Re: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Mon, 26 November 2018 06:06 UTC

Return-Path: <TirumaleswarReddy_Konda@mcafee.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1266130E9B for <dots@ietfa.amsl.com>; Sun, 25 Nov 2018 22:06:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.749
X-Spam-Level:
X-Spam-Status: No, score=-5.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02NwQlcE-aoL for <dots@ietfa.amsl.com>; Sun, 25 Nov 2018 22:06:57 -0800 (PST)
Received: from DNVWSMAILOUT1.mcafee.com (dnvwsmailout1.mcafee.com [161.69.31.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85B831271FF for <dots@ietf.org>; Sun, 25 Nov 2018 22:06:56 -0800 (PST)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=s_mcafee; t=1543212417; h=From: To:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:authentication-results: x-originating-ip:x-ms-publictraffictype:x-microsoft-exchange-diagnostics: x-ms-exchange-antispam-srfa-diagnostics:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-microsoft-antispam-prvs:x-ms-exchange-senderadcheck: x-exchange-antispam-report-cfa-test:x-forefront-prvs: x-forefront-antispam-report:received-spf:x-microsoft-antispam-message-info: spamdiagnosticoutput:spamdiagnosticmetadata: Content-Type:MIME-Version:X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Threshold: X-NAI-Spam-Score:X-NAI-Spam-Version; bh=T 7CaACHoeNdHEvp420/Bz/AoPkth2VcyRDanaBmE15 E=; b=fMuUNtHFUtB4FkUAZeZvIG9NOjQM9QANl3OnzwbkUFIY BV9Vlb4ysTc3PQrEzh4oSotD72YCjETF35+KDQ7O8MN6JMjZxf YwLpgAwgvUCLxWTZKVYpsNoUjZSzx8U9owCN2ULDANegYn0od7 FWtPwKConrTMCZ71oXcJx+SbJBM=
Received: from DNVEXAPP1N05.corpzone.internalzone.com (unknown [10.44.48.89]) by DNVWSMAILOUT1.mcafee.com with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 7a43_424f_17997227_a37e_4661_9e0a_5a7dc280cbe6; Mon, 26 Nov 2018 00:06:56 -0600
Received: from DNVEXUSR1N08.corpzone.internalzone.com (10.44.48.81) by DNVEXAPP1N05.corpzone.internalzone.com (10.44.48.89) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Sun, 25 Nov 2018 23:06:22 -0700
Received: from DNVO365EDGE2.corpzone.internalzone.com (10.44.176.74) by DNVEXUSR1N08.corpzone.internalzone.com (10.44.48.81) with Microsoft SMTP Server (TLS) id 15.0.1347.2 via Frontend Transport; Sun, 25 Nov 2018 23:06:21 -0700
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (10.44.176.243) by edge.mcafee.com (10.44.176.74) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Sun, 25 Nov 2018 23:06:21 -0700
Received: from BN6PR16MB1425.namprd16.prod.outlook.com (10.172.207.19) by BN6PR16MB1793.namprd16.prod.outlook.com (10.172.28.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1361.15; Mon, 26 Nov 2018 06:06:19 +0000
Received: from BN6PR16MB1425.namprd16.prod.outlook.com ([fe80::b8de:7bb:cfa3:22ee]) by BN6PR16MB1425.namprd16.prod.outlook.com ([fe80::b8de:7bb:cfa3:22ee%8]) with mapi id 15.20.1361.019; Mon, 26 Nov 2018 06:06:18 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: Jon Shallow <supjps-ietf@jpshallow.com>, "'Panwei (William)'" <william.panwei@huawei.com>, "dots@ietf.org" <dots@ietf.org>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, 'kaname nishizuka' <kaname@nttv6.jp>
Thread-Topic: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering
Thread-Index: AdSDBf0VtkQPWnToQ7CWp4O9gIla1gAF1xwAAItEO/A=
Date: Mon, 26 Nov 2018 06:06:18 +0000
Message-ID: <BN6PR16MB142568CE7799AEB93B588DD5EAD70@BN6PR16MB1425.namprd16.prod.outlook.com>
References: <30E95A901DB42F44BA42D69DB20DFA6A608D45C7@nkgeml513-mbx.china.huawei.com> <04c401d4831d$59c749b0$0d55dd10$@jpshallow.com>
In-Reply-To: <04c401d4831d$59c749b0$0d55dd10$@jpshallow.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.500.52
dlp-reaction: no-action
authentication-results: spf=none (sender IP is ) smtp.mailfrom=TirumaleswarReddy_Konda@McAfee.com;
x-originating-ip: [103.245.47.20]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR16MB1793; 6:mtd8DBoMIwGRhIAIv3HaECPijfAz5qnYqZMKrsqC+8wqYLua3DiJPKxKLYIUfx1JMw8YB+kdQxZ7+EMSNc1aYbqxFBzA69EzqWDQsb2n/nHOfgs8f5j2hBYpnSyUaYl0HC4fJHFQBneaB4Xnp9Vyg1YXGp27RI+VqwCyspd5Uv+cq/l8aRWeQcubUzHvv9hsRcduQ3gJP8V6C/Bgwm4TvCQvJ3irW9LiBWsSUvBUccNWyx0TVZRejMLQtpRSHBhra6rwIxxkY5QQf5seR1cObd1sxv4wP2X5ID2kQ4u3PToMSxGKcRI3qvw2OCPPahH7BNKFj9cQbU+hyZGI+z5nf5UAUL5bsCAUHcGBPt1hTNy8AdgAH60wjG190Tz1cyj7CgqpN5HodftZBjUNovITDoOS26CDBO8QATXbjNqrVWBdTOU3VvyWp3/8RrwGqwnxP96b1T4R/r+B/mHiDta/6A==; 5:Bg7Feol00vQQJfsyXdvfG2cecOeKUyy90uCU07iglag4fdX71a8UWs3AZwfWMEfzjGA2EyQFzqsDwgIV5hnj068QIUc1KHgrbXl3PWdyeTEY2nMqDqQNSg5FKjUpCnf0L0iKA3ti6YTZPpDyQj56QLGmKj9vZE0Nmwqi0mCkAUQ=; 7:oqgp+oZJAorkiwB+SMZrulnpWqQEDGZ8qjwJxYrOIRKj3LNuLY1Lqm7X1B42+izwnmhhdWr4Cr5T5kMOVZOWWvtgD5eV+MSBpRrRbnLtcP8EgxGEG+mLQiwRaU8UwLEW7kYZRXxbWfnFqREa/6M2TQ==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 6975be9d-40cc-402b-e970-08d65365484c
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(5600074)(711020)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:BN6PR16MB1793;
x-ms-traffictypediagnostic: BN6PR16MB1793:
x-microsoft-antispam-prvs: <BN6PR16MB17934A54BB390DE38C2E01C2EAD70@BN6PR16MB1793.namprd16.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231443)(944501410)(4982022)(52105112)(93006095)(93001095)(148016)(149066)(150057)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:BN6PR16MB1793; BCL:0; PCL:0; RULEID:; SRVR:BN6PR16MB1793;
x-forefront-prvs: 086831DFB4
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(376002)(396003)(366004)(346002)(32952001)(199004)(189003)(66066001)(7736002)(55016002)(21615005)(5024004)(14444005)(446003)(256004)(476003)(11346002)(5660300001)(68736007)(14454004)(486006)(7696005)(99286004)(105586002)(53936002)(97736004)(54896002)(6306002)(53546011)(106356001)(8676002)(8936002)(33656002)(81166006)(9686003)(102836004)(74316002)(26005)(25786009)(6246003)(186003)(71190400001)(236005)(76176011)(71200400001)(4744004)(53946003)(4001150100001)(80792005)(86362001)(2201001)(72206003)(2501003)(966005)(6436002)(606006)(316002)(110136005)(9326002)(229853002)(3846002)(6116002)(790700001)(6506007)(81156014)(478600001)(2906002)(345774005)(85282002)(559001)(579004)(569006); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR16MB1793; H:BN6PR16MB1425.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: McAfee.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: m9iNwApvQbMXslVeRPQK5735/436w+IPb2YQ2VuU8CYhtQomq/kTZp1woBF/a/lGl85RFGXKh+OkWQUjsObKECVVoquLdXAUCC27IUYlnIFq/S9b4hiZw6dW2agBQM5z+rdfpHLV7gQeT6cRORO4fKglFuxiB/lfrURfbQen4npPKYymqRd2jkm/dSciGvHFGCtPC/Nq94YCRqDBmlNbger9dvqQukEArL1fVvdfUICdkxIT+ACNen5NY4Yg+QC6OyoYNCTnAmvkL4Zbfi/rj9Fi2ca2F9MyplwV7PTz5qc3avEUoiOxyfsh/7/h35YNZ8a/EXJ8Dl4GRwmWR+rrT6qxXE47SYudfggUcGGnr1A=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BN6PR16MB142568CE7799AEB93B588DD5EAD70BN6PR16MB1425namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 6975be9d-40cc-402b-e970-08d65365484c
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Nov 2018 06:06:18.7304 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR16MB1793
X-OriginatorOrg: mcafee.com
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0
X-NAI-Spam-Version: 2.3.0.9418 : core <6425> : inlines <6970> : streams <1805359> : uri <2755800>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/clRz1WVz5GUUM3TPKQqT2Q0TdAs>
Subject: Re: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Nov 2018 06:07:00 -0000

Hi Jon,

If the DOTS client believes the traffic from the accept-list sources will not attack its targets, it configures the accept-list filtering rules. The draft-nishizuka-dots-signal-control-filtering is  dealing with an attack scenario where the accept-list sources are either spoofed or compromised to attack the target.

Irrespective of whether accept-list rules are configured or not, all incoming traffic will be scrubbed and the DOTS client will be notified if the accept-list sources are attacking target. It is then up to the DOTS client to make a call and de-activate the accept-list rules.
The DOTS client with DDoS detection capability can also identify and de-activate the accept-list rules during attack even without the conflict notification from the DOTS server.

Since all traffic to the target will anyway be scrubbed during DDoS mitigation, I don’t see the need to configure a “accept+mitigate”.  The “no action” does not mean the traffic (not matching the filtering rules) will by-pass scrubbing by the DDoS mitigator.

Cheers,
-Tiru

From: Jon Shallow <supjps-ietf@jpshallow.com>
Sent: Friday, November 23, 2018 4:42 PM
To: 'Panwei (William)' <william.panwei@huawei.com>; dots@ietf.org; mohamed.boucadair@orange.com; Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com>; 'kaname nishizuka' <kaname@nttv6.jp>
Subject: RE: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.


________________________________
Hi There,

This thread has flagged up to me that we are trying to represent a tri-state of actions (“always-drop”, “always-let-through” and “let-through-if-after-being-mitigated-it-is-allowed”) with a duo-state of “accept-list” and “drop-list” in the (Data Channel) ACLs.

The traditional ACL is a set of match criteria and then an appropriate action if matched.
[As a separate note, picked up later, it has always been unclear in my mind over many years as to what happens if a packet does not trigger a match in any of the ACLs (falls off the end of the list).  What happens is usually defined by documentation of what actually happens in the underlying logic.  The Data Channel currently states “If there is no match, then there is no action to be taken against the packet.”.]
The Data Channel only defines the DOTS forwarding actions as ‘accept’ or ‘drop’ with the addition of ‘rate-limit’ if ‘accept’ is defined.
It does state that, as an example, “Accept-list management, which enables a DOTS client to inform a DOTS server about sources from which traffic should always be accepted” which implies that ‘accept’ is the same as what we knew as white-list.  However, ‘accept’ means just that – it is accepted at this point in the process.  Yes, it is effectively defined as a white list in the requirements document, but even though those working with the DOTS documents can get confused as they also are thinking about mitigate or mitigation [Is it accepted for mitigation, or is it unconditionally accepted?].

We need the DOTS server to clearly understand the tri-state, and  cause (how is out of scope) traffic to be always accepted, always dropped or be analysed to see if it needs to be mitigated.

In terms of moving forward, we could (in Data Channel) have an additional ‘leaf mitigate’ in ‘container actions’ which is only available when ‘accept’.  If true, traffic is passed to a mitigator (how out of scope), if false traffic is always passed through. (‘leaf rate-limit’ is a special case of mitigation I guess.)
Alternatively, we could have actions of ‘accept’, ‘drop’ or ‘mitigate’.  ‘accept’ would then have the traditional meaning of pass – effectively a white-list as previously intended, and ‘mitigate’ much clearer to the reader as to the intent.  Then we just need a definition for “Mitigate-List:”.  I think ‘rate-limit’ would then have to only be associated with ‘mitigate’, not ‘accept’ as ‘accept’ is whitelist(no expected additional action).

Using ‘accept’, ‘drop’ or ‘mitigate’ (or ‘accept + mitigate’, ‘accept + no-mitigate’ or ‘drop’ if going with the additional leaf suggestion) makes it much easier to directly instantiate these actions in the DOTS server environment.

That then just leaves the question of what happens if there are no ACL matches (there could be no ACLs defined).  Do we go for an implied last ACL of all other traffic is to be mitigated if mitigating (Signal channel request), or do we take ‘no action’ as defined in the Data Channel?

Regards

Jon

From: Dots [mailto: dots-bounces@ietf.org<mailto:dots-bounces@ietf.org>] On Behalf Of Panwei (William)
Sent: 23 November 2018 08:25
To: Konda, Tirumaleswar Reddy; mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
Cc: dots@ietf.org<mailto:dots@ietf.org>; kaname nishizuka
Subject: Re: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering

Hi Tiru, Med,

Thank you for explaining and reminding me. I just remembered that this terminology has already been described in the requirement draft.
Accept-list: A list of filters indicating sources from which traffic
should always be allowed, regardless of contradictory data gleaned
in a detected attack.

Best Regards
Wei Pan

发件人: Konda, Tirumaleswar Reddy [mailto:TirumaleswarReddy_Konda@McAfee.com]
发送时间: 2018年11月23日 16:07
收件人: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>; Panwei (William) <william.panwei@huawei.com<mailto:william.panwei@huawei.com>>; kaname nishizuka <kaname@nttv6.jp<mailto:kaname@nttv6.jp>>
抄送: dots@ietf.org<mailto:dots@ietf.org>
主题: RE: Suggestions about draft-nishizuka-dots-signal-control-filtering

If accept-listed sources are attacking the target, the DOTS server cannot turn-off the accept-list filtering rules without the consent from the DOTS client. DOTS server can inform the DOTS client of the conflict and/or the DOTS client with DDoS detection capability can identify the attack, and using the signal channel de-activate the accept-list filtering rules.

“accept-list” does not mean only the traffic matching the accept-list will be allowed to reach the target.

Cheers,
-Tiru

From: Dots <dots-bounces@ietf.org<mailto:dots-bounces@ietf.org>> On Behalf Of mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
Sent: Friday, November 23, 2018 12:04 PM
To: Panwei (William) <william.panwei@huawei.com<mailto:william.panwei@huawei.com>>; kaname nishizuka <kaname@nttv6.jp<mailto:kaname@nttv6.jp>>
Cc: dots@ietf.org<mailto:dots@ietf.org>
Subject: Re: [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.


________________________________
Hi Wei,

Please see inline.

Cheers,
Med

De : Dots [mailto:dots-bounces@ietf.org] De la part de Panwei (William)
Envoyé : vendredi 23 novembre 2018 04:09
À : kaname nishizuka
Cc : dots@ietf.org<mailto:dots@ietf.org>
Objet : [Dots] Suggestions about draft-nishizuka-dots-signal-control-filtering

Hi Kaname,

I have read your draft recently, and I have two suggestions about it.

1.      I’d like to suggest using “whitelist” or “DDoS detection whitelist” instead of “accept-list” in the typical case.

[Med] accept-list means white-list. accept-list is already used in DOTS requirements and data channel. The signal channel will make use of that term too. FWIW, that change is made because of what was reported by hrpc.

A typical case is a DOTS client which configures during peace time
filtering rules using data channel to permit traffic from accept-
listed sources, but during the volumetric DDoS attack the DDoS
mitigator identifies the source addresses/prefixes in the accept-
listed filtering rules are attacking the target. For example, an
attacker can spoof the IP addresses of accept-listed sources to
generate attack traffic or the attacker can compromise the accept-
listed sources and program them to launch DDoS attack.
In this typical case, when you use “accept-list”, it sounds like that only the traffic which match the accept-list can reach the target. I don’t know if you mean so, but if YES, I feel like the extension may not be essentially needed in such case. Because if a DDoS attack occurs in such situation, the attacker must have been included in the accept-list. The DOTS server can get this conclusion as the DOTS client can, so the DOTS server can de-activate the accept-list by its own without DOTS client’s request of filtering rules.
In my opinion, “whitelist” or “DDoS detection whitelist” is more suitable than  “accept-list”. Because it indicates that the traffic which doesn’t match the DDoS whitelist can also reach the target, as long as it passes the detection. And if a DDoS attack happens, the DOTS server can’t know if the attacker is in the whitelist. If DOTS client find that the attacker is included in the DDoS whitelist, it must request the DOTS server to de-activate the whitelist.

I’m not object to your case, I just want to make it clear and no misunderstanding.

2. I’d like to suggest adding a guideline or suggestion about using signal channel to control filtering rules.
The purpose of using DOTS signal channel to control filtering rules is trying to help mitigate the DDoS attack when under attack time. This purpose should also be the guideline.
Requests which can help mitigate the attack should be send by the signal channel immediately. Requests which can’t help mitigate the attack should wait for the data channel to be re-established and then be sent by the data channel.
For example, during attack time, de-activating a drop-list (or blacklist) or activating a accept-list (or whitelist) may usually not help mitigate the DDoS attack. So If there is no necessary reason, these two requests should wait for using the data channel.

[Med] Agree. We do have the following in -01:

   A DOTS client relies on the information received from the DOTS server
   and/or local information to the DOTS client domain to trigger a
   filter control request.  Obviously, only filters that are pertinent
   for an ongoing mitigation should be controlled by a DOTS client using
   the DOTS signal channel.

And

   The DOTS client can also decide to send a PUT request to deactivate
   the "an-accept-list" ACL, if suspect traffic is received from an
   accept-listed source (2001:db8:1234::/48).  The structure of that PUT
   is the same as the one shown in Figure 4.


Best Regards
Wei Pan

发件人: Dots [mailto:dots-bounces@ietf.org] 代表 kaname nishizuka
发送时间: 2018年11月21日 9:50
收件人: dots@ietf.org<mailto:dots@ietf.org>
主题: [Dots] Fwd: I-D Action: draft-nishizuka-dots-signal-control-filtering-00.txt

Hi,

Base on the discussion of Bangkok interop: control data channel filtering via signal channel,
we've submitted the new draft for an extension to the DOTS signal channel to control the filtering rules during attack mitigation.

thanks,
Kaname Nishizuka



-------- Forwarded Message --------
Subject:

I-D Action: draft-nishizuka-dots-signal-control-filtering-00.txt

Date:

Tue, 20 Nov 2018 17:42:13 -0800

From:

internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>

Reply-To:

internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>

To:

i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>



A New Internet-Draft is available from the on-line Internet-Drafts directories.





        Title           : Controlling Filtering Rules Using DOTS Signal Channel

        Authors         : Kaname Nishizuka

                          Takahiko Nagata

                          Tirumaleswar Reddy

                          Mohamed Boucadair

    Filename        : draft-nishizuka-dots-signal-control-filtering-00.txt

    Pages           : 11

    Date            : 2018-11-20



Abstract:

   This document specifies an extension to the DOTS signal channel to

   control the filtering rules during attack mitigation.



   This extension allows a DOTS client to activate or de-activate

   filtering rules during a DDoS attack.  The characterization of these

   filters is supposed to be conveyed by a DOTS client during peace time

   by means of DOTS data channel.



Editorial Note (To be removed by RFC Editor)



   Please update these statements within the document with the RFC

   number to be assigned to this document:



   o  "This version of this YANG module is part of RFC XXXX;"



   o  "RFC XXXX: Controlling Filtering Rules Using DOTS Signal Channel";



   o  reference: RFC XXXX



   o  [RFCXXXX]



   Please update these statements with the RFC number to be assigned to

   the following documents:



   o  "RFC SSSS: Distributed Denial-of-Service Open Threat Signaling

      (DOTS) Signal Channel Specification" (used to be

      [I-D.ietf-dots-signal-channel])



   o  "RFC DDDD: Distributed Denial-of-Service Open Threat Signaling

      (DOTS) Data Channel Specification" (used to be

      [I-D.ietf-dots-data-channel])



   Please update the "revision" date of the YANG module.





The IETF datatracker status page for this draft is:

https://datatracker.ietf.org/doc/draft-nishizuka-dots-signal-control-filtering/



There are also htmlized versions available at:

https://tools.ietf.org/html/draft-nishizuka-dots-signal-control-filtering-00

https://datatracker.ietf.org/doc/html/draft-nishizuka-dots-signal-control-filtering-00





Please note that it may take a couple of minutes from the time of submission

until the htmlized version and diff are available at tools.ietf.org.



Internet-Drafts are also available by anonymous FTP at:

ftp://ftp.ietf.org/internet-drafts/



_______________________________________________

I-D-Announce mailing list

I-D-Announce@ietf.org<mailto:I-D-Announce@ietf.org>

https://www.ietf..org/mailman/listinfo/i-d-announce<https://www.ietf.org/mailman/listinfo/i-d-announce>

Internet-Draft directories: http://www.ietf.org/shadow.html

or ftp://ftp.ietf.org/ietf/1shadow-sites.txt