[Dots] Last Call: <draft-ietf-dots-signal-channel-30.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification) to Proposed Standard
The IESG <iesg-secretary@ietf.org> Tue, 05 March 2019 23:11 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: dots@ietf.org
Delivered-To: dots@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F68F1200D8; Tue, 5 Mar 2019 15:11:47 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.93.0
Auto-Submitted: auto-generated
Precedence: bulk
CC: draft-ietf-dots-signal-channel@ietf.org, dots@ietf.org, frank.xialiang@huawei.com, kaduk@mit.edu, dots-chairs@ietf.org, Liang Xia <frank.xialiang@huawei.com>
Reply-To: ietf@ietf.org
Sender: iesg-secretary@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Reply-To: ietf@ietf.org
Message-ID: <155182750727.27636.16089143237300202213.idtracker@ietfa.amsl.com>
Date: Tue, 05 Mar 2019 15:11:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/5I6QmqyRX5_Zxh5UURa1JX9acoE>
Subject: [Dots] Last Call: <draft-ietf-dots-signal-channel-30.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification) to Proposed Standard
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2019 23:11:47 -0000
The IESG has received a request from the DDoS Open Threat Signaling WG (dots) to consider the following document: - 'Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification' <draft-ietf-dots-signal-channel-30.txt> as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2019-03-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies the DOTS signal channel, a protocol for signaling the need for protection against Distributed Denial-of- Service (DDoS) attacks to a server capable of enabling network traffic mitigation on behalf of the requesting client. A companion document defines the DOTS data channel, a separate reliable communication layer for DOTS management and configuration purposes. Editorial Note (To be removed by RFC Editor) Please update these statements within the document with the RFC number to be assigned to this document: o "This version of this YANG module is part of RFC XXXX;" o "RFC XXXX: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification"; o "| [RFCXXXX] |" o reference: RFC XXXX Please update this statement with the RFC number to be assigned to the following documents: o "RFC YYYY: Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification (used to be I-D.ietf-dots-data- channel) Please update TBD/TBD1/TBD2 statements with the assignments made by IANA to DOTS Signal Channel Protocol. Also, please update the "revision" date of the YANG modules. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dots-signal-channel/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-dots-signal-channel/ballot/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc7918: Transport Layer Security (TLS) False Start (Informational - IETF stream)