Re: [Dots] New Version Notification for draft-ietf-dots-telemetry-05.txt

Jon Shallow <supjps-ietf@jpshallow.com> Fri, 03 April 2020 11:51 UTC

Return-Path: <supjps-ietf@jpshallow.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5548A3A1842 for <dots@ietfa.amsl.com>; Fri, 3 Apr 2020 04:51:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level:
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, PDS_BTC_ID=0.499, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A2dRKetk3r-I for <dots@ietfa.amsl.com>; Fri, 3 Apr 2020 04:51:08 -0700 (PDT)
Received: from mail.jpshallow.com (mail.jpshallow.com [217.40.240.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAF9F3A1847 for <dots@ietf.org>; Fri, 3 Apr 2020 04:51:07 -0700 (PDT)
Received: from mail2.jpshallow.com ([192.168.0.3] helo=N01332) by mail.jpshallow.com with esmtp (Exim 4.92.3) (envelope-from <jon.shallow@jpshallow.com>) id 1jKKqh-0002Ex-QI; Fri, 03 Apr 2020 12:50:59 +0100
From: Jon Shallow <supjps-ietf@jpshallow.com>
To: mohamed.boucadair@orange.com, "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@mcafee.com>, kaname nishizuka <kaname@nttv6.jp>, dots@ietf.org
References: <158532456961.24330.9684049527965442282@ietfa.amsl.com> <787AE7BB302AE849A7480A190F8B93303148203F@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <0acd01d60458$9df439f0$d9dcadd0$@jpshallow.com> <787AE7BB302AE849A7480A190F8B933031482353@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <0b7501d604f9$40fd53c0$c2f7fb40$@jpshallow.com> <787AE7BB302AE849A7480A190F8B933031483683@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <0db001d606d0$3f6312b0$be293810$@jpshallow.com> <787AE7BB302AE849A7480A190F8B933031489524@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <0ed901d6079d$ad34b1e0$079e15a0$@jpshallow.com> <787AE7BB302AE849A7480A190F8B93303148B373@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <101201d60868$affd91a0$0ff8b4e0$@jpshallow.com> <787AE7BB302AE849A7480A190F8B93303148D091@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <112b01d60927$b2ae7300$180b5900$@jpshallow.com> <787AE7BB302AE849A7480A190F8B93303148D4EE@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <787AE7BB302AE849A7480A190F8B93303148D71 C@OPEXCAUBMA2. corporate.adroot.infra.ftgroup>
In-Reply-To: <787AE7BB302AE849A7480A190F8B93303148D71C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Date: Fri, 03 Apr 2020 12:51:00 +0100
Message-ID: <11e001d609ae$2511c790$6f3556b0$@jpshallow.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKpDKSlae91Qx1rveAaG4y93fawwwGS0CN0ActngzYBop/8/AGLlQYiAqtlZCwC5xXv2wJXxJ8rAWqlVlgB+pAcCQK0mLlyAOa0qGwBVbcNwQHQJXQlAokNMHal5+yX0A==
Content-Language: en-gb
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/UUFcANuAhzqNEmoyRkmEjGLI7xI>
Subject: Re: [Dots] New Version Notification for draft-ietf-dots-telemetry-05.txt
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Apr 2020 11:51:10 -0000

Hi Med,

Thanks for this.  It looks as if it might be going in the right direction - I need to check if it can be sensibly coded up.

Hi all,

Some further thoughts.

/tm
===

For /tm we are trying to use the same YANG model for 2 purposes.
1-  Client indicating to Server attack telemetry information
2- Server indicating to Client attack telemetry information.

With Server -> Client, this is initiated by GET.  There is no reason as to why Uri-Query: cannot be used for prefix=, port=, protocol=, fqdn=, uri=, and alias-name= where each query can be repeated multiple times and port= can be a range.  Obviously the queries need to be validated that they are valid for the client in the same way that PUT gets validated.

The GET response (and any Observed response) can then populate target as appropriate and fill out the remaining information with non-zero values (or certainly values of consequence).
1-  For single port and/or single protocol in the query, do we just use total-traffic, total-traffic-protocol or (missing) total-traffic-port etc. in the response?
2-  Same true for the other variants (e.g. total-attack-traffic) as well.
It may be that only total-traffic makes sense and total-traffic-protocol can be dropped (same with other variants).  There is nothing stopping the Client doing different GET queries and observing all the different query combinations (other than volumes of traffic).

Then I believe that attack-detail should be an array [id] as multiple attack vectors may be concurrent

With Client -> Server, the information can easily be reduced by use of target-* information in the PUT, so I again question whether total-traffic-protocol etc. is really needed.  Multiple PUTs can be done with different target definitions which will not get caught by the target overlapping rule.

I am making a basic assumption that any traffic based information portrayed in the PUT is kept by the DOTS server for its internal use, but any GET responses reflect the actual situation, not a regurgitation of what the Client sent the Server.

It unclear to me what the difference is between embryonic and partial connections.  Embryonic is well defined, but partial is not.  Can the text be tidied up here?

There is no notion of /tm refresh (as in /mitigate or /config refresh) - is this correct?

/mitigate
========

The use of Queries would work here for any GET /mitigate (telemetry extension) so that the responses can be controlled despite the target definitions used for the PUT mitigation request.  Again, (because of packet size limitations when under attack) do we need total-traffic-protocol etc.?

The mitigate augment needs to be the same as for /tm from total-traffic onwards (with the CBOR mapping including ietf-dots-telemetry:).

If server-originated-telemetry is set and there is an active tmid, then responses include telemetry information
1- Do the responses get sent out at telemetry-notify-interval intervals (assuming Observe active)?
2- Why does this have to be with a tmid active - surely the tmid response and telemetry response will be containing the same data? 

/tm-setup
========

When doing a GET with cuid=, but not tsid= (to get the max/min etc. configuration information) what should be returned in the tsid field in the response given that it is a key?

While the baseline information is certainly worthwhile, things can wildly fluctuate during, say, Black Friday sales, or sales for some major festival.  The baseline then really needs to be updated for when these flash crowds take place to prevent unnecessary mitigation.  The text should be updated to reflect that there may be changing baselines. - e.g. extra servers spun up to handle the additional expected loads.

Peak Embryonic connection counts are a function of the listen queue (backlog) sizes on the target server and are likely to be different per port.  I am not sure that over my time in the last 2 decades working with DDoS that I have come across that many people who are able to sensibly answer the embryonic max question - especially when SYN Cookies and other techniques can muddy the water.  There is benefit in reporting it (e.g. SYN flooding attack) but I think it is difficult to baseline.  Thoughts?

Regards

Jon

> -----Original Message-----
> From: Dots [mailto: dots-bounces@ietf.org] On Behalf Of mohamed.boucadair@orange.com
> Sent: 03 April 2020 09:24
> To: Jon Shallow; Konda, Tirumaleswar Reddy; kaname nishizuka
> Cc: dots@ietf.org
> Subject: Re: [Dots] New Version Notification for draft-ietf-dots-telemetry-05.txt
> 
> Jon,
> 
> FWIW, the proposed change on the tree diagram can be seen here:
> 
> https://github.com/boucadair/draft-dots-
> telemetry/commit/ea7c2101c4d3f748808c25fa85900fca7bca273b#diff-
> 37c9ec7a9a8498c6dc3829deef79b5e7
> 
> Of course, this is a proposal for discussion.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Dots [mailto:dots-bounces@ietf.org] De la part de
> > mohamed.boucadair@orange.com
> > Envoyé : vendredi 3 avril 2020 07:54
> > À : Jon Shallow; Konda, Tirumaleswar Reddy; kaname nishizuka
> > Cc : dots@ietf.org
> > Objet : Re: [Dots] New Version Notification for draft-ietf-dots-
> > telemetry-05.txt
> >
> > Hi Jon,
> >
> > Moving the discussion to the WG list as this is an important design
> > change we need to make.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -----Message d'origine-----
> > > De : Jon Shallow [mailto:supjps-ietf@jpshallow.com]
> > > Envoyé : jeudi 2 avril 2020 21:49
> > > À : BOUCADAIR Mohamed TGI/OLN; Konda, Tirumaleswar Reddy; kaname
> > > nishizuka
> > > Objet : RE: [Dots] New Version Notification for draft-ietf-dots-
> > > telemetry-05.txt
> > >
> > > Stepping back to look at the bigger picture, I think that I would be
> > > more interested in the detail of a potentially multi-vectored
> > mutating
> > > attack, and so question whether having target-protocol as an overall
> > > restrictive view of all the detail makes sense.  It is easier to
> > > filter out data that I do not want / care about after receiving it.
> > > The remote peer may not have the same view of what to send v what I
> > am
> > > interested in.
> > >
> > > [I am concerned about over-filling a packet and having to go into
> > CoAP
> > > Block2 mode though which will fail on a saturated link.  I have not
> > > done any sizing of that yet with genuine attack information]
> > >
> > > So, for the /tm and /tm-setup stuff do we really need target-
> > protocol
> > > and could just have protocol as an optional, but array, entity?
> >
> > [Med] It is important to provide details per protocol as this will
> > help identifying abnormal patterns.
> >
> > We could associate 0 to mean "all" protocols but I know this will hurt
> > many. We can consider the following change:
> >
> > OLD
> >
> >     |           +--rw baseline* [id]
> >     |              +--rw id                               uint32
> >     |              +--rw target-prefix*                   inet:ip-
> > prefix
> >     |              +--rw target-port-range* [lower-port]
> >     |              |  +--rw lower-port    inet:port-number
> >     |              |  +--rw upper-port?   inet:port-number
> >     |              +--rw target-protocol*                 uint8
> >     |              +--rw target-fqdn*                     inet:domain-
> > name
> >     |              +--rw target-uri*                      inet:uri
> >     |              +--rw total-traffic-normal-baseline* [unit
> > protocol]
> >     |              |  +--rw unit                 unit
> >     |              |  +--rw protocol             uint8
> >     |              |  +--rw low-percentile-g?    yang:gauge64
> >     |              |  +--rw mid-percentile-g?    yang:gauge64
> >     |              |  +--rw high-percentile-g?   yang:gauge64
> >     |              |  +--rw peak-g?              yang:gauge64
> >
> > NEW:
> >
> >     |        +--:(baseline)
> >     |           +--rw baseline* [id]
> >     |              +--rw id                                   uint32
> >     |              +--rw target-prefix*                       inet:ip-
> > prefix
> >     |              +--rw target-port-range* [lower-port]
> >     |              |  +--rw lower-port    inet:port-number
> >     |              |  +--rw upper-port?   inet:port-number
> >     |              +--rw target-protocol*                     uint8
> >     |              +--rw target-fqdn*
> > inet:domain-name
> >     |              +--rw target-uri*                          inet:uri
> >     |              +--rw alias-name*                          string
> >     |              +--rw total-traffic-normal* [unit]
> >     |              |  +--rw unit                 unit
> >     |              |  +--rw low-percentile-g?    yang:gauge64
> >     |              |  +--rw mid-percentile-g?    yang:gauge64
> >     |              |  +--rw high-percentile-g?   yang:gauge64
> >     |              |  +--rw peak-g?              yang:gauge64
> >     |              +--rw total-traffic-normal-per-protocol* [unit
> > protocol]
> >     |              |  +--rw unit                 unit
> >     |              |  +--rw protocol             uint8
> >     |              |  +--rw low-percentile-g?    yang:gauge64
> >     |              |  +--rw mid-percentile-g?    yang:gauge64
> >     |              |  +--rw high-percentile-g?   yang:gauge64
> >     |              |  +--rw peak-g?              yang:gauge64
> >
> > Of course, the protocol must be listed in target-protocol (if
> > present).
> >
> > >
> > > Then for /mitigate, target-protocol is ignored in deciding what to
> > > send back, but the use of an optional protocol array can reduce some
> > > of the packet size.
> > >
> > > total-attack-connection  / total-connection-capacity will only be
> > for
> > > connection based connections - primarily TCP I suspect.
> >
> > [Med] Agree.
> >
> >  However
> > > (target) ports may be relevant here - a server may be able to
> > support
> > > X HTTPS connections, but only Y DNS (TCP) connections - or a load-
> > > balancer in the path is only  capable of handling Z connections - no
> > > matter what the port is..  So, do we want to introduce optional
> > ports?
> >
> > [Med] These ports have to be listed in target-port-range (if present).
> > If we include port to the existing list, we can't maintain two entries
> > for the same protocol but with distinct port. It may be more simple to
> > make this change:
> >
> > OLD:
> >     |              +--rw total-connection-capacity* [protocol]
> >     |                 +--rw protocol                     uint8
> >     |                 +--rw connection?                  uint64
> >     |                 +--rw connection-client?           uint64
> >     |                 +--rw embryonic?                   uint64
> >     |                 +--rw embryonic-client?            uint64
> >     |                 +--rw connection-ps?               uint64
> >     |                 +--rw connection-client-ps?        uint64
> >     |                 +--rw request-ps?                  uint64
> >     |                 +--rw request-client-ps?           uint64
> >     |                 +--rw partial-request-ps?          uint64
> >     |                 +--rw partial-request-client-ps?   uint64
> >
> > NEW:
> >
> >     |              +--rw total-connection-capacity* [protocol]
> >     |              |  +--rw protocol                     uint8
> >     |              |  +--rw connection?                  uint64
> >     |              |  +--rw connection-client?           uint64
> >     |              |  +--rw embryonic?                   uint64
> >     |              |  +--rw embryonic-client?            uint64
> >     |              |  +--rw connection-ps?               uint64
> >     |              |  +--rw connection-client-ps?        uint64
> >     |              |  +--rw request-ps?                  uint64
> >     |              |  +--rw request-client-ps?           uint64
> >     |              |  +--rw partial-request-ps?          uint64
> >     |              |  +--rw partial-request-client-ps?   uint64
> >     |              +--rw total-connection-capacity-per-port* [protocol
> > lower-port]
> >     |                 +--rw protocol                     uint8
> >     |                 +--rw lower-port                   inet:port-
> > number
> >     |                 +--rw connection?                  uint64
> >     |                 +--rw connection-client?           uint64
> >     |                 +--rw embryonic?                   uint64
> >     |                 +--rw embryonic-client?            uint64
> >     |                 +--rw connection-ps?               uint64
> >     |                 +--rw connection-client-ps?        uint64
> >     |                 +--rw request-ps?                  uint64
> >     |                 +--rw request-client-ps?           uint64
> >     |                 +--rw partial-request-ps?          uint64
> >     |                 +--rw partial-request-client-ps?   uint64
> >
> > >
> > > > > NEW:
> > > > > "Sending a DELETE with no 'tmid' indicates that all 'tmids' must
> > > be
> > > > > deactivated."
> > > > >
> > >
> > > I found this (but I prefer your addition for consistency)
> > >
> > >    A DOTS client that lost the state of its active 'tmids' or has to
> > > set
> > >    'tmid' back to zero (e.g., crash or restart) MUST send a GET
> > > request
> > >    to the DOTS server to retrieve the list of active 'tmid'.  The
> > DOTS
> > >    client may then delete 'tmids' that should not be active anymore.
> > >
> >
> > [Med] Yes. The NEW text will be right after this one.
> >
> > > Other minor nits
> > >
> > > OLD
> > >    attack-severity:  Attack severity.  These values are supported:
> > >       Emergency (1), critical (2), and alert (3).
> > > NEW (case of emergency)
> > >    attack-severity:  Attack severity.  These values are supported:
> > >       emergency (1), critical (2), and alert (3).
> > >
> > > OLD
> > >    tmid:  Telemetry Identifier is an identifier for the DOTS pre-or-
> > >         ongoing-mitigation telemetry data represented as an integer.
> > >         This identifier MUST be generated by DOTS clients. 'tsid'
> > > values
> > > NEW tsid -> tmid
> > >    tmid:  Telemetry Identifier is an identifier for the DOTS pre-or-
> > >         ongoing-mitigation telemetry data represented as an integer.
> > >         This identifier MUST be generated by DOTS clients. 'tmid'
> > > values
> > >
> >
> > [Med] Fixed. Thanks.
> >
> > > Regards
> > >
> > > Jon
> > >
> > >
> > > > -----Original Message-----
> > > > From: mohamed.boucadair@orange.com
> > > [mailto:mohamed.boucadair@orange.com]
> > > > Sent: 02 April 2020 19:42
> > > > To: Jon Shallow; Konda, Tirumaleswar Reddy; kaname nishizuka
> > > > Subject: RE: [Dots] New Version Notification for draft-ietf-dots-
> > > telemetry-05.txt
> > > >
> > > > Re-,
> > > >
> > > > The same issue applies as well for the baseline component:
> > > >
> > > > If we convey multiple protocols in target-prefix and want to
> > signal
> > > all total-
> > > > traffic-normal-baseline + total-traffic-normal-baseline of each
> > > protocol listed in
> > > > target-prefix, we will need to have to use an index in addition to
> > > the unit.
> > > > Protocol can then become optional. The same apply for total-
> > > connection-
> > > > capacity.
> > > >
> > > > I need to think about this further.
> > > >
> > > > Cheers,
> > > > Med
> > > >
> > > > > -----Message d'origine-----
> > > > > De : BOUCADAIR Mohamed TGI/OLN
> > > > > Envoyé : jeudi 2 avril 2020 19:29
> > > > > À : 'Jon Shallow'; Konda, Tirumaleswar Reddy; kaname nishizuka
> > > > > Objet : RE: [Dots] New Version Notification for draft-ietf-dots-
> > > > > telemetry-05.txt
> > > > >
> > > > > Hi Jon,
> > > > >
> > > > > Please see inline.
> > > > >
> > > > > Cheers,
> > > > > Med
> > > > >
> > > > > > -----Message d'origine-----
> > > > > > De : Jon Shallow [mailto:supjps-ietf@jpshallow.com]
> > > > > > Envoyé : mercredi 1 avril 2020 23:01
> > > > > > À : BOUCADAIR Mohamed TGI/OLN; Konda, Tirumaleswar Reddy;
> > kaname
> > > > > > nishizuka
> > > > > > Objet : RE: [Dots] New Version Notification for draft-ietf-
> > dots-
> > > > > > telemetry-05.txt
> > > > > >
> > > > > > Hi Med et al,
> > > > > >
> > > > > > Other nits (as well as 2 following sections)
> > > > > >
> > > > > > OLD:
> > > > > >
> > > > > >    ongoing-mitigation telemetry data from the DOTS server.
> > The
> > > GET
> > > > > >    request specify a 'tmid' (Figure 31) or not (Figure 32).
> > > > > >
> > > > > > NEW:
> > > > > >
> > > > > >    ongoing-mitigation telemetry data from the DOTS server.
> > The
> > > GET
> > > > > >    request specifies a 'tmid' (Figure 31) or not (Figure 32).
> > > > > >
> > > > >
> > > > > [Med] Fixed.
> > > > >
> > > > >
> > > > > > DELETE /tm
> > > > > >
> > > > > > Does no tmid= delete all tmids ?
> > > > > > - In particular after a restart of a client?
> > > > > >
> > > > >
> > > > > [Med] Yes, they should be "deactivated".
> > > > >
> > > > > NEW:
> > > > > "Sending a DELETE with no 'tmid' indicates that all 'tmids' must
> > > be
> > > > > deactivated."
> > > > >
> > > > > > >
> > > > > > > .. The below is coming from what the server sends to the
> > > client
> > > > > > perspective.  I
> > > > > > > accept that in the client sending to the server having
> > target-
> > > > > > protocol and
> > > > > > > protocol may give rise to some potential confusion...
> > > > > > >
> > > > >
> > > > > [Med] Let's see how to avoid the inconsistency. The YANG module
> > is
> > > > > currently reflecting the text we have I draft-ietf-dots-
> > telemetry-
> > > > > 04#section-7.1. We need to check that section to see where the
> > > per-
> > > > > transport is mentioned and make sure we don't break things.
> > > > >
> > > > > For example, if protocol is present in the target, we to avoid
> > > > > conflicting (and redundant) information to be supplied in the
> > > > > telemetry data.
> > > > >
> > > > > > > >
> > > > > > > > In terms of protocol, there are still some consistencies
> > > even if
> > > > > > you accept the
> > > > > > > > argument that protocol is already defined in the
> > mitigation
> > > > > scope
> > > > > > (which I am
> > > > > > > > not happy with).
> > > > > > > >
> > > > > > > > 1) target-protocol is optionally set and it is an array
> > > whereas
> > > > > > protocol is
> > > > > > > singular
> > > > > > > >
> > > > > > > > 2) protocol is defined mitigation scope augment as per
> > > > > > > > module: ietf-dots-telemetry
> > > > > > > >   augment /ietf-signal:dots-signal/ietf-signal:message-
> > > > > type/ietf-
> > > > > > > signal:mitigation-
> > > > > > > > scope/ietf-signal:scope:
> > > > > > > >     +--ro total-traffic* [unit protocol] {dots-telemetry}?
> > > > > > > >     |  +--ro unit                 unit
> > > > > > > >     |  +--ro protocol             uint8
> > > > > > > >     |  +--ro low-percentile-g?    yang:gauge64
> > > > > > > >     |  +--ro mid-percentile-g?    yang:gauge64
> > > > > > > >     |  +--ro high-percentile-g?   yang:gauge64
> > > > > > > >     |  +--ro peak-g?              yang:gauge64
> > > > > > > >     +--rw total-attack-traffic* [unit] {dots-telemetry}?
> > > > > > > >     |  +--rw unit                 unit
> > > > > > > >     |  +--rw low-percentile-g?    yang:gauge64
> > > > > > > > And so there is no consistency between total-traffic and
> > > total-
> > > > > > attack-traffic
> > > > >
> > > > > [Med] The idea was to have a view of total traffic bound to a
> > > target
> > > > > prefix/domain. We should clarify or remove the protocol for this
> > > one.
> > > > > Fair enough.
> > > > >
> > > > > > > >
> > > > > > > > 3) For /tm you have
> > > > > > > >     +--:(telemetry) {dots-telemetry}?
> > > > > > > >        +--rw pre-or-ongoing-mitigation* [cuid tmid]
> > > > > > > > ..
> > > > > > > >           |  +--rw target-protocol*     uint8
> > > > > > > > ..
> > > > > > > >           +--rw total-traffic* [unit protocol]
> > > > > > > >           |  +--rw unit                 unit
> > > > > > > >           |  +--rw protocol             uint8
> > > > > > > > ..
> > > > > > > >           +--rw total-attack-traffic* [unit protocol]
> > > > > > > >           |  +--rw unit                 unit
> > > > > > > >           |  +--rw protocol             uint8
> > > > > > > >
> > > > > > > > And so could argue here that protocol is not needed
> > > > >
> > > > > [Med] but we may have many protocols listed under target-
> > protocol.
> > > > >
> > > > > > > >
> > > > > > > > 4) If target-protocol is not specified, then it refers to
> > > any
> > > > > > protocol.  If target-
> > > > > > > > protocol is not defined in /mitigate, then I have no way
> > of
> > > > > > indicating which is a
> > > > > > > > problematic protocol if protocol is not supported.
> > > > >
> > > > > [Med] Good point. This one (and the following one) justifies
> > that
> > > we
> > > > > need to revisit the design.
> > > > >
> > > > > We ca group the data by target-protocol and send many tmids if
> > > many
> > > > > protocols need to be returned. Protocol can be then optional.
> > > > >
> > > > > Would that be better?
> > > > >
> > > > >
> > >
> >
> > _______________________________________________
> > Dots mailing list
> > Dots@ietf.org
> > https://www.ietf.org/mailman/listinfo/dots
> _______________________________________________
> Dots mailing list
> Dots@ietf.org
> https://www.ietf.org/mailman/listinfo/dots