Re: [Dots] Robert Wilton's No Objection on draft-ietf-dots-multihoming-11: (with COMMENT)

mohamed.boucadair@orange.com Thu, 21 April 2022 06:23 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A5B03A00DB; Wed, 20 Apr 2022 23:23:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y5XgUTUSnRqN; Wed, 20 Apr 2022 23:23:41 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8071B3A0039; Wed, 20 Apr 2022 23:23:41 -0700 (PDT)
Received: from opfedar05.francetelecom.fr (unknown [xx.xx.xx.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar27.francetelecom.fr (ESMTP service) with ESMTPS id 4KkSCv0Gc6z2yJl; Thu, 21 Apr 2022 08:23:39 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1650522219; bh=5S8Lp8zfNDjKmO432OoHEG61egNhT2/TJkpnyj0iUas=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=IrbIUsezKFnH7+b6D+331sRELGW4jqkSPpQChdV+HVb5t/iFYSm6++3gDltrrIyKJ hMoe3LvGes1wYzatyYPOZkc/bt5LRPAHx8m71IEcCpG/SYeJ0Pn6c41TBj101MhUnP iNONt043ZgP0lfONmApVeE2f8oLBcab91N262N6FvN8cd+b0G6pfuXgFnuf72C4CGj 8lcUEZwYl1E8cspeK136DLh94wvY3Utvh8nsUfVoH6moOp9LWr7yaW8kU+RGuHVnFv G4yeA9UgCFjuKIv2dc9k0gll5kXBgSGUeiIIpE+ALzDmhRAUxM95C9NwmPXkb5zGXi 4xFik9YoShINw==
From: mohamed.boucadair@orange.com
To: Robert Wilton <rwilton@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-dots-multihoming@ietf.org" <draft-ietf-dots-multihoming@ietf.org>, "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "dots@ietf.org" <dots@ietf.org>, "valery@smyslov.net" <valery@smyslov.net>
Thread-Topic: Robert Wilton's No Objection on draft-ietf-dots-multihoming-11: (with COMMENT)
Thread-Index: AQHYVNbxGLPtbiYMA0SjGZNb/e7qXKz51nHw
Content-Class:
Date: Thu, 21 Apr 2022 06:23:38 +0000
Message-ID: <23737_1650522218_6260F86A_23737_290_1_b243598c987d4ab2ac6a5701e819f245@orange.com>
References: <165047351251.9467.7586201632352226367@ietfa.amsl.com>
In-Reply-To: <165047351251.9467.7586201632352226367@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-04-21T05:24:56Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=63e39e62-327e-42eb-ac12-ab92b87b6bf4; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.26.50]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/dUNh-SdW9LUxpOnWqQHmBzWL44g>
Subject: Re: [Dots] Robert Wilton's No Objection on draft-ietf-dots-multihoming-11: (with COMMENT)
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2022 06:23:47 -0000

Hi Rob, 

Thanks for the review. 

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : Robert Wilton via Datatracker <noreply@ietf.org>
> Envoyé : mercredi 20 avril 2022 18:52
> À : The IESG <iesg@ietf.org>
> Cc : draft-ietf-dots-multihoming@ietf.org; dots-chairs@ietf.org;
> dots@ietf.org; valery@smyslov.net; valery@smyslov.net
> Objet : Robert Wilton's No Objection on draft-ietf-dots-
> multihoming-11: (with COMMENT)
> 
> Robert Wilton has entered the following ballot position for
> draft-ietf-dots-multihoming-11: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-dots-multihoming/
> 
> 
> 
> ------------------------------------------------------------------
> ----
> COMMENT:
> ------------------------------------------------------------------
> ----
> 
> Hi,
> 
> Thanks for this document.
> 
> Two comments on section 5.1:
> 
> 1.
>    The DOTS client MUST resolve the DOTS server's name provided by
> each
>    provisioning domain using either the DNS servers learned from
> the
>    respective provisioning domain or from the DNS servers
> associated
>    with the interface(s) for which a DOTS server was explicitly
>    configured (Section 4).
> 
> It wasn't clear to me why the DNS lookup MUST be done relative to
> each
> provisioning domain?
> 

[Med] This is because randomly using any available DNS server may lead to failures or exacerbate resolution delays. Note that the name may be local to an attachment network. 

> 2.
>    DOTS signaling
>    session to a given DOTS server must be established using the
>    interface from which the DOTS server was provisioned.
> 
> If I have read and understood the draft correctly that it also
> seems that
> requests to ask a DOTS server to mitigate an attack must also be
> done on the
> same interface on which that attack is occurring.  Is my
> understanding correct,

[Med] I guess you noted that no normative language is used in that text. The base requirement is that the mitigation request is sent to the DOTS server that is responsible for managing the resources under attack:

   When conveying a mitigation request to protect the attack target(s),
   the DOTS client MUST select an available DOTS server whose network
   has assigned the IP prefixes from which target prefixes/addresses are
   derived.

Depending on the location of the DOTS client, the available paths to reach that server may be constrained (or not). The text you quoted is in reference to the residential CPE case, where the ** DOTS client is on the CPE **:

* If a DOTS server was provisioned by an upstream network using DHCP/PCE/etc., then the same interface must be used. There are considerations related to the use of private addressing, filters at upstream networks to let pass only mitigation requests received from customer-facing interfaces not Internet-facing ones, etc.
* If a DOTS server is explicitly configured and no interface restriction is provided, then any active interface can be used to place the mitigation request as per:    

   If a DOTS server is explicitly configured, it is assumed that an
   interface is also provided to bind the DOTS service to an
   interconnection link.  If no interface is provided, this means that
   the DOTS server can be reached via any active interface.

Please note that the use of the same interface from where an attack traffic may be observed is required in cases where automatically triggering mitigations on signal loss is enabled (see the following text from RFC9132):   

==
   trigger-mitigation:  If the parameter value is set to 'false', DDoS
      mitigation will not be triggered for the mitigation request unless
      the DOTS signal channel session is lost.

      If the DOTS client ceases to respond to heartbeat messages, the
      DOTS server can detect that the DOTS signal channel session is
      lost.  More details are discussed in Section 4.7.

      The default value of the parameter is 'true' (that is, the
      mitigation starts immediately).  If 'trigger-mitigation' is not
      present in a request, this is equivalent to receiving a request
      with 'trigger-mitigation' set to 'true'.
== 

> and if so, why is this a requirement?  I.e., communicating to a
> DOTS server via
> a separate link that isn't under attack would seem to be
> beneficial (when that
> is possible).  Is the reasoning here that these are stub networks
> and hence
> will only be routable via the interface provided by the ISP's
> gateway?
> 
> Regards,
> Rob
> 
> 


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.