Re: [Dots] I-D Action: draft-ietf-dots-data-channel-19.txt

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Mon, 03 September 2018 10:47 UTC

Return-Path: <TirumaleswarReddy_Konda@mcafee.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 412B512D949 for <dots@ietfa.amsl.com>; Mon, 3 Sep 2018 03:47:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dZLdt2dNug5E for <dots@ietfa.amsl.com>; Mon, 3 Sep 2018 03:47:54 -0700 (PDT)
Received: from DNVWSMAILOUT1.mcafee.com (dnvwsmailout1.mcafee.com [161.69.31.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E938128CF3 for <dots@ietf.org>; Mon, 3 Sep 2018 03:47:54 -0700 (PDT)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=s_mcafee; t=1535971685; h=From: To:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:x-originating-ip: x-ms-publictraffictype:x-microsoft-exchange-diagnostics: x-ms-exchange-antispam-srfa-diagnostics:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-microsoft-antispam-prvs:x-exchange-antispam-report-test: x-ms-exchange-senderadcheck:x-exchange-antispam-report-cfa-test: x-forefront-prvs:x-forefront-antispam-report: received-spf:authentication-results:x-microsoft-antispam-message-info: spamdiagnosticoutput:spamdiagnosticmetadata: Content-Type:Content-Transfer-Encoding:MIME-Version: X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Threshold: X-NAI-Spam-Score:X-NAI-Spam-Version; bh=K WXbW+rnJcNYNiTLhXY7M4x/kGVNTucHgkjnvOWYZC E=; b=iBIyDEWfjaF2yocVVEQhoKI1k/nPwycoKBtZR2ZceoMA 4d2JkJeJZHYhOeJr04t6IrfNU2WV7p3qvIdmiLfwrsajf+T1Va hF2yFlFvUBcCKqEKyF4GHoSvzF6sWhBzfxXQ0nw9eVSCR+WBsn PCUyYN6o1WQnktWveASaeAPyD3k=
Received: from DNVEXAPP1N05.corpzone.internalzone.com (unknown [10.44.48.89]) by DNVWSMAILOUT1.mcafee.com with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 0eef_b263_40e91fe6_11c0_4736_b5da_3ab74bbbd0c4; Mon, 03 Sep 2018 05:48:04 -0500
Received: from DNVEXAPP1N05.corpzone.internalzone.com (10.44.48.89) by DNVEXAPP1N05.corpzone.internalzone.com (10.44.48.89) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Mon, 3 Sep 2018 04:47:07 -0600
Received: from DNVEX10N01.corpzone.internalzone.com (10.44.82.192) by DNVEXAPP1N05.corpzone.internalzone.com (10.44.48.89) with Microsoft SMTP Server (TLS) id 15.0.1347.2 via Frontend Transport; Mon, 3 Sep 2018 04:47:07 -0600
Received: from DNVO365EDGE2.corpzone.internalzone.com (10.44.176.74) by DNVEX10N01.corpzone.internalzone.com (10.44.82.192) with Microsoft SMTP Server (TLS) id 14.3.361.1; Mon, 3 Sep 2018 04:47:07 -0600
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (10.44.176.243) by edge.mcafee.com (10.44.176.74) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Mon, 3 Sep 2018 04:47:07 -0600
Received: from BN6PR16MB1425.namprd16.prod.outlook.com (10.172.207.19) by BN6PR16MB1859.namprd16.prod.outlook.com (10.172.29.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1101.18; Mon, 3 Sep 2018 10:47:05 +0000
Received: from BN6PR16MB1425.namprd16.prod.outlook.com ([fe80::a14e:458f:4a71:ef35]) by BN6PR16MB1425.namprd16.prod.outlook.com ([fe80::a14e:458f:4a71:ef35%6]) with mapi id 15.20.1101.016; Mon, 3 Sep 2018 10:47:05 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: "dots@ietf.org" <dots@ietf.org>
Thread-Topic: [Dots] I-D Action: draft-ietf-dots-data-channel-19.txt
Thread-Index: AQHUQ3NM2X8p0l40Q0yCHLRCSFkr76TeX4Zw
Date: Mon, 03 Sep 2018 10:47:05 +0000
Message-ID: <BN6PR16MB1425990DC933A7AF3CAC37A8EA0C0@BN6PR16MB1425.namprd16.prod.outlook.com>
References: <153597153637.13248.2499219757872072955@ietfa.amsl.com>
In-Reply-To: <153597153637.13248.2499219757872072955@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.500.52
dlp-reaction: no-action
x-originating-ip: [103.245.47.20]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR16MB1859; 6:I3+6ih3gzcvJOKt5zEh5VpPaLla3EGl36AogoVmAytaX7ZcsdKGG507XCjg3vc2Ae2eiVrTalvbAAslNu+uUH0gDKdKKG0WUgXLR5MiMCDOofsuSbOtbQHYKWHflW6vrix6hegWjk7VEcmMFzUdjPnhIupBdFi7M2f6gV5FImI5VVnqY7MRdMiaVGHXmz3onTI8Q6CuZKh7oMsVBKip4eEAXHWEKcjTcFd6Oh4ggV1XvbH1q3sI57NES4Mnfm1G2e8/hq2jhG15jmaD4hZgU+Eh4k9jqkqAjeLrJpnS6ttq9X2QBKrWcGcOg6swXC/Hls5blKr2tjRFwH7BfPJHjkmx3N6gEtTwvmduAvN9nj/BoBIuzNsvfhmiDPqaQ9bSkr0pKS0w6HrJldrkleRWhpfZ3AW9CWzXyeuPzNNEFaxsAxcyBafOKCz9fDsYixLD+pxNVLWtMoosKl53HNYwE7g==; 5:Fnl90DAjUT0PehB60D+72DGcjFLl8WUN3kpU+yKg984qEZE0jtrljO06VlJYY8oYs5W8EU5Z26bES0199ed3ZC4alQvkJz6eGY6GrgRsp3e4vHUoR6pQqIFX1F2Xf4rL4zzdOFLRY8Z0gf2Q8f6kgffuQnneai2cSFQ8nWlBtFM=; 7:ioDPKI4iO6TdnV7TgFjzAnL+IeR66idnFVahZjUWEOAHdSEDL5Cj0erPM6DLwlSMmupOzjtbvMMGRJr8gSMneOC3MkKSldXkbGZ0bc5xBGAZsVZk6Ub0ZkskjKwxNfksZfBLE+cyZXKOSRsSPZ5krt0WDV/ynCDFJ1RjAiiCauS1EDF94deFYOfI7e5LysHiKAKbX2kwh/6k2BnEn3eNe//Jz0sUqZkSPhFLo2fCZuKX+XvgL3g3vcC1h6M2Fz5b
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: c074dd0e-81a9-4fe3-44f8-08d6118a9731
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989137)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:BN6PR16MB1859;
x-ms-traffictypediagnostic: BN6PR16MB1859:
x-microsoft-antispam-prvs: <BN6PR16MB1859898BEECF7C624F310780EA0C0@BN6PR16MB1859.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(120809045254105)(192374486261705);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231311)(944501410)(52105095)(10201501046)(3002001)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(201708071742011)(7699016); SRVR:BN6PR16MB1859; BCL:0; PCL:0; RULEID:; SRVR:BN6PR16MB1859;
x-forefront-prvs: 0784C803FD
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(366004)(136003)(396003)(39860400002)(13464003)(189003)(199004)(32952001)(6116002)(86362001)(5660300001)(6916009)(476003)(8676002)(105586002)(7696005)(76176011)(99286004)(6246003)(74316002)(2501003)(186003)(5250100002)(68736007)(11346002)(6306002)(2900100001)(9686003)(3846002)(97736004)(80792005)(2906002)(33656002)(446003)(5640700003)(229853002)(6346003)(55016002)(25786009)(102836004)(6506007)(53546011)(486006)(6436002)(305945005)(106356001)(14444005)(256004)(2351001)(72206003)(53936002)(966005)(81166006)(81156014)(14454004)(8936002)(478600001)(7736002)(316002)(1730700003)(26005)(66066001)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR16MB1859; H:BN6PR16MB1425.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: McAfee.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=TirumaleswarReddy_Konda@McAfee.com;
x-microsoft-antispam-message-info: PQNq3+7YwMTJBTSo/FDLb1Lt8YSC9tNDxiK//GaWNNxl+0180yp15jHl83P4bkS+JQqdOj17MoZIgCL7+JuPn1VnNnvJnQCBwXUnnQ9Eooln/4yFZYQLvNteyCboEp1AB7C3MINZ9/Mfi8eqbSMoorJGxMzDnkyQWwqYhBcY9PbI4CFEJs1BjJsQNEEMdp47qzixLA7wbMi7BBGvDQQCUcAtRysc3DkiX8Sn36zjPnQY8jPAnQWLDm0E5A+fi/GUySW9cJvEtc3jjvpG3tQO2r8CNi8i///w0eKbSrSSPhEU25cP+5pgqxgIS7TrpgFd8QdIO+gCnwLUqSC8eWBDpCS2FJT9RHd9RmO0Nfp/ebE=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: c074dd0e-81a9-4fe3-44f8-08d6118a9731
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Sep 2018 10:47:05.8626 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR16MB1859
X-OriginatorOrg: mcafee.com
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0
X-NAI-Spam-Version: 2.3.0.9418 : core <6365> : inlines <6846> : streams <1797368> : uri <2702042>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/6HnX5o3XMkPLpOijI-_U5S1bVv8>
Subject: Re: [Dots] I-D Action: draft-ietf-dots-data-channel-19.txt
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Sep 2018 10:47:56 -0000

This revision addresses comment from Kathleen and adds the following lines to Security Considerations section.

The installation of black-list and white-list rules using RESTCONF over TLS reveal the attacker IP addresses and legitimate IP addresses 
only to the DOTS server trusted by the DOTS client. The secure communication channel between DOTS agents provides privacy and prevents a network eavesdropper from 
gaining access to the black-listed and white-listed IP addresses.

-Tiru

> -----Original Message-----
> From: Dots <dots-bounces@ietf.org> On Behalf Of internet-drafts@ietf.org
> Sent: Monday, September 3, 2018 4:16 PM
> To: i-d-announce@ietf.org
> Cc: dots@ietf.org
> Subject: [Dots] I-D Action: draft-ietf-dots-data-channel-19.txt
> 
> 
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the DDoS Open Threat Signaling WG of the IETF.
> 
>         Title           : Distributed Denial-of-Service Open Threat Signaling (DOTS)
> Data Channel Specification
>         Authors         : Mohamed Boucadair
>                           Tirumaleswar Reddy
>                           Kaname Nishizuka
>                           Liang Xia
>                           Prashanth Patil
>                           Andrew Mortensen
>                           Nik Teague
> 	Filename        : draft-ietf-dots-data-channel-19.txt
> 	Pages           : 66
> 	Date            : 2018-09-03
> 
> Abstract:
>    The document specifies a Distributed Denial-of-Service Open Threat
>    Signaling (DOTS) data channel used for bulk exchange of data that
>    cannot easily or appropriately communicated through the DOTS signal
>    channel under attack conditions.
> 
>    This is a companion document to the DOTS signal channel
>    specification.
> 
> Editorial Note (To be removed by RFC Editor)
> 
>    Please update these statements within the document with the RFC
>    number to be assigned to this document:
> 
>    o  "This version of this YANG module is part of RFC XXXX;"
> 
>    o  "RFC XXXX: Distributed Denial-of-Service Open Threat Signaling
>       (DOTS) Data Channel Specification";
> 
>    o  reference: RFC XXXX
> 
>    Please update these statements with the RFC number to be assigned to
>    the following documents:
> 
>    o  "RFC YYYY: Distributed Denial-of-Service Open Threat Signaling
>       (DOTS) Signal Channel Specification" (used to be
>       [I-D.ietf-dots-signal-channel])
> 
>    o  "RFC ZZZZ: Network Access Control List (ACL) YANG Data Model"
>       (used to be [I-D.ietf-netmod-acl-model])
> 
>    Please update the "revision" date of the YANG module.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dots-data-channel/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-dots-data-channel-19
> https://datatracker.ietf.org/doc/html/draft-ietf-dots-data-channel-19
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dots-data-channel-19
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Dots mailing list
> Dots@ietf.org
> https://www.ietf.org/mailman/listinfo/dots