Re: [Dots] (draft-ietf-dots-signal-filter-control) ACL Stats issue

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Thu, 25 April 2019 14:26 UTC

Return-Path: <TirumaleswarReddy_Konda@mcafee.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D616812011C for <dots@ietfa.amsl.com>; Thu, 25 Apr 2019 07:26:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.698
X-Spam-Level:
X-Spam-Status: No, score=0.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, GB_SUMOF=5, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3NQYj7GqFV4i for <dots@ietfa.amsl.com>; Thu, 25 Apr 2019 07:26:35 -0700 (PDT)
Received: from DNVWSMAILOUT1.mcafee.com (dnvwsmailout1.mcafee.com [161.69.31.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F335312013B for <dots@ietf.org>; Thu, 25 Apr 2019 07:26:34 -0700 (PDT)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=s_mcafee; t=1556202028; h=From: To:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:authentication-results: x-originating-ip:x-ms-publictraffictype:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-ms-exchange-purlcount:x-microsoft-antispam-prvs: x-forefront-prvs:x-forefront-antispam-report: received-spf:x-ms-exchange-senderadcheck:x-microsoft-antispam-message-info: Content-Type:Content-Transfer-Encoding:MIME-Version: X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-CrossTenant-mailboxtype: X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Threshold: X-NAI-Spam-Score:X-NAI-Spam-Version; bh=t B8wAE8PDPCKqEeXsMznQg1wnSvBhCjU0DbVk/NBda Y=; b=eludJTonWpYlgr49di0RzeY7O3PB+5dsoB9yXtlsKjUY VNUoNSw1PSaSodE50KrOeMJ6DyXvEHxhQCoeB+cSyxWIDRfmOX goIgV+gCw8wcj94wzSifQyO4V74ilU+yaxVvZhCHxZZCQwqwBg ozNB+h16JR2dWmKk99uBiwebqMc=
Received: from DNVEXAPP1N05.corpzone.internalzone.com (unknown [10.44.48.89]) by DNVWSMAILOUT1.mcafee.com with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 46f9_c0f5_f595d191_ee3b_448c_a2d9_6c5518c19c1d; Thu, 25 Apr 2019 08:20:27 -0600
Received: from DNVEXAPP1N04.corpzone.internalzone.com (10.44.48.88) by DNVEXAPP1N05.corpzone.internalzone.com (10.44.48.89) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 25 Apr 2019 08:26:19 -0600
Received: from DNVO365EDGE2.corpzone.internalzone.com (10.44.176.74) by DNVEXAPP1N04.corpzone.internalzone.com (10.44.48.88) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Thu, 25 Apr 2019 08:26:18 -0600
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (10.44.176.243) by edge.mcafee.com (10.44.176.74) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 25 Apr 2019 08:26:17 -0600
Received: from BYAPR16MB2790.namprd16.prod.outlook.com (20.178.233.91) by BYAPR16MB2709.namprd16.prod.outlook.com (20.178.232.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1813.14; Thu, 25 Apr 2019 14:26:17 +0000
Received: from BYAPR16MB2790.namprd16.prod.outlook.com ([fe80::4873:7200:9e57:9e62]) by BYAPR16MB2790.namprd16.prod.outlook.com ([fe80::4873:7200:9e57:9e62%5]) with mapi id 15.20.1813.017; Thu, 25 Apr 2019 14:26:17 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Jon Shallow <supjps-ietf@jpshallow.com>, 'kaname nishizuka' <kaname@nttv6.jp>, "dots@ietf.org" <dots@ietf.org>
Thread-Topic: [Dots] (draft-ietf-dots-signal-filter-control) ACL Stats issue
Thread-Index: AdT6ZmI8uG0f606MQBW+/9uvcTWn6QA3ueOAAAD5v4AAAuISAAACLWCwAASh2bAAAFNQMAAALZgg
Date: Thu, 25 Apr 2019 14:26:16 +0000
Message-ID: <BYAPR16MB279013E8029BE0294293A333EA3D0@BYAPR16MB2790.namprd16.prod.outlook.com>
References: <787AE7BB302AE849A7480A190F8B93302EA649B4@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <c3c9614f-908a-c132-cd35-6c627e341f2b@nttv6.jp> <012601d4fb49$3328c000$997a4000$@jpshallow.com> <BYAPR16MB279020119E24ADCB54B339E3EA3D0@BYAPR16MB2790.namprd16.prod.outlook.com> <787AE7BB302AE849A7480A190F8B93302EA6591A@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <BYAPR16MB27903D8D208FA3AC951FDEE4EA3D0@BYAPR16MB2790.namprd16.prod.outlook.com> <787AE7BB302AE849A7480A190F8B93302EA65AD6@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B93302EA65AD6@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.2.0.6
dlp-reaction: no-action
authentication-results: spf=none (sender IP is ) smtp.mailfrom=TirumaleswarReddy_Konda@McAfee.com;
x-originating-ip: [49.37.205.191]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c30fcbdf-5fea-4721-e8dc-08d6c989fa90
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:BYAPR16MB2709;
x-ms-traffictypediagnostic: BYAPR16MB2709:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <BYAPR16MB2709DD30BD7971B7A4BF9EFDEA3D0@BYAPR16MB2709.namprd16.prod.outlook.com>
x-forefront-prvs: 0018A2705B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(376002)(396003)(39860400002)(366004)(346002)(13464003)(51444003)(52084003)(199004)(189003)(32952001)(53754006)(102836004)(74316002)(26005)(6506007)(186003)(14444005)(25786009)(9686003)(66574012)(6246003)(7696005)(486006)(55016002)(6306002)(66066001)(71200400001)(30864003)(256004)(33656002)(53936002)(476003)(52536014)(68736007)(11346002)(305945005)(5024004)(7736002)(5660300002)(64756008)(81156014)(93886005)(229853002)(76176011)(446003)(71190400001)(66946007)(2906002)(53546011)(8936002)(81166006)(478600001)(966005)(8676002)(97736004)(14454004)(3846002)(73956011)(6436002)(86362001)(99286004)(80792005)(2501003)(66556008)(72206003)(6116002)(76116006)(316002)(66446008)(110136005)(66476007)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR16MB2709; H:BYAPR16MB2790.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: McAfee.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: XVGMGYO8NJFe7ac8v9Naoz0g4TUPtTMiiSCH5IrRmEevyGiILBWmiTK3Wz0q1Oh3HsRNCw7nPEJXf6KVxwkLA5/AriUPdput7LdoM8EHBeULFVRz5H6ESg/v4r+El12VbAje9XmVg8hMeo79MZboVqLAtSKod5GN6nr1B5aQHV+cXUToibbFcfxg5KhLG37ZZvK04p5OAbDhqE76vgpeeUnp1a7VcqjXW5k4QnKwFwV1LtF5OOH7OQ07XIOdpJlSrz3pjpKp99QVtCnXq816iHUOQEITalyB/i1bwitwtrfcjxANlKIcTN297b7fXYnbGr/TOoRlmIW6g6eETnxVY+L8DYMZ8cQnKSgHRiglqqq4q03DSE1btv8XNe1ys6kNjEujdyWUkbRcVBPAnBvcTKznAR6ce5ziDam/1Ue53Ak=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: c30fcbdf-5fea-4721-e8dc-08d6c989fa90
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2019 14:26:16.9476 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR16MB2709
X-OriginatorOrg: mcafee.com
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0
X-NAI-Spam-Version: 2.3.0.9418 : core <6533> : inlines <7059> : streams <1819692> : uri <2836927>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/DU1QfW4y1wCOIUUFXq7iSc-Cwhg>
Subject: Re: [Dots] (draft-ietf-dots-signal-filter-control) ACL Stats issue
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Apr 2019 14:26:38 -0000

> -----Original Message-----
> From: mohamed.boucadair@orange.com
> <mohamed.boucadair@orange.com>
> Sent: Thursday, April 25, 2019 7:48 PM
> To: Konda, Tirumaleswar Reddy
> <TirumaleswarReddy_Konda@McAfee.com>om>; Jon Shallow <supjps-
> ietf@jpshallow.com>gt;; 'kaname nishizuka' <kaname@nttv6.jp>jp>;
> dots@ietf.org
> Subject: RE: [Dots] (draft-ietf-dots-signal-filter-control) ACL Stats issue
> 
> 
> 
> Re-,
> 
> Why it would be useful to share stats for ACLs activated via the signal channel
> but not for (pre-installed) ACLs that are automatically activated during
> mitigations ?

The rate-limit ACL activated via the signal channel is a last resort employed by the DOTS client to mitigate the volumetric attack, it has an adverse effect of blocking not just the attack traffic but also legitimate traffic, and potentially impacts the business of the victim (e.g. good users cannot leverage its service), hence it's stats look more critical to me. 

-Tiru

> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Konda, Tirumaleswar Reddy
> > [mailto:TirumaleswarReddy_Konda@McAfee.com]
> > Envoyé : jeudi 25 avril 2019 16:13
> > À : BOUCADAIR Mohamed TGI/OLN; Jon Shallow; 'kaname nishizuka';
> > dots@ietf.org Objet : RE: [Dots]
> > (draft-ietf-dots-signal-filter-control) ACL Stats issue
> >
> > > -----Original Message-----
> > > From: mohamed.boucadair@orange.com
> > > <mohamed.boucadair@orange.com>
> > > Sent: Thursday, April 25, 2019 5:37 PM
> > > To: Konda, Tirumaleswar Reddy
> > > <TirumaleswarReddy_Konda@McAfee.com>om>; Jon Shallow <supjps-
> > > ietf@jpshallow.com>gt;; 'kaname nishizuka' <kaname@nttv6.jp>jp>;
> > > dots@ietf.org
> > > Subject: RE: [Dots] (draft-ietf-dots-signal-filter-control) ACL
> > > Stats issue
> > >
> > >
> > >
> > > Tiru,
> > >
> > > Even if we assume that ACL-specific stats can be communicated via
> > > the
> > signal
> > > channel (which we don't have an agreement on it so far), this is not
> > specific
> > > to the filter-control spec but the same reasoning would apply for
> > > all ACLs instructed by the DOTS client (not only those that are
> > > adjusted during
> > attack
> > > times).
> >
> > My point is, If the ACL is activated using the signal channel, since
> > the ACL is part of the mitigation request, only the activated ACL
> > stats needs to be conveyed in the mitigation status.  Other ACLs
> > activated using data channel are not part of mitigation request, so no
> > need to convey their stats using the signal channel.
> >
> > -Tiru
> >
> > >
> > > Cheers,
> > > Med
> > >
> > > > -----Message d'origine-----
> > > > De : Konda, Tirumaleswar Reddy
> > > > [mailto:TirumaleswarReddy_Konda@McAfee.com]
> > > > Envoyé : jeudi 25 avril 2019 13:04 À : Jon Shallow; 'kaname
> > > > nishizuka'; BOUCADAIR Mohamed TGI/OLN; dots@ietf.org Objet : RE:
> > > > [Dots]
> > > > (draft-ietf-dots-signal-filter-control) ACL Stats issue
> > > >
> > > > > -----Original Message-----
> > > > > From: Dots <dots-bounces@ietf.org> On Behalf Of Jon Shallow
> > > > > Sent: Thursday, April 25, 2019 2:58 PM
> > > > > To: 'kaname nishizuka' <kaname@nttv6.jp>jp>;
> > > > > mohamed.boucadair@orange.com; dots@ietf.org
> > > > > Subject: Re: [Dots] (draft-ietf-dots-signal-filter-control) ACL
> > > > > Stats issue
> > > > >
> > > > > This email originated from outside of the organization. Do not
> > > > > click links
> > > > or
> > > > > open attachments unless you recognize the sender and know the
> > > > > content is safe.
> > > > >
> > > > > Hi there,
> > > > >
> > > > > The advantage of separating out the counters for the different
> > > > > ACLs is that the DOTS client can then determine what is being
> > > > > effective or
> > not.
> > > > However,
> > > > > if (signal) data is able to get from the DOTS server to the DOTS
> > > > > client,
> > > > then it
> > > > > is likely that the data channel will still be operable and can
> > > > > be used to
> > > > get
> > > > > these numbers so I still do not think that this should be over
> > > > > the signal channel.
> > > > >
> > > > > I think that that the GET response (or observe response)
> > > > > bytes-dropped
> > > etc.
> > > > > should be the total dropped - i.e. the sum of the ACls and what
> > > > > the DMS is otherwise doing as it refers to the mitigation request.
> > > >
> > > > If the DOTS server knows the traffic dropped by ACLs and the
> > > > traffic dropped by DMS, why can't it provide this statistics
> > > > separately instead of summing it.  If the incoming link is
> > > > saturated, data channel will not function  but signal channel
> > > > (using UDP) will work and there is a good possibility that one of
> > > > the GET responses periodically sent will reach the client (As you
> > > > already know, DOTS signal
> > > channel is tolerant to high packet loss in one direction).
> > > >
> > > > -Tiru
> > > >
> > > > >
> > > > > Regards
> > > > >
> > > > > Jon
> > > > >
> > > > > > -----Original Message-----
> > > > > > From: Dots [mailto: dots-bounces@ietf.org] On Behalf Of kaname
> > > > > > nishizuka
> > > > > > Sent: 25 April 2019 10:00
> > > > > > To: mohamed.boucadair@orange.com; dots@ietf.org
> > > > > > Subject: Re: [Dots] (draft-ietf-dots-signal-filter-control)
> > > > > > ACL Stats issue
> > > > > >
> > > > > > Hi Med, all,
> > > > > >
> > > > > > Regarding with the issue, I'm not convinced of the benefit to
> > > > > > return the activated ACL statistics over signal-channel.
> > > > > >
> > > > > > The idea of this draft is based on this situation (quoted from
> > > > > > Jon's
> > > > > > comment):
> > > > > > (It is) very unreliable when the inbound pipe is running full.
> > > > > > If the pipe is not running full, then this information can be
> > > > > > obtained over the
> > > > data
> > > > > channel.
> > > > > >
> > > > > > ACL stats can be get over the data-channel. I don't see any
> > > > > > reason to reproduce the same function.
> > > > > >
> > > > > > Further more, I don't think the DOTS server should notify that
> > > > > > DOTS client with the change by including the corresponding
> > > > > > acl-* parameters in an asynchronous notification.
> > > > > > The basic behavior is already written in the draft:
> > > > > >     This specification does not require any modification to
> > > > > > the
> > efficacy
> > > > > >     update and the withdrawal procedures defined in
> > > > > >     [I-D.ietf-dots-signal-channel].  In particular,
> > > > > > ACL-related
> > clauses
> > > > > >     are not included in a PUT request used to send an efficacy
> > > > > > update
> > and
> > > > > >     DELETE requests.
> > > > > >
> > > > > > If so, the server need not to store any resource about acl-*
> > > > > > per mitigation request, which make the function of the
> > > > > > signal-filter-control
> > > > > simple enough.
> > > > > >
> > > > > > thanks,
> > > > > > Kaname
> > > > > >
> > > > > > On 2019/04/24 15:24, mohamed.boucadair@orange.com wrote:
> > > > > > > Hi all,
> > > > > > >
> > > > > > > We do have one pending issue to be resolved for this draft.
> > > > > > > The issue is
> > > > > > available at:
> > > > > > > https://github.com/boucadair/filter-control/issues/1
> > > > > > >
> > > > > > > We need your feedback on this.
> > > > > > >
> > > > > > > Cheers,
> > > > > > > Med
> > > > > > >
> > > > > > >> -----Message d'origine----- De : Dots
> > > > > > >> [mailto:dots-bounces@ietf.org] De la part de
> > > > > > >> internet- drafts@ietf.org Envoyé : mercredi 24 avril 2019
> > > > > > >> 07:34 À
> > :
> > > > > > >> i-d-announce@ietf.org Cc : dots@ietf.org Objet : [Dots] I-D
> > Action:
> > > > > > >> draft-ietf-dots-signal-filter-control-00.txt
> > > > > > >>
> > > > > > >>
> > > > > > >> A New Internet-Draft is available from the on-line
> > > > > > >> Internet-Drafts directories.
> > > > > > >> This draft is a work item of the DDoS Open Threat Signaling
> > > > > > >> WG of the
> > > > > > IETF.
> > > > > > >>
> > > > > > >>          Title           : Controlling Filtering Rules Using
> > > > Distributed
> > > > > > >> Denial-of-Service Open Threat Signaling (DOTS) Signal Channel
> > > > > > >>          Authors         : Kaname Nishizuka
> > > > > > >>                            Mohamed Boucadair
> > > > > > >>                            Tirumaleswar Reddy
> > > > > > >>                            Takahiko Nagata
> > > > > > >> 	Filename        : draft-ietf-dots-signal-filter-control-00.txt
> > > > > > >> 	Pages           : 23
> > > > > > >> 	Date            : 2019-04-23
> > > > > > >>
> > > > > > >> Abstract:
> > > > > > >>     This document specifies an extension to the DOTS signal
> > channel
> > > so
> > > > > > >>     that DOTS clients can control their filtering rules
> > > > > > >> when an
> > attack
> > > > > > >>     mitigation is active.
> > > > > > >>
> > > > > > >>     Particularly, this extension allows a DOTS client to
> > > > > > >> activate or
> > > > de-
> > > > > > >>     activate existing filtering rules during a DDoS attack.  The
> > > > > > >>     characterization of these filtering rules is supposed
> > > > > > >> to be
> > > > conveyed
> > > > > > >>     by a DOTS client during an idle time by means of the DOTS data
> > > > > > >>     channel protocol.
> > > > > > >>
> > > > > > >> Editorial Note (To be removed by RFC Editor)
> > > > > > >>
> > > > > > >>     Please update these statements within the document with
> > > > > > >> the
> > > RFC
> > > > > > >>     number to be assigned to this document:
> > > > > > >>
> > > > > > >>     o  "This version of this YANG module is part of RFC XXXX;"
> > > > > > >>
> > > > > > >>     o  "RFC XXXX: Controlling Filtering Rules Using
> > > > > > >> Distributed
> > > > Denial-
> > > > > > >>        of-Service Open Threat Signaling (DOTS) Signal
> > > > > > >> Channel";
> > > > > > >>
> > > > > > >>     o  reference: RFC XXXX
> > > > > > >>
> > > > > > >>     o  [RFCXXXX]
> > > > > > >>
> > > > > > >>     Please update these statements with the RFC number to
> > > > > > >> be assigned
> > > > > to
> > > > > > >>     the following documents:
> > > > > > >>
> > > > > > >>     o  "RFC SSSS: Distributed Denial-of-Service Open Threat
> > Signaling
> > > > > > >>        (DOTS) Signal Channel Specification" (used to be
> > > > > > >>        [I-D.ietf-dots-signal-channel])
> > > > > > >>
> > > > > > >>     o  "RFC DDDD: Distributed Denial-of-Service Open Threat
> > Signaling
> > > > > > >>        (DOTS) Data Channel Specification" (used to be
> > > > > > >>        [I-D.ietf-dots-data-channel])
> > > > > > >>
> > > > > > >>     Please update the "revision" date of the YANG module.
> > > > > > >>
> > > > > > >>
> > > > > > >> The IETF datatracker status page for this draft is:
> > > > > > >> https://datatracker.ietf.org/doc/draft-ietf-dots-signal-fil
> > > > > > >> ter-
> > > > > > >> cont
> > > > > > >> rol/
> > > > > > >>
> > > > > > >> There are also htmlized versions available at:
> > > > > > >> https://tools.ietf.org/html/draft-ietf-dots-signal-filter-c
> > > > > > >> ontr
> > > > > > >> ol-0
> > > > > > >> 0
> > > > > > >> https://datatracker.ietf.org/doc/html/draft-ietf-dots-signa
> > > > > > >> l-fi
> > > > > > >> lter
> > > > > > >> -control-
> > > > > > >> 00
> > > > > > >>
> > > > > > >>
> > > > > > >> Please note that it may take a couple of minutes from the
> > > > > > >> time of
> > > > > > submission
> > > > > > >> until the htmlized version and diff are available at
> > tools.ietf.org.
> > > > > > >>
> > > > > > >> Internet-Drafts are also available by anonymous FTP at:
> > > > > > >> ftp://ftp.ietf.org/internet-drafts/
> > > > > > >>
> > > > > > >> _______________________________________________
> > > > > > >> Dots mailing list
> > > > > > >> Dots@ietf.org
> > > > > > >> https://www.ietf.org/mailman/listinfo/dots
> > > > > > > _______________________________________________
> > > > > > > Dots mailing list
> > > > > > > Dots@ietf.org
> > > > > > > https://www.ietf.org/mailman/listinfo/dots
> > > > > >
> > > > > > _______________________________________________
> > > > > > Dots mailing list
> > > > > > Dots@ietf.org
> > > > > > https://www.ietf.org/mailman/listinfo/dots
> > > > >
> > > > > _______________________________________________
> > > > > Dots mailing list
> > > > > Dots@ietf.org
> > > > > https://www.ietf.org/mailman/listinfo/dots