOTS. | |||
| The orchestrator may be configured to start a DDoS Mitigation upon | The orchestrator may be configured to start a DDoS Mitigation upon | |||
| approval from a network administrator. The analysis from the | approval from a network administrator. The analysis from the | |||
| orchestrator is reported to the network administrator via, for | orchestrator is reported to the network administrator via, for | |||
| example, a web interface. If the network administrator decides to | example, a web interface. If the network administrator decides to | |||
| start the mitigation, the network administrator triggers the DDoS | start the mitigation, the network administrator triggers the DDoS | |||
| mitigation request using, for example, a web interface of a DOTS | Mitigation request using, for example, a web interface of a DOTS | |||
| client communicating to the orchestrator DOTS server. This request | client communicating to the orchestrator DOTS server. This request | |||
| is expected to be associated with a context that provides sufficient | is expected to be associated with a context that provides sufficient | |||
| information to the orchestrator DOTS server to infer, elaborate and | information to the orchestrator DOTS server to infer, elaborate, and | |||
| coordinate the appropriate DDoS Mitigation. | coordinate the appropriate DDoS Mitigation. | |||
| Upon receiving a request to mitigate a DDoS attack aimed at a target, | Upon receiving a request to mitigate a DDoS attack aimed at a target, | |||
| the orchestrator may evaluate the volume of the attack as well as the | the orchestrator may evaluate the volume of the attack as well as the | |||
| value that the target represents. The orchestrator may select the | value that the target represents. The orchestrator may select the | |||
| DDoS Mitigation Service Provider based on the attack severity. It | DDoS Mitigation Service Provider based on the attack severity. It | |||
| may also coordinate the DDoS Mitigation performed by the DDoS | may also coordinate the DDoS Mitigation performed by the DDoS | |||
| Mitigation Service Provider with some other tasks such as, for | Mitigation Service Provider with some other tasks such as, for | |||
| example, moving the target to another network so new sessions will | example, moving the target to another network so new sessions will | |||
| not be impacted. The orchestrator requests a DDoS Mitigation by the | not be impacted. The orchestrator requests a DDoS Mitigation by the | |||
| selected DDoS mitigation systems via its DOTS client, as described in | selected DMSs via its DOTS client, as described in Section 3.1. | |||
| Section 3.1. | ||||
| The orchestrator DOTS client is notified that the DDoS Mitigation is | The orchestrator DOTS client is notified that the DDoS Mitigation is | |||
| effective by the selected DDoS mitigation systems. The orchestrator | effective by the selected DMSs. The orchestrator DOTS server returns | |||
| DOTS server returns this information back to the network | this information to the network administrator. | |||
| administrator. | ||||
| Similarly, when the DDoS attack has stopped, the orchestrator DOTS | Similarly, when the DDoS attack has stopped, the orchestrator DOTS | |||
| client is notified and the orchestrator's DOTS server indicates to | client is notified and the orchestrator's DOTS server indicates the | |||
| the DDoS telemetry systems as well as to the network administrator | end of the DDoS Mitigation to the DDoS telemetry systems as well as | |||
| the end of the DDoS Mitigation. | to the network administrator. | |||
| In addition to the above DDoS Orchestration, the selected DDoS | In addition to the DDoS orchestration shown in Figure 4, the selected | |||
| mitigation system can return back a mitigation request to the | DMS can return a mitigation request to the orchestrator as an | |||
| orchestrator as an offloading. For example, when the DDoS attack | offloading. For example, when the DDoS attack becomes severe and the | |||
| becomes severe and the DDoS mitigation system's utilization rate | DMS's utilization rate reaches its maximum capacity, the DMS can send | |||
| reaches its maximum capacity, the DDoS mitigation system can send | mitigation requests with additional hints, such as its blocked | |||
| mitigation requests with additional hints such as its blocked traffic | traffic information, to the orchestrator. Then the orchestrator can | |||
| information to the orchestrator. Then the orchestrator can take | take further actions such as requesting forwarding nodes (e.g., | |||
| further actions such as requesting forwarding nodes such as routers | routers) to filter the traffic. In this case, the DMS implements a | |||
| to filter the traffic. In this case, the DDoS mitigation system | DOTS client while the orchestrator implements a DOTS server. Similar | |||
| implements a DOTS client while the orchestrator implements a DOTS | to other DOTS use cases, the offloading scenario assumes that some | |||
| server. Similar to other DOTS use cases, the offloading scenario | validation checks are followed by the DMS, the orchestrator, or both | |||
| assumes that some validation checks are followed by the DMS, the | (e.g., avoid exhausting the resources of the forwarding nodes or | |||
| orchestrator, or both (e.g., avoid exhausting the resources of the | inadvertent disruption of legitimate services). These validation | |||
| forwarding nodes or inadvertent disruption of legitimate services). | checks are part of the mitigation and are therefore out of the scope | |||
| These validation checks are part of the mitigation, and are therefore | of the document. | |||
| out of the scope of the document. | ||||
| 4. Security Considerations | 4. Security Considerations | |||
| The document does not describe any protocol, though there are still a | The document does not describe any protocol, though there are still a | |||
| few high-level security considerations to discuss. | few high-level security considerations to discuss. | |||
| DOTS is at risk from three primary attacks: DOTS agent impersonation, | DOTS is at risk from three primary attacks: DOTS agent impersonation, | |||
| traffic injection, and signaling blocking. | traffic injection, and signaling blocking. | |||
| Impersonation and traffic injection mitigation can be mitigated | Impersonation and traffic injection mitigation can be mitigated | |||
| through current secure communications best practices including mutual | through current secure communications best practices, including | |||
| authentication. Preconfigured mitigation steps to take on the loss | mutual authentication. Preconfigured mitigation steps to take on the | |||
| of keepalive traffic can partially mitigate signal blocking, but in | loss of keepalive traffic can partially mitigate signal blocking. | |||
| general it is impossible to comprehensively defend against an | But in general, it is impossible to comprehensively defend against an | |||
| attacker that can selectively block any or all traffic. Alternate | attacker that can selectively block any or all traffic. Alternate | |||
| communication paths that are (hopefully) not subject to blocking by | communication paths that are (hopefully) not subject to blocking by | |||
| the attacker in question is another potential mitigation. | the attacker in question is another potential mitigation. | |||
| Additional details of DOTS security requirements can be found in | Additional details of DOTS security requirements can be found in | |||
| [RFC8612]. | [RFC8612]. | |||
| Service disruption may be experienced if inadequate mitigation | Service disruption may be experienced if inadequate mitigation | |||
| actions are applied. These considerations are out of the scope of | actions are applied. These considerations are out of the scope of | |||
| DOTS. | DOTS. | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| No IANA considerations exist for this document. | This document has no IANA actions. | |||
| 6. Acknowledgments | ||||
| The authors would like to thank among others Tirumaleswar Reddy; | ||||
| Andrew Mortensen; Mohamed Boucadair; Artyom Gavrichenkov; Jon | ||||
| Shallow, Yuuhei Hayashi, Elwyn Davies, the DOTS WG chairs, Roman | ||||
| Danyliw and Tobias Gondrom as well as the Security AD Benjamin Kaduk | ||||
| for their valuable feedback. | ||||
| We also would like to thank Stephan Fouant that was part of the | ||||
| initial co-authors of the documents. | ||||
| 7. Informative References | 6. Informative References | |||
| [I-D.ietf-dots-multihoming] | [DOTS-MULTIHOMING] | |||
| Boucadair, M., Reddy.K, T., and W. Pan, "Multi-homing | Boucadair, M., Reddy, T., and W. Pan, "Multi-homing | |||
| Deployment Considerations for Distributed-Denial-of- | Deployment Considerations for Distributed-Denial-of- | |||
| Service Open Threat Signaling (DOTS)", draft-ietf-dots- | Service Open Threat Signaling (DOTS)", Work in Progress, | |||
| multihoming-04 (work in progress), May 2020. | Internet-Draft, draft-ietf-dots-multihoming-05, 23 | |||
| November 2020, <https://tools.ietf.org/html/draft-ietf- | ||||
| dots-multihoming-05>. | ||||
| [RFC8612] Mortensen, A., Reddy, T., and R. Moskowitz, "DDoS Open | [RFC8612] Mortensen, A., Reddy, T., and R. Moskowitz, "DDoS Open | |||
| Threat Signaling (DOTS) Requirements", RFC 8612, | Threat Signaling (DOTS) Requirements", RFC 8612, | |||
| DOI 10.17487/RFC8612, May 2019, | DOI 10.17487/RFC8612, May 2019, | |||
| <https://www.rfc-editor.org/info/rfc8612>. | <https://www.rfc-editor.org/info/rfc8612>. | |||
| [RFC8782] Reddy.K, T., Ed., Boucadair, M., Ed., Patil, P., | [RFC8782] Reddy.K, T., Ed., Boucadair, M., Ed., Patil, P., | |||
| Mortensen, A., and N. Teague, "Distributed Denial-of- | Mortensen, A., and N. Teague, "Distributed Denial-of- | |||
| Service Open Threat Signaling (DOTS) Signal Channel | Service Open Threat Signaling (DOTS) Signal Channel | |||
| Specification", RFC 8782, DOI 10.17487/RFC8782, May 2020, | Specification", RFC 8782, DOI 10.17487/RFC8782, May 2020, | |||
| <https://www.rfc-editor.org/info/rfc8782>. | <https://www.rfc-editor.org/info/rfc8782>. | |||
| [RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed | [RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed | |||
| Denial-of-Service Open Threat Signaling (DOTS) Data | Denial-of-Service Open Threat Signaling (DOTS) Data | |||
| Channel Specification", RFC 8783, DOI 10.17487/RFC8783, | Channel Specification", RFC 8783, DOI 10.17487/RFC8783, | |||
| May 2020, <https://www.rfc-editor.org/info/rfc8783>. | May 2020, <https://www.rfc-editor.org/info/rfc8783>. | |||
| Acknowledgments | ||||
| The authors would like to thank, among others, Tirumaleswar Reddy.K, | ||||
| Andrew Mortensen, Mohamed Boucadair, Artyom Gavrichenkov, Jon | ||||
| Shallow, Yuuhei Hayashi, Elwyn Davies, the DOTS WG Chairs (at the | ||||
| time of writing) Roman Danyliw and Tobias Gondrom, as well as the | ||||
| Security AD Benjamin Kaduk for their valuable feedback. | ||||
| We also would like to thank Stephan Fouant, who was one of the | ||||
| initial coauthors of the documents. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Roland Dobbins | Roland Dobbins | |||
| Arbor Networks | Netscout, Inc. | |||
| Singapore | Singapore | |||
| EMail: rdobbins@arbor.net | Email: roland.dobbins@netscout.com | |||
| Daniel Migault | Daniel Migault | |||
| Ericsson | Ericsson | |||
| 8275 Trans Canada Route | 8275 Trans Canada Route | |||
| Saint Laurent, QC 4S 0B6 | Saint Laurent, Quebec 4S 0B6 | |||
| Canada | Canada | |||
| EMail: daniel.migault@ericsson.com | Email: daniel.migault@ericsson.com | |||
| Robert Moskowitz | Robert Moskowitz | |||
| HTT Consulting | HTT Consulting | |||
| Oak Park, MI 48237 | Oak Park, MI 48237 | |||
| USA | United States of America | |||
| EMail: rgm@labs.htt-consult.com | Email: rgm@labs.htt-consult.com | |||
| Nik Teague | Nik Teague | |||
| Iron Mountain Data Centers | Iron Mountain Data Centers | |||
| UK | United Kingdom | |||
| Email: nteague@ironmountain.co.uk | ||||
| EMail: nteague@ironmountain.co.uk | ||||
| Liang Xia | Liang Xia | |||
| Huawei | Huawei | |||
| No. 101, Software Avenue, Yuhuatai District | No. 101, Software Avenue, Yuhuatai District | |||
| Nanjing | Nanjing | |||
| China | China | |||
| EMail: Frank.xialiang@huawei.com | Email: Frank.xialiang@huawei.com | |||
| Kaname Nishizuka | Kaname Nishizuka | |||
| NTT Communications | NTT Communications | |||
| GranPark 16F 3-4-1 Shibaura, Minato-ku | GranPark 16F | |||
| Tokyo 108-8118 | 3-4-1 Shibaura, Minato-ku, Tokyo | |||
| 108-8118 | ||||
| Japan | Japan | |||
| EMail: kaname@nttv6.jp | Email: kaname@nttv6.jp | |||
| End of changes. 94 change blocks. | ||||
| 214 lines changed or deleted | 213 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||