[Dots] Opsdir last call review of draft-ietf-dots-signal-filter-control-04

Tim Chown via Datatracker <noreply@ietf.org> Mon, 15 June 2020 15:08 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: dots@ietf.org
Delivered-To: dots@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E3D013A0E52; Mon, 15 Jun 2020 08:08:29 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Tim Chown via Datatracker <noreply@ietf.org>
To: ops-dir@ietf.org
Cc: draft-ietf-dots-signal-filter-control.all@ietf.org, last-call@ietf.org, dots@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.3.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <159223370986.12685.10672338283953567887@ietfa.amsl.com>
Reply-To: Tim Chown <tim.chown@jisc.ac.uk>
Date: Mon, 15 Jun 2020 08:08:29 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/2jF7zF32hshWHQjwxgZibSL77B4>
Subject: [Dots] Opsdir last call review of draft-ietf-dots-signal-filter-control-04
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jun 2020 15:08:30 -0000

Reviewer: Tim Chown
Review result: Has Nits

Hi,

I have reviewed this document as part of the Operational directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs should
treat these comments just like any other last call comments.

This document is one of a set of documents produced by the DDoS Open Threat
Signalling (DOTS) working group, and builds on previously published RFCs (RFC
8782, 8783). It describes a mechanism by which the DOTS signalling channel
defined in RFC 8782 can be used to allow a DOTS client that is under attack to
change the filtering rules and thus the mitigation behaviour being applied to
it via a DOTS server, even when the downstream to it may be saturated.

The text is well-written with a good structure and a healthy number of
examples. I would asses its current state as Ready with Nits.  The new
capability seems very useful.

General comments:

I am not wholly clear about some terms, e.g. “idle time” seems to be when no
mitigation is in place, but does this mean no filtering rules are active, or no
anti-DDoS rules are active?  Or are all DOTS rules there for mitigation rather
than general protection?

If I understand correctly, this extension allows new filter rules to be added,
such as rate limits, so it’s not just that the signal channel can be used to
control (activate and deactivate) existing filters.  If correct, perhaps that
could be made more explicit early on, even in the abstract.

Section 1.1:

The problem statement is good.  A very clear requirement.

Section 1.2:

I would add some text that briefly explains the different properties of RFC
8782 and 8783, i.e. that with its lightweight design and heartbeat protocol
(section 4.7 of RFC 8782) the signalling channel can be used to communicate
with a DOTS server even when the downstream link to the DOTS client is
saturated.  As it is, you have to be familiar with RFC 8782 to understand
what’s written here; some extra clarity would be useful.

Section 3.2.1:

“A DOTS client relies on information received from the DOTS server…” but can it
always receive such information if the link is saturated?  It seems to me that
you can push messages from client to server under an attack, but cannot assume
the reverse is true?

Nits:

Abstract:

The filtering rules are “supposed to be conveyed during idle time .. by the
data channel” - does that mean they can be conveyed outside quiet time, or MUST
NOT be conveyed outside idle time over the data channel?   Or does the new
capability in this document make that a MUST or SHOULD NOT?

Section 1.1:
What is “the conflict” in para 4?

Otherwise, very clean with no typos that I see.

Best wishes,
Tim