Re: [Dots] WGLC for draft-ietf-dots-multihoming-07

mohamed.boucadair@orange.com Tue, 16 November 2021 09:15 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C15BF3A0406; Tue, 16 Nov 2021 01:15:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WR7-afQYDPcj; Tue, 16 Nov 2021 01:15:42 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.39]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE9B63A040C; Tue, 16 Nov 2021 01:15:41 -0800 (PST)
Received: from opfedar00.francetelecom.fr (unknown [xx.xx.xx.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar23.francetelecom.fr (ESMTP service) with ESMTPS id 4HtgQM5TXbzBryY; Tue, 16 Nov 2021 10:15:39 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1637054139; bh=Xg8pJHV3IiZ9ph0DUHvZbK9/LOGMimcjfADMP6o46LE=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=fyGJBuFanBdkiGqzX6o+Eh5BbIq4ERlvmyUUwnLzJ9d/MOGVCgjqgnkVvqnb4JPMG N+qa9lqHbuauE9QU4NIkAb5B+fXS2HC5cwZVbqO0BokPZz7AlDIq0nKeNBuVasHQj9 7fO5kLlPJJvptuYorWjUXCgIN2ZvYLBOJL01MGe1dMe7G9V9I8ysYO/UGVQvdzGtkw KKZ5ZeVBr8P/GLPbTCIc/TSZaQQy9Jk8yxJkMypLd9aTLZVR4ijReFCUVUVz8xsCrs 3VyUVJeDodZEd2v6JAK6hWWAMp+HPYGWpRIFz8CFpGIdkNrz6UoUkfB1ek6c4a2MVD yLHZXwHtIzEkQ==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfedar00.francetelecom.fr (ESMTP service) with ESMTPS id 4HtgQM4BrLzCqkX; Tue, 16 Nov 2021 10:15:39 +0100 (CET)
From: mohamed.boucadair@orange.com
To: Valery Smyslov <valery@smyslov.net>, "dots@ietf.org" <dots@ietf.org>
CC: "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "draft-ietf-dots-multihoming@ietf.org" <draft-ietf-dots-multihoming@ietf.org>
Thread-Topic: [Dots] WGLC for draft-ietf-dots-multihoming-07
Thread-Index: AQH6belXfbSp5MW82qMwT7ehhypeAKukjvbwgBwXH6A=
Content-Class:
Date: Tue, 16 Nov 2021 09:15:38 +0000
Message-ID: <29138_1637054139_619376BB_29138_50_1_787AE7BB302AE849A7480A190F8B93303545258E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <002101d7be93$c890ed10$59b2c730$@smyslov.net> <059501d7ccc8$8ad61390$a0823ab0$@smyslov.net>
In-Reply-To: <059501d7ccc8$8ad61390$a0823ab0$@smyslov.net>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-11-16T09:15:33Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=03cd7d7c-fcc6-41ab-8e06-85e3f03d29fb; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/Ed3w3ldh06dRRvlKNDvQQc8E5tU>
Subject: Re: [Dots] WGLC for draft-ietf-dots-multihoming-07
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Nov 2021 09:15:47 -0000

Hi Valery, 

Many thanks for the detailed review. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Valery Smyslov <valery@smyslov.net>
> Envoyé : vendredi 29 octobre 2021 15:26
> À : dots@ietf.org
> Cc : dots-chairs@ietf.org; draft-ietf-dots-multihoming@ietf.org
> Objet : RE: [Dots] WGLC for draft-ietf-dots-multihoming-07
> 
> Hi,
> 
> here is my review of the draft (sorry for delay).
> 
> [chair hat on]
> 
> First, I'm a bit confused why this is a Standards Track document.
> draft explicitly states that it defines no new protocol, it only contains
> recommendations how applications should deal with multihomed scenarios.
> 
> Isn't Informational or BCP status more appropriate for this document?

[Med] Informational is just OK as the intent is to complement the DOTS arch. Fixed.

> 
> A related issue - the draft has a normative reference to RFC 8811, which
> is an Informational RFC and is not listed in the downref registry.
> If this draft persists as Standards Track document, this should be worked
> around.

[Med] 8811 is cited as normative as we built on that reference architecture. 

> 
> [chair hat off]
> 
> Section 4.
> 
> I might be missing something very obvious, but from my reading of the
> scenarios I have an impression that only those situations when upstream
> network providers are also the DDoS mitigation providers are considered.
> What if you have multiple ISPs and a single independent DDOS mitigation
> provider?

[Med] This is a subcase of the ones that are discussed in the draft. Each of multiple ISPs will provision that independent DDoS server to the CE. The key assumption is that a DOTS server is unambiguously associated with the interconnection link over which it can be used.   

 Or you have several DDOS mitigation providers, and some of them
> are provided by ISPs and some are independent?

[Med] This is also allowed in the current draft as we don't make an assumption of the provisioned DOTS server's name nor wither the same/distinct one are provisioned over each interconnection link:

   *  Each of these provisioning domains assigns IP addresses/prefixes
      to the CPE and provides additional configuration information such
      as a list of DNS servers, DNS suffixes associated with the
      network, default gateway address, and DOTS server's name
                                            ^^^^^^^^^^^^^^^^^^
      [RFC8973].  These addresses/prefixes are assumed to be Provider-
      ^^^^^^^^
      Aggregatable (PA).


Please let me know if you think that an explicit statement is needed to the draft to further clarify the rationale. 

> 
> Section 5.1.
> 
>    For each provisioning domain, the DOTS client MUST resolve the DOTS
>    server's name provided by a provisioning domain ([RFC8973]) using the
>    DNS servers learned from the respective provisioning domain.
> 
> What if explicit configuration (RFC8973, Section 4, item 1) is used?
> If this case this recommendation is unnecessary.

[Med] This text refers to the DOTS server's name, that is also mentioned in (RFC8973, Section 4, item 1):

          "These may be
          specified either as a list of IP addresses or the DNS name of
          a DOTS server."

> 
> Section 5.1.
> 
>    Consequently, if a CPE detects a DDoS attack that spreads over all
>    its network attachments, it MUST contact both DOTS servers for
>    mitigation purposes.
> 
> s/both/all

[Med] Fixed. Thanks.

> 
> Then, it seems to be implied that all network attachments have provided
> CPE with DOTS servers. In this case how can happen what is described
> earlier:
> 
>   This implies that if no appropriate DOTS server is found,
>    the DOTS client MUST NOT send the mitigation request to any other
>    available DOTS server.
> 
> I think that this situation is only possible when some network attachments
> don't provide CPE with DOTS servers.

[Med] Agree. This is to echo this part from the introduction:

   2.  Identify DOTS deployment schemes in a multi-homing context, where
       DOTS services can be offered by all or a subset of upstream
                                       ^^^^^^^^^^^^^^^^^^^^^^^^^^      
       providers.

I added this NEW sentence to the intro text of Section 4:

"In the following subsections, all or a subset of interconnection links are associated with DOTS servers."

> 
> Section 5.1.
> 
>    DOTS signaling session to a
>    given DOTS server must be established using the interface from which
>    the DOTS server was provisioned.
> 
> What about explicit configuration, when DOTS server IP is not associated
> with a network interface?

[Med] An interface can also be indicated when explicit configuration is used. If no such information is provided, this means that the address applies for any active interface.  

As a reminder, RFC8973 says the following:

   The results of the discovery procedure are a function of the
                                              ^^^^^^^^^^^^^^^^
   interface/address family.  Contacting a discovered DOTS server via an
   ^^^^^^^^^^
   interface to which it is not bound may exacerbate the delay required
   to establish a DOTS channel.  Moreover, such behavior may reveal that
   a DOTS service is enabled by a DOTS client domain and exposes the
   identity of the DOTS service provider (which can be inferred from the
   name and the destination IP address) to external networks.

> 
> Section 5.2.
> 
> I think the readability would benefit from moving pictures 6 and 7 closer
> to the text that refers to them. Currently they are almost half page
> apart.

[Med] Sure. Moved up. 

> 
> Section 5.2.
> 
>    Each DOTS client SHOULD be provided with policies (e.g., a prefix
>    filter that will be against DDoS detection alarms) that will trigger
>    DOTS communications with the DOTS servers.  Such policies will help
>    the DOTS client to select the appropriate destination DOTS server.
> 
> It's unclear for me to which scenario this recommendation applies.
> In Figure 8 each DOTS client may communicate only with a single DOTS
> server.

[Med] It applies to both figure 7/8. Clients in Figure 8 may still receive detection alarms on resources that are not handled by their peer DOTS server.  

> 
> Related question - why SHOULD (and not MUST)?.  What if clients are not
> provided with these policies?

[Med] SHOULD is used because in Figure 8 some filters may be applied when directing alarms to DOTS clients. 

> 
> Section 5.2.
> 
>    The CPE MUST select the appropriate source IP address when forwarding
>    DOTS messages received from an internal DOTS client.  If anycast
>    addresses are used to reach multiple DOTS servers, the CPE may not be
>    able to select the appropriate provisioning domain to which the
>    mitigation request should be forwarded.  As a consequence, the
>    request may not be forwarded to the appropriate DOTS server.
> 
> I'm confused. What to do in this case? Using anycast addresses is NOT
> RECOMMENDED (earlier), but is not prohibited.
> I believe better recommendations should be given for this case.
> 

[Med] The risk here is that the mitigation request will be rejected by the DOTS server to which the CPE decided to froward the request. If the CPE embeds a DOTS gateways, the situation can be better as it may use a sequential mode. I think that NOT RECOMMENDED is appropriate. 

> Section 5.3.
> 
> Again, I think it's worth to move Figure 9 closer to the text that refers
> to it.

[Med] Done. 

> 
> Section 5.3.
> 
>    The use of anycast addresses
>    to establish DOTS sessions between DOTS clients and DOTS gateways is
>    not an option.
> 
> What does "is not an option" mean?

[Med] It means that it is not a valid technical solution to fulfil the "MUST contact all" requirement, as by definition, only one will be selected. 

 MUST NOT be used? Or impossible to use?

> 
> Section 6.
> 
>    In particular, if a DOTS client maintains DOTS
>    associations with specific DOTS servers per interconnection link, the
>    DOTS client SHOULD NOT leak information specific to a given link to
>    DOTS servers on different interconnection links that are not
>    authorized to mitigate attacks for that given link.
> 
> How this rule can be followed when DOTS clients send requests to all
> available DOTS servers (with PI scenarios)?

[Med] In such case, the "information specific to a given link" will point to the target (PI@) that is authorized to be revealed to all servers. 

> 
> Regards,
> Valery.
> 
> 
> > Hi,
> >
> > this message starts a two-week working group last call for draft-ietf-
> dots-multihoming-07.
> > The WGLC will end on Monday, October 25. Please, review the draft and
> > send your comments to the mailing list.
> >
> > Regards,
> > Frank & Valery.
> >
> > _______________________________________________
> > Dots mailing list
> > Dots@ietf.org
> > https://www.ietf.org/mailman/listinfo/dots


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.