Re: [Dots] Adoption call for draft-reddy-dots-home-network-04

"Konda, Tirumaleswar Reddy" <> Thu, 18 April 2019 14:00 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id D927212014A; Thu, 18 Apr 2019 07:00:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 12j6TgBMSrGI; Thu, 18 Apr 2019 07:00:12 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 72CAE12033E; Thu, 18 Apr 2019 07:00:11 -0700 (PDT)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=s_mcafee; t=1555595665; h=From: To:CC:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:authentication-results: x-originating-ip:x-ms-publictraffictype:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-ms-exchange-purlcount:x-microsoft-antispam-prvs: x-forefront-prvs:x-forefront-antispam-report: received-spf:x-ms-exchange-senderadcheck:x-microsoft-antispam-message-info: Content-Type:MIME-Version:X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-CrossTenant-mailboxtype: X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Level: X-NAI-Spam-Threshold:X-NAI-Spam-Score:X-NAI-Spam-Version; bh=eK7Xz03H4acW0QEy7iTGT460Za5NwTTs/OII8W 7QR60=; b=jS1nrlt7dLmTU9uaV3LsGVj0+A5bgzsESuq6kqIJ rCfqvaQefreKl8ENJjV3jM/ytAMK4HkGQA4ibmLcXdaZfyDvyU 2K3NhwsGW16mrzmN0R/A/eYn7t6/x932BpQkwZNpNk41fQ51C4 1PpKjEaqihUdkAYdlFEKxhI7EjKIufo=
Received: from (unknown []) by with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 1532_b981_5cbd11ea_d25e_45b0_ad76_cd9d8cc1b527; Thu, 18 Apr 2019 07:54:24 -0600
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 18 Apr 2019 07:59:11 -0600
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Thu, 18 Apr 2019 07:59:11 -0600
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 18 Apr 2019 07:59:09 -0600
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1813.11; Thu, 18 Apr 2019 13:59:09 +0000
Received: from ([fe80::4873:7200:9e57:9e62]) by ([fe80::4873:7200:9e57:9e62%5]) with mapi id 15.20.1813.011; Thu, 18 Apr 2019 13:59:09 +0000
From: "Konda, Tirumaleswar Reddy" <>
To: "" <>, Daniel Migault <>
CC: "" <>, Valery Smyslov <>, "" <>, "" <>
Thread-Topic: [Dots] Adoption call for draft-reddy-dots-home-network-04
Thread-Index: AdTuHVZNyfDh6IMnTiyfhZP8vM2pOAFGr25wABsxq4AAi6JHcAAE2iQQAAHe34A=
Date: Thu, 18 Apr 2019 13:59:08 +0000
Message-ID: <>
References: <023d01d4ee1f$c2bcb190$483614b0$> <> <> <> <787AE7BB302AE849A7480A190F8B93302EA62879@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B93302EA62879@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
dlp-product: dlpe-windows
dlp-reaction: no-action
authentication-results: spf=none (sender IP is );
x-originating-ip: []
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8ccebc85-24c4-49e5-9b49-08d6c4060757
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600141)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:BYAPR16MB2808;
x-ms-traffictypediagnostic: BYAPR16MB2808:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <>
x-forefront-prvs: 0011612A55
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(346002)(136003)(376002)(396003)(51914003)(13464003)(53754006)(189003)(199004)(32952001)(71200400001)(80792005)(966005)(25786009)(81166006)(52536014)(6506007)(478600001)(8936002)(72206003)(68736007)(790700001)(6246003)(5660300002)(53546011)(97736004)(53936002)(71190400001)(14454004)(81156014)(8676002)(3846002)(186003)(4326008)(6116002)(2501003)(99286004)(86362001)(236005)(606006)(2906002)(102836004)(6306002)(7736002)(66066001)(26005)(76176011)(93886005)(486006)(33656002)(476003)(316002)(229853002)(6436002)(256004)(54896002)(110136005)(74316002)(14444005)(5024004)(9686003)(11346002)(55016002)(7696005)(446003)(54906003)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR16MB2808;; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None ( does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ic6Y1pAiz51T8n463jDbDtIJn1WXRMPJRpuendM7TshkLFDjjx2qXT3Omngq+KUsxaNTq3sj/6uCLmwT5waT4bjG08GS2qeWGEj+/3AZ69aBROLRkktsPukCesAQdBdflD1dbElWKdMgypoUazBN6m+0uWNz05T0NRjpeWkRVvwrlwTM+7GmivHdWKiZ0z8LZG64JBEsQiiFLzkhLJtH6rZs6gacP4D5Oko0lAql86Zaed85HD072xHgrV1N3ttgMMsOkK+BXH8TnTi5Fpim98rAWiI/lGobY99A+7hweJUFA/nuZlN5u31uKq6WXzG41dxR+6VHDsuBgmZtiiFTBujhnSZME+DfKz3bmgFqjfsna/Myn5eLoQ3qXpwHAYBCULNiav5by/abvzAsRgkEjl+6NfgId7/9aR1mWkLwMSw=
Content-Type: multipart/alternative; boundary="_000_BYAPR16MB2790D5CB67D6A4C1BE6D022BEA260BYAPR16MB2790namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ccebc85-24c4-49e5-9b49-08d6c4060757
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2019 13:59:08.9302 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR16MB2808
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0.1
X-NAI-Spam-Version: : core <6528> : inlines <7057> : streams <1819021> : uri <2834146>
Archived-At: <>
Subject: Re: [Dots] Adoption call for draft-reddy-dots-home-network-04
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 18 Apr 2019 14:00:16 -0000

From: <>
Sent: Thursday, April 18, 2019 6:43 PM
To: Konda, Tirumaleswar Reddy <>; Daniel Migault <>
Cc:; Valery Smyslov <>;;
Subject: RE: [Dots] Adoption call for draft-reddy-dots-home-network-04

CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

Hi Tiru, Daniel,

With regards to:

“ I believe that
the same mechanism could be deployed between a DDoS target, its Cloud
provider major ISPs up to the origin.”

This is not currently doable with DOTS. Some key functional components are needed:
(1) To identify the appropriate ISP which is hosting a DDoS source once a DDoS target has detected/reported an attack to its DOTS server/provider. The target may not be on the same network as the source.
(2) That ISP needs to expose a service to receive these notifications.

Of course, if the ISP is capable of receiving these notifications, it can invoke the procedure in draft-reddy-dots-home-network.

The scenario mentioned by Daniel is an interesting problem to address…but I’m afraid this is out of scope of the current DOTS charter.

[TR] Agree with your response

I don’t see how BGP Flowspec solves this.

[TR], BGP Flowspec allows the ISP to receive the filtering rules from the mitigation provider (downstream ISP) for the attack target, do you see a problem with my proposed text ?



De : Dots [] De la part de Konda, Tirumaleswar Reddy
Envoyé : jeudi 18 avril 2019 14:52
À : Daniel Migault; Panwei (William)
Cc :<>; Valery Smyslov;<>;<>
Objet : Re: [Dots] Adoption call for draft-reddy-dots-home-network-04

Hi Daniel,

Thanks for the review, Please see inline [TR]

From: Dots <<>> On Behalf Of Daniel Migault
Sent: Monday, April 15, 2019 9:34 PM
To: Panwei (William) <<>>
Cc:<>; Valery Smyslov <<>>;<>;<>
Subject: Re: [Dots] Adoption call for draft-reddy-dots-home-network-04

CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

I support the adoption of the draft, please see my comments on the current version. None of them should be considered as preventing the adoption.


Some random comments:

Section 1:

   Some of the DDoS attacks like spoofed RST or FIN packets, Slowloris,
   and TLS re-negotiation are difficult to detect on the home network
   devices without adversely affecting its performance.  The reason is
   typically home routers have fast path to boost the throughput.  For
   every new TCP/UDP flow, only the first few packets are punted through
   the slow path.  Hence, it is not possible to detect various DDoS
   attacks in the slow path, since the attack payload is sent to the
   target server after the flow is switched to fast path.  Deep packet
   inspection (DPI) of all the packets of a flow would be able to detect
   some of the attacks.  However, a full-fledged DPI to detect these
   type of DDoS attacks is functionally or operationally not possible
   for all the devices attached to the home network owing to the memory
   and CPU limitations of the home routers.  Further, for certain DDoS
   attacks the ability to distinguish legitimate traffic from attacker
   traffic on a per packet basis is complex.  This complexity originates
   from the fact that the packet itself may look "legitimate" and no
   attack signature can be identified.  The anomaly can be identified
   only after detailed statistical analysis.

I understand, the paragraph below as saying that detection at the ISP is
easier than at the homenet level as the ISP aggregates the traffic. This
is correct and I agree with the text. However, if we are going a bit
further, the detection is even easier to the DDoS target. I believe that
the same mechanism could be deployed between a DDoS target, its Cloud
provider major ISPs up to the origin. The example of the Homenet and the
ISP is only one bound but the mechanism can be generalized and actually
help coordination between independent domains.  I believe the draft can
be placed in a larger perspective.

[TR] Agreed, it is relatively easy for the DDoS mitigation provider for the attack target to detect sophisticated DDoS attacks (especially if the attack uses encrypted traffic).

I will add the following lines:

BGP defines a mechanism as described in [RFC5575] that can be used to
automate inter-domain coordination of traffic filtering, such as what
is required in order to mitigate DDoS attacks. DDoS mitigation provider
for the attack target can detect sophisticated DDoS attacks
using encrypted attack traffic, and can possibly use BGP flowspec [RFC5575] to
  convey the filtering rules to filter block, or rate-limit DDoS attack traffic originating
  from the ISP's subscribers to the attack target.

Section 3.1 Procedure:

I am not convinced this is the right approach to switch the roles
between clients and servers. I believe that while the previous dots
signal-channel was foreseeing the relation as asymmetric, we are now
considering DOTS Client and DOTS Server as mostly symmetric. Maybe one
way to see this could be to have a DOTS communication between different
entities, and exchanges can be in both directions. The one initiating
the exchange could be designated as DOTS Initiator, while the receiving
side is the DOTS Responder.

Here is a more concrete example while Client / Server  might be
confusing. When  a server sends an alert when under attach it is designated
as the DOTS Client, while the same client specifying these IP addresses
are detected as belonging to an attacker will be the Server.

It seems also to me that establishment of the (D)TLS channel can be sent
by any other peer, not necessarily the peer sending further
notification/request. Typically the DOTS Client may have set the DOTS
channel protected by (D)TLS, and the DOTS Server may re-use that exact
same channel.

I am also wondering if the support of the extension is agreed or
announced. If so this would ease the negotiation of which peer is able
to handle the requests and be a "Server".

[TR] Both draft-reddy-dots-home-network and RFC8071 adopt the same approach for managing roles and connections. You may want to look into RFC8071.
        CoAP allows asynchronous messages but the request is always sent by the CoAP client.

I believe the clarification and comparison with the
"traditional"/"initial" DOTS use cases is useful and needs to stay for
clarification purpose. However, one should make sure also that such
signalling can also be made with a signal dots signalling established in
the initial use cases. Typically, the DOTS client may have set the DOTS
channel and set a DTLS session which could carry the signalling of the

[TR] I don’t get the above comment.


On Sun, Apr 14, 2019 at 11:06 PM Panwei (William) <<>> wrote:

I support adoption of this draft.

Best Regards
Wei Pan

-----Original Message-----
From: Dots [<>] On Behalf Of Valery Smyslov
Sent: Monday, April 08, 2019 11:29 PM
Subject: [Dots] Adoption call for draft-reddy-dots-home-network-04

Hi all,

the chairs recently received an adoption request for draft-reddy-dots-home-network-04.

This message starts a two-week adoption call for draft-reddy-dots-home-network-04.
The call ends up on Tuesday, April the 23rd.

Please send your opinion regarding adoption of this document to the list before this date.
If you think the draft should be adopted, please indicate whether you're willing to review it/to work on it. If you think the draft should not be adopted, please explain why.

Frank & Valery.

Dots mailing list<>

Dots mailing list<>