[Dots] 答复: several comments on draft-ietf-dots-architecture-06:

"Xialiang (Frank, Network Integration Technology Research Dept)" <frank.xialiang@huawei.com> Tue, 04 September 2018 01:33 UTC

Return-Path: <frank.xialiang@huawei.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16FBA126CB6; Mon, 3 Sep 2018 18:33:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZXXnmaGe7ZOb; Mon, 3 Sep 2018 18:32:58 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24AEA124C04; Mon, 3 Sep 2018 18:32:58 -0700 (PDT)
Received: from LHREML712-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id F24649C4BB896; Tue, 4 Sep 2018 02:32:53 +0100 (IST)
Received: from DGGEMM404-HUB.china.huawei.com (10.3.20.212) by LHREML712-CAH.china.huawei.com (10.201.108.35) with Microsoft SMTP Server (TLS) id 14.3.399.0; Tue, 4 Sep 2018 02:32:55 +0100
Received: from DGGEMM531-MBS.china.huawei.com ([169.254.6.185]) by DGGEMM404-HUB.china.huawei.com ([10.3.20.212]) with mapi id 14.03.0399.000; Tue, 4 Sep 2018 09:32:28 +0800
From: "Xialiang (Frank, Network Integration Technology Research Dept)" <frank.xialiang@huawei.com>
To: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, "Mortensen, Andrew" <amortensen@arbor.net>
CC: "draft-ietf-dots-architecture.all@ietf.org" <draft-ietf-dots-architecture.all@ietf.org>, "dots@ietf.org" <dots@ietf.org>
Thread-Topic: several comments on draft-ietf-dots-architecture-06:
Thread-Index: AdQY9faFKNrvNpoNS8mebZHrIJkKUwD3ia+gANR3n4AI0J/a8AAhqF/g
Date: Tue, 04 Sep 2018 01:32:28 +0000
Message-ID: <C02846B1344F344EB4FAA6FA7AF481F12C85C2C3@DGGEMM531-MBS.china.huawei.com>
References: <C02846B1344F344EB4FAA6FA7AF481F12BE33CF3@DGGEML522-MBX.china.huawei.com> <BN6PR16MB142540F3CEB6E889F9016B05EA5D0@BN6PR16MB1425.namprd16.prod.outlook.com> <25825426-17EB-4A11-BE07-72E24A71000C@arbor.net> <BN6PR16MB1425A7381FBAC5FACDF1FF02EA0C0@BN6PR16MB1425.namprd16.prod.outlook.com>
In-Reply-To: <BN6PR16MB1425A7381FBAC5FACDF1FF02EA0C0@BN6PR16MB1425.namprd16.prod.outlook.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.134.159.76]
Content-Type: multipart/alternative; boundary="_000_C02846B1344F344EB4FAA6FA7AF481F12C85C2C3DGGEMM531MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/sEeexO7uCzhwfxB0GjRLze9kMic>
Subject: [Dots] 答复: several comments on draft-ietf-dots-architecture-06:
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Sep 2018 01:33:01 -0000

+1

发件人: Konda, Tirumaleswar Reddy [mailto:TirumaleswarReddy_Konda@McAfee.com]
发送时间: 2018年9月3日 17:55
收件人: Mortensen, Andrew <amortensen@arbor.net>
抄送: Xialiang (Frank, Network Integration Technology Research Dept) <frank.xialiang@huawei.com>; draft-ietf-dots-architecture.all@ietf.org; dots@ietf.org
主题: RE: several comments on draft-ietf-dots-architecture-06:

Update looks good to me.

-Tiru

From: Mortensen, Andrew <amortensen@arbor.net<mailto:amortensen@arbor.net>>
Sent: Friday, July 20, 2018 6:04 PM
To: Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com<mailto:TirumaleswarReddy_Konda@McAfee.com>>
Cc: Xialiang (Frank, Network Integration Technology Research Dept) <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>; draft-ietf-dots-architecture.all@ietf.org<mailto:draft-ietf-dots-architecture.all@ietf.org>; dots@ietf.org<mailto:dots@ietf.org>
Subject: Re: several comments on draft-ietf-dots-architecture-06:


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.


________________________________
I’ve got a pull request to incorporate some minor changes to address issues 2, 3 and 5 below:

<https://github.com/dotswg/dots-architecture/pull/29>

Unless there are objections, I’ll merge and submit a new draft revision. The remaining barrier to initiating WGLC will then be the updated NAT considerations.

andrew


On Jul 16, 2018, at 3:40 AM, Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com<mailto:TirumaleswarReddy_Konda@McAfee.com>> wrote:

[EXTERNAL EMAIL]
Hi Frank,

Thanks for the review. Please see inline [TR]

From: Dots [mailto:dots-bounces@ietf.org] On Behalf Of Xialiang (Frank, Network Integration Technology Research Dept)
Sent: Wednesday, July 11, 2018 3:03 PM
To: draft-ietf-dots-architecture.all@ietf.org<mailto:draft-ietf-dots-architecture.all@ietf.org>
Cc: dots@ietf.org<mailto:dots@ietf.org>
Subject: [Dots] several comments on draft-ietf-dots-architecture-06:

CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

________________________________
Hi draft authors,
I have several comments of this draft as below for your consideration:
1.       Section 1.2, / “so that only authorized clients can invoke the DOTS service” / “so that only authorized clients/servers can invoke/honor the DOTS service”;

[TR] DOTS client is both authenticated and authorized to invoke the DOTS service but the DOTS server is only authenticated by the DOTS client. I don’t see the need to add “server” and “honor” in the above line.

2.       Section 2.2.2, / If a DOTS server refuses a DOTS client’s request for mitigation, the DOTS server SHOULD include the refusal reason in the server signal sent to the client / If a DOTS server refuses a DOTS client’s request for mitigation, the DOTS server MUST include the refusal reason in the server signal sent to the client;

[TR] Agreed, we will update draft.

3.       Section 3.2.3, / "End-customer with a single upstream transit provider offering DDoS mitigation services" described in [I-D.ietf-dots-use-cases] /  "Upstream DDoS Mitigation by an Upstream Internet Transit Provider" described in [I-D.ietf-dots-use-cases];

[TR] Okay, will fix.

4.       Section 3.2.3, you say “For example, the recursing domain’s mitigator should incorporate into mitigation status messages available metrics such as dropped packet or byte counts from the recursed mitigation.”, but this is not described in current DOTS signal channel draft. What’s your opinion about whether we should add the specified content into the signal channel draft?


[TR] DOTS client is conveyed the mitigation metrics (e.g. bytes-dropped, bps-dropped etc.) by the DOTS server. The DOTS client is opaque to the recursion of the originating mitigation request to the secondary DOTS server, hence the signal channel draft does not discuss recursive signaling but explains conveying the mitigation metrics to the DOTS client in Section 4.4.2.

5.       Section 3.3.3, by reviewing the DOTS signal channel draft, my take is a signal session (sid) can carry multiple mitigation-scope requesting conversations (cuid + mid + cdid (optional)), is it right? If so, by saying “a DOTS operator may configure the DOTS session to trigger mitigation when the DOTS server ceases receiving DOTS client signals (or vice versa) beyond the miss count or period permitted by the protocol.”, which mitigation conversation do you mean to trigger, or all of them over the same signal session?

[TR] If the DOTS server creases receiving DOTS client signal, mitigation will be triggered for all the mitigation requests signaled over the same DOTS signal channel session.

Cheers,
-Tiru

Thanks!

B.R.
Frank