rfc9066v4.txt   rfc9066.txt 
Internet Engineering Task Force (IETF) T. Reddy.K Internet Engineering Task Force (IETF) T. Reddy.K
Request for Comments: 9066 Akamai Request for Comments: 9066 Akamai
Category: Standards Track M. Boucadair, Ed. Category: Standards Track M. Boucadair, Ed.
ISSN: 2070-1721 Orange ISSN: 2070-1721 Orange
J. Shallow J. Shallow
October 2021 November 2021
Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal
Channel Call Home Channel Call Home
Abstract Abstract
This document specifies the Denial-of-Service Open Threat Signaling This document specifies the Denial-of-Service Open Threat Signaling
(DOTS) signal channel Call Home, which enables a Call Home DOTS (DOTS) signal channel Call Home, which enables a Call Home DOTS
server to initiate a secure connection to a Call Home DOTS client and server to initiate a secure connection to a Call Home DOTS client and
to receive attack traffic information from the Call Home DOTS client. to receive attack traffic information from the Call Home DOTS client.
skipping to change at line 51 skipping to change at line 51
Copyright (c) 2021 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Revised BSD License text as described in Section 4.e of the
the Trust Legal Provisions and are provided without warranty as Trust Legal Provisions and are provided without warranty as described
described in the Simplified BSD License. in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction 1. Introduction
2. Terminology 2. Terminology
3. Applicability Scope 3. Applicability Scope
4. Coexistence of a Base DOTS Signal Channel and DOTS Call Home 4. Coexistence of a Base DOTS Signal Channel and DOTS Call Home
5. DOTS Signal Channel Call Home 5. DOTS Signal Channel Call Home
5.1. Procedure 5.1. Procedure
5.2. DOTS Signal Channel Variations 5.2. DOTS Signal Channel Variations
skipping to change at line 249 skipping to change at line 249
"DDoS Mitigation System (DMS)" refers to a system that performs DDoS "DDoS Mitigation System (DMS)" refers to a system that performs DDoS
mitigation. mitigation.
"Base DOTS signal channel" refers to [RFC9132]. "Base DOTS signal channel" refers to [RFC9132].
The meaning of the symbols in YANG tree diagrams are defined in The meaning of the symbols in YANG tree diagrams are defined in
[RFC8340] and [RFC8791]. [RFC8340] and [RFC8791].
(D)TLS is used for statements that apply to both Transport Layer (D)TLS is used for statements that apply to both Transport Layer
Security (TLS) [RFC8446] and Datagram Transport Layer Security (DTLS) Security (TLS) [RFC8446] and Datagram Transport Layer Security (DTLS)
[RFC9147]. Specific terms are used for any statement that applies to [RFC6347] [DTLS13]. Specific terms are used for any statement that
either protocol alone. applies to either protocol alone.
3. Applicability Scope 3. Applicability Scope
The problems discussed in Section 1 may be encountered in many The problems discussed in Section 1 may be encountered in many
deployments (e.g., home networks, enterprise networks, transit deployments (e.g., home networks, enterprise networks, transit
networks, data centers). The solution specified in this document can networks, data centers). The solution specified in this document can
be used for those deployments to block DDoS attack traffic closer to be used for those deployments to block DDoS attack traffic closer to
the source(s) of the attack. That is, attacks that are issued, e.g., the source(s) of the attack. That is, attacks that are issued, e.g.,
from within an enterprise network or a data center will thus be from within an enterprise network or a data center will thus be
blocked before exiting these networks. blocked before exiting these networks.
skipping to change at line 1450 skipping to change at line 1450
[RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X. [RFC6052] Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and X.
Li, "IPv6 Addressing of IPv4/IPv6 Translators", RFC 6052, Li, "IPv6 Addressing of IPv4/IPv6 Translators", RFC 6052,
DOI 10.17487/RFC6052, October 2010, DOI 10.17487/RFC6052, October 2010,
<https://www.rfc-editor.org/info/rfc6052>. <https://www.rfc-editor.org/info/rfc6052>.
[RFC6146] Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful [RFC6146] Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful
NAT64: Network Address and Protocol Translation from IPv6 NAT64: Network Address and Protocol Translation from IPv6
Clients to IPv4 Servers", RFC 6146, DOI 10.17487/RFC6146, Clients to IPv4 Servers", RFC 6146, DOI 10.17487/RFC6146,
April 2011, <https://www.rfc-editor.org/info/rfc6146>. April 2011, <https://www.rfc-editor.org/info/rfc6146>.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
January 2012, <https://www.rfc-editor.org/info/rfc6347>.
[RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", [RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types",
RFC 6991, DOI 10.17487/RFC6991, July 2013, RFC 6991, DOI 10.17487/RFC6991, July 2013,
<https://www.rfc-editor.org/info/rfc6991>. <https://www.rfc-editor.org/info/rfc6991>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
skipping to change at line 1472 skipping to change at line 1476
[RFC8791] Bierman, A., Björklund, M., and K. Watsen, "YANG Data [RFC8791] Bierman, A., Björklund, M., and K. Watsen, "YANG Data
Structure Extensions", RFC 8791, DOI 10.17487/RFC8791, Structure Extensions", RFC 8791, DOI 10.17487/RFC8791,
June 2020, <https://www.rfc-editor.org/info/rfc8791>. June 2020, <https://www.rfc-editor.org/info/rfc8791>.
[RFC9132] Boucadair, M., Ed., Shallow, J., and T. Reddy.K, [RFC9132] Boucadair, M., Ed., Shallow, J., and T. Reddy.K,
"Distributed Denial-of-Service Open Threat Signaling "Distributed Denial-of-Service Open Threat Signaling
(DOTS) Signal Channel Specification", RFC 9132, (DOTS) Signal Channel Specification", RFC 9132,
DOI 10.17487/RFC9132, September 2021, DOI 10.17487/RFC9132, September 2021,
<https://www.rfc-editor.org/info/rfc9132>. <https://www.rfc-editor.org/info/rfc9132>.
[RFC9147] Rescorla, E., Tschofenig, H., and N. Modadugu, "The
Datagram Transport Layer Security (DTLS) Protocol Version
1.3", RFC 9147, DOI 10.17487/RFC9147, 30 April 2021,
<https://www.rfc-editor.org/rfc/rfc9147>.
10.2. Informative References 10.2. Informative References
[Cause] IANA, "DOTS Signal Channel Conflict Cause Codes", [Cause] IANA, "DOTS Signal Channel Conflict Cause Codes",
<https://www.iana.org/assignments/dots/>. <https://www.iana.org/assignments/dots/>.
[DOTS-MULTIHOMING] [DOTS-MULTIHOMING]
Boucadair, M., Reddy, T., and W. Pan, "Multi-homing Boucadair, M., Reddy, T., and W. Pan, "Multi-homing
Deployment Considerations for Distributed-Denial-of- Deployment Considerations for Distributed-Denial-of-
Service Open Threat Signaling (DOTS)", Work in Progress, Service Open Threat Signaling (DOTS)", Work in Progress,
Internet-Draft, draft-ietf-dots-multihoming-07, 6 July Internet-Draft, draft-ietf-dots-multihoming-09, 2 December
2021, <https://datatracker.ietf.org/doc/html/draft-ietf- 2021, <https://datatracker.ietf.org/doc/html/draft-ietf-
dots-multihoming-07>. dots-multihoming-09>.
[DTLS13] Rescorla, E., Tschofenig, H., and N. Modadugu, "The
Datagram Transport Layer Security (DTLS) Protocol Version
1.3", Work in Progress, Internet-Draft, draft-ietf-tls-
dtls13-43, 30 April 2021,
<https://datatracker.ietf.org/doc/html/draft-ietf-tls-
dtls13-43>.
[I2NSF-TERMS] [I2NSF-TERMS]
Hares, S., Strassner, J., Lopez, D. R., Xia, L., and H. Hares, S., Strassner, J., Lopez, D. R., Xia, L., and H.
Birkholz, "Interface to Network Security Functions (I2NSF) Birkholz, "Interface to Network Security Functions (I2NSF)
Terminology", Work in Progress, Internet-Draft, draft- Terminology", Work in Progress, Internet-Draft, draft-
ietf-i2nsf-terminology-08, 5 July 2019, ietf-i2nsf-terminology-08, 5 July 2019,
<https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf- <https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-
terminology-08>. terminology-08>.
[Key-Map] IANA, "DOTS Signal Channel CBOR Key Values", [Key-Map] IANA, "DOTS Signal Channel CBOR Key Values",
 End of changes. 7 change blocks. 
13 lines changed or deleted 19 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/