WG Action: Formed DDoS Open Threat Signaling (dots)

The IESG <iesg-secretary@ietf.org> Fri, 26 June 2015 16:25 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D2DC1A0381; Fri, 26 Jun 2015 09:25:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.3
X-Spam-Level:
X-Spam-Status: No, score=-101.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_14=0.6, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PRqA27d1neam; Fri, 26 Jun 2015 09:25:25 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 873981A0387; Fri, 26 Jun 2015 09:25:24 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Action: Formed DDoS Open Threat Signaling (dots)
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.4.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150626162524.4491.67420.idtracker@ietfa.amsl.com>
Date: Fri, 26 Jun 2015 09:25:24 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf-announce/vYNQz6fK_r1YLHu5HfGn6LsbUak>
Cc: dots WG <dots@ietf.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jun 2015 16:25:26 -0000

A new IETF working group has been formed in the Security Area. For
additional information please contact the Area Directors or the WG Chair.

DDoS Open Threat Signaling (dots)
------------------------------------------------
Current Status: Proposed WG

Chairs:
  Roman Danyliw <rdd@cert.org>

Assigned Area Director:
  Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>

Mailing list
  Address: dots@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/dots
  Archive: https://mailarchive.ietf.org/arch/browse/dots/

Charter:

The aim of DDoS Open Threat Signaling (DOTS) is to develop a standards
based approach for the realtime signaling of DDoS related telemetry and
threat handling requests and data between elements concerned with DDoS
attack detection, classification, traceback, and mitigation.

The elements may be described as:
* On-premise DDoS mitigation platforms
* Service provider DDoS mitigation platforms
* Other network elements and services with the ability to analyze and/or
influence network traffic

Elements may participate in DDoS detection, classification, traceback 
and mitigation individually or within the context of a larger 
collaborative system.

These elements may be communicating inter-domain or intra-domain over
links that may be congested by attack traffic resulting in potentially
hostile conditions for any type of upstream signaling, in particular 
transport protocols that yield to congestion, and more generalized 
signaling and  telemetry solutions.  Robustness under these conditions 
is paramount  while ensuring appropriate regard for authentication, 
authorization,  privacy and data integrity.  Elements may be deployed as 
part of a wider strategy incorporating multiple points of DDoS 
detection, classification,  traceback and mitigation, both on premise or 
service provider based.  Should changing conditions necessitate altering 
the specifics of mitigation actions and/or the topological scope of 
mitigation coverage, timely and  effective signaling of telemetry and 
current threat status to all elements involved in the mitigation is 
essential.  Feedback between participating elements is required for 
increased awareness supporting effective decision making.

The WG will, where appropriate, reuse or extend existing standard
protocols and mechanisms (for example, IPFIX and its associated 
templating and extension mechanisms).  Any modification of or extension 
to existing protocols must be in close coordination with the working 
groups responsible for the protocol being modified, and may be done in 
this working group after agreement with all the relevant WGs and 
responsible Area Directors.  The WG may coordinate on a situationally
appropriate basis with other working groups and initiatives which
compliment the DOTS effort e.g. M3AAWG, SACM, MILE, SUPA, I2NSF et. al.

The WG will document requirements for the transport protocol to be used 
for the signaling of DOTS and consult with the Transport Area about the 
requirements and, if applicable, any new development of an encapsulation 
scheme for DOTS.  The working group may develop an applicability 
statement (architecture document) explaining how all these elements 
should communicate together for a complete DDoS service.

The charter of the working group is to produce one or more standards 
track specifications to provide for this open signaling in the DDoS 
problem space.  While the resulting standards should be designed so they 
apply to network security applications beyond the DDoS problem space, 
this working group will focus on signaling and coordination mechanisms 
directly related to DDoS attack detection, classification, traceback and 
mitigation, incorporating the general principles articulated in RFC5218
<https://tools.ietf.org/html/rfc5218>.  Focusing the WG efforts on DDoS 
is intended to meet the community's desire for a deployable solution in 
the near term.  The specification(s) produced by the WG will include a 
standard mechanism for authentication and authorization, data integrity, 
and providing for privacy in operation, with privacy-friendly choices 
being the default in all cases.

The WG will produce the following deliverables and milestones:

* Document or Documents describing the problem space, use cases, 
protocol requirements and other qualifying information as the WG sees 
fit.
* Document or Documents specifying protocols and associated data models 
to address the stated goals of the WG.

Milestones:
  Feb 2016 - Requirements/use case information document to IESG
  May 2016 - Transport document as proposed standard to IESG
  Jun 2016 - Data model document as proposed standard to IESG