| < draft-ietf-dots-multihoming-04.txt | draft-ietf-dots-multihoming-05.txt > | |||
|---|---|---|---|---|
| Network Working Group M. Boucadair | Network Working Group M. Boucadair | |||
| Internet-Draft Orange | Internet-Draft Orange | |||
| Intended status: Standards Track T. Reddy | Intended status: Standards Track T. Reddy | |||
| Expires: November 30, 2020 McAfee | Expires: May 27, 2021 McAfee | |||
| W. Pan | W. Pan | |||
| Huawei Technologies | Huawei Technologies | |||
| May 29, 2020 | November 23, 2020 | |||
| Multi-homing Deployment Considerations for Distributed-Denial-of-Service | Multi-homing Deployment Considerations for Distributed-Denial-of-Service | |||
| Open Threat Signaling (DOTS) | Open Threat Signaling (DOTS) | |||
| draft-ietf-dots-multihoming-04 | draft-ietf-dots-multihoming-05 | |||
| Abstract | Abstract | |||
| This document discusses multi-homing considerations for Distributed- | This document discusses multi-homing considerations for Distributed- | |||
| Denial-of-Service Open Threat Signaling (DOTS). The goal is to | Denial-of-Service Open Threat Signaling (DOTS). The goal is to | |||
| provide some guidance for DOTS clients/gateways when multihomed. | provide some guidance for DOTS clients/gateways when multihomed. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on November 30, 2020. | This Internet-Draft will expire on May 27, 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 41 ¶ | skipping to change at page 2, line 41 ¶ | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 14 | 9.2. Informative References . . . . . . . . . . . . . . . . . 14 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
| 1. Introduction | 1. Introduction | |||
| In many deployments, it may not be possible for a network to | In many deployments, it may not be possible for a network to | |||
| determine the cause of a distributed Denial-of-Service (DoS) attack | determine the cause of a distributed Denial-of-Service (DoS) attack | |||
| [RFC4732]. Rather, the network may just realize that some resources | [RFC4732]. Rather, the network may just realize that some resources | |||
| seem to be under attack. To improve such situation, the IETF is | seem to be under attack. To improve such situation, the IETF is | |||
| specifying the DDoS Open Threat Signaling (DOTS) | specifying the DDoS Open Threat Signaling (DOTS) | |||
| [I-D.ietf-dots-architecture]architecture, where a DOTS client can | [RFC8811]architecture, where a DOTS client can inform a DOTS server | |||
| inform a DOTS server that the network is under a potential attack and | that the network is under a potential attack and that appropriate | |||
| that appropriate mitigation actions are required. Indeed, because | mitigation actions are required. Indeed, because the lack of a | |||
| the lack of a common method to coordinate a real-time response among | common method to coordinate a real-time response among involved | |||
| involved actors and network domains jeopardizes the efficiency of | actors and network domains jeopardizes the efficiency of DDoS attack | |||
| DDoS attack mitigation actions, the DOTS protocol is meant to carry | mitigation actions, the DOTS protocol is meant to carry requests for | |||
| requests for DDoS attack mitigation, thereby reducing the impact of | DDoS attack mitigation, thereby reducing the impact of an attack and | |||
| an attack and leading to more efficient responsive actions. | leading to more efficient responsive actions. | |||
| [I-D.ietf-dots-use-cases] identifies a set of scenarios for DOTS; | [I-D.ietf-dots-use-cases] identifies a set of scenarios for DOTS; | |||
| most of these scenarios involve a Customer Premises Equipment (CPE). | most of these scenarios involve a Customer Premises Equipment (CPE). | |||
| The high-level DOTS architecture is illustrated in Figure 1 | The high-level base DOTS architecture is illustrated in Figure 1 | |||
| ([I-D.ietf-dots-architecture]): | ([RFC8811]): | |||
| +-----------+ +-------------+ | +-----------+ +-------------+ | |||
| | Mitigator | ~~~~~~~~~~ | DOTS Server | | | Mitigator | ~~~~~~~~~~ | DOTS Server | | |||
| +-----------+ +-------------+ | +-----------+ +-------------+ | |||
| | | | | |||
| | | | | |||
| | | | | |||
| +---------------+ +-------------+ | +---------------+ +-------------+ | |||
| | Attack Target | ~~~~~~ | DOTS Client | | | Attack Target | ~~~~~~ | DOTS Client | | |||
| +---------------+ +-------------+ | +---------------+ +-------------+ | |||
| Figure 1: Basic DOTS Architecture | Figure 1: Basic DOTS Architecture | |||
| [I-D.ietf-dots-architecture] specifies that the DOTS client may be | [RFC8811] specifies that the DOTS client may be provided with a list | |||
| provided with a list of DOTS servers; each of these servers is | of DOTS servers; each of these servers is associated with one or more | |||
| associated with one or more IP addresses. These addresses may or may | IP addresses. These addresses may or may not be of the same address | |||
| not be of the same address family. The DOTS client establishes one | family. The DOTS client establishes one or more DOTS sessions by | |||
| or more DOTS sessions by connecting to the provided DOTS server(s) | connecting to the provided DOTS server(s) addresses. | |||
| addresses. | ||||
| DOTS may be deployed within networks that are connected to one single | DOTS may be deployed within networks that are connected to one single | |||
| upstream provider. It can also be enabled within networks that are | upstream provider. It can also be enabled within networks that are | |||
| multi-homed. The reader may refer to [RFC3582] for an overview of | multi-homed. The reader may refer to [RFC3582] for an overview of | |||
| multi-homing goals and motivations. This document discusses DOTS | multi-homing goals and motivations. This document discusses DOTS | |||
| multi-homing considerations. Specifically, the document aims to: | multi-homing considerations. Specifically, the document aims to: | |||
| 1. Complete the base DOTS architecture with multi-homing specifics. | 1. Complete the base DOTS architecture with multi-homing specifics. | |||
| Those specifics need to be taken into account because: | Those specifics need to be taken into account because: | |||
| skipping to change at page 4, line 25 ¶ | skipping to change at page 4, line 25 ¶ | |||
| * One vs. multiple interconnect routers | * One vs. multiple interconnect routers | |||
| * Provider-Independent (PI) vs. Provider-Aggregatable (PA) IP | * Provider-Independent (PI) vs. Provider-Aggregatable (PA) IP | |||
| addresses | addresses | |||
| o Describe the recommended behavior of DOTS clients and gateways for | o Describe the recommended behavior of DOTS clients and gateways for | |||
| each case. | each case. | |||
| Multi-homed DOTS agents are assumed to make use of the protocols | Multi-homed DOTS agents are assumed to make use of the protocols | |||
| defined in [I-D.ietf-dots-signal-channel] and | defined in [RFC8782] and [RFC8783]; no specific extension is required | |||
| [I-D.ietf-dots-data-channel]; no specific extension is required to | to the base DOTS protocols for deploying DOTS in a multi-homed | |||
| the base DOTS protocols for deploying DOTS in a multi-homed context. | context. | |||
| 2. Requirements Language | 2. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119][RFC8174] when, and only when, they appear in all | 14 [RFC2119][RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 3. Terminology | 3. Terminology | |||
| This document makes use of the terms defined in | This document makes use of the terms defined in [RFC8811] and | |||
| [I-D.ietf-dots-architecture] and [RFC4116]. | [RFC4116]. | |||
| IP indifferently refers to IPv4 or IPv6. | IP indifferently refers to IPv4 or IPv6. | |||
| 4. Multi-Homing Scenarios | 4. Multi-Homing Scenarios | |||
| This section describes some multi-homing scenarios that are relevant | This section describes some multi-homing scenarios that are relevant | |||
| to DOTS. In the following sub-sections, only the connections of | to DOTS. In the following sub-sections, only the connections of | |||
| border routers are shown; internal network topologies are not | border routers are shown; internal network topologies are not | |||
| elaborated. | elaborated. | |||
| skipping to change at page 13, line 16 ¶ | skipping to change at page 13, line 16 ¶ | |||
| servers need to coordinate when a mitigation action is received | servers need to coordinate when a mitigation action is received | |||
| from the enterprise network. | from the enterprise network. | |||
| In both cases, DOTS agents enabled within the enterprise network MAY | In both cases, DOTS agents enabled within the enterprise network MAY | |||
| decide to select one or all network attachments to send DOTS | decide to select one or all network attachments to send DOTS | |||
| mitigation requests. | mitigation requests. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| DOTS-related security considerations are discussed in Section 4 of | DOTS-related security considerations are discussed in Section 4 of | |||
| [I-D.ietf-dots-architecture]. | [RFC8811]. | |||
| DOTS clients should control the information that they share with peer | DOTS clients should control the information that they share with peer | |||
| DOTS servers. For example, if a DOTS client maintains DOTS | DOTS servers. For example, if a DOTS client maintains DOTS | |||
| associations with specific DOTS servers per interconnection link, the | associations with specific DOTS servers per interconnection link, the | |||
| DOTS client should not leak information specific to a given link to | DOTS client should not leak information specific to a given link to | |||
| DOTS servers not authorized to mitigate attacks received on that | DOTS servers not authorized to mitigate attacks received on that | |||
| link. Whether this constraint is relaxed is deployment specific and | link. Whether this constraint is relaxed is deployment specific and | |||
| must be subject to explicit consent from the DOTS client domain | must be subject to explicit consent from the DOTS client domain | |||
| administrator. | administrator. | |||
| skipping to change at page 13, line 42 ¶ | skipping to change at page 13, line 42 ¶ | |||
| Thanks to Roland Dobbins, Nik Teague, Jon Shallow, Dan Wing, and | Thanks to Roland Dobbins, Nik Teague, Jon Shallow, Dan Wing, and | |||
| Christian Jacquenet for sharing their comments on the mailing list. | Christian Jacquenet for sharing their comments on the mailing list. | |||
| Thanks to Kirill Kasavchenko for the comments. | Thanks to Kirill Kasavchenko for the comments. | |||
| 9. References | 9. References | |||
| 9.1. Normative References | 9.1. Normative References | |||
| [I-D.ietf-dots-architecture] | ||||
| Mortensen, A., Reddy.K, T., Andreasen, F., Teague, N., and | ||||
| R. Compton, "Distributed-Denial-of-Service Open Threat | ||||
| Signaling (DOTS) Architecture", draft-ietf-dots- | ||||
| architecture-18 (work in progress), March 2020. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, | [RFC6724] Thaler, D., Ed., Draves, R., Matsumoto, A., and T. Chown, | |||
| "Default Address Selection for Internet Protocol Version 6 | "Default Address Selection for Internet Protocol Version 6 | |||
| (IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012, | (IPv6)", RFC 6724, DOI 10.17487/RFC6724, September 2012, | |||
| <https://www.rfc-editor.org/info/rfc6724>. | <https://www.rfc-editor.org/info/rfc6724>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 9.2. Informative References | [RFC8811] Mortensen, A., Ed., Reddy.K, T., Ed., Andreasen, F., | |||
| Teague, N., and R. Compton, "DDoS Open Threat Signaling | ||||
| (DOTS) Architecture", RFC 8811, DOI 10.17487/RFC8811, | ||||
| August 2020, <https://www.rfc-editor.org/info/rfc8811>. | ||||
| [I-D.ietf-dots-data-channel] | 9.2. Informative References | |||
| Boucadair, M. and T. Reddy.K, "Distributed Denial-of- | ||||
| Service Open Threat Signaling (DOTS) Data Channel | ||||
| Specification", draft-ietf-dots-data-channel-31 (work in | ||||
| progress), July 2019. | ||||
| [I-D.ietf-dots-server-discovery] | [I-D.ietf-dots-server-discovery] | |||
| Boucadair, M. and T. Reddy.K, "Distributed-Denial-of- | Boucadair, M. and T. Reddy.K, "Distributed-Denial-of- | |||
| Service Open Threat Signaling (DOTS) Agent Discovery", | Service Open Threat Signaling (DOTS) Agent Discovery", | |||
| draft-ietf-dots-server-discovery-10 (work in progress), | draft-ietf-dots-server-discovery-15 (work in progress), | |||
| February 2020. | November 2020. | |||
| [I-D.ietf-dots-signal-channel] | ||||
| Reddy.K, T., Boucadair, M., Patil, P., Mortensen, A., and | ||||
| N. Teague, "Distributed Denial-of-Service Open Threat | ||||
| Signaling (DOTS) Signal Channel Specification", draft- | ||||
| ietf-dots-signal-channel-41 (work in progress), January | ||||
| 2020. | ||||
| [I-D.ietf-dots-use-cases] | [I-D.ietf-dots-use-cases] | |||
| Dobbins, R., Migault, D., Moskowitz, R., Teague, N., Xia, | Dobbins, R., Migault, D., Moskowitz, R., Teague, N., Xia, | |||
| L., and K. Nishizuka, "Use cases for DDoS Open Threat | L., and K. Nishizuka, "Use cases for DDoS Open Threat | |||
| Signaling", draft-ietf-dots-use-cases-21 (work in | Signaling", draft-ietf-dots-use-cases-25 (work in | |||
| progress), May 2020. | progress), July 2020. | |||
| [RFC3582] Abley, J., Black, B., and V. Gill, "Goals for IPv6 Site- | [RFC3582] Abley, J., Black, B., and V. Gill, "Goals for IPv6 Site- | |||
| Multihoming Architectures", RFC 3582, | Multihoming Architectures", RFC 3582, | |||
| DOI 10.17487/RFC3582, August 2003, | DOI 10.17487/RFC3582, August 2003, | |||
| <https://www.rfc-editor.org/info/rfc3582>. | <https://www.rfc-editor.org/info/rfc3582>. | |||
| [RFC4116] Abley, J., Lindqvist, K., Davies, E., Black, B., and V. | [RFC4116] Abley, J., Lindqvist, K., Davies, E., Black, B., and V. | |||
| Gill, "IPv4 Multihoming Practices and Limitations", | Gill, "IPv4 Multihoming Practices and Limitations", | |||
| RFC 4116, DOI 10.17487/RFC4116, July 2005, | RFC 4116, DOI 10.17487/RFC4116, July 2005, | |||
| <https://www.rfc-editor.org/info/rfc4116>. | <https://www.rfc-editor.org/info/rfc4116>. | |||
| skipping to change at page 15, line 20 ¶ | skipping to change at page 15, line 5 ¶ | |||
| [RFC7556] Anipko, D., Ed., "Multiple Provisioning Domain | [RFC7556] Anipko, D., Ed., "Multiple Provisioning Domain | |||
| Architecture", RFC 7556, DOI 10.17487/RFC7556, June 2015, | Architecture", RFC 7556, DOI 10.17487/RFC7556, June 2015, | |||
| <https://www.rfc-editor.org/info/rfc7556>. | <https://www.rfc-editor.org/info/rfc7556>. | |||
| [RFC8043] Sarikaya, B. and M. Boucadair, "Source-Address-Dependent | [RFC8043] Sarikaya, B. and M. Boucadair, "Source-Address-Dependent | |||
| Routing and Source Address Selection for IPv6 Hosts: | Routing and Source Address Selection for IPv6 Hosts: | |||
| Overview of the Problem Space", RFC 8043, | Overview of the Problem Space", RFC 8043, | |||
| DOI 10.17487/RFC8043, January 2017, | DOI 10.17487/RFC8043, January 2017, | |||
| <https://www.rfc-editor.org/info/rfc8043>. | <https://www.rfc-editor.org/info/rfc8043>. | |||
| [RFC8782] Reddy.K, T., Ed., Boucadair, M., Ed., Patil, P., | ||||
| Mortensen, A., and N. Teague, "Distributed Denial-of- | ||||
| Service Open Threat Signaling (DOTS) Signal Channel | ||||
| Specification", RFC 8782, DOI 10.17487/RFC8782, May 2020, | ||||
| <https://www.rfc-editor.org/info/rfc8782>. | ||||
| [RFC8783] Boucadair, M., Ed. and T. Reddy.K, Ed., "Distributed | ||||
| Denial-of-Service Open Threat Signaling (DOTS) Data | ||||
| Channel Specification", RFC 8783, DOI 10.17487/RFC8783, | ||||
| May 2020, <https://www.rfc-editor.org/info/rfc8783>. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Mohamed Boucadair | Mohamed Boucadair | |||
| Orange | Orange | |||
| Rennes 35000 | Rennes 35000 | |||
| France | France | |||
| Email: mohamed.boucadair@orange.com | Email: mohamed.boucadair@orange.com | |||
| Tirumaleswar Reddy | Tirumaleswar Reddy | |||
| End of changes. 16 change blocks. | ||||
| 49 lines changed or deleted | 45 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||