rfc8903xml2.original.xml | rfc8903.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="utf-8"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | |||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 --> | ||||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | ||||
<!ENTITY RFC8612 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.8612.xml"> | ||||
<!ENTITY RFC8782 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.8782.xml"> | ||||
<!ENTITY RFC8783 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.8783.xml"> | ||||
<!ENTITY I-D.ietf-dots-multihoming SYSTEM "https://xml2rfc.tools.ietf.org/public | ||||
/rfc/bibxml3/reference.I-D.ietf-dots-multihoming.xml"> | ||||
]> | ||||
<?rfc rfcedstyle="yes"?> | ||||
<?rfc toc="yes"?> | ||||
<?rfc tocindent="yes"?> | ||||
<?rfc sortrefs="yes"?> | ||||
<?rfc symrefs="yes"?> | ||||
<?rfc strict="yes"?> | ||||
<?rfc comments="yes"?> | ||||
<?rfc inline="yes"?> | ||||
<?rfc docmapping="yes"?> | ||||
<rfc docName="draft-ietf-dots-use-cases-25" category="info"> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft -ietf-dots-use-cases-25" number="8903" submissionType="IETF" category="info" con sensus="true" obsoletes="" updates="" xml:lang="en" tocInclude="true" sortRefs=" true" symRefs="true" version="3"> | |||
<front> | <front> | |||
<title abbrev="DOTS Use Cases">Use cases for DDoS Open Threat Signaling</tit | <title abbrev="DOTS Use Cases">Use Cases for DDoS Open Threat Signaling</tit | |||
le> | le> | |||
<seriesInfo name="RFC" value="8903"/> | ||||
<author initials="R." surname="Dobbins" fullname="Roland Dobbins"> | <author initials="R." surname="Dobbins" fullname="Roland Dobbins"> | |||
<organization>Arbor Networks</organization> | <organization>Netscout, Inc.</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street></street> | <street/> | |||
<city></city> | <city/> | |||
<code></code> | <code/> | |||
<country>Singapore</country> | <country>Singapore</country> | |||
</postal> | </postal> | |||
<email>rdobbins@arbor.net</email> | <email>roland.dobbins@netscout.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="D." surname="Migault" fullname="Daniel Migault"> | <author initials="D." surname="Migault" fullname="Daniel Migault"> | |||
<organization>Ericsson</organization> | <organization>Ericsson</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>8275 Trans Canada Route</street> | <street>8275 Trans Canada Route</street> | |||
<city>Saint Laurent, QC</city> | <city>Saint Laurent,</city> | |||
<region>Quebec</region> | ||||
<code>4S 0B6</code> | <code>4S 0B6</code> | |||
<country>Canada</country> | <country>Canada</country> | |||
</postal> | </postal> | |||
<email>daniel.migault@ericsson.com</email> | <email>daniel.migault@ericsson.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="R." surname="Moskowitz" fullname="Robert Moskowitz"> | <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz"> | |||
<organization>HTT Consulting</organization> | <organization>HTT Consulting</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street></street> | <street/> | |||
<city>Oak Park, MI</city> | <city>Oak Park</city> | |||
<region>MI</region> | ||||
<code>48237</code> | <code>48237</code> | |||
<country>USA</country> | <country>United States of America</country> | |||
</postal> | </postal> | |||
<email>rgm@labs.htt-consult.com</email> | <email>rgm@labs.htt-consult.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="N." surname="Teague" fullname="Nik Teague"> | <author initials="N." surname="Teague" fullname="Nik Teague"> | |||
<organization>Iron Mountain Data Centers</organization> | <organization>Iron Mountain Data Centers</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street></street> | <street/> | |||
<city></city> | <city/> | |||
<code></code> | <code/> | |||
<country>UK</country> | <country>United Kingdom</country> | |||
</postal> | </postal> | |||
<email>nteague@ironmountain.co.uk</email> | <email>nteague@ironmountain.co.uk</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="L." surname="Xia" fullname="Liang Xia"> | <author initials="L." surname="Xia" fullname="Liang Xia"> | |||
<organization>Huawei</organization> | <organization>Huawei</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>No. 101, Software Avenue, Yuhuatai District</street> | <street>No. 101, Software Avenue, Yuhuatai District</street> | |||
<city>Nanjing</city> | <city>Nanjing</city> | |||
<country>China</country> | <country>China</country> | |||
</postal> | </postal> | |||
<email>Frank.xialiang@huawei.com</email> | <email>Frank.xialiang@huawei.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="K." surname="Nishizuka" fullname="Kaname Nishizuka"> | <author initials="K." surname="Nishizuka" fullname="Kaname Nishizuka"> | |||
<organization>NTT Communications</organization> | <organization>NTT Communications</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>GranPark 16F 3-4-1 Shibaura, Minato-ku</street> | <street>3-4-1 Shibaura, Minato-ku</street> | |||
<city>Tokyo</city> | <extaddr>GranPark 16F</extaddr> | |||
<region>Tokyo</region> | ||||
<code>108-8118</code> | <code>108-8118</code> | |||
<country>Japan</country> | <country>Japan</country> | |||
</postal> | </postal> | |||
<email>kaname@nttv6.jp</email> | <email>kaname@nttv6.jp</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2021" month="May"/> | ||||
<date year="2020" month="July" day="05"/> | ||||
<area>Security</area> | <area>Security</area> | |||
<workgroup>DOTS</workgroup> | <workgroup>DOTS</workgroup> | |||
<keyword>Internet-Draft</keyword> | ||||
<abstract> | <abstract> | |||
<t>The DDoS Open Threat Signaling (DOTS) effort is intended to provide | ||||
<t>The DDoS Open Threat Signaling (DOTS) effort is intended to provide | ||||
protocols to facilitate interoperability across disparate DDoS | protocols to facilitate interoperability across disparate DDoS | |||
mitigation solutions. This document presents sample use cases which describe | Mitigation solutions. This document presents sample use cases that describe | |||
the interactions expected between the DOTS components as well as DOTS | the interactions expected between the DOTS components as well as DOTS | |||
messaging exchanges. These use cases are meant to identify the | messaging exchanges. These use cases are meant to identify the | |||
interacting DOTS components, how they collaborate, and what are the | interacting DOTS components, how they collaborate, and what the | |||
typical information to be exchanged.</t> | typical information to be exchanged is.</t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="introduction" numbered="true" toc="default"> | ||||
<section anchor="introduction" title="Introduction"> | <name>Introduction</name> | |||
<t>At the time of writing, distributed denial-of-service (DDoS) attack | ||||
<t>At the time of writing, distributed denial-of-service (DDoS) attack | ||||
mitigation solutions are largely based upon siloed, proprietary | mitigation solutions are largely based upon siloed, proprietary | |||
communications schemes with vendor lock-in as a side-effect. This can | communications schemes with vendor lock-in as a side effect. This can | |||
result in the configuration, provisioning, operation, and activation of | result in the configuration, provisioning, operation, and activation of | |||
these solutions being a highly manual and often time-consuming process. | these solutions being a highly manual and often time-consuming process. | |||
Additionally, coordinating multiple DDoS mitigation solutions | Additionally, coordinating multiple DDoS Mitigation solutions | |||
simultaneously is fraught with both technical and process-related | simultaneously is fraught with both technical and process-related | |||
hurdles. This greatly increases operational complexity which, in turn, | hurdles. This greatly increases operational complexity, which in turn | |||
can degrade the efficacy of mitigations that are generally highly dependent on | can degrade the efficacy of mitigations that are generally highly dependent on | |||
a timely reaction by the system.</t> | a timely reaction by the system.</t> | |||
<t>The DDoS Open Threat Signaling (DOTS) effort is intended to specify | ||||
<t>The DDoS Open Threat Signaling (DOTS) effort is intended to specify | ||||
protocols that facilitate interoperability between diverse DDoS | protocols that facilitate interoperability between diverse DDoS | |||
mitigation solutions and ensure greater integration in term of | Mitigation solutions and ensure greater integration in terms of | |||
attack detection, mitigation requests, and attack characterization patterns.</t> | attack detection, mitigation requests, and attack characterization patterns.</t> | |||
<t>As DDoS solutions are broadly heterogeneous among vendors, the | ||||
<t>As DDoS solutions are broadly heterogeneous among vendors, the | ||||
primary goal of DOTS is to provide high-level interaction amongst | primary goal of DOTS is to provide high-level interaction amongst | |||
differing DDoS solutions, such as detecting DDoS attacks, | differing DDoS solutions, such as detecting DDoS attacks, | |||
initiating/terminating DDoS mitigation assistance, or requesting the | initiating/terminating DDoS Mitigation assistance, or requesting the | |||
status of a DDoS mitigation.</t> | status of a DDoS Mitigation.</t> | |||
<t>This document provides sample use cases that provided input for the req | ||||
<t>This document provides sample use cases that provided input for the requireme | uirements <xref target="RFC8612" format="default"/> and design of | |||
nts <xref target="RFC8612"/> and design of | the DOTS protocols <xref target="RFC8782" format="default"/><xref target="RFC878 | |||
the DOTS protocols <xref target="RFC8782"/><xref target="RFC8783"/>. The use cas | 3" format="default"/>. The use cases are not exhaustive, and future use cases ar | |||
es are not exhaustive and future use cases are | e | |||
expected to emerge as DOTS is adopted and evolves.</t> | expected to emerge as DOTS is adopted and evolves.</t> | |||
</section> | ||||
</section> | <section anchor="terminology-and-acronyms" numbered="true" toc="default"> | |||
<section anchor="terminology-and-acronyms" title="Terminology and Acronyms"> | <name>Terminology and Acronyms</name> | |||
<t>This document makes use of the same terminology and definitions as | ||||
<t>This document makes use of the same terminology and definitions as | <xref target="RFC8612" format="default"/>. In addition, it uses the terms define | |||
<xref target="RFC8612"/>. In addition it uses the terms defined | d | |||
below:</t> | below:</t> | |||
<dl newline="true" spacing="normal"> | ||||
<t><list style="symbols"> | <dt>DDoS Mitigation System (DMS):</dt><dd>A system that performs DDoS | |||
<t>DDoS Mitigation System (DMS): A system that performs DDoS mitigation. | Mitigation. The DDoS Mitigation System may be composed of a cluster of | |||
The DDoS Mitigation System may be composed of a cluster of hardware | hardware and/or software resources but could also involve an orchestrator that | |||
and/or software resources, but could also involve an orchestrator that | may make decisions, such as outsourcing some or all of the mitigation to | |||
may take decisions such as outsourcing some or all of the mitigation | another DDoS Mitigation System.</dd> | |||
to another DDoS Mitigation System.</t> | <dt>DDoS Mitigation:</dt><dd>The action performed by the DDoS Mitigation System. | |||
<t>DDoS Mitigation: The action performed by the DDoS Mitigation System.</t> | </dd> | |||
<t>DDoS Mitigation Service: designates a service provided to a | <dt>DDoS Mitigation Service:</dt><dd>Designates a service provided to a | |||
customer to mitigate DDoS attacks. Each service subscription usually involve Ser | customer to mitigate DDoS attacks. Each service subscription usually involve | |||
vice | Service Level Agreement (SLA) that has to be met. It is the responsibility of | |||
Level Agreement (SLA) that has to be met. It is the responsibility of | the DDoS Service provider to instantiate the DDoS Mitigation System to meet | |||
the DDoS Service provider to instantiate the DDoS Mitigation System to | these SLAs.</dd> | |||
meet these SLAs.</t> | <dt>DDoS Mitigation Service Provider:</dt><dd>Designates the administrative | |||
<t>DDoS Mitigation Service Provider: designates the administrative entity | entity providing the DDoS Mitigation Service.</dd> | |||
providing the DDoS Mitigation Service.</t> | <dt>Internet Transit Provider (ITP):</dt><dd>Designates the entity that | |||
<t>Internet Transit Provider (ITP): designates the entity that delivers | delivers the traffic to a customer network. It can be an Internet Service | |||
the traffic to a customer network. It can be an Internet Service Provider | Provider (ISP) or an upstream entity delivering the traffic to the ISP. | |||
(ISP), or an upstream entity delivering the traffic to the ISP.</t> | </dd> | |||
</list></t> | </dl> | |||
</section> | ||||
</section> | <section anchor="use-cases" numbered="true" toc="default"> | |||
<section anchor="use-cases" title="Use Cases"> | <name>Use Cases</name> | |||
<section anchor="use-case-1" numbered="true" toc="default"> | ||||
<section anchor="use-case-1" title="Upstream DDoS Mitigation by an Upstream Inte | <name>Upstream DDoS Mitigation by an Upstream Internet Transit Provider< | |||
rnet Transit Provider"> | /name> | |||
<t>This use case describes how an enterprise or a residential customer | ||||
<t>This use case describes how an enterprise or a residential customer | ||||
network may take advantage of a pre-existing relation with its ITP in order to m itigate a DDoS attack targeting its | network may take advantage of a pre-existing relation with its ITP in order to m itigate a DDoS attack targeting its | |||
network.</t> | network.</t> | |||
<t>For clarity of discussion, the targeted network is indicated as an en | ||||
<t>For clarity of discussion, the targeted network is indicated as an enterprise | terprise | |||
network, but the same scenario applies to any downstream network, including | network, but the same scenario applies to any downstream network, including | |||
residential and cloud hosting networks.</t> | residential and cloud hosting networks.</t> | |||
<t>As the ITP provides connectivity to the enterprise | ||||
<t>As the ITP provides connectivity to the enterprise | ||||
network, it is already on the path of the inbound and outbound traffic of | network, it is already on the path of the inbound and outbound traffic of | |||
the enterprise network and well aware of the networking parameters | the enterprise network and is well aware of the networking parameters | |||
associated to the enterprise network WAN connectivity. This eases both the | associated with the enterprise network WAN connectivity. This eases both the | |||
configuration and the instantiation of a DDoS Mitigation Service.</t> | configuration and the instantiation of a DDoS Mitigation Service.</t> | |||
<t>This | ||||
<t>This | ||||
section considers two kinds of DDoS Mitigation Service between an | section considers two kinds of DDoS Mitigation Service between an | |||
enterprise network and an ITP:</t> | enterprise network and an ITP:</t> | |||
<ul spacing="normal"> | ||||
<t><list style="symbols"> | <li>The upstream ITP may instantiate a DMS upon | |||
<t>The upstream ITP may instantiate a DDoS Mitigation System (DMS) upon | ||||
receiving a request from the enterprise network. This typically | receiving a request from the enterprise network. This typically | |||
corresponds to the case when the enterprise network is under attack.</t> | corresponds to a case when the enterprise network is under attack.</li> | |||
<t>On the other hand, the ITP may identify an enterprise network as the | <li>On the other hand, the ITP may identify an enterprise network as t | |||
he | ||||
source of an attack and send a mitigation request to the enterprise DMS | source of an attack and send a mitigation request to the enterprise DMS | |||
to mitigate this at the source.</t> | to mitigate this at the source.</li> | |||
</list></t> | </ul> | |||
<t>The two scenarios, though different, have similar interactions betwee | ||||
<t>The two scenarios, though different, have similar interactions between | n | |||
the DOTS client and server. For the sake of simplicity, only the first | the DOTS client and server. For the sake of simplicity, only the first | |||
scenario will be detailed in this section. Nevertheless, the second scenario is also in scope for DOTS.</t> | scenario will be detailed in this section. Nevertheless, the second scenario is also in scope for DOTS.</t> | |||
<t>In the first scenario, as depicted in <xref target="fig-1"/>, an ente | ||||
<t>In the first scenario, as depicted in Figure 1, an enterprise network | rprise network | |||
with self-hosted Internet-facing properties such as Web servers, | with self-hosted Internet-facing properties such as web servers, | |||
authoritative DNS servers, and VoIP servers has a DMS deployed to | authoritative DNS servers, and Voice over IP (VoIP) servers has a DMS deployed t | |||
o | ||||
protect those servers and applications from DDoS attacks. In addition to | protect those servers and applications from DDoS attacks. In addition to | |||
on-premise DDoS defense capability, the enterprise has contracted with | on-premise DDoS defense capabilities, the enterprise has contracted with | |||
its ITP for DDoS Mitigation Services when attacks | its ITP for DDoS Mitigation Services when attacks | |||
threaten to overwhelm the bandwidth of their WAN link(s).</t> | threaten to overwhelm the bandwidth of their WAN link(s).</t> | |||
<figure anchor="fig-1"> | ||||
<figure><artwork><![CDATA[ | <name>Upstream Internet Transit Provider DDoS Mitigation</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
| Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | Provider | | | | | Provider | | |||
| +--------+ | | DDoS Attack | | +--------+ | | DDoS Attack | |||
| | DDoS | | <================================= | | | DDoS | | <================================= | |||
| | Target | | <================================= | | | Target | | <================================= | |||
| +--------+ | | +------------+ | | | +--------+ | | +------------+ | | |||
| | +-------->| DDoS | | | | | +-------->| DDoS | | | |||
| | | |S | Mitigation | | | | | | |S | Mitigation | | | |||
skipping to change at line 243 ¶ | skipping to change at line 211 ¶ | |||
| | | | | | | | | | | | |||
| +------------+ | | | | | | +------------+ | | | | | |||
| | DDoS |<---+ | | | | | DDoS |<---+ | | | |||
| | Mitigation |C | | | | | | Mitigation |C | | | | |||
| | System | | | | | | | System | | | | | |||
| +------------+ | | | | | +------------+ | | | | |||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
* C is for DOTS client functionality | * C is for DOTS client functionality | |||
* S is for DOTS server functionality | * S is for DOTS server functionality | |||
]]></artwork> | ||||
Figure 1: Upstream Internet Transit Provider DDoS Mitigation | </figure> | |||
]]></artwork></figure> | <t>The enterprise DMS is configured such that if the incoming Internet | |||
<t>The enterprise DMS is configured such that if the incoming Internet | ||||
traffic volume exceeds 50% of the provisioned upstream Internet WAN | traffic volume exceeds 50% of the provisioned upstream Internet WAN | |||
link capacity, the DMS will request DDoS mitigation assistance from the | link capacity, the DMS will request DDoS Mitigation assistance from the | |||
upstream transit provider. More sophisticated detection means may be considered | upstream transit provider. More sophisticated detection means may be considered | |||
as well.</t> | as well.</t> | |||
<t>The requests to trigger, manage, and finalize a DDoS Mitigation betwe | ||||
<t>The requests to trigger, manage, and finalize a DDoS Mitigation between | en | |||
the enterprise DMS and the ITP is performed using DOTS. The enterprise | the enterprise DMS and the ITP are made using DOTS. The enterprise | |||
DMS implements a DOTS client while the ITP implements a DOTS server | DMS implements a DOTS client while the ITP implements a DOTS server, | |||
which is integrated with their DMS in this example.</t> | which is integrated with their DMS in this example.</t> | |||
<t>When the enterprise DMS locally detects an inbound DDoS attack target | ||||
<t>When the enterprise DMS locally detects an inbound DDoS attack targeting | ing | |||
its resources (e.g., servers, hosts, or applications), it immediately | its resources (e.g., servers, hosts, or applications), it immediately | |||
begins a DDoS Mitigation.</t> | begins a DDoS Mitigation.</t> | |||
<t>During the course of the attack, the inbound traffic volume to the en | ||||
<t>During the course of the attack, the inbound traffic volume to the enterprise | terprise network exceeds the | |||
network exceeds the | 50% threshold, and the enterprise DMS escalates the DDoS Mitigation. The | |||
50% threshold and the enterprise DMS escalates the DDoS mitigation. The | ||||
enterprise DMS DOTS client signals to the DOTS server on the upstream ITP | enterprise DMS DOTS client signals to the DOTS server on the upstream ITP | |||
to initiate DDoS Mitigation. The DOTS server replies to the DOTS client | to initiate DDoS Mitigation. The DOTS server replies to the DOTS client | |||
that it can serve this request, and mitigation is initiated on the ITP | that it can serve this request, and mitigation is initiated on the ITP | |||
network by the ITP DMS.</t> | network by the ITP DMS.</t> | |||
<t>Over the course of the attack, the DOTS server of the ITP periodicall | ||||
<t>Over the course of the attack, the DOTS server of the ITP periodically | y | |||
informs the DOTS client on the mitigation status, | informs the DOTS client on the mitigation status, | |||
statistics related to DDoS attack traffic mitigation, and related | statistics related to DDoS attack traffic mitigation, and related | |||
information. Once the DDoS attack has ended, or decreased to a certain | information. Once the DDoS attack has ended or decreased to a certain | |||
level that the enterprise DMS might handle by itself, the DOTS server | level that the enterprise DMS might handle by itself, the DOTS server | |||
signals the enterprise DMS DOTS client that the attack has subsided.</t> | signals the enterprise DMS DOTS client that the attack has subsided.</t> | |||
<t>The DOTS client on the enterprise DMS then requests that the ITP term | ||||
<t>The DOTS client on the enterprise DMS then requests the ITP to terminate | inate | |||
the DDoS Mitigation. The DOTS server on the ITP receives this request | the DDoS Mitigation. The DOTS server on the ITP receives this request | |||
and once the mitigation has ended, confirms the end of upstream DDoS | and, once the mitigation has ended, confirms the end of upstream DDoS | |||
Mitigation to the enterprise DMS DOTS client.</t> | Mitigation to the enterprise DMS DOTS client.</t> | |||
<t>The following is an overview of the DOTS communication model for this | ||||
<t>The following is an overview of the DOTS communication model for this | use case:</t> | |||
use-case:</t> | <ol spacing="normal" type="1"> | |||
<li>A DDoS attack is initiated against resources of a | ||||
<t><list style="numbers"> | network organization (here, the enterprise), which has deployed a | |||
<t>A DDoS attack is initiated against resources of a | DOTS-capable DMS -- typically a DOTS client.</li> | |||
network organization (here, the enterprise) which has deployed a | <li>The enterprise DMS detects, classifies, and begins the DDoS | |||
DOTS-capable DMS - typically a DOTS client.</t> | Mitigation.</li> | |||
<t>The enterprise DMS detects, classifies, and begins the DDoS | <li>The enterprise DMS determines that its capacity and/or capability | |||
Mitigation.</t> | to mitigate the DDoS attack is insufficient and sends a DOTS DDoS Mitigation req | |||
<t>The enterprise DMS determines that its capacity and/or capability | uest via its DOTS | |||
to mitigate the DDoS attack is insufficient, and sends via its DOTS | client to one or more DOTS servers | |||
client a DOTS DDoS Mitigation request to one or more DOTS servers | residing on the upstream ITP.</li> | |||
residing on the upstream ITP.</t> | <li>The DOTS server, which receives the DOTS Mitigation request, | |||
<t>The DOTS server which receives the DOTS Mitigation request | ||||
determines that it has been configured to honor requests from the | determines that it has been configured to honor requests from the | |||
requesting DOTS client, and honors the request by orchestrating | requesting DOTS client and does so by orchestrating | |||
its own DMS.</t> | its own DMS.</li> | |||
<t>While the DDoS Mitigation is active, the DOTS server | <li>While the DDoS Mitigation is active, the DOTS server | |||
regularly transmits DOTS DDoS Mitigation status updates to the DOTS | regularly transmits DOTS DDoS Mitigation status updates to the DOTS | |||
client.</t> | client.</li> | |||
<t>Informed by the DOTS server status update that the attack has | <li>Informed by the DOTS server status update that the attack has | |||
ended or subsided, the DOTS client transmits a DOTS DDoS Mitigation | ended or subsided, the DOTS client transmits a DOTS DDoS Mitigation | |||
termination request to the DOTS server.</t> | termination request to the DOTS server.</li> | |||
<t>The DOTS server terminates DDoS Mitigation, and sends the | <li>The DOTS server terminates DDoS Mitigation and sends the | |||
notification to the DOTS client.</t> | notification to the DOTS client.</li> | |||
</list></t> | </ol> | |||
<t>Note that communications between the enterprise DOTS client and the | ||||
<t>Note that communications between the enterprise DOTS client and the | upstream ITP DOTS server may take place in band within the main Internet | |||
upstream ITP DOTS server may take place in-band within the main Internet | WAN link between the enterprise and the ITP; out of band via a separate, | |||
WAN link between the enterprise and the ITP; out-of-band via a separate, | ||||
dedicated wireline network link utilized solely for DOTS signaling; or | dedicated wireline network link utilized solely for DOTS signaling; or | |||
out-of-band via some other form of network connectivity such as a | out of band via some other form of network connectivity such as | |||
third-party wireless 4G network connectivity.</t> | third-party wireless 4G network connectivity.</t> | |||
<t>Note also that a DOTS client that sends a DOTS Mitigation request | ||||
<t>Note also that a DOTS client that sends a DOTS Mitigation request | may also be triggered by a network admin that manually confirms the | |||
may be also triggered by a network admin that manually confirms the | ||||
request to the upstream ITP, in which case the request may be sent from | request to the upstream ITP, in which case the request may be sent from | |||
an application such as a web browser or a dedicated mobile application.</t> | an application such as a web browser or a dedicated mobile application.</t> | |||
<t>Note also that when the enterprise is multihomed and connected to | ||||
<t>Note also that when the enterprise is multihomed and connected to | ||||
multiple upstream ITPs, each ITP is only able to provide a DDoS | multiple upstream ITPs, each ITP is only able to provide a DDoS | |||
Mitigation Service for the traffic it transits. As a result, the | Mitigation Service for the traffic it transits. As a result, the | |||
enterprise network may be required to coordinate the various DDoS Mitigation | enterprise network may be required to coordinate the various DDoS Mitigation | |||
Services associated to each link. More multi-homing considerations are | Services associated with each link. More multihoming considerations are | |||
discussed in <xref target="I-D.ietf-dots-multihoming"/>.</t> | discussed in <xref target="I-D.ietf-dots-multihoming" format="default"/>.</t> | |||
</section> | ||||
</section> | <section anchor="use-case-2" numbered="true" toc="default"> | |||
<section anchor="use-case-2" title="DDoS Mitigation by a Third Party DDoS Mitiga | <name>DDoS Mitigation by a Third-Party DDoS Mitigation Service Provider< | |||
tion Service Provider"> | /name> | |||
<t>This use case differs from the previous use case described in <xref | ||||
<t>This use case differs from the previous use case described in Section | target="use-case-1"/> in that the DDoS Mitigation Service is not provided | |||
3.1 in that the DDoS Mitigation Service is not provided by an upstream | by an upstream | |||
ITP. In other words, as represented in Figure 2, the traffic is not | ITP. In other words, as represented in <xref target="fig-2"/>, the traffic is no | |||
t | ||||
forwarded through the DDoS Mitigation Service Provider by default. In | forwarded through the DDoS Mitigation Service Provider by default. In | |||
order to steer the traffic to the DDoS Mitigation Service Provider, some | order to steer the traffic to the DDoS Mitigation Service Provider, some | |||
network configuration changes are required. As such, this use case is | network configuration changes are required. As such, this use case is | |||
likely to apply to large enterprises or large data centers, but as for | likely to apply to large enterprises or large data centers but, as for | |||
the other use cases is not exclusively limited to them.</t> | the other use cases, is not exclusively limited to them.</t> | |||
<t>Another typical scenario for this use case is for there to be a relat | ||||
<t>Another typical scenario for this use case is for there to be a relationship | ionship | |||
between DDoS Mitigation Service Providers, forming an overlay of DMS. When | between DDoS Mitigation Service Providers, forming an overlay of DMS. When | |||
a DDoS Mitigation Service Provider mitigating a DDoS attack reaches its | a DDoS Mitigation Service Provider mitigating a DDoS attack reaches its | |||
resources capacity, it may chose to delegate the DDoS Mitigation to | resource capacity, it may choose to delegate the DDoS Mitigation to | |||
another DDoS Mitigation Service Provider.</t> | another DDoS Mitigation Service Provider.</t> | |||
<figure anchor="fig-2"> | ||||
<figure><artwork><![CDATA[ | <name>DDoS Mitigation between an Enterprise Network and a Third-Party DDoS Mitig | |||
ation Service Provider</name> | ||||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
| Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | Provider | | | | | Provider | | |||
| +--------+ | | DDoS Attack | | +--------+ | | DDoS Attack | |||
| | DDoS | | <================================= | | | DDoS | | <================================= | |||
| | Target | | <================================= | | | Target | | <================================= | |||
| +--------+ | | | | | +--------+ | | | | |||
| | | | | | | | | | |||
| | +------------------+ | | | +------------------+ | |||
skipping to change at line 370 ¶ | skipping to change at line 325 ¶ | |||
| | | | | | | | | | |||
| +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
| | DDoS |<------------>| DDoS | | | | | DDoS |<------------>| DDoS | | | |||
| | Mitigation |C | | S| Mitigation | | | | | Mitigation |C | | S| Mitigation | | | |||
| | System | | | | System | | | | | System | | | | System | | | |||
| +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
* C is for DOTS client functionality | * C is for DOTS client functionality | |||
* S is for DOTS server functionality | * S is for DOTS server functionality | |||
]]></artwork> | ||||
Figure 2: DDoS Mitigation between an Enterprise Network and Third | </figure> | |||
Party DDoS Mitigation Service Provider | <t>In this scenario, an enterprise network has entered into a prearrange | |||
]]></artwork></figure> | d | |||
DDoS Mitigation assistance agreement with one or more third-party DDoS | ||||
<t>In this scenario, an enterprise network has entered into a pre-arranged | ||||
DDoS mitigation assistance agreement with one or more third-party DDoS | ||||
Mitigation Service Providers in order to ensure that sufficient DDoS | Mitigation Service Providers in order to ensure that sufficient DDoS | |||
mitigation capacity and/or capabilities may be activated in the event | Mitigation capacity and/or capabilities may be activated in the event | |||
that a given DDoS attack threatens to overwhelm the ability of the | that a given DDoS attack threatens to overwhelm the ability of the | |||
enterprise’s or any other given DMS to mitigate the attack on its own.</t> | enterprise or any other given DMS to mitigate the attack on its own.</t> | |||
<t>The prearrangement typically includes agreement on the mechanisms | ||||
<t>The pre-arrangement typically includes agreement on the mechanisms | ||||
used to redirect the traffic to the DDoS Mitigation Service Provider, as | used to redirect the traffic to the DDoS Mitigation Service Provider, as | |||
well as the mechanism to re-inject the traffic back to the Enterprise | well as the mechanism to re-inject the traffic back to the Enterprise | |||
Network. Redirection to the DDoS Mitigation Service Provider typically | Network. Redirection to the DDoS Mitigation Service Provider typically | |||
involves BGP prefix announcement or DNS redirection, while re-injection | involves BGP prefix announcement or DNS redirection, while re-injection | |||
of the scrubbed traffic to the enterprise network may be performed via | of the scrubbed traffic to the enterprise network may be performed via | |||
tunneling mechanisms (e.g., GRE). The exact mechanisms | tunneling mechanisms (e.g., GRE). The exact mechanisms | |||
used for traffic steering are out of scope of DOTS, but will need to be pre-arra | used for traffic steering are out of scope of DOTS but will need to be prearrang | |||
nged, while in some contexts such changes could be detected and considered as an | ed, while in some contexts such changes could be detected and considered as an a | |||
attack.</t> | ttack.</t> | |||
<t>In some cases, the communication between the enterprise DOTS client a | ||||
<t>In some cases the communication between the enterprise DOTS client and | nd | |||
the DOTS server of the DDoS Mitigation Service Provider may go through | the DOTS server of the DDoS Mitigation Service Provider may go through | |||
the ITP carrying the DDoS attack, which would affect the communication. | the ITP carrying the DDoS attack, which would affect the communication. | |||
On the other hand, the communication between the DOTS client and DOTS | On the other hand, the communication between the DOTS client and DOTS | |||
server may take a path that is not undergoing a DDoS attack.</t> | server may take a path that is not undergoing a DDoS attack.</t> | |||
<figure anchor="fig-3"> | ||||
<figure><artwork><![CDATA[ | <name>Redirection to a DDoS Mitigation Service Provider</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
| Enterprise | | Upstream | | | Enterprise | | Upstream | | |||
| Network | | Internet Transit | | | Network | | Internet Transit | | |||
| | | Provider | | | | | Provider | | |||
| +--------+ | | DDoS Attack | | +--------+ | | DDoS Attack | |||
| | DDoS | |<----------------+ | ++==== | | | DDoS | |<----------------+ | ++==== | |||
| | Target | | Mitigated | | || ++= | | | Target | | Mitigated | | || ++= | |||
| +--------+ | | | | || || | | +--------+ | | | | || || | |||
| | | | | || || | | | | | | || || | |||
| | +--------|---------+ || || | | | +--------|---------+ || || | |||
skipping to change at line 422 ¶ | skipping to change at line 373 ¶ | |||
| | | | | || || | | | | | | || || | |||
| +------------+ | | +------------+ | || || | | +------------+ | | +------------+ | || || | |||
| | DDoS |<------------>| DDoS | | || || | | | DDoS |<------------>| DDoS | | || || | |||
| | mitigation |C | |S | mitigation |<===++ || | | | mitigation |C | |S | mitigation |<===++ || | |||
| | system | | | | system |<======++ | | | system | | | | system |<======++ | |||
| +------------+ | | +------------+ | | | +------------+ | | +------------+ | | |||
+------------------+ +------------------+ | +------------------+ +------------------+ | |||
* C is for DOTS client functionality | * C is for DOTS client functionality | |||
* S is for DOTS server functionality | * S is for DOTS server functionality | |||
]]></artwork> | ||||
Figure 3: Redirection to a DDoS Mitigation Service Provider | </figure> | |||
]]></artwork></figure> | <t>When the enterprise network is under attack or at least is reaching i | |||
ts | ||||
<t>When the enterprise network is under attack or at least is reaching its | ||||
capacity or ability to mitigate a given DDoS attack, the DOTS | capacity or ability to mitigate a given DDoS attack, the DOTS | |||
client sends a DOTS request to the DDoS Mitigation Service Provider to | client sends a DOTS request to the DDoS Mitigation Service Provider to | |||
initiate network traffic diversion – as represented in Figure 3 – and | initiate network traffic diversion -- as represented in <xref target="fig-3"/> - | |||
DDoS mitigation activities. Ongoing attack and mitigation status | - and | |||
DDoS Mitigation activities. Ongoing attack and mitigation status | ||||
messages may be passed between the enterprise network and the DDoS | messages may be passed between the enterprise network and the DDoS | |||
Mitigation Service Provider using DOTS. If the DDoS attack has stopped or the | Mitigation Service Provider using DOTS. If the DDoS attack has stopped or the | |||
severity of the attack has subsided, the DOTS client can request the | severity of the attack has subsided, the DOTS client can request that the | |||
DDoS Mitigation Service Provider to terminate the DDoS Mitigation.</t> | DDoS Mitigation Service Provider terminate the DDoS Mitigation.</t> | |||
</section> | ||||
</section> | <section anchor="use-case-3" numbered="true" toc="default"> | |||
<section anchor="use-case-3" title="DDoS Orchestration"> | <name>DDoS Orchestration</name> | |||
<t>In this use case, one or more DDoS telemetry systems or monitoring | ||||
<t>In this use case, one or more DDoS telemetry systems or monitoring | devices monitor a network -- typically an ISP network, an enterprise | |||
devices monitor a network – typically an ISP network, an enterprise | ||||
network, or a data center. Upon detection of a DDoS attack, these DDoS | network, or a data center. Upon detection of a DDoS attack, these DDoS | |||
telemetry systems alert an orchestrator in charge of coordinating the | telemetry systems alert an orchestrator in charge of coordinating the | |||
various DMS’s within the domain. The DDoS telemetry systems may be | various DMSs within the domain. The DDoS telemetry systems may be | |||
configured to provide required information, such as a preliminary | configured to provide required information, such as a preliminary | |||
analysis of the observation, to the orchestrator.</t> | analysis of the observation, to the orchestrator.</t> | |||
<t>The orchestrator analyzes the various sets of information it receives | ||||
<t>The orchestrator analyses the various sets of information it receives from DD | from DDoS | |||
oS | telemetry systems and initiates one or more DDoS Mitigation | |||
telemetry systems, and initiates one or more DDoS mitigation | strategies. For example, the orchestrator could select the DMS in the enterprise | |||
strategies. For example, the orchestrator could select the DDoS | network or one provided by the ITP.</t> | |||
mitigation system in the enterprise network or one provided by the ITP.</t> | <t>DMS selection and DDoS Mitigation techniques may | |||
depend on the type of the DDoS attack. In some cases, a manual confirmation | ||||
<t>DDoS Mitigation System selection and DDoS Mitigation techniques may | ||||
depend on the type of the DDoS attack. In some case, a manual confirmation | ||||
or selection may also be required to choose a proposed strategy to | or selection may also be required to choose a proposed strategy to | |||
initiate a DDoS Mitigation. The DDoS Mitigation may consist of multiple | initiate a DDoS Mitigation. The DDoS Mitigation may consist of multiple | |||
steps such as configuring the network, or of updating already instantiated | steps such as configuring the network or updating already-instantiated | |||
DDoS mitigation functions. Eventually, the coordination of the | DDoS Mitigation functions. Eventually, the coordination of the | |||
mitigation may involve external DDoS mitigation resources such as a | mitigation may involve external DDoS Mitigation resources such as a | |||
transit provider or a Third Party DDoS Mitigation Service Provider.</t> | transit provider or a third-party DDoS Mitigation Service Provider.</t> | |||
<t>The communication used to trigger a DDoS Mitigation between the DDoS | ||||
<t>The communication used to trigger a DDoS Mitigation between the DDoS | ||||
telemetry and monitoring systems and the orchestrator is performed using | telemetry and monitoring systems and the orchestrator is performed using | |||
DOTS. The DDoS telemetry system implements a DOTS client while the | DOTS. The DDoS telemetry system implements a DOTS client while the | |||
orchestrator implements a DOTS server.</t> | orchestrator implements a DOTS server.</t> | |||
<t>The communication between a network administrator and the orchestrato | ||||
<t>The communication between a network administrator and the orchestrator | r | |||
is also performed using DOTS. The network administrator uses, for example, a web | is also performed using DOTS. The network administrator uses, for example, a web | |||
interface which interacts with a DOTS client, while the orchestrator | interface that interacts with a DOTS client, while the orchestrator | |||
implements a DOTS server.</t> | implements a DOTS server.</t> | |||
<t>The communication between the orchestrator and the DMSs is performed | ||||
<t>The communication between the orchestrator and the DDoS Mitigation | using DOTS. The orchestrator implements a DOTS | |||
Systems is performed using DOTS. The orchestrator implements a DOTS | client while the DMSs implement a DOTS server.</t> | |||
client while the DDoS Mitigation Systems implement a DOTS server.</t> | <t>The configuration aspects of each DMS, as well as the | |||
instantiations of DDoS Mitigation functions or network configuration, are | ||||
<t>The configuration aspects of each DDoS Mitigation System, as well as the | not part of DOTS. Similarly, the discovery of available DDoS Mitigation | |||
instantiations of DDoS mitigation functions or network configuration is | functions is not part of DOTS and, as such, is out of scope.</t> | |||
not part of DOTS. Similarly, the discovery of available DDoS mitigation | <figure anchor="fig-4"> | |||
functions is not part of DOTS; and as such is out of scope.</t> | <name>DDoS Orchestration</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
<figure><artwork><![CDATA[ | ||||
+----------+ | +----------+ | |||
| network |C (Enterprise Network) | | network |C (Enterprise Network) | |||
| adminis |<-+ | | admini- |<-+ | |||
| trator | | | | strator | | | |||
+----------+ | | +----------+ | | |||
| | | | |||
+----------+ | S+--------------+ +-----------+ | +----------+ | S+--------------+ +-----------+ | |||
|telemetry/| +->| |C S| DDoS |+ | |telemetry/| +->| |C S| DDoS |+ | |||
|monitoring|<--->| Orchestrator |<--->| mitigation|| | |monitoring|<--->| Orchestrator |<--->| mitigation|| | |||
|systems |C S| |<-+ | systems || | |systems |C S| |<-+ | systems || | |||
+----------+ +--------------+C | +-----------+| | +----------+ +--------------+C | +-----------+| | |||
| +----------+ | | +----------+ | |||
-----------------------------------|----------------- | -----------------------------------|----------------- | |||
| | | | |||
| | | | |||
(Internet Transit Provider) | | (Internet Transit Provider) | | |||
| +-----------+ | | +-----------+ | |||
| S| DDoS |+ | | S| DDoS |+ | |||
+->| mitigation|| | +->| mitigation|| | |||
| systems || | | systems || | |||
+-----------+| | +-----------+| | |||
* C is for DOTS client functionality +----------+ | * C is for DOTS client functionality +----------+ | |||
* S is for DOTS server functionality | * S is for DOTS server functionality | |||
]]></artwork> | ||||
Figure 4: DDoS Orchestration | </figure> | |||
]]></artwork></figure> | <t>The DDoS telemetry systems monitor various aspects of the network tra | |||
ffic and perform | ||||
<t>The DDoS telemetry systems monitor various aspects of the network traffic and | ||||
perform | ||||
some measurement tasks.</t> | some measurement tasks.</t> | |||
<t>These systems are configured so that when an event or some measuremen | ||||
<t>These systems are configured so that when an event or some measurement | t | |||
indicators reach a predefined level their associated DOTS client sends a | indicators reach a predefined level, their associated DOTS client sends a | |||
DOTS mitigation request to the orchestrator DOTS server. The DOTS | DOTS mitigation request to the orchestrator DOTS server. The DOTS | |||
mitigation request may be associated with some optional mitigation hints | mitigation request may be associated with some optional mitigation hints | |||
to let the orchestrator know what has triggered the request. In particular, it i | to let the orchestrator know what has triggered the request. In particular, it | |||
s possible for something that locally to one telemetry system looks like an atta | is possible for something that looks like an attack locally to one | |||
ck is not actually an attack when seen from the broader scope (e.g., of the orch | telemetry system is not actually an attack when seen from the broader sco | |||
estrator)</t> | pe (e.g., of the orchestrator).</t> | |||
<t>Upon receipt of the DOTS mitigation request from the DDoS telemetry | ||||
<t>Upon receipt of the DOTS mitigation request from the DDoS telemetry | system, the orchestrator DOTS server responds with an acknowledgment to | |||
system, the orchestrator DOTS server responds with an acknowledgment, to | ||||
avoid retransmission of the request for mitigation. The orchestrator | avoid retransmission of the request for mitigation. The orchestrator | |||
may begin collecting additional fine-grained and specific information | may begin collecting additional fine-grained and specific information | |||
from various DDoS telemetry systems in order to correlate the | from various DDoS telemetry systems in order to correlate the | |||
measurements and provide an analysis of the event. Eventually, the | measurements and provide an analysis of the event. Eventually, the | |||
orchestrator may ask for additional information from the DDoS telemetry | orchestrator may ask for additional information from the DDoS telemetry | |||
system; however, the collection of this information is out of scope of DOTS.</t> | system; however, the collection of this information is out of scope of DOTS.</t> | |||
<t>The orchestrator may be configured to start a DDoS Mitigation upon | ||||
<t>The orchestrator may be configured to start a DDoS Mitigation upon | ||||
approval from a network administrator. The analysis from the | approval from a network administrator. The analysis from the | |||
orchestrator is reported to the network administrator via, for example, a web | orchestrator is reported to the network administrator via, for example, a web | |||
interface. If the network administrator decides to start the mitigation, | interface. If the network administrator decides to start the mitigation, | |||
the network administrator triggers the DDoS mitigation request using, for exampl e, a | the network administrator triggers the DDoS Mitigation request using, for exampl e, a | |||
web interface of a DOTS client communicating to the orchestrator DOTS | web interface of a DOTS client communicating to the orchestrator DOTS | |||
server. This request is expected to be associated with a context that | server. This request is expected to be associated with a context that | |||
provides sufficient information to the orchestrator DOTS server to infer, elabo rate and coordinate | provides sufficient information to the orchestrator DOTS server to infer, elabor ate, and coordinate | |||
the appropriate DDoS Mitigation.</t> | the appropriate DDoS Mitigation.</t> | |||
<t>Upon receiving a request to mitigate a DDoS attack aimed at a | ||||
<t>Upon receiving a request to mitigate a DDoS attack aimed at a | ||||
target, the orchestrator may evaluate the volume of the attack as | target, the orchestrator may evaluate the volume of the attack as | |||
well as the value that the target represents. The orchestrator may | well as the value that the target represents. The orchestrator may | |||
select the DDoS Mitigation Service Provider based on the attack | select the DDoS Mitigation Service Provider based on the attack | |||
severity. It may also coordinate the DDoS Mitigation performed by the | severity. It may also coordinate the DDoS Mitigation performed by the | |||
DDoS Mitigation Service Provider with some other tasks such as, for | DDoS Mitigation Service Provider with some other tasks such as, for | |||
example, moving the target to another network so new sessions will not | example, moving the target to another network so new sessions will not | |||
be impacted. The orchestrator requests a DDoS Mitigation by the selected | be impacted. The orchestrator requests a DDoS Mitigation by the selected | |||
DDoS mitigation systems via its DOTS client, as described in Section | DMSs via its DOTS client, as described in <xref target="use-case-1"/>.</t> | |||
3.1.</t> | <t>The orchestrator DOTS client is notified that the DDoS Mitigation is | |||
effective by the selected DMSs. The orchestrator DOTS | ||||
<t>The orchestrator DOTS client is notified that the DDoS Mitigation is | server returns this information to the network administrator.</t> | |||
effective by the selected DDoS mitigation systems. The orchestrator DOTS | <t>Similarly, when the DDoS attack has stopped, the orchestrator DOTS | |||
server returns this information back to the network administrator.</t> | client is notified and the orchestrator's DOTS server indicates the end of the | |||
DDoS Mitigation to the DDoS telemetry systems as well as to the network a | ||||
<t>Similarly, when the DDoS attack has stopped, the orchestrator DOTS | dministrator.</t> | |||
client is notified and the orchestrator’s DOTS server indicates | <t>In addition to the DDoS orchestration shown in <xref target="fig-4"/> | |||
to the DDoS telemetry systems as well as to the network administrator | , the selected DMS can return a mitigation request to the | |||
the end of the DDoS Mitigation.</t> | ||||
<t>In addition to the above DDoS Orchestration, the selected DDoS | ||||
mitigation system can return back a mitigation request to the | ||||
orchestrator as an offloading. For example, when the DDoS attack becomes severe and | orchestrator as an offloading. For example, when the DDoS attack becomes severe and | |||
the DDoS mitigation system’s utilization rate reaches its maximum | the DMS's utilization rate reaches its maximum | |||
capacity, the DDoS mitigation system can send mitigation requests with | capacity, the DMS can send mitigation requests with | |||
additional hints such as its blocked traffic information to the | additional hints, such as its blocked traffic information, to the | |||
orchestrator. Then the orchestrator can take further actions such as | orchestrator. Then the orchestrator can take further actions such as | |||
requesting forwarding nodes such as routers to filter the traffic. In | requesting forwarding nodes (e.g., routers) to filter the traffic. In | |||
this case, the DDoS mitigation system implements a DOTS client while the | this case, the DMS implements a DOTS client while the | |||
orchestrator implements a DOTS server. Similar to other DOTS use cases, the offl | orchestrator implements a DOTS server. Similar to other DOTS use cases, the offl | |||
oading scenario assumes that some validation checks are followed by the DMS, the | oading scenario assumes that some validation checks are followed by the DMS, the | |||
orchestrator, or both (e.g., avoid exhausting the resources of the forwarding n | orchestrator, or both (e.g., avoid exhausting the resources of the forwarding n | |||
odes or inadvertent disruption of legitimate services). These validation checks | odes or inadvertent disruption of legitimate services). These validation checks | |||
are part of the mitigation, and are therefore out of the scope of the document.< | are part of the mitigation and are therefore out of the scope of the document.</ | |||
/t> | t> | |||
</section> | ||||
</section> | </section> | |||
</section> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<section anchor="security-considerations" title="Security Considerations"> | <name>Security Considerations</name> | |||
<t>The document does not describe any protocol, though there are still a f | ||||
<t>The document does not describe any protocol, though there are still a few | ew | |||
high-level security considerations to discuss.</t> | high-level security considerations to discuss.</t> | |||
<t>DOTS is at risk from three primary attacks: DOTS agent impersonation, t | ||||
<t>DOTS is at risk from three primary attacks: DOTS agent impersonation, traffic | raffic | |||
injection, and signaling blocking.</t> | injection, and signaling blocking.</t> | |||
<t>Impersonation and traffic injection mitigation can be mitigated through | ||||
<t>Impersonation and traffic injection mitigation can be mitigated through | current secure communications best practices, including mutual authentication. P | |||
current secure communications best practices including mutual authentication. Pr | reconfigured mitigation | |||
econfigured mitigation | ||||
steps to take on the loss of keepalive traffic can partially mitigate | steps to take on the loss of keepalive traffic can partially mitigate | |||
signal blocking, but in general it is impossible to comprehensively | signal blocking. But in general, it is impossible to comprehensively | |||
defend against an attacker that can selectively block any or all traffic. | defend against an attacker that can selectively block any or all traffic. | |||
Alternate communication paths that are (hopefully) not subject to blocking | Alternate communication paths that are (hopefully) not subject to blocking | |||
by the attacker in question is another potential mitigation.</t> | by the attacker in question is another potential mitigation.</t> | |||
<t>Additional details of DOTS security requirements can be found in | ||||
<t>Additional details of DOTS security requirements can be found in | <xref target="RFC8612" format="default"/>.</t> | |||
<xref target="RFC8612"/>.</t> | <t>Service disruption may be experienced if inadequate mitigation actions | |||
are applied. These considerations are out of the scope of DOTS.</t> | ||||
<t>Service disruption may be experienced if inadequate mitigation actions are ap | </section> | |||
plied. These considerations are out of the scope of DOTS.</t> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | ||||
</section> | <t>This document has no IANA actions.</t> | |||
<section anchor="iana-considerations" title="IANA Considerations"> | </section> | |||
<t>No IANA considerations exist for this document.</t> | ||||
</section> | ||||
<section anchor="acknowledgments" title="Acknowledgments"> | ||||
<t>The authors would like to thank among others Tirumaleswar Reddy; Andrew | ||||
Mortensen; Mohamed Boucadair; Artyom Gavrichenkov; Jon Shallow, Yuuhei | ||||
Hayashi, Elwyn Davies, the DOTS WG chairs, Roman Danyliw and Tobias Gondrom as w | ||||
ell as | ||||
the Security AD Benjamin Kaduk for their valuable feedback.</t> | ||||
<t>We also would like to thank Stephan Fouant that was part of the initial | ||||
co-authors of the documents.</t> | ||||
</section> | ||||
</middle> | </middle> | |||
<back> | <back> | |||
<references title='Informative References'> | <displayreference target="I-D.ietf-dots-multihoming" to="DOTS-MULTIHOMING"/> | |||
&RFC8612; | <references> | |||
&RFC8782; | <name>Informative References</name> | |||
&RFC8783; | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | |||
&I-D.ietf-dots-multihoming; | .8612.xml"/> | |||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8782.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC | ||||
.8783.xml"/> | ||||
<xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.i etf-dots-multihoming.xml"/> | ||||
</references> | </references> | |||
<section anchor="acknowledgments" numbered="false" toc="default"> | ||||
<name>Acknowledgments</name> | ||||
<t>The authors would like to thank, among others, <contact fullname="Tirum | ||||
aleswar Reddy.K"/>, <contact fullname="Andrew | ||||
Mortensen"/>, <contact fullname="Mohamed Boucadair"/>, <contact fullname="Artyom | ||||
Gavrichenkov"/>, <contact fullname="Jon Shallow"/>, <contact fullname="Yuuhei | ||||
Hayashi"/>, <contact fullname="Elwyn Davies"/>, the DOTS WG Chairs (at the | ||||
time of writing) <contact fullname="Roman Danyliw"/> and <contact fullname | ||||
="Tobias Gondrom"/>, as well as | ||||
the Security AD <contact fullname="Benjamin Kaduk"/> for their valuable feedback | ||||
.</t> | ||||
<t>We also would like to thank <contact fullname="Stephan Fouant"/>, who | ||||
was one of the initial coauthors of the documents.</t> | ||||
</section> | ||||
</back> | </back> | |||
<!-- ##markdown-source: | ||||
H4sIALWHAl8AA809a3MbN5Lf8StQtXW11orkxnYeLiW3G8VOvN7Eci7SXu4+ | ||||
ghyQRDQz4A5mSDOR/8v9lvtl1w8Ag3nRsry3d6xULHEGQHej392A5vO5qE2d | ||||
6wv5N6flSjnt5NpW8sULey3f7HQpb7aVVrW8NptS5abcCLVcVnp/IV+8ubmm | ||||
Uc9xlMjsqlQFTJRVal3Pja7X88zWbt44PaeJ508+E0IomO5CXutVU5n6KA4b | ||||
nkncHi7kq7LWVanr+QucQ6xUfSFNubZCrGwGa1/IBmZ9JnbmQkhZrVc6c/UR | ||||
oT8CBFLWdpX8aMpMl3X4wtmqrvTaxd+PRefXujKr+PLKFgWMjU9NCajHZQDV | ||||
Qu12BBB+I1RTb22FMOFn7v/FYTDDTwv5wi6X8HP8ngn1k81VmQ0e2gqmvayW | ||||
sAtXuj7Y6rZ9BlBqXV/E39ulVkDM0e9tpse/b8q6OsJOABpqZysdH+lCmfxC | ||||
VhkD9rVCWBawLeP4vVjI12ajmrzu4fdClUbng4eE37dAbeds2cdMPnvyxWfy | ||||
plKlA74qVaaATE2tu3jKa2XKWv6gmgp2aSb/7XkXX/nptfzkm8+HyPKUfUwz | ||||
AnRRMKBfaw/bArhgcktfW3drD6b+dbCpS13VI48J7b/c3MjntnSwDIrSPbdV | ||||
vlG38kdV3c7k61d9TJ89efrFENG/XV8O9nNTfJ2rpVts63q+YiCmUbxayBut | ||||
No3u4XdlbvsPCLNXlS0Ba1getga2vlbyuUZxdnKwx5N4TvHv+IOA6vd9TGFZ | ||||
BPBrAzAVHiTAdNHcjuP6w0L+h1E9RH8wqtx0vucdbNRBmwFKV3YhH3/yeCav | ||||
7bo+gI6Tl3tdNnom/7PZNkANI18Y1jE9nK9U+UvKCy2vbk05YNXvQDJuF28N | ||||
qGIA7+stQTO9i98vYMPc1vza3Pbx+17hvyOPCc0rYtSiaEoDWtjYcqCD5EsA | ||||
BZlSPv78O/l0/un8sbzemiXIpAI+BdhrO79tetje2Nuj7W3u40+ezZ89fvxs | ||||
SIK/qp0q+yS4JcC/Lut6//nilx2YlPl8LoGx60oBdcXNVp8wX/IRWpszqddg | ||||
5mppHBCq1mApMjAZclfZvcm0gH/BgNjc4ZdrtTK5qVWt6d3K7nSllvjVUapV | ||||
ZZ2TmXE7VeEbuLIoTA26BMkGZidviH4gT1tYDWxHg6YFltIOTYx0qtjlWjbR | ||||
/h62ZrWVmXaryiy1qLd+XcAOJ5L67U6vagB4CeZBA474Bllj4IOdLWlWBfPo | ||||
PMd/ybwW2jm1QQLot6st8I4miACGZGXk20IrgA7QNmg9zfqI04sIAEzQW2om | ||||
t/aALx3hyxw0jEVCzCTatsMWaI+z4hz1cQfMlJNFrwomD6yz1BGkbMGbWZgs | ||||
y7UQ4A9UNmsIb/nb70zy6zvxr8lHiMuayFAb4Gm7lgdwLgDWGe4MSN2yQXoB | ||||
QiA4c7ueO13tzUoDM8B2nUlV12p1O7ptBH2uqo3Oj3IJVMpks8MXTG51NkOO | ||||
2VXg7KjqKFYdgZFutdUF7qeptxK0QQYWPber2zkoSNgWBXNkeg6MCLvpuWMF | ||||
7A58AZoZqEQIgaJemw3IFM45YwZ18CMhR5zID5DauD97ht+ukW9gY1tElho3 | ||||
T8mt2WwBl0KVDWwGjgOVhVwEpGO7UOCLsNIKeGYhLrPM4Awqz48zgMdWGQo3 | ||||
vlOgHUPmJXkbI59wBl9SpbaNg1UBx3Wlms22ZrIsLfyv1qttSayB0PiF55XO | ||||
gY8ysW0qYIYgPxsUZ5yoXMFPyLSRCDAeuTLXb1EySYpmRMamKmfgTJbAAJtK | ||||
ZcSNqABgydURuaWFHAQ+sOxGlzAxIB0olumdJpdS2vK//wsoiRSD7wEO5tAl | ||||
yQp4lq7WxeLjNJEDGQfhSzURAnZKFwV1kJk9mN0TqojIrGGjEUsESlc024bp | ||||
SDTTVYFMxJIBqMMeMaMlE1b67412qAGI+/hVkGRUFOBE/cpv7eABePWwgSCl | ||||
jgnSFa9lZVWGdNaIEdIdmEWqwgKRWG5gCdQgIGkFCJrcWNhr2DfSRMYlmpv2 | ||||
ap7rvc5TpcmTuVpkBsStIi3WgWMmXQNKF8TSoxreYKzcDDQgIE5s/0ckThCB | ||||
Pucr50DjqHIFGhDk3ZMI30QE4EkNqAHoqj+S+KVrIAijEQNBnOAfZ4Dmrqkp | ||||
aEPmwwVNpSl6kb/99uefvnv+7PPHT969oz2C6YD9vHZg8rUM5t/+4hm8HX9+ | ||||
+u4d2YmelShtDVp7qxrAba9p7nVTI0N13hPRVsEWAVCgRoNFwn1Tmd3hQ+LH | ||||
vc33IOZgz2+Ivja3myM9ugQjWx4LgPB3dftoDo/myj/qmoOuaeiStVC3ABtC | ||||
CbtA4opuUN1bMtNr2nBiUSdSQi4gTAXIWSlKU+Ncjo0PTOJ4KOitpc7t4UKI | ||||
P/BOv2555JoUBMj/6+szCPW8wvDbqiu0jm7IHlGbDGcqFEo/22S0UMRfqxw2 | ||||
ByQbfgGRzNApFYDaH4FRXHBSwdbYpgJ1O5NgItHxymE3cgfWv6T9AGIAG4Mh | ||||
Q++qJh5TtcD1aqAj4Loia+Si+ECwRlMixzuLxriCCfNA7BYhARyhgI22uppA | ||||
azFCuwviRS/UnlboCbHmnZhHjm4CuwAXXiZACZJJ9o5BlC6EUqyAkoBLhb95 | ||||
DHRHPSzktwrwD6Nds0TnbUcLNa4hKxIo6hcWP5CSugQFTNIqH13/cHnGTLBV | ||||
zntGhQbX4BVZB5ZuB86HM17jBzlGSK67kBOsEAOAKkK1pU/QB94E91CTAwVi | ||||
AWC4MdLHFX70K3RIh9OrDGTIEKegUkD3sSYLBq97DTg1KSwo/xDzP5wAANEK | ||||
S8lHr25+PBssyCswzTKdk90jigAIaN5p92TcvZLTKURQdAeWxN5x0T5+4tGr | ||||
6x/PSI3Da80OAx9VhEX9egGvZEX8FUYi24mYHwPdFRNho8oK3g0r9Gm0RJ0k | ||||
4+NpKrVrzB+/Q0965OP1YVDTMc5w5MbDOhS1g6V1LLvIcxwKoH/lSSk8KWXU | ||||
BCrbA6epjWblA9HNHPwwtnzkySEi5PIZMEywm+hlgCvZEyqVihXMDAaDpoBB | ||||
Im6fEN8BZCvwylkI0MkHyBz5J7QZNA6kN4BJzlWGnjlaG9dFM0zMOjCaBLfS | ||||
JawAHLTb5UaTRKoSNt4eSr8TcSB4o3mDPC5SaqEhWeW2yYC0TAk/IPhCxClA | ||||
imjqwf0u0fvYE1vbwOQDQA1pBJUDFBlQgEMFcLS2Qc+acglBNFtWUMn8S+BR | ||||
rzaSjQ50opiNwkYyD34y/5SiAnDuCnTTnABPx66M8sZ9YsKfL686SHkvnj13 | ||||
dv7BLeoEOQQE4xC0F0c0gTlGtIdkrhaOvVRcErehAhIfrATIM3K6pjRa8Jwh | ||||
+pogCuqJmx/JmpMzFGURdg9lINW0I2AmBp/CR2CTlQaCUEDmfUQIjGwxQUdP | ||||
Nh9B5xhqVmwLMheoT9J82Pp8wAgeKPUlChxLF+n4N/w2m2GIwbNZZEpCK+QA | ||||
unohUsaxV0s+BO1QGUQXieY0Um4kYhhhGCCNSBVBjfgqL440vw+ocEODaFJY | ||||
YCGalOzXUzJ4q8D2QNhpQD90Eyd+m1vfdwVyDZaXYa1Amy/kd96PdqjUACOY | ||||
CKQfk1dgCMqc/Yy1qSCWiAriYEBilqhKa2VycskZfs+OC3kFtr6CkRDHciiD | ||||
jywuG+YgcSa/C76DqI6rMAAk8varsl02DplxtAIcUfOS36EIafl4Nr5bgrSv | ||||
0/l6juoIxsRyC0aVHPKDS1Wjrgvu3M966UkDIRCXOTD6RPP+4uo6PiIS/rt9 | ||||
9WP4hlwYhbuKIOb2SFqColmgCe4a5ib8uyRgqGRD5oQkoetfpT43TGTLOZiY | ||||
wvgwF51uCGhRCHY+HJ71OQwhAppTlhCgQWqIYItiyWuoHBzLlAcEeIcCZspc | ||||
WYAeHuYstUtA42CyqINNRdoPQv3bR+4M45qQyDwfWuXzU8/iwDv5bYtP+Cr+ | ||||
EB2E+FUy0JeSZPuw/WHgUKQDB59kYHQ8xlbsonPeGZh+iO6XnIHrvXHHD+n3 | ||||
O/nVVIjX+lCD8TfkCTx0/BT0nU06H0G7S6/4+p8iQv7d9wwMaFzDTwln3n8g | ||||
/ueNz4et+ME43k0/+78dOMDjvgO7e/VVK6TvH5ju1fMpvh8b2Nur+w4c4nif | ||||
gR+shkQyzR/kc0rmeisVTOm6KVeci8XQr/P+ded91v299+OAYMou7hP19BQ3 | ||||
uwld1wKXDk4m6H6ybhQ1muAuryxlvcMqIvjKELM3BVUotAZf67NP/iV4xTEV | ||||
TyWBPpSg+gWqfrJIq2iPEBZyF4InNJ0/jP6giLPXHvUQ42MZukL/aLfFUIvD | ||||
m5irpVKOa5ND7BLrTPjakHeoQhaXnLLKbDa6mmF1AGI5tutrg9vz65hjm3pU | ||||
PYoHL55CPZfkahoXikicWEziG9opTHZy+lJ1WOuwBd+qnXLwGnOU4OqZz6Zj | ||||
Rtvbem+SaQnvnum3lFkFOvw84jbjm7kld9vTlOLGEFmNxqnkUMSkmnykF5vF | ||||
rPWS0O9ynFBI3J0zjucKIA7GD+DdL/XGlG5Ib4D0RRNTDitYpU1jMiizTvTX | ||||
Y+LpMC2wN3Ibsjh6OW5r8yxuY48w2gFhYh6mn6vEfRW9EelWUhInj5FLqhB8 | ||||
LJsGWIIyWYaDqz5FiIXSCSodo/Weny9Y4jn3Q28zG3gBYGZPRJF4iJfNAlwI | ||||
TiCaTzoiNwKCsDdvcP3TO9NBdd0mADQ49JmP7bg+6vrgBxDSig6VE2ZUViAF | ||||
4KSvmiH6HQ71nNAOZnRDkS2pyS4gKFwl+UI/A7rPVJ0i/s00l98yn2KDsEGZ | ||||
UnDhheg8wjSFwbofRpkgyEA9EBaIRgaEEZE9hlOk9IjLJBBi5hXztqH6NiRf | ||||
b8IaJb9VgX4/kHl8kUe3KdZTbNfyh+TYnkSj5S5BmZhA2GQPE7qShQo7r6kw | ||||
2woCVfMS1TsaQqcIexKsbZ7bA+XQSH9h0LI3+hDYL1Tz28q1LGwGu8gVJeNE | ||||
yCleCPF4IS87XNGREbVRmAdJFCCmBKK82GqjylAVfLQFU9SP0c5878OWI1sO | ||||
G5VAEOcU2eWM5bzNhHSNBOD8pG9VfBBKCnyGWUOwsGujfdDqVW3YY9HVtk8H | ||||
k8XZkDtCLQ61frDz0tdY2ki0l9fQQwK6BoXTUPoiJE6c3BtFM1P/RkhVMLZ9 | ||||
O5zkVcAfQQEt0DFIGNRxZhL5YETFAqqfDnmaNyNhZ/94uLAYUoQ2cYlZtcTx | ||||
Avi2tmzroq51cpJKabKhTA8aEyogjCmoj7YuFSyvPZReFX+2kD9Hf6FPLRQE | ||||
zEfqoeqp9KbJVYV5HvS1ikD/wRy+ktvsMraCrbURkRU/x7RFr0KVkLczxZg2 | ||||
E9wNgAU7r9YSgIMSjGCOs4aIxeph+i0BBqD9YsgAUQe6/rQpn+LulbY266A/ | ||||
hqYXsx9XNmDZ65NJ25hSse1l6DqeMBndBNJYh9jlaoUO0HxJuWxw/HwjTYF9 | ||||
idG9D5mZqcUT7/VLTKBj0xDNiEKJZUJu95oB44eywsGAMQUJiE4Vzd/UBn3n | ||||
DFsNsFmkDYBCHwjMX4n+Elw6pawsMhAq0jBtp0YQ8nQKrJSpsjmAhb0vCIp2 | ||||
Tn76cnTYwu8GZRy54WVoWXlz1aTI+7iC5+C4gflctflhLAjybNxulB87Rk70 | ||||
GDLdXmrdYQ1Eme1U+P3SjiJOUCAC886tR91SBeKcJbaXHByaaKxmtftV2CUq | ||||
iGTckCxj6XTQHtT3tLWFb13wpOUUZ+yJSpEBY6OxQOyDIUokkzVLOlfUwMSH | ||||
8kTo7QhOnKlDJOjAHjuu0cGy3CQz4t57evneEFLDsY+LKbvHjHIzEHMRk6Dd | ||||
ag8hg/ztI1BCer7lGDpEmip2+AhfoOM89W+//fnV/MWiPSEQyAmD373DGGek | ||||
/okFkCrDLmjg7/dVptNC6JN7F0KphNBaJKxh7okog1opoXHNUTb4CI9l4PIT | ||||
FW7cd+yaiZ0FXNUNXCLQCmOWm4Ueti1zlOGHeIY7RTtJ/iezLkfQ3AIY5aAq | ||||
alvYVlQXOQVQpNYSA9w19r4jBCJWZV2tdZfzgmZ/z4wz0l8iUT1Jec93n0ru | ||||
P2GOJDZGqZ2x0xwpDu5nbm5RcdZciKUfqB8zkUmHss1fZth5vuLOcy7oKso6 | ||||
ibbM1XYo+S2B6DdvHPgDMHtuwJjGkib1jlz6LpXQvxprNsFDTsENwlpp38Gh | ||||
Yvnbbc1OBHvzPhIC8Kj4qULITnuuqNaN/o3EfIWYLIe2OxviDKozpm4n9ixu | ||||
kQI1OYbeXW9zVYaV7IrqNIAIBAR6M9VGAlpvspOnBxHS86Hpx5jTfFgR5KE1 | ||||
kIeWQD6qAvKRBZCPrH/cH/RRlCdI9bBxp1lhetzY539zvbsB79+XLgOp/UfQ | ||||
81RJYLK0M1r1iJ9h9Up2Bk5WPa4nq1fvKXpMFq8eiuD/35JHsOsXUzl2NAOJ | ||||
4rtKmlPINUpX5s/9fCXfXYDdCm1jwWi3B2eqanLzTUl5P2zzUlVFZzfEiVKG | ||||
il2OlIpPcxRp3DLlAEej2Gka8x3sHKzEDMqg7X0yMYNZ4hDE8MmJ0LoBvsU+ | ||||
JoyV3IBrUHbTqb4LwA3bAFTszex547933El49G6InxVzkL38kF+EuospqeFT | ||||
eQm1iZZtEoz7z9CpioQO2WKN/pZxBeXxyK+B/QOfa1U/zLNTToSDRZ35eea5 | ||||
KX/pT70kivH8LQeLq9Da9JOHJ00dvM+xaTuhfFutk9+8xEY6vTZvgcilBSnz | ||||
hKioVaVqV5n5WlIEF9340A2+qpolevg9wkxHVW1lCwJ3UTcQC9LxjpbyoQ70 | ||||
8qdvz3xC8S1w3GBvyHX0y5LvTX4b9uGBG4u9SNQY5M89sHNLtcRS88YuOyyS | ||||
BTSxpQjTCdj8ot/WvrknuOHc883dSxzE+pDWVwt9u6TvGZPcjcTzqdD43k0f | ||||
3y+f03Zhdcsh7/dpFR4ACRGOCFn3FaB97HQZh7oLJxEO3NtOp62GQC/ERCfc | ||||
NGr9/BTl/vrpKMVdmZwT5WiDevA2duCTt67xAz3jBzrGD/SLH+gWf4xXPOYU | ||||
fzWgRgLO+Xni1Y76xPDxvAac3gHhTt7RBB8Cd2/03f1o9RGDIzh3Cf73HTz6 | ||||
zT9l5TFf+QMGDx3mfyi1P8iz7A/+MP95MLiY8KGve88wljs/7w12Jxzp9JkP | ||||
BM/PH4jzQ9XUP8uZ9r7004u+a/H+jMl4K8hEBzX5c7XMtXKk3SmpEk4rRLcT | ||||
X/I+Yfekw8CtbKs7odzXycH3qzfv9ZGsiG0TAYPgXvAZURyGZ+ensoxP6Wk5 | ||||
4tpzIcHgsdw3pTdmbeP3oEXBHz9vHe6domzwhKuQdt7HyuwpVNOeolfrvgvA | ||||
nQG13e24moZ+ucOO7NZPH+shGBbbsHEk7gJMco8taGtoY5sWkt1v2lImnXSP | ||||
2eun09nrELaF5OOsW/rFaWuNPVJ1dfTi7/gxMIVF31JkmpP7/qukcjPvlNhL | ||||
PM/UnnaZOD3D9ZU2/7oAn8OWST9ae4Qj4fdwUHkIq8rxJpX+AURDGeSKDxp1 | ||||
TqPjjsQ6xuvr37u0/JdZLAD6Euc4bZg1RbdcHaozsXaSdMrMkkLTDot/uNHV | ||||
UShQR0dnXOAtu0Rt5Yd46U1x8uFdB02ew/vXASuna5o0vUHB1G2FPvbND6nJ | ||||
BdugD9yQV5KTmQSD3pB043kI3yc3GwDugwcHi63a4kfnzDmbHTMp4rYiUNKq | ||||
iPfoRwpBPhvE64WjQoNsNN0mgEKKOyr41H4Ih4GpdSfSCL53GtTM8NAKX4/g | ||||
q5VMFyzEx6WRW6hQ2C+sbS3mzBWdpqDTuJ6cx45CHvb2tayZIENJeIzFHEWA | ||||
obgIW6R37SmNwLIh/ElFknqIMl8D8AfGktNKQ90eTCoeasUsSMMXP3AwFMSN | ||||
pRklrugCG065QqAJcQNQsD99W21Iate9vlZWJR9S8fMi1I3WQsLDV6en+1db | ||||
1m3lhuxYVJWtUvImqauTBv2tou1vHdU292hzFd0lJvpdRxGPKcNuJd60ymWI | ||||
hAgnkKY7dccnw+PvVKxq9QTV3fnOmDW2Y/ieXH8Wy9+Iorp9Pm17bxeqh+A9 | ||||
2KDUkeiUt/2unmxQPr0PYtCePK61XDt0ApPOGUi8/4OVPdXax+ecpdf81HRN | ||||
T3Jksj3yOCbdKGPjBVrjBBWqQfBCsmkhr/lAXdAEWNDHvCf5T2qv4NlyeA+M | ||||
aFcL1e9k0i/54JdXBMZ10lzpealuPHEuO5/0rbuIEUZPyefRMHN+1h3oeZpi | ||||
tvPuI7/z3QrEEKi7YQY+CaJGPycmk9e9EOq8/1YPzKhh/kgh2596axI9rtMI | ||||
9K47vtV1FLXC+Dcp34cv28296yB8FxRku1R3/a8YreS1E7SUgwjy/Hk/FD0/ | ||||
QfDRz11/nXT8uJfd+dwNvvlQAD7y/UeTZ2DOAoIfTpJJjrrX8BMcdY/P+SmO | ||||
ui8IUxx1XxCmOOo+GYreDOcPzVj4jw+7P/VFwE5UKERyodRI8OJDuBAqJAYk | ||||
8Qhj/E8XbbHFE+T3FlphNY3rSsrxFQU3fIVYcH0q3TlElfbIYUi499WW/nzC | ||||
X72ALbyUIuFwyd+TI8OZATydk3SZpTT3aRByqk4cJ+8Y6tTCxsZWMTI4lADb | ||||
pfmgNHVg7nirOg374Mc47OnO+cqU7rK3pT3wtXd0iUvsi0zaFynYQENoVthr | ||||
HG5zgGDBGTSia0/Desv+PKaY/Dkk39898CZza2+dxE6p5Ai+N7ngcTUhjPdP | ||||
aMscekqx2Y3u4MKmZKox+YJViF8TBM/wnhKiHsScu7pzimCEuHH+LtsK5/2X | ||||
U9sm4w0H7C9i2gnJm+tsU5DPiI1He2vwGIvvg6ZLQAJQEQhb9U8ndZ1MZoEN | ||||
phZsnvvrv1S89w5PwOn5plLEr9T4TLezYeNdG4kLwrXTSDkU07R+TXc45D4z | ||||
JBKBceEePO4LLWU/oUCiNgjPugEDxafulpBPUElTB6c350u8EAazZCH2y/M2 | ||||
j0OZp04awo1WKcdSG+2BxCTPAn5rVY9EaHRbhtohMXAjEOKJqIb3NZIqHizo | ||||
R2qV3tkqubVkPKrZG3U6qImJxvHxeDNWxgcDGLW6c+xnJqaHeqUxerQu8jQF | ||||
KX0IBbY7t2EX59vS/GUbLaFmmdCaotWa7fklaZKLR31nY09jqlBhJp0l2vvr | ||||
2t6M3tWfJ6WfTv2tkf2kDreK+tp0aF0mIhJzgGs/djowVVa921ambx1Shhq7 | ||||
a0xMUKlwRE0hD2vgyCY2UPMRy242udcrge8nBz148jb17kbCTcxg9dJrp1t5 | ||||
6UyeT3b5a01DqpvuvYppq14DeH/m/t1q7891J1aT22XRiwhJHuJUETm1sPt4 | ||||
cRZTIbkNLkgFAFnqA7CD4yvmuNfB1gJ4D2JpusZjhGTxaNFIusdf0EkEHUl9 | ||||
BS2dnrxqDyK5yf5vaosYAJJKHttiPHeWTXeKQ+DNt8Hi9So9WIdXrDKsIwRI | ||||
GxHAMDZV6Yb6Om3KmVCnQiRBfzwJMVFXmTDlYgT/sezT711H9sNlXeRnDS1U | ||||
65Im6Y8TuPjz6dlEj8mCiinJ9TK+kcvu9YgjPhvuy0jGm0tFSHwm9YlrkLoW | ||||
ittt7Hqdg0MGQtJLwY/uw1KDZkdNi5Ku2+6aUZYBUvOhJA8LaoCkHRw0xFtT | ||||
NIXoXVwwOpc/St0t+UUBpCt2Et+DPOeY9sW1lngfctJsNbQPHeKAnN1sx/J7 | ||||
CAb126ybinRIuPIpLJYeL/SnJOg+NpsliegK/9JAxXd+m7zunn2goxE1X9Ls | ||||
9Emi/MNyuyHrRn4/4UVP4wEGL3SRV5I765xrinAYk5QyGB+ThRMYenXL8Ryf | ||||
Dk7OJ76+Hkoy1RHosjYfF7DTHe5/9Yq8c+oXvxjQmap3KsOrsJAamXFVswse | ||||
ZQ7+d20K5EZ/jaY7CzeUj8Mecok9z4qzinzneKXXtu2fI7kN3ikXBflSWNJ1 | ||||
/i+S0N9nSI4v/fY755/MuwebJq+cZVMQL5zNrOZALFgP6gEN1+7GG8wIWoIb | ||||
SIoqTa71QSTXGQcw+uer8HQGH6/Cilm4WRf8CoPeP3vBlcYSG1+e7G+y8n/A | ||||
RW1IPRdg750tg4JjlhexO9If94xXV5PcknIC1ZmOZeUepfmXUCxL23Hp4s3g | ||||
e8WjSgKwqzjYXzVVL7OPh0Qd1odQrpHF4oWLsmhquse8AQKWdWjnA7dEJwFG | ||||
p7iJlTNULnTDGyuTHC/xB6a41Xqn8F7PiAOCS7E6hdABan9FQaQDN2OCU+Av | ||||
DfchvSliUE/xXgGeHkDJR40E3VnWnpqP4bnmW3a9bs3ZH8Db53ExbiDmO3WD | ||||
ZhKXORXb6n49BHsPkxvNH22B99cNIHJGDOmaJTfr2oiI8HogQgI4seL056a9 | ||||
j7azKMKmkxkB9mvviveX4bl4TXdk384N1Z4b1nRdiSm7Fy2LcPwwVRU+esRY | ||||
pAKlukJnbE16BeZFEvTaVMIl43yLZxZUyvCQ4qiW4OIHcvnl1WVPNYzf4npl | ||||
Jb3bW4AuQ21PjEXNI4BonazGYFpWJ3z3nvNtrJTpIQOpylt/UzptjJM3pmoK | ||||
lWsHuhf7n7Ljl/KyzCpQJq8x7i3BXH8pX9utQuf+G9usVKZMBS9V9RGUxUu1 | ||||
rwxo2fLW7r+Uf0VPf6vQSOCfMmm22oi/qKNyWzOT3+aHI/6tl70Jpoh2+ueX | ||||
2KFh8AjbT7ZQ+EZ5zM2BzyrYpQFT+9ICSBjLRweOPJaohC9fyG90+YvC88Pf | ||||
q6y5DefqTEVhFFWb1lpnS77J8md/aneMPNcg8fAD+FGNCoebD7Bwaj+4Lp+L | ||||
lZ0HSvdshEM2+B9tAT9wMGsAAA== | ||||
</rfc> | </rfc> | |||
End of changes. 92 change blocks. | ||||
549 lines changed or deleted | 314 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |