Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard
Roman Danyliw <rdd@cert.org> Wed, 27 February 2019 17:04 UTC
Return-Path: <rdd@cert.org>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E4601310B0; Wed, 27 Feb 2019 09:04:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tsyssiBkpSit; Wed, 27 Feb 2019 09:04:22 -0800 (PST)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1284C131041; Wed, 27 Feb 2019 09:04:21 -0800 (PST)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id x1RH4KNu004436; Wed, 27 Feb 2019 12:04:20 -0500
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu x1RH4KNu004436
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1551287060; bh=jx1MlLfeSb9lMWonbdRiJgLj8rLuv8gqR4otD9XWo8Q=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=KaNWt1bbMAAbIDJViYL/qNm7apwotDv9qEOl36heYBFJTDd9A3zeBYLEmaefBVWly TIlO3NMkzHfYjDQVftRE+RgNIYqkzeJcTgOE26J1J/ZaTYDlH5Jo6cIHZAFWnueIG7 HxUCCVFOWN0TUk+vUMRhF/c9GuAZcnmEGA5Tfs3g=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id x1RH4IaK009205; Wed, 27 Feb 2019 12:04:18 -0500
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0435.000; Wed, 27 Feb 2019 12:04:18 -0500
From: Roman Danyliw <rdd@cert.org>
To: Barry Raveendran Greene <bgreene@senki.org>, "ietf@ietf.org" <ietf@ietf.org>
CC: IETF-Announce <ietf-announce@ietf.org>, "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "kaduk@mit.edu" <kaduk@mit.edu>, "dots@ietf.org" <dots@ietf.org>, "draft-ietf-dots-data-channel@ietf.org" <draft-ietf-dots-data-channel@ietf.org>
Thread-Topic: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard
Thread-Index: AQHUzql0X7WKeLBkNUCj9i7xUt9vTaX0MCUA//+sdnA=
Date: Wed, 27 Feb 2019 17:04:17 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC01857DC0F8@marathon>
References: <155127802240.13985.12710692781572812550.idtracker@ietfa.amsl.com> <CDD3AF39-BFAB-49DB-A25A-87D6A3A2C1AA@senki.org>
In-Reply-To: <CDD3AF39-BFAB-49DB-A25A-87D6A3A2C1AA@senki.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/o92MIiSUHwfPI0TdrgK5eWmJdrg>
Subject: Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2019 17:04:33 -0000
Hi Barry, > -----Original Message----- > From: Barry Raveendran Greene [mailto:bgreene@senki.org] > Sent: Wednesday, February 27, 2019 11:53 AM > To: ietf@ietf.org > Cc: IETF-Announce <ietf-announce@ietf.org>; Roman Danyliw > <rdd@cert.org>; dots-chairs@ietf.org; kaduk@mit.edu; dots@ietf.org; draft- > ietf-dots-data-channel@ietf.org > Subject: Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> > (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel > Specification) to Proposed Standard > > > Do we have working implementations to validate the movement to a > proposed standard? Does it work? Yes. There are two implementations [1] (from NTT and NCC Group) of this data channel specification. These implementations did an interop at IETF 102 [2] and IETF 103 [3] which improved the current specification. Regards, Roman [1] https://trac.ietf.org/trac/dots [2] https://datatracker.ietf.org/meeting/102/materials/slides-102-dots-ietf-102-hackathon-interop-report-00 [3] https://datatracker.ietf.org/meeting/103/materials/slides-103-dots-interop-report-from-ietf-103-hackathon-00 > > On Feb 27, 2019, at 06:33, The IESG <iesg-secretary@ietf.org> wrote: > > > > > > The IESG has received a request from the DDoS Open Threat Signaling WG > > (dots) to consider the following document: - 'Distributed > > Denial-of-Service Open Threat Signaling (DOTS) Data > > Channel Specification' > > <draft-ietf-dots-data-channel-27.txt> as Proposed Standard > > > > The IESG plans to make a decision in the next few weeks, and solicits > > final comments on this action. Please send substantive comments to the > > ietf@ietf.org mailing lists by 2019-03-13. Exceptionally, comments may > > be sent to iesg@ietf.org instead. In either case, please retain the > > beginning of the Subject line to allow automated sorting. > > > > Abstract > > > > > > The document specifies a Distributed Denial-of-Service Open Threat > > Signaling (DOTS) data channel used for bulk exchange of data that > > cannot easily or appropriately communicated through the DOTS signal > > channel under attack conditions. > > > > This is a companion document to the DOTS signal channel > > specification. > > > > Editorial Note (To be removed by RFC Editor) > > > > Please update these statements within the document with the RFC > > number to be assigned to this document: > > > > o "This version of this YANG module is part of RFC XXXX;" > > > > o "RFC XXXX: Distributed Denial-of-Service Open Threat Signaling > > (DOTS) Data Channel Specification"; > > > > o reference: RFC XXXX > > > > Please update the "revision" date of the YANG module. > > > > > > > > > > The file can be obtained via > > https://datatracker.ietf.org/doc/draft-ietf-dots-data-channel/ > > > > IESG discussion can be tracked via > > https://datatracker.ietf.org/doc/draft-ietf-dots-data-channel/ballot/ > > > > > > No IPR declarations have been submitted directly on this I-D. > > > > > > > > > > _______________________________________________ > > Dots mailing list > > Dots@ietf.org > > https://www.ietf.org/mailman/listinfo/dots
- [Dots] Last Call: <draft-ietf-dots-data-channel-2… The IESG
- Re: [Dots] Last Call: <draft-ietf-dots-data-chann… Barry Raveendran Greene
- Re: [Dots] Last Call: <draft-ietf-dots-data-chann… Roman Danyliw