Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard

Roman Danyliw <rdd@cert.org> Wed, 27 February 2019 17:04 UTC

Return-Path: <rdd@cert.org>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E4601310B0; Wed, 27 Feb 2019 09:04:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tsyssiBkpSit; Wed, 27 Feb 2019 09:04:22 -0800 (PST)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1284C131041; Wed, 27 Feb 2019 09:04:21 -0800 (PST)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id x1RH4KNu004436; Wed, 27 Feb 2019 12:04:20 -0500
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu x1RH4KNu004436
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1551287060; bh=jx1MlLfeSb9lMWonbdRiJgLj8rLuv8gqR4otD9XWo8Q=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=KaNWt1bbMAAbIDJViYL/qNm7apwotDv9qEOl36heYBFJTDd9A3zeBYLEmaefBVWly TIlO3NMkzHfYjDQVftRE+RgNIYqkzeJcTgOE26J1J/ZaTYDlH5Jo6cIHZAFWnueIG7 HxUCCVFOWN0TUk+vUMRhF/c9GuAZcnmEGA5Tfs3g=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id x1RH4IaK009205; Wed, 27 Feb 2019 12:04:18 -0500
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0435.000; Wed, 27 Feb 2019 12:04:18 -0500
From: Roman Danyliw <rdd@cert.org>
To: Barry Raveendran Greene <bgreene@senki.org>, "ietf@ietf.org" <ietf@ietf.org>
CC: IETF-Announce <ietf-announce@ietf.org>, "dots-chairs@ietf.org" <dots-chairs@ietf.org>, "kaduk@mit.edu" <kaduk@mit.edu>, "dots@ietf.org" <dots@ietf.org>, "draft-ietf-dots-data-channel@ietf.org" <draft-ietf-dots-data-channel@ietf.org>
Thread-Topic: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard
Thread-Index: AQHUzql0X7WKeLBkNUCj9i7xUt9vTaX0MCUA//+sdnA=
Date: Wed, 27 Feb 2019 17:04:17 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC01857DC0F8@marathon>
References: <155127802240.13985.12710692781572812550.idtracker@ietfa.amsl.com> <CDD3AF39-BFAB-49DB-A25A-87D6A3A2C1AA@senki.org>
In-Reply-To: <CDD3AF39-BFAB-49DB-A25A-87D6A3A2C1AA@senki.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/o92MIiSUHwfPI0TdrgK5eWmJdrg>
Subject: Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification) to Proposed Standard
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2019 17:04:33 -0000

Hi Barry,

> -----Original Message-----
> From: Barry Raveendran Greene [mailto:bgreene@senki.org]
> Sent: Wednesday, February 27, 2019 11:53 AM
> To: ietf@ietf.org
> Cc: IETF-Announce <ietf-announce@ietf.org>; Roman Danyliw
> <rdd@cert.org>; dots-chairs@ietf.org; kaduk@mit.edu; dots@ietf.org; draft-
> ietf-dots-data-channel@ietf.org
> Subject: Re: [Dots] Last Call: <draft-ietf-dots-data-channel-27.txt>
> (Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel
> Specification) to Proposed Standard
> 
> 
> Do we have working implementations to validate the movement to a
> proposed standard? Does it work?

Yes.  There are two implementations [1] (from NTT and NCC Group) of this data channel specification. These implementations did an interop at IETF 102 [2] and IETF 103 [3] which improved the current specification.

Regards,
Roman

[1] https://trac.ietf.org/trac/dots
[2] https://datatracker.ietf.org/meeting/102/materials/slides-102-dots-ietf-102-hackathon-interop-report-00
[3] https://datatracker.ietf.org/meeting/103/materials/slides-103-dots-interop-report-from-ietf-103-hackathon-00 

> > On Feb 27, 2019, at 06:33, The IESG <iesg-secretary@ietf.org> wrote:
> >
> >
> > The IESG has received a request from the DDoS Open Threat Signaling WG
> > (dots) to consider the following document: - 'Distributed
> > Denial-of-Service Open Threat Signaling (DOTS) Data
> >   Channel Specification'
> >  <draft-ietf-dots-data-channel-27.txt> as Proposed Standard
> >
> > The IESG plans to make a decision in the next few weeks, and solicits
> > final comments on this action. Please send substantive comments to the
> > ietf@ietf.org mailing lists by 2019-03-13. Exceptionally, comments may
> > be sent to iesg@ietf.org instead. In either case, please retain the
> > beginning of the Subject line to allow automated sorting.
> >
> > Abstract
> >
> >
> >   The document specifies a Distributed Denial-of-Service Open Threat
> >   Signaling (DOTS) data channel used for bulk exchange of data that
> >   cannot easily or appropriately communicated through the DOTS signal
> >   channel under attack conditions.
> >
> >   This is a companion document to the DOTS signal channel
> >   specification.
> >
> > Editorial Note (To be removed by RFC Editor)
> >
> >   Please update these statements within the document with the RFC
> >   number to be assigned to this document:
> >
> >   o  "This version of this YANG module is part of RFC XXXX;"
> >
> >   o  "RFC XXXX: Distributed Denial-of-Service Open Threat Signaling
> >      (DOTS) Data Channel Specification";
> >
> >   o  reference: RFC XXXX
> >
> >   Please update the "revision" date of the YANG module.
> >
> >
> >
> >
> > The file can be obtained via
> > https://datatracker.ietf.org/doc/draft-ietf-dots-data-channel/
> >
> > IESG discussion can be tracked via
> > https://datatracker.ietf.org/doc/draft-ietf-dots-data-channel/ballot/
> >
> >
> > No IPR declarations have been submitted directly on this I-D.
> >
> >
> >
> >
> > _______________________________________________
> > Dots mailing list
> > Dots@ietf.org
> > https://www.ietf.org/mailman/listinfo/dots