rfc8973v2.txt   rfc8973.txt 
skipping to change at line 98 skipping to change at line 98
DDoS Open Threat Signaling (DOTS) [RFC8811] specifies an architecture DDoS Open Threat Signaling (DOTS) [RFC8811] specifies an architecture
in which a DOTS client can inform a DOTS server that the network is in which a DOTS client can inform a DOTS server that the network is
under a potential attack and that appropriate mitigation actions are under a potential attack and that appropriate mitigation actions are
required. Indeed, because the lack of a common method to coordinate required. Indeed, because the lack of a common method to coordinate
a real-time response among involved actors and network domains a real-time response among involved actors and network domains
inhibits the effectiveness of DDoS attack mitigation, the DOTS signal inhibits the effectiveness of DDoS attack mitigation, the DOTS signal
channel protocol [RFC8782] is meant to carry requests for DDoS attack channel protocol [RFC8782] is meant to carry requests for DDoS attack
mitigation. With this approach, DOTS can reduce the impact of an mitigation. With this approach, DOTS can reduce the impact of an
attack and lead to more efficient defensive actions in various attack and lead to more efficient defensive actions in various
deployment scenarios, such as those discussed in [RFC8903]. deployment scenarios, such as those discussed in [DOTS-USE-CASES].
Moreover, DOTS clients can instruct a DOTS server to install named Moreover, DOTS clients can instruct a DOTS server to install named
filtering rules by means of the DOTS data channel protocol [RFC8783]. filtering rules by means of the DOTS data channel protocol [RFC8783].
The basic high-level DOTS architecture is illustrated in Figure 1. The basic high-level DOTS architecture is illustrated in Figure 1.
+-----------+ +-------------+ +-----------+ +-------------+
| Mitigator | ~~~~~~~~~~ | DOTS Server | | Mitigator | ~~~~~~~~~~ | DOTS Server |
+-----------+ +------+------+ +-----------+ +------+------+
| |
| |
skipping to change at line 195 skipping to change at line 195
DOTS agent: is any DOTS-aware software module capable of DOTS agent: is any DOTS-aware software module capable of
participating in a DOTS channel. participating in a DOTS channel.
Peer DOTS agent: refers to the peer DOTS server (base DOTS Peer DOTS agent: refers to the peer DOTS server (base DOTS
operation) or to a peer Call Home DOTS client (for DOTS signal operation) or to a peer Call Home DOTS client (for DOTS signal
channel Call Home). channel Call Home).
3. Why Multiple Discovery Mechanisms? 3. Why Multiple Discovery Mechanisms?
Analysis of the various use cases sketched in [RFC8903] reveals that Analysis of the various use cases sketched in [DOTS-USE-CASES]
it is unlikely that one single discovery method can be suitable for reveals that it is unlikely that one single discovery method can be
all the sample deployments. Concretely: suitable for all the sample deployments. Concretely:
* Many of the use cases discussed in [RFC8903] do involve Customer * Many of the use cases discussed in [DOTS-USE-CASES] do involve
Premises Equipment (CPE). Multiple CPEs connected to distinct Customer Premises Equipment (CPE). Multiple CPEs connected to
network providers may even be considered. It is intuitive to distinct network providers may even be considered. It is
leverage existing mechanisms, such as discovery using service intuitive to leverage existing mechanisms, such as discovery using
resolution or DHCP, to provision the CPE acting as a DOTS client service resolution or DHCP, to provision the CPE acting as a DOTS
with the DOTS server(s). client with the DOTS server(s).
* Resolving a DOTS server domain name offered by an upstream transit * Resolving a DOTS server domain name offered by an upstream transit
provider provisioned to a DOTS client into IP address(es) requires provider provisioned to a DOTS client into IP address(es) requires
the use of the appropriate DNS resolvers; otherwise, resolving the use of the appropriate DNS resolvers; otherwise, resolving
those names will fail. The use of protocols, such as DHCP, does those names will fail. The use of protocols, such as DHCP, does
allow associating provisioned DOTS server domain names with a list allow associating provisioned DOTS server domain names with a list
of DNS servers to be used for name resolution. Furthermore, DHCP of DNS servers to be used for name resolution. Furthermore, DHCP
allows for directly providing IP addresses, therefore, avoiding allows for directly providing IP addresses, therefore, avoiding
the need for extra lookup delays. the need for extra lookup delays.
skipping to change at line 1062 skipping to change at line 1062
dots-multihoming-05>. dots-multihoming-05>.
[DOTS-SIG-CALL-HOME] [DOTS-SIG-CALL-HOME]
Reddy, T., Boucadair, M., and J. Shallow, "Distributed Reddy, T., Boucadair, M., and J. Shallow, "Distributed
Denial-of-Service Open Threat Signaling (DOTS) Signal Denial-of-Service Open Threat Signaling (DOTS) Signal
Channel Call Home", Work in Progress, Internet-Draft, Channel Call Home", Work in Progress, Internet-Draft,
draft-ietf-dots-signal-call-home-12, 23 December 2020, draft-ietf-dots-signal-call-home-12, 23 December 2020,
<https://tools.ietf.org/html/draft-ietf-dots-signal-call- <https://tools.ietf.org/html/draft-ietf-dots-signal-call-
home-12>. home-12>.
[DOTS-USE-CASES]
Dobbins, R., Migault, D., Moskowitz, R., Teague, N., Xia,
L., and K. Nishizuka, "Use cases for DDoS Open Threat
Signaling", Work in Progress, Internet-Draft, draft-ietf-
dots-use-cases-25, 5 July 2020,
<https://tools.ietf.org/html/draft-ietf-dots-use-cases-
25>.
[RFC2136] Vixie, P., Ed., Thomson, S., Rekhter, Y., and J. Bound, [RFC2136] Vixie, P., Ed., Thomson, S., Rekhter, Y., and J. Bound,
"Dynamic Updates in the Domain Name System (DNS UPDATE)", "Dynamic Updates in the Domain Name System (DNS UPDATE)",
RFC 2136, DOI 10.17487/RFC2136, April 1997, RFC 2136, DOI 10.17487/RFC2136, April 1997,
<https://www.rfc-editor.org/info/rfc2136>. <https://www.rfc-editor.org/info/rfc2136>.
[RFC3007] Wellington, B., "Secure Domain Name System (DNS) Dynamic [RFC3007] Wellington, B., "Secure Domain Name System (DNS) Dynamic
Update", RFC 3007, DOI 10.17487/RFC3007, November 2000, Update", RFC 3007, DOI 10.17487/RFC3007, November 2000,
<https://www.rfc-editor.org/info/rfc3007>. <https://www.rfc-editor.org/info/rfc3007>.
[RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S. [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
skipping to change at line 1113 skipping to change at line 1121
[RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed [RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed
Denial-of-Service Open Threat Signaling (DOTS) Data Denial-of-Service Open Threat Signaling (DOTS) Data
Channel Specification", RFC 8783, DOI 10.17487/RFC8783, Channel Specification", RFC 8783, DOI 10.17487/RFC8783,
May 2020, <https://www.rfc-editor.org/info/rfc8783>. May 2020, <https://www.rfc-editor.org/info/rfc8783>.
[RFC8811] Mortensen, A., Ed., Reddy.K, T., Ed., Andreasen, F., [RFC8811] Mortensen, A., Ed., Reddy.K, T., Ed., Andreasen, F.,
Teague, N., and R. Compton, "DDoS Open Threat Signaling Teague, N., and R. Compton, "DDoS Open Threat Signaling
(DOTS) Architecture", RFC 8811, DOI 10.17487/RFC8811, (DOTS) Architecture", RFC 8811, DOI 10.17487/RFC8811,
August 2020, <https://www.rfc-editor.org/info/rfc8811>. August 2020, <https://www.rfc-editor.org/info/rfc8811>.
[RFC8903] Dobbins, R., Migault, D., Moskowitz, R., Teague, N., Xia,
L., and K. Nishizuka, "Use Cases for DDoS Open Threat
Signaling", RFC 8903, DOI 10.17487/RFC8903, December 2020,
<https://www.rfc-editor.org/info/rfc8903>.
Acknowledgements Acknowledgements
Thanks to Brian Carpenter for the review of the Bootstrapping Remote Thanks to Brian Carpenter for the review of the Bootstrapping Remote
Secure Key Infrastructure (BRSKI) text used in previous draft Secure Key Infrastructure (BRSKI) text used in previous draft
versions of the specification. versions of the specification.
Many thanks to Russ White for the review, comments, and text Many thanks to Russ White for the review, comments, and text
contribution. contribution.
Thanks to Dan Wing, Pei Wei, Valery Smyslov, and Jon Shallow for the Thanks to Dan Wing, Pei Wei, Valery Smyslov, and Jon Shallow for the
 End of changes. 5 change blocks. 
15 lines changed or deleted 18 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/