[Dots] I-D Action: draft-ietf-dots-server-discovery-03.txt
internet-drafts@ietf.org Fri, 31 May 2019 09:10 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dots@ietf.org
Delivered-To: dots@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BA71C120052; Fri, 31 May 2019 02:10:00 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: dots@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: dots@ietf.org
Message-ID: <155929380072.6494.3978581022587968483@ietfa.amsl.com>
Date: Fri, 31 May 2019 02:10:00 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/w9yF_vFp_TB6sjsrzeX4GZl-NOw>
Subject: [Dots] I-D Action: draft-ietf-dots-server-discovery-03.txt
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 May 2019 09:10:01 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the DDoS Open Threat Signaling WG of the IETF. Title : Distributed-Denial-of-Service Open Threat Signaling (DOTS) Server Discovery Authors : Mohamed Boucadair Tirumaleswar Reddy Filename : draft-ietf-dots-server-discovery-03.txt Pages : 22 Date : 2019-05-31 Abstract: It may not be possible for a network to determine the cause for an attack, but instead just realize that some resources seem to be under attack. To fill that gap, Distributed-Denial-of-Service Open Threat Signaling (DOTS) allows a network to inform a DOTS server that it is under a potential attack so that appropriate mitigation actions are undertaken. This document specifies mechanisms to configure DOTS clients with DOTS servers. The discovery procedure also covers the DOTS Signal Channel Call Home. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-dots-server-discovery/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-ietf-dots-server-discovery-03 https://datatracker.ietf.org/doc/html/draft-ietf-dots-server-discovery-03 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-dots-server-discovery-03 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [Dots] I-D Action: draft-ietf-dots-server-discove… internet-drafts
- Re: [Dots] I-D Action: draft-ietf-dots-server-dis… mohamed.boucadair