Re: [Dots] WGLC for draft-ietf-dots-multihoming-07

mohamed.boucadair@orange.com Thu, 02 December 2021 09:11 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B98643A0D17; Thu, 2 Dec 2021 01:11:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2s6hK3DX6Tj8; Thu, 2 Dec 2021 01:11:54 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2BF1F3A0D1A; Thu, 2 Dec 2021 01:11:54 -0800 (PST)
Received: from opfednr04.francetelecom.fr (unknown [xx.xx.xx.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr20.francetelecom.fr (ESMTP service) with ESMTPS id 4J4VZb501Dz1ybn; Thu, 2 Dec 2021 10:11:51 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1638436311; bh=gD+HQxt+X+JEAO0JbmZOBVCWxPWHCxmNEkWPOAit3fU=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=BTPEJOvAaFFoLA4z8MaoFrf+rId+TDIxbb5JvMzVKw9zU/2dZLJZln9ZTAbU3jhH3 8YQEbrCi1KezI+pbDoGZcgBFnYW2Ib5dm0CaqAGBMZF0KL8rnftz68VwC/BLeVpQR+ pntkcfAJbbS/hWozqGQpiVHjNK8Fn9UCwVXeFUNHoVENqQVJH4My2OHzgXstFoYb8G gc6+UJpp3od6yPl9mb1gT9utyEgvHv7HJ3MRUsZQb9LukoRLQo2iEVhx4Meej+6dyo JSR8/zKEfSUtiUmcDJlbuLcW++Grfevs/Kv6o8/Pb2/HcBJ3O55ramoBTaKsJxhSbe 2pugnxvDSEqWg==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfednr04.francetelecom.fr (ESMTP service) with ESMTPS id 4J4VZb43Lvz1xpP; Thu, 2 Dec 2021 10:11:51 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Valery Smyslov <smyslov.ietf@gmail.com>, 'Valery Smyslov' <valery@smyslov.net>
CC: "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "draft-ietf-dots-multihoming@ietf.org" <draft-ietf-dots-multihoming@ietf.org>, "dots@ietf.org" <dots@ietf.org>
Thread-Topic: [Dots] WGLC for draft-ietf-dots-multihoming-07
Thread-Index: AQH6belXfbSp5MW82qMwT7ehhypeAAIsV0W/Al6AJjuroQQUoIAGrTrAgA3VHaA=
Content-Class:
Date: Thu, 02 Dec 2021 09:11:49 +0000
Message-ID: <7628_1638436311_61A88DD7_7628_373_4_787AE7BB302AE849A7480A190F8B93303545DB24@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <002101d7be93$c890ed10$59b2c730$@smyslov.net> <059501d7ccc8$8ad61390$a0823ab0$@smyslov.net> <29138_1637054139_619376BB_29138_50_1_787AE7BB302AE849A7480A190F8B93303545258E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <174101d7dd22$8f6cd5a0$ae4680e0$@gmail.com> <31854_1637676424_619CF588_31854_112_1_787AE7BB302AE849A7480A190F8B933035457D44@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <31854_1637676424_619CF588_31854_112_1_787AE7BB302AE849A7480A190F8B933035457D44@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-12-02T09:11:36Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=b899fd99-558f-4d31-b466-dff2a26907ae; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/BNzZMFolonVHkksBjidA5yLuqvE>
Subject: Re: [Dots] WGLC for draft-ietf-dots-multihoming-07
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2021 09:12:00 -0000

Hi Valery, 

FWIW, the changes are now available online: https://www.ietf.org/rfcdiff?url2=draft-ietf-dots-multihoming-09

Cheers,
Med

> -----Message d'origine-----
> De : Dots <dots-bounces@ietf.org> De la part de
> mohamed.boucadair@orange.com
> Envoyé : mardi 23 novembre 2021 15:07
> À : Valery Smyslov <smyslov.ietf@gmail.com>; 'Valery Smyslov'
> <valery@smyslov.net>; dots@ietf.org
> Cc : dots-chairs@ietf.org; draft-ietf-dots-multihoming@ietf.org
> Objet : Re: [Dots] WGLC for draft-ietf-dots-multihoming-07
> 
> Hi Valery,
> 
> Thank you for the follow-up.
> 
> The changes to address your comments can be tracked at:
> https://tinyurl.com/dots-multihoming-latest.
> 
> Please see inline for more context.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Valery Smyslov <smyslov.ietf@gmail.com> Envoyé : vendredi 19
> > novembre 2021 09:51 À : BOUCADAIR Mohamed INNOV/NET
> > <mohamed.boucadair@orange.com>; 'Valery Smyslov' <valery@smyslov.net>;
> > dots@ietf.org Cc : dots-chairs@ietf.org;
> > draft-ietf-dots-multihoming@ietf.org
> > Objet : RE: [Dots] WGLC for draft-ietf-dots-multihoming-07
> >
> > HI Med,
> >
> > please see inline.
> >
> > > Hi Valery,
> > >
> > > Many thanks for the detailed review.
> > >
> > > Please see inline.
> > >
> > > Cheers,
> > > Med
> > >
> > > > Hi,
> > > >
> > > > here is my review of the draft (sorry for delay).
> > > >
> > > > [chair hat on]
> > > >
> > > > First, I'm a bit confused why this is a Standards Track document.
> > > > draft explicitly states that it defines no new protocol, it only
> > > > contains recommendations how applications should deal with
> > > > multihomed
> > scenarios.
> > > >
> > > > Isn't Informational or BCP status more appropriate for this
> document?
> > >
> > > [Med] Informational is just OK as the intent is to complement the
> > > DOTS
> > arch. Fixed.
> >
> > Good.
> >
> > > > A related issue - the draft has a normative reference to RFC 8811,
> > > > which is an Informational RFC and is not listed in the downref
> > registry.
> > > > If this draft persists as Standards Track document, this should be
> > > > worked around.
> > >
> > > [Med] 8811 is cited as normative as we built on that reference
> > architecture.
> >
> > That's OK if you changed intended status to Informational.
> 
> [Med] ACK.
> 
> >
> > > > [chair hat off]
> > > >
> > > > Section 4.
> > > >
> > > > I might be missing something very obvious, but from my reading of
> > > > the scenarios I have an impression that only those situations when
> > > > upstream network providers are also the DDoS mitigation providers
> > > > are
> > considered.
> > > > What if you have multiple ISPs and a single independent DDOS
> > > > mitigation provider?
> > >
> > > [Med] This is a subcase of the ones that are discussed in the draft.
> > > Each of multiple ISPs will provision that independent DDoS server to
> > > the CE. The key assumption is that a DOTS server is unambiguously
> > associated with the interconnection link over which it can be used.
> >
> > Well, what if the independent DOTS server is configured manually, not
> > provisioned by ISPs?
> > Is it possible (and how) to use it with only subset of ISPs?
> 
> [Med] Added this NEW text:
> 
> A multihomed network may enable DOTS for all or a subset of its
> upstream interconnection links.  In such a case, DOTS servers can be
> explicitly configured or dynamically discovered by a DOTS client
> using means such as those discussed in [RFC8973].  These DOTS servers
> can be owned by the upstream provider, managed by a third-party
> (e.g., mitigation service provider), or a combination thereof.
> 
> If a DOTS server is explicitly configured, it is assumed that an
> interface is also provided to bind the DOTS service to an
> interconnection link.  If no interface is provided, this means that
> the DOTS server can be reached via any active interface.
> 
> >
> > >  Or you have several DDOS mitigation providers, and some of them
> > > > are provided by ISPs and some are independent?
> > >
> > > [Med] This is also allowed in the current draft as we don't make an
> > > assumption of the provisioned DOTS server's name nor wither the
> > same/distinct one are provisioned over each interconnection link:
> > >
> > >    *  Each of these provisioning domains assigns IP addresses/prefixes
> > >       to the CPE and provides additional configuration information
> such
> > >       as a list of DNS servers, DNS suffixes associated with the
> > >       network, default gateway address, and DOTS server's name
> > >                                             ^^^^^^^^^^^^^^^^^^
> > >       [RFC8973].  These addresses/prefixes are assumed to be Provider-
> > >       ^^^^^^^^
> > >       Aggregatable (PA).
> > >
> > > Please let me know if you think that an explicit statement is needed
> > > to the draft to further clarify the rationale.
> >
> > I think it's worth to to clarify situation with manually configured
> > independent DOTS servers, when some of them can be used with only a
> > subset of ISPs.
> 
> [Med] Covered by the NEW text above and this one:
> 
> In the following subsections, all or a subset of interconnection
> links are associated with DOTS servers.
> 
> >
> > > > Section 5.1.
> > > >
> > > >    For each provisioning domain, the DOTS client MUST resolve the
> DOTS
> > > >    server's name provided by a provisioning domain ([RFC8973])
> > > > using
> > the
> > > >    DNS servers learned from the respective provisioning domain.
> > > >
> > > > What if explicit configuration (RFC8973, Section 4, item 1) is used?
> > > > If this case this recommendation is unnecessary.
> > >
> > > [Med] This text refers to the DOTS server's name, that is also
> > > mentioned
> > in (RFC8973, Section 4, item 1):
> > >
> > >           "These may be
> > >           specified either as a list of IP addresses or the DNS name
> of
> > >           a DOTS server."
> >
> > That's what my concern is. The draft says that you MUST resolve DOTS
> > server's name provided by a PD using the DNS servers from the same PD.
> > So, what if DOTS server's name was configured manually, not learned
> > from PD - what DNS server to use to resolve it? Any? Should this be
> > more explicit in the text?
> 
> [Med] Made this change:
> 
> OLD:
>    For each provisioning domain, the DOTS client MUST resolve the DOTS
>    server's name provided by a provisioning domain [RFC8973] using the
>    DNS servers learned from the respective provisioning domain.
> 
> NEW:
>    For each provisioning domain, the DOTS client MUST resolve the DOTS
>    server's name provided by a provisioning domain [RFC8973] using the
>    DNS servers learned from the respective provisioning domain (or the
>    DNS servers associated with the interface(s) for which a DOTS server
>    was explicitly configured).
> 
> 
> >
> > > > Then, it seems to be implied that all network attachments have
> > > > provided CPE with DOTS servers. In this case how can happen what
> > > > is described
> > > > earlier:
> > > >
> > > >   This implies that if no appropriate DOTS server is found,
> > > >    the DOTS client MUST NOT send the mitigation request to any other
> > > >    available DOTS server.
> > > >
> > > > I think that this situation is only possible when some network
> > > > attachments don't provide CPE with DOTS servers.
> > >
> > > [Med] Agree. This is to echo this part from the introduction:
> > >
> > >    2.  Identify DOTS deployment schemes in a multi-homing context,
> where
> > >        DOTS services can be offered by all or a subset of upstream
> > >                                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
> > >        providers.
> > >
> > > I added this NEW sentence to the intro text of Section 4:
> > >
> > > "In the following subsections, all or a subset of interconnection
> > > links
> > are associated with DOTS servers."
> >
> > OK.
> >
> > > > Section 5.1.
> > > >
> > > >    DOTS signaling session to a
> > > >    given DOTS server must be established using the interface from
> > which
> > > >    the DOTS server was provisioned.
> > > >
> > > > What about explicit configuration, when DOTS server IP is not
> > > > associated with a network interface?
> > >
> > > [Med] An interface can also be indicated when explicit configuration
> > > is used. If no such information is provided, this means that the
> > > address
> > applies for any active interface.
> >
> > Please, add this clarification.
> 
> [Med] Done.
> 
> >
> > > As a reminder, RFC8973 says the following:
> > >
> > >    The results of the discovery procedure are a function of the
> > >                                               ^^^^^^^^^^^^^^^^
> > >    interface/address family.  Contacting a discovered DOTS server via
> an
> > >    ^^^^^^^^^^
> > >    interface to which it is not bound may exacerbate the delay
> required
> > >    to establish a DOTS channel.  Moreover, such behavior may reveal
> that
> > >    a DOTS service is enabled by a DOTS client domain and exposes the
> > >    identity of the DOTS service provider (which can be inferred from
> the
> > >    name and the destination IP address) to external networks.
> > >
> > > >
> > > > Section 5.2.
> > > >
> > > >    Each DOTS client SHOULD be provided with policies (e.g., a prefix
> > > >    filter that will be against DDoS detection alarms) that will
> > trigger
> > > >    DOTS communications with the DOTS servers.  Such policies will
> help
> > > >    the DOTS client to select the appropriate destination DOTS
> server.
> > > >
> > > > It's unclear for me to which scenario this recommendation applies.
> > > > In Figure 8 each DOTS client may communicate only with a single
> > > > DOTS server.
> > >
> > > [Med] It applies to both figure 7/8. Clients in Figure 8 may still
> > > receive detection alarms on resources that are not handled by their
> > > peer
> > DOTS server.
> >
> > It is not clear. Previously the draft says:
> >
> >    Another deployment approach is to enable many DOTS clients; each of
> >    them is responsible for handling communications with a specific
> > DOTS
> >
> > ^^^^^^^
> >    server (see Figure 8).
> >
> > Probably some clarification is needed.
> 
> [Med] Added "For both deployments depicted in Figures 7 and 8 ..."
> 
> >
> > > > Related question - why SHOULD (and not MUST)?.  What if clients
> > > > are not provided with these policies?
> > >
> > > [Med] SHOULD is used because in Figure 8 some filters may be applied
> > when directing alarms to DOTS clients.
> >
> > I read the sentence "Each DOTS client SHOULD be provided with
> policies..."
> > that under some conditions it's OK to not provide clients with
> > policies
> > (filters) at all, that's why my question. My understanding, that they
> > MUST be provided always, but the policies may differ. Am I missing
> something?
> 
> [Med] This can't be a MUST as the filtering can be on the alarms
> themselves before being known to the DOTS client.
> 
> >
> > > > Section 5.2.
> > > >
> > > >    The CPE MUST select the appropriate source IP address when
> > forwarding
> > > >    DOTS messages received from an internal DOTS client.  If anycast
> > > >    addresses are used to reach multiple DOTS servers, the CPE may
> > > > not
> > be
> > > >    able to select the appropriate provisioning domain to which the
> > > >    mitigation request should be forwarded.  As a consequence, the
> > > >    request may not be forwarded to the appropriate DOTS server.
> > > >
> > > > I'm confused. What to do in this case? Using anycast addresses is
> > > > NOT RECOMMENDED (earlier), but is not prohibited.
> > > > I believe better recommendations should be given for this case.
> > > >
> > >
> > > [Med] The risk here is that the mitigation request will be rejected
> > > by the DOTS server to which the CPE decided to froward the request.
> > > If the CPE embeds a DOTS gateways, the situation can be better as it
> > > may
> > use a sequential mode. I think that NOT RECOMMENDED is appropriate.
> >
> > So it's just an explanation why using anycast is not recommended?
> > Then, can you move it closer to the recommendation not to use anycast?
> 
> [Med] Done. Thanks.
> 
> >
> > > > Section 5.3.
> > > >
> > > >    The use of anycast addresses
> > > >    to establish DOTS sessions between DOTS clients and DOTS
> > > > gateways
> > is
> > > >    not an option.
> > > >
> > > > What does "is not an option" mean?
> > >
> > > [Med] It means that it is not a valid technical solution to fulfil
> > > the "MUST contact all" requirement, as by definition, only one will
> > > be
> > selected.
> > >
> > >  MUST NOT be used? Or impossible to use?
> >
> > "Cannot be used, because <explanation>" ?
> 
> [Med] Updated the text as suggested.
> 
> >
> > > > Section 6.
> > > >
> > > >    In particular, if a DOTS client maintains DOTS
> > > >    associations with specific DOTS servers per interconnection
> > > > link,
> > the
> > > >    DOTS client SHOULD NOT leak information specific to a given link
> to
> > > >    DOTS servers on different interconnection links that are not
> > > >    authorized to mitigate attacks for that given link.
> > > >
> > > > How this rule can be followed when DOTS clients send requests to
> > > > all available DOTS servers (with PI scenarios)?
> > >
> > > [Med] In such case, the "information specific to a given link" will
> > > point to the target (PI@) that is authorized to be revealed to all
> > servers.
> >
> > OK.
> >
> > Regards,
> > Valery.
> >
> 
> __________________________________________________________________________
> _______________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
> exploites ou copies sans autorisation. Si vous avez recu ce message par
> erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les
> pieces jointes. Les messages electroniques etant susceptibles
> d'alteration, Orange decline toute responsabilite si ce message a ete
> altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged
> information that may be protected by law; they should not be distributed,
> used or copied without authorisation.
> If you have received this email in error, please notify the sender and
> delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
> 
> _______________________________________________
> Dots mailing list
> Dots@ietf.org
> https://www.ietf.org/mailman/listinfo/dots

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.