[Dots] 答复: Re Fwd: New Version Notification for draft-nishizuka-dots-inter-domain-mechanism-00.txt

"Xialiang (Frank)" <frank.xialiang@huawei.com> Fri, 11 March 2016 05:42 UTC

Return-Path: <frank.xialiang@huawei.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CD8B12E0AB for <dots@ietfa.amsl.com>; Thu, 10 Mar 2016 21:42:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MtfTp8mEH6me for <dots@ietfa.amsl.com>; Thu, 10 Mar 2016 21:42:09 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 167A212D113 for <dots@ietf.org>; Thu, 10 Mar 2016 21:42:07 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml703-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CKG17172; Fri, 11 Mar 2016 05:42:05 +0000 (GMT)
Received: from SZXEMA412-HUB.china.huawei.com (10.82.72.71) by lhreml703-cah.china.huawei.com (10.201.5.104) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 11 Mar 2016 05:42:04 +0000
Received: from SZXEMA502-MBS.china.huawei.com ([169.254.4.185]) by SZXEMA412-HUB.china.huawei.com ([10.82.72.71]) with mapi id 14.03.0235.001; Fri, 11 Mar 2016 13:41:57 +0800
From: "Xialiang (Frank)" <frank.xialiang@huawei.com>
To: "Roman D. Danyliw" <rdd@cert.org>
Thread-Topic: [Dots] Re Fwd: New Version Notification for draft-nishizuka-dots-inter-domain-mechanism-00.txt
Thread-Index: AQHRexq1CmPLb6ch3EqfuUf1DCluiZ9TkoMA
Date: Fri, 11 Mar 2016 05:41:57 +0000
Message-ID: <C02846B1344F344EB4FAA6FA7AF481F12AEF99C0@SZXEMA502-MBS.china.huawei.com>
References: <20160219143213.18440.22155.idtracker@ietfa.amsl.com> <56C729D0.2080707@nttv6.jp> <359EC4B99E040048A7131E0F4E113AFCD96E1534@marathon> <C02846B1344F344EB4FAA6FA7AF481F12AEF923E@SZXEMA502-MBS.china.huawei.com> <359EC4B99E040048A7131E0F4E113AFCD96E3836@marathon>
In-Reply-To: <359EC4B99E040048A7131E0F4E113AFCD96E3836@marathon>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.135.43.91]
Content-Type: multipart/alternative; boundary="_000_C02846B1344F344EB4FAA6FA7AF481F12AEF99C0SZXEMA502MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020201.56E25AAE.008E, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.4.185, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: cfb1414a8e91f174bc731e75a430d9a9
Archived-At: <http://mailarchive.ietf.org/arch/msg/dots/rYoxYnvhSE4oHxG7UxxcUwLsMwM>
Cc: "dots@ietf.org" <dots@ietf.org>, kaname nishizuka <kaname@nttv6.jp>
Subject: [Dots] 答复: Re Fwd: New Version Notification for draft-nishizuka-dots-inter-domain-mechanism-00.txt
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2016 05:42:12 -0000

Hi Roman,
Please see my response inline:

发件人: Roman D. Danyliw [mailto:rdd@cert.org]
发送时间: 2016年3月11日 6:18
收件人: Xialiang (Frank)
抄送: dots@ietf.org; kaname nishizuka
主题: RE: [Dots] Re Fwd: New Version Notification for draft-nishizuka-dots-inter-domain-mechanism-00.txt


Hello Frank!



(Chair hat off …)

> From: Dots [mailto:dots-bounces@ietf.org] On Behalf Of Xialiang (Frank)

> 发件人: Dots [mailto:dots-bounces@ietf.org] 代表 Roman D. Danyliw

> 主题: Re: [Dots] Fwd: New Version Notification for draft-nishizuka-dots-

> inter-domain-mechanism-00.txt



[snip]

> ** Page 3 – 5, Section 2,  In laying out these problems, what new

> requirements for draft-ietf-dots-requirements-00 are suggested?  Do you

> see this problems as only applicable to the use cases/architectures described

> in Section 3?

> [Frank]: Good question. In this part, we try to list all the problems related

> with the ddos protection coordination. Some of them are general (i.e.,

> Bootstrapping, coordination, provision, etc), some are more specific with

> inter-domain condition (i.e., near source protection, billing, etc). So, these

> problems are not only applicable for Section 3 and more broad than it. If

> necessary, it should be synchronized with the DOTS use cases/requirements

> drafts.



I think that synchronization would help.  From the problem statement in Section 2, articulating the requirements that they suggest would help clarify the unique needs of these use cases (if any).

[Frank]: Ok, we will do it in next version.



[snip]

> ** Page 6, Section 3, “flow analyzer” definition.  This term is defined as part

> of ecosystem, but it is not used again in the document.  Is it needed?

> [Frank]: I think it’s not yet decided whether DOTS should cover the work

> related to the interface/protocol of flow analyzer. But in reality, it is widely

> used for the ddos attack detection.



To clarify, do you mean that the WG hasn't discussed the data channel sufficiently, or that there is an additional element (flow analyzer?) in the DOTS architecture (per the requirements draft) that needs to be described (beyond a client, server, relay and mitigator).

[Frank]: I mean both. I hope we can include this part of work in DOTS WG.



> ** Page 6 – 8, Section 3.1,  In the distributed architecture, can you clarify why

> the DOTS server and DOTS client need to be coupled in a controller?  Is the

> controller a new part of the DOTS architecture that needs to accounted for in

> the protocol?  Is the introduction of the term “controller” to get around the

> fact that the current definition of a DOTS server is “network element … [that

> communicates] the DOTS client’s request to a mitigator”.  Effectively, clients

> send requests to servers/proxies.  Servers only send requests to mitigators;

> not other servers?

> [Frank]: From our viewpoint, “The ISP controller should support the functions

> of DOTS server and DOTS client at the same time in order to participate in the

> system of inter-domain DDoS protection service.  In other words, as the

> representative for an ISP's DDoS protective service, the ISP controller

> manages and provides DDoS mitigation service to its customer in one hand,

> but may require helps from other ISPs under some situation especially when

> the attack volume exceeds its capacity or the attack is from other ISPs. ”,

> especially for the inter-domain ddos protection scenario.



Thanks for the clarification. In figure 1, why are there multiple DOTS clients/servers in ISP 1?  Could there be two servers one client; or two clients and one server; one client and one server?  I'm trying to understand what DOTS considerations exists between what appears to be a tight 1:1 coupling of server/client in the orchestrator.  Like noted above with the flow analyzer, in the view of the draft, is the orchestrator is an additional element of the DOTS architecture?

[Frank]: Good question. In general, one ISP can have multiple DOTS systems to be responsible for its multiple domains respectively. It can relieve the traffic pressure to one DOTS system in the ISP network, and provide the optimized near-source mitigation in certain level. I also think different deployment ways as you mentioned above can work in various occasions. 1:1 coupling of server/client in the orchestrator is now a simple model but is enough for most occasions. I think the orchestrator should be an additional element for the DOTS architecture.



Roman