Re: [Dots] A general question about the near source mitigation and DOTS call home mechanism:
<mohamed.boucadair@orange.com> Fri, 12 July 2019 06:23 UTC
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D07B120098; Thu, 11 Jul 2019 23:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level:
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rv2qZoD6w1Mj; Thu, 11 Jul 2019 23:23:00 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A855D120048; Thu, 11 Jul 2019 23:22:59 -0700 (PDT)
Received: from opfednr03.francetelecom.fr (unknown [xx.xx.xx.67]) by opfednr24.francetelecom.fr (ESMTP service) with ESMTP id 45lNC56VjQz1yYS; Fri, 12 Jul 2019 08:22:57 +0200 (CEST)
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.35]) by opfednr03.francetelecom.fr (ESMTP service) with ESMTP id 45lNC55G2kzDq7p; Fri, 12 Jul 2019 08:22:57 +0200 (CEST)
Received: from OPEXCAUBMA2.corporate.adroot.infra.ftgroup ([fe80::e878:bd0:c89e:5b42]) by OPEXCAUBM6C.corporate.adroot.infra.ftgroup ([fe80::f58e:8e9d:ae18:b9e3%21]) with mapi id 14.03.0439.000; Fri, 12 Jul 2019 08:22:57 +0200
From: mohamed.boucadair@orange.com
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>, "dots@ietf.org" <dots@ietf.org>
CC: "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "draft-ietf-dots-signal-call-home.authors@ietf.org" <draft-ietf-dots-signal-call-home.authors@ietf.org>
Thread-Topic: A general question about the near source mitigation and DOTS call home mechanism:
Thread-Index: AdU4YWiV0o6ZgW1PTuq0BxDsS/XflAAD0NKQAAEiEIAAANuLAAAARGFg
Date: Fri, 12 Jul 2019 06:22:57 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302EACAD8E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <C02846B1344F344EB4FAA6FA7AF481F13E7C87BC@dggemm511-mbx.china.huawei.com> <787AE7BB302AE849A7480A190F8B93302EACACA3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <C02846B1344F344EB4FAA6FA7AF481F13E7C8896@dggemm511-mbx.china.huawei.com> <DM5PR16MB1705EB5E892DE2946DD8B447EAF20@DM5PR16MB1705.namprd16.prod.outlook.com>
In-Reply-To: <DM5PR16MB1705EB5E892DE2946DD8B447EAF20@DM5PR16MB1705.namprd16.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B93302EACAD8EOPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/5ob59ehmNFgjV6NdBBYN_u8Kn10>
Subject: Re: [Dots] A general question about the near source mitigation and DOTS call home mechanism:
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jul 2019 06:23:04 -0000
Hi Tiru, Agree. This is why src-* are not considered as part of the initial set of attributes defined in the base spec. Nevertheless, there are scenarios where a limited number of sources can be included even for the base signal channel. An example is discussed in draft-hayashi-dots-dms-offload-usecase. Cheers, Med De : Konda, Tirumaleswar Reddy [mailto:TirumaleswarReddy_Konda@McAfee.com] Envoyé : vendredi 12 juillet 2019 08:18 À : Xialiang (Frank, Network Standard & Patent Dept); BOUCADAIR Mohamed TGI/OLN; dots@ietf.org Cc : dots-chairs@ietf.org; draft-ietf-dots-signal-call-home.authors@ietf.org Objet : RE: A general question about the near source mitigation and DOTS call home mechanism: Hi Frank, A typical DDoS attack would involve several thousand compromised devices (botnets) to attack the victim, and the IP addresses itself could be spoofed and can keep changing. DOTS signal channel cannot convey so many prefixes. However, in the DOTS call home scenario, it is not a problem since the source-prefix is restricted to the subscriber assigned prefixes and IP addresses. Cheers, -Tiru From: Dots <dots-bounces@ietf.org> On Behalf Of Xialiang (Frank, Network Standard & Patent Dept) Sent: Friday, July 12, 2019 11:24 AM To: mohamed.boucadair@orange.com; dots@ietf.org Cc: dots-chairs@ietf.org; draft-ietf-dots-signal-call-home.authors@ietf.org Subject: [Dots] 答复: A general question about the near source mitigation and DOTS call home mechanism: CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe. ________________________________ Hi Med, Ok. Thanks for the clarification. Any suggestions about whether we should add these attack source related information into the base dots signal channel draft? As a contributor, I think it’s friendly for the RFC readers to find all the useful attributes in one draft. B.R. Frank 发件人: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> [mailto:mohamed.boucadair@orange.com] 发送时间: 2019年7月12日 13:25 收件人: Xialiang (Frank, Network Standard & Patent Dept) <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>; dots@ietf.org<mailto:dots@ietf.org> 抄送: draft-ietf-dots-signal-call-home.authors@ietf.org<mailto:draft-ietf-dots-signal-call-home.authors@ietf.org>; dots-chairs@ietf.org<mailto:dots-chairs@ietf.org> 主题: RE: A general question about the near source mitigation and DOTS call home mechanism: Hi Franck, The source information can be used in the DOTS signal channel. The I-D says the following: This specification extends the mitigation request defined in Section 4.4.1 of [I-D.ietf-dots-signal-channel<https://tools.ietf.org/html/draft-ietf-dots-signal-call-home-03#ref-I-D.ietf-dots-signal-channel>] to convey the attacker source prefixes and source port numbers. augment /ietf-signal:dots-signal/ietf-signal:message-type /ietf-signal:mitigation-scope/ietf-signal:scope: +--rw source-prefix* inet:ip-prefix {source-signaling}? +--rw source-port-range* [lower-port] {source-signaling}? | +--rw lower-port inet:port-number | +--rw upper-port? inet:port-number +--rw source-icmp-type-range* | [lower-type] {source-signaling}? +--rw lower-type uint8 +--rw upper-type? uint8 The attributes are optional for the DOTS signal channel: This is an optional attribute for the base DOTS signal channel operations [I-D.ietf-dots-signal-channel<https://tools.ietf.org/html/draft-ietf-dots-signal-call-home-03#ref-I-D.ietf-dots-signal-channel>]. while some of them are mandatory for the call home: The 'source-prefix' parameter is a mandatory attribute when the ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ attack traffic information is signaled by a DOTS client in the Call ^^^^ Home scenario (depicted in Figure 2). ^^^^ Cheers, Med De : Xialiang (Frank, Network Standard & Patent Dept) [mailto:frank.xialiang@huawei.com] Envoyé : vendredi 12 juillet 2019 05:38 À : dots@ietf.org<mailto:dots@ietf.org> Cc : draft-ietf-dots-signal-call-home.authors@ietf.org<mailto:draft-ietf-dots-signal-call-home.authors@ietf.org>; dots-chairs@ietf.org<mailto:dots-chairs@ietf.org> Objet : A general question about the near source mitigation and DOTS call home mechanism: Hi all, If I am correct, current dots call home draft include 2 main points: 1—dots server create underlay tls connection with dots client due to the dots server is located behind home gateway (more generally, DC gateway, cloud gateway, branch gateway, …); 2—for near source mitigation, dots client should send the attack source information (address, port, …) to dots server for its mitigation. I am wondering why we cannot use the same attack source information of point 2 in the dots signal channel, which aims for the same goal of near source mitigation? I do see the use cases and requirements for many outbound attacks. And it also means the point 1 and 2 of signal channel call home is not necessary to be combined together always. And should we consider the update of current signal channel WG draft, or other way? Your comments? B.R. Frank
- [Dots] A general question about the near source m… Xialiang (Frank, Network Standard & Patent Dept)
- Re: [Dots] A general question about the near sour… mohamed.boucadair
- [Dots] 答复: A general question about the near sour… Xialiang (Frank, Network Standard & Patent Dept)
- Re: [Dots] A general question about the near sour… mohamed.boucadair
- Re: [Dots] A general question about the near sour… Konda, Tirumaleswar Reddy
- [Dots] 答复: A general question about the near sour… Xialiang (Frank, Network Standard & Patent Dept)
- Re: [Dots] A general question about the near sour… mohamed.boucadair
- [Dots] 答复: A general question about the near sour… Xialiang (Frank, Network Standard & Patent Dept)