Re: [Dots] FW: Why is DOTS not using NETCONF/RESTCONF for management functions

"Mortensen, Andrew" <amortensen@arbor.net> Tue, 15 November 2016 18:20 UTC

Return-Path: <amortensen@arbor.net>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18AB01294B1 for <dots@ietfa.amsl.com>; Tue, 15 Nov 2016 10:20:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=arbor.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GAxXRKOmEbdz for <dots@ietfa.amsl.com>; Tue, 15 Nov 2016 10:20:28 -0800 (PST)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0102.outbound.protection.outlook.com [104.47.38.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37C50129408 for <dots@ietf.org>; Tue, 15 Nov 2016 10:20:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arbor.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=HVja7fEgktuW82epEFfrgbovzpthq2NDYO3JJEnE3EE=; b=FM8v+3Yx7/5dMycAsw9kig8CB52OYcThFX5XM+PQ6ok1pzyVoN7xBlJAycmC4rrHusQU0RAY8BXjmQ/AmDoDGJUCMI+LcZ7T4EWiU68PHppklHVmWGZhycYnQcPQQArMrkAxvRYvClYiPjPO9b1J2Etu0yLrF0Rgos26d+fhOeU=
Received: from BL2PR01MB1777.prod.exchangelabs.com (10.167.95.11) by BL2PR01MB1777.prod.exchangelabs.com (10.167.95.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.707.6; Tue, 15 Nov 2016 18:20:22 +0000
Received: from BL2PR01MB1777.prod.exchangelabs.com ([10.167.95.11]) by BL2PR01MB1777.prod.exchangelabs.com ([10.167.95.11]) with mapi id 15.01.0707.015; Tue, 15 Nov 2016 18:20:22 +0000
From: "Mortensen, Andrew" <amortensen@arbor.net>
To: Susan Hares <shares@ndzh.com>
Thread-Topic: [Dots] FW: Why is DOTS not using NETCONF/RESTCONF for management functions
Thread-Index: AQJsYSNI9YQbUtBqHoLL9S6IwUEr0J+llK+wgACC4gA=
Date: Tue, 15 Nov 2016 18:20:21 +0000
Message-ID: <0962D718-09D3-4762-916A-03262A06D2E6@arbor.net>
References: <008f01d23f2b$277490e0$765db2a0$@ndzh.com> <00a801d23f2b$8a283480$9e789d80$@ndzh.com>
In-Reply-To: <00a801d23f2b$8a283480$9e789d80$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=amortensen@arbor.net;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [31.133.159.169]
x-microsoft-exchange-diagnostics: 1; BL2PR01MB1777; 7:HrDr0Yof+zxQV+q+QLwOAYf9nzxNx/yuYkvbaM7aEViySiLeXn52PbtISouwOfElVX9Js1BVW2MpoVdAj7lGIRKrciFaXrOEyqNsCTuovIglzX7lpUX8VLeF58eG0k11OYVhEw3PD4Iz5QyxOi5OriB1dh8cf6SnxVTkeAzbY5jhqTbrlvNdU5F8Vyt76+Z1iifKWbpcG8SEFQUA+Jsc9mBpHtBAqUBYw0oUE33s17CdvIm3MePZfs2MIfjYYXCuAGUExOb4xPbS9kNpkBK/DWdkr91UiXGazPqYXSKYnsraC5tv+35EBQSHYcAnWl5U4SEtV7APaSoIhIsaZaRI6xXyB4q1FN3ZylJy26aVgCA=
x-ms-office365-filtering-correlation-id: c2474681-3dfa-4c63-f7a9-08d40d840ff7
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BL2PR01MB1777;
x-microsoft-antispam-prvs: <BL2PR01MB17777D1CDE50376D8808D7A7D1BF0@BL2PR01MB1777.prod.exchangelabs.com>
x-exchange-antispam-report-test: UriScan:(158342451672863);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6060326)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6061324)(6043046); SRVR:BL2PR01MB1777; BCL:0; PCL:0; RULEID:; SRVR:BL2PR01MB1777;
x-forefront-prvs: 012792EC17
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(7916002)(24454002)(377454003)(189002)(199003)(81166006)(68736007)(81156014)(102836003)(3846002)(6116002)(110136003)(2906002)(8936002)(7846002)(105586002)(101416001)(189998001)(6916009)(2950100002)(83716003)(54356999)(7906003)(106116001)(76176999)(66066001)(4326007)(106356001)(33656002)(50986999)(77096005)(7736002)(122556002)(92566002)(87936001)(97736004)(82746002)(3660700001)(3280700002)(36756003)(5660300001)(2900100001)(86362001)(229853002)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR01MB1777; H:BL2PR01MB1777.prod.exchangelabs.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: arbor.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_0962D71809D34762916A03262A06D2E6arbornet_"
MIME-Version: 1.0
X-OriginatorOrg: arbor.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Nov 2016 18:20:21.8323 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 54f11205-d4aa-4809-bd36-0b542199c5b2
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR01MB1777
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/Y28gxSmsnAwYyn_cKo9s_GxA988>
Cc: "dots@ietf.org" <dots@ietf.org>
Subject: Re: [Dots] FW: Why is DOTS not using NETCONF/RESTCONF for management functions
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Nov 2016 18:20:30 -0000

Hi Sue. The impression I get from reading this is that you see DOTS as a use case or subset of I2NSF. Am I misrepresenting the content dramatically?

A few comments marked [AM] inline. I’ll try to provide a more comprehensive response soon.

On Nov 15, 2016, at 5:32 AM, Susan Hares <shares@ndzh.com<mailto:shares@ndzh.com>> wrote:


My question: Why is DOTS, SCAM, SECEVENT not using the same mechanisms for events, configuration control and telemetry data as NM/OPS with their own data models?
•       This email walks through the DOTS drafts indicating which of the NM/OPS services could be used, and what data is being passed.
•       What I found is that 95% of work is covered by NM/OPS with data models.

[AM] This is a remarkably specific number. :)

The DOTS workgroup has defined three main messaging models:


  *   Actionable Event Alerting

◦        Called ‘Signaling’ in the workgroup – “I’m being attacked”

[AM] While generally true, this summary appears to overlook the requirement that the signaling be operable, to the maximum degree possible, under attack conditions. In particular, the signaling must be robust and operable despite high rates of packet loss e.g. over a link congested with volumetric attack traffic, and must not fragment messages sent over the DOTS signal channel. For that reason the WG settled on the requirement that DOTS signaling use a connectionless protocol with a sub-MTU message size when calling for help. I’m not aware of a UDP-based NETCONF, though I freely admit I may have overlooked it.

The RESTCONF over QUIC work you mention below might be made to meet those requirements, but QUIC is also by design a reliable transport. However, it’s my personal opinion that a request/response convention is not the best option for the SOS signaling, given the significantly increased probability that server responses will be lost when the inbound link is congested with attack traffic.

For that reason, draft-teague-dots-protocol-00 decouples DOTS signal channel messaging from the request/response model. The DOTS client instead calls for help by sustaining mitigation requests in its heartbeats, resembling an emergency beacon at intervals broadcasting the need for aid. The DOTS server uses its unidirectional heartbeats to return mitigation request status to the client. Loss in either direction is absorbed without retransmission, since the client is concerned merely with communicating the current need for mitigation (with associated scope and supplementary data), and the server is concerned solely with returning mitigation status to the client (including refusal to begin mitigation).

Once a DOTS server has enabled mitigation, ideally the data channel is available for reliable operations.


  *   Configuration Control

◦        Called ‘Bulk Data’ in the workgroup

[AM] I’m certainly open to using existing standards here. I previously suggested RESTCONF as an option as far back as my original threat signaling requirements draft: <https://tools.ietf.org/html/draft-mortensen-threat-signaling-requirements-00#section-4.1>. The gRPC work Google’s bringing forward in <https://tools.ietf.org/html/draft-kumar-rtgwg-grpc-protocol-00> is also worth a look, though it seems like there's a degree of overlap with NETCONF there. Not a surprise given gRPC’s use by OpenConfig.

andrew