Re: [Dots] I-D Action: draft-ietf-dots-server-discovery-04.txt

<mohamed.boucadair@orange.com> Wed, 26 June 2019 12:56 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 133B81201D2 for <dots@ietfa.amsl.com>; Wed, 26 Jun 2019 05:56:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fsp8RJlOUWxl for <dots@ietfa.amsl.com>; Wed, 26 Jun 2019 05:56:35 -0700 (PDT)
Received: from relais-inet.orange.com (mta134.mail.business.static.orange.com [80.12.70.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA5CD1200FE for <dots@ietf.org>; Wed, 26 Jun 2019 05:56:34 -0700 (PDT)
Received: from opfednr06.francetelecom.fr (unknown [xx.xx.xx.70]) by opfednr23.francetelecom.fr (ESMTP service) with ESMTP id 45Yjhc4wQgz5xDq for <dots@ietf.org>; Wed, 26 Jun 2019 14:56:32 +0200 (CEST)
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.26]) by opfednr06.francetelecom.fr (ESMTP service) with ESMTP id 45Yjhc2yKbzDq7m for <dots@ietf.org>; Wed, 26 Jun 2019 14:56:32 +0200 (CEST)
Received: from OPEXCAUBMA2.corporate.adroot.infra.ftgroup ([fe80::e878:bd0:c89e:5b42]) by OPEXCAUBM31.corporate.adroot.infra.ftgroup ([fe80::34b6:11d0:147f:6560%21]) with mapi id 14.03.0439.000; Wed, 26 Jun 2019 14:56:32 +0200
From: mohamed.boucadair@orange.com
To: "dots@ietf.org" <dots@ietf.org>
Thread-Topic: [Dots] I-D Action: draft-ietf-dots-server-discovery-04.txt
Thread-Index: AQHVLB5taJW321ZuxUCW/6wsGSFfPaat5Mlg
Date: Wed, 26 Jun 2019 12:56:31 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302EAADDCE@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <156155371863.20253.4638172627415827980@ietfa.amsl.com>
In-Reply-To: <156155371863.20253.4638172627415827980@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/F6iFASWCRYzcyUbXp0u2hzpYMFw>
Subject: Re: [Dots] I-D Action: draft-ietf-dots-server-discovery-04.txt
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jun 2019 12:56:37 -0000

Hi all, 

The new version addresses the review from Franck. 

Cheers,
Med

> -----Message d'origine-----
> De : Dots [mailto:dots-bounces@ietf.org] De la part de internet-
> drafts@ietf.org
> Envoyé : mercredi 26 juin 2019 14:55
> À : i-d-announce@ietf.org
> Cc : dots@ietf.org
> Objet : [Dots] I-D Action: draft-ietf-dots-server-discovery-04.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the DDoS Open Threat Signaling WG of the
> IETF.
> 
>         Title           : Distributed-Denial-of-Service Open Threat
> Signaling (DOTS) Server Discovery
>         Authors         : Mohamed Boucadair
>                           Tirumaleswar Reddy
> 	Filename        : draft-ietf-dots-server-discovery-04.txt
> 	Pages           : 22
> 	Date            : 2019-06-26
> 
> Abstract:
>    It may not be possible for a network to determine the cause for an
>    attack, but instead just realize that some resources seem to be under
>    attack.  To fill that gap, Distributed-Denial-of-Service Open Threat
>    Signaling (DOTS) allows a network to inform a DOTS server that it is
>    under a potential attack so that appropriate mitigation actions are
>    undertaken.
> 
>    This document specifies mechanisms to configure DOTS clients with
>    DOTS servers.  The discovery procedure also covers the DOTS Signal
>    Channel Call Home.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-dots-server-discovery/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-dots-server-discovery-04
> https://datatracker.ietf.org/doc/html/draft-ietf-dots-server-discovery-04
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-dots-server-discovery-04
> 
> 
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Dots mailing list
> Dots@ietf.org
> https://www.ietf.org/mailman/listinfo/dots