One document matched: draft-ietf-dots-use-cases-00.xml


<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
  <!ENTITY RFC2119 SYSTEM "http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>



<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
     please see http://xml.resource.org/authoring/README.html -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
     (Here they are set differently than their defaults in xml2rfc v1.35) -->

<!-- give errors regarding ID-nits and DTD validation -->
<?rfc strict="yes"?>

<!-- control the table of contents (ToC) -->
<!-- generate a ToC -->
<?rfc toc="yes"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<?rfc tocdepth="4"?>

<!-- control references -->
<!-- use anchors instead of numbers for refs, i.e, [RFC2119] instead of [1] -->
<?rfc symrefs="yes"?>
<!-- sort the reference entries alphabetically -->
<?rfc sortrefs="no" ?>

<!-- control vertical white space
     (using these PIs as follows is recommended by the RFC Editor) -->
<!-- do not start each main section on a new page -->
<?rfc compact="yes" ?>
<!-- "no" to keep one blank line between list items (rfced) -->
<?rfc subcompact="no" ?>

<!-- encourage use of "xml2rfc" tool -->
<?rfc rfcprocack="yes" ?>
<!-- end of list of popular I-D processing instructions -->

<rfc category="info" ipr="trust200902" docName="draft-ietf-dots-use-cases-00.txt">
  <front>
    <title abbrev="DOTS Use cases">Use cases for DDoS Open Threat Signaling</title>

     <author fullname="Roland Dobbins" initials="R." surname="Dobbins" role="editor">
     <organization>Arbor Networks</organization>
     <address>
     <postal>
     <street>30 Raffles Place</street>
	 <street>Level 17 Chevron House</street>
     <city>Singapore 048622</city>
     <country>Singapore</country>
     </postal>
     <email>rdobbins@arbor.net</email>
     </address>
     </author>

 
    <author fullname="Stephane Fouant" initials="S." surname="Fouant">
      <organization> Corero Network Security </organization>
      <address>
        <email> Stefan.Fouant@corero.com </email>
      </address>
    </author>

    <author fullname="Daniel Migault" initials="D." surname="Migault">
      <organization> Ericsson </organization>
      <address>
        <postal>
          <street> 8400 boulevard Decarie </street>
          <city> Montreal, QC </city>
          <code> H4P 2N2 </code>
          <country> Canada </country>
        </postal>
        <phone> +1 514-452-2160 </phone>
        <email> daniel.migault@ericsson.com </email>
      </address>
    </author>

    <author initials="R." surname="Moskowitz"
      fullname="Robert Moskowitz">
      <organization>HTT Consulting
      </organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park</city>
          <region>MI</region>
	<code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>

<author fullname="Nik Teague" initials="N." surname="Teague">  <organization>Verisign Inc</organization>  <address>  <postal>
 <street>12061 Bluemont Way</street>
 <city>Reston, VA 20190</city>
 <country>US</country>
 </postal>
<phone>+44 791 763 5384</phone>
 <email>nteague@verisign.com</email>
 </address>
 </author>


     <author fullname="Liang Xia" initials="L." surname="Xia">
        <organization>Huawei</organization>
        <address>
        <postal>
        <street>No. 101, Software Avenue, Yuhuatai District</street>
        <city>Nanjing</city>
        <country>China</country>
        </postal>
     <phone></phone>
        <email>Frank.xialiang@huawei.com</email>
        </address>
        </author>

    <date/> <!-- <date day="4" month="March" year="2015"/> -->
    <area> Security AREA </area>
    <workgroup> DOTS WG</workgroup>

    <abstract>
      <t>This document delineates principal and ancillary use cases for DDoS Open Threat Signaling (DOTS), a communications protocol intended to facilitate the programmatic, coordinated mitigation of Distributed Denial of Service (DDoS) attacks via a standards-based mechanism.  DOTS is purposely designed to support requests for DDoS mitigation services and status updates across inter-organizational administrative boundaries.</t>
    </abstract>

  </front>
  <middle>

        <section title="Requirements notation">
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>
        </section>

    <section title="Introduction" anchor="sec-intro">
    <t>Currently, distributed denial-of-service (DDoS) attack mitigation solutions/services are largely based upon siloed, proprietary communications paradigms which result in vendor/service lock-in, and as a side-effect make the configuration, provisioning, operation, and activation of these solutions a highly manual and often time-consuming process.  Additionally, coordination of multiple DDoS mitigation solutions/services simultaneously engaged in defending the same organization against DDoS attacks is fraught with both technical and process-related hurdles which greatly increase operational complexity and often result in suboptimal DDoS attack mitigation efficacy.</t>

    <t>The DDoS Open Threat Signaling (DOTS) effort is intended to facilitate interoperability between DDoS solutions/services by providing a standards-based, programmatic communications mechanism for the invitation and termination of heterogeneous DDoS attack mitigation systems and services.  This allows for a much higher degree of automation and concomitant efficacy and rapidity of DDoS attack mitigation involving multiple DDoS mitigation systems and services than is currently the norm, as well as providing additional benefits such as automatic DDoS mitigation service registration and provisioning.</t>

   <t>This document provides an overview of common DDoS mitigation system/service deployment and operational models which are in use today, but which are currently limited in scope to a single vendor and/or service provider and are often highly manual in nature, which can lead to miscommunications, misconfigurations, and delays in bringing mitigation services to bear against an attack.  The introduction of DOTS into these scenarios will reduce reaction times and the risks associated with manual processes, simplify the use of multiple types of DDoS mitigation systems and services as required, and make practical the simultaneous use multiple DDoS mitigation systems and services as circumstances warrant.</t>
    </section>

    <section title="Terminology and Acronyms">
    <t>This document makes use of the same terminology and definitions as [I-D.draft-ietf-dots-requirements], except where noted below:
        <list hangIndent="6" style="hanging">
            <t hangText="- DDoS: ">A distributed denial-of-service attack.  DDoS attacks are intended to cause a negative impact on the availability of servers, services, applications, and/or other functionality of an attack target.</t> 
            <t hangText="- Attack target: ">The intended target of a DDoS attack.</t> 
            <t hangText="- Attack telemetry: ">Collected network traffic characteristics enabling the detection, classification, and in many cases traceback of a DDoS attack.</t> 
            <t hangText="- Mitigation: ">A defensive response against a detected DDoS attack, performed by an entity in the network path between attack sources and the attack target, either through inline deployment or some form of traffic diversion, consisting of one or more countermeasures.  The form a given mitigation takes is out of scope for this document.</t> 
            <t hangText="- Countermeasure: ">An action or set of actions taken by a mitigator to evaluate and filter out a significant proportion of DDoS attack traffic while forwarding onwards a significant proportion of legitimate traffic directed towards an attack target.</t> 
       </list> 
     </t>
    </section>


    <section title="Use Cases">
    <t>This section provides a high-level overview of likely use cases and deployment scenarios for DOTS-enabled DDoS mitigation services.  It should be noted that DOTS servers may be standalone entities which, upon receiving a DOTS mitigation service request from a DOTS client, then initiate DDoS mitigation service by communicating directly or indirectly with DDoS mitigators, and likewise terminate the service upon receipt of a DOTS service termination request; conversely, the DDoS mitigators themselves may incorporate DOTS servers and/or DOTS clients.  The mechanisms by which DOTS servers initiate and terminate DDoS mitigation service with DDoS mitigators is beyond the scope of this document.</t>
    <t>All of the primary use cases described in this section are derived from current, real-world DDoS mitigation functionality, capabilities, and operational models which have been implemented in a largely proprietary manner by various DDoS mitigation solution vendor and/or service providers, resulting in vendor/service lock-in and mutually incompatible solutions/services.  The overarching goal of the DOTS effort is to provide a standards-based mechanism to allow heterogeneous DDoS mitigation solutions and services to be woven together in order to allow broader, more pervasive adoption of coordinated DDoS defense.</t>
    <t>The posited ancillary use cases described in this section are reasonable and highly desirable extrapolations of the functionality of baseline DOTS capabilities, and are readily attainable in the near term.</t>
    <t>Another important goal of DOTS is interoperability and coordination via a common standards-based mechanism between multiple DDoS mitigation service providers contemporaneously engaged in defending the same organization against DDoS attacks.  Each of the primary and ancillary use cases described in this section may be read as involving one or more DDoS mitigation service providers; DOTS makes multi-provider coordinated DDoS defenses much more effective and practical due to abstraction of the particulars of a given DDoS mitigation service/solution set.</t>
    <t>Both the primary and ancillary use cases may be facilitated by direct DOTS client - DOTS server communications or via DOTS relays deployed in order to aggregate DOTS mitigation service requests/responses, to mediate between stateless and stateful underlying transport protocols, to aggregate multiple DOTS requests and/or responses, to filter DOTS requests and/or responses via configured policy mechanisms, or some combination of these functions.</t>
    <t>These use cases requirements are intended to inform the DOTS requirements described in [I-D.draft-ietf-dots-requirements].</t>

    <section title="Primary Use Cases">

    <section title="Successful Automatic or Operator-Assisted CPE or PE Mitigators Request Upstream DDoS Mitigation Services">

    <t>In this scenario, one or more CPE or PE mitigators with DOTS client capabilities may be configured to signal to one or more DOTS servers in order to request upstream DDoS mitigation service initiation during an attack when DDoS attack volumes and/or attack characteristics exceed the capabilities of such CPE mitigators.  DDoS mitigation service may be terminated either automatically or manually via a DOTS mitigation service termination request initiated by the mitigator when it has been determined that the DDoS attack has ended.</t>
   <t>All DOTS messages exchanged between the DOTS clients and DOTS servers in this use case may be communicated directly between the DOTS clients and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.
    <list style="format (%c)">
    <t>A DDoS attack is initiated against online properties of an organization which has deployed DOTS-client-capable DDoS mitigators.</t>
    <t>CPE or PE DDoS mitigators detect, classify, and begin mitigating the DDoS attack.</t>
    <t>CPE or PE DDoS mitigators determine that their capacity and/or capability to mitigate the DDoS attack is insufficient, and utilize their DOTS client functionality to send a DOTS mitigation service initiation request to one or more DOTS servers residing on one or more upstream transit networks, peer networks, or overlay MSSP networks. The scope, format, and content of these messages must be codified by the DOTS WG. This DOTS mitigation service initiation request may be automatically initiated by the CPE or PE DDoS mitigators, or may be manually triggered by personnel of the requesting organization in response to an alert from the mitigators (the mechanism by which this process takes place is beyond the scope of this document).
</t>
   <t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been to honor requests from the requesting CPE or PE mitigators, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>
    <t>The DOTS servers transmit a DOTS service status message to the requesting CPE or PE mitigators indicating that upstream DDoS mitigation service has been initiated.</t>
    <t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the requesting CPE or PE mitigators. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
    <t>While DDoS mitigation services are active, the CPE or PE mitigators may optionally regularly transmit DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
   <t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the CPE or PE mitigators indicating that the DDoS attack has ceased. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE DDoS mitigators transmit a DOTS mitigation service termination request to the DOTS servers.  [The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service termination request may be automatically initiated by the CPE or PE DDoS mitigators, or may be manually triggered by personnel of the requesting organization in response to an alert from the mitigators or a management system which monitors them (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the CPE or PE mitigators indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE DDoS mitigators transmit a DOTS mitigation termination status acknowledgement to the DOTS servers.  [The scope, format, and content of these messages must be codified by the DOTS WG.]</t>
    </list>
    </t>
    </section>


    <section title="Successful Automatic or Operator-Assisted CPE or PE Network Infrastructure Element Request to Upstream Mitigator">
<t>In this scenario, CPE or PE network infrastructure elements such as routers, switches, load-balancers, firewalls, ‘IPSes’, etc. which have the capability to detect and classify DDoS attacks and which have DOTS client capabilities may be configured to signal to one or more DOTS servers in order to request upstream DDoS mitigation service initiation during an attack.  DDoS mitigation service may be terminated either automatically or manually via a DOTS mitigation service termination request initiated by the network element when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS clients and DOTS servers in this use case may be communicated directly between the DOTS clients and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>
<t>
    <list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization with DOTS-client-capable network infrastructure elements deployed.</t>

<t>The network infrastructure elements utilize their DOTS client functionality to send a DOTS mitigation service initiation request to one or more DOTS servers residing on one or more upstream transit networks, peer networks, or overlay MSSP networks, either directly or via intermediate DOTS relays residing upon the requesting organization’s network, the upstream mitigation provider’s network, or both. The scope, format, and content of these messages must be codified by the DOTS WG. This DOTS mitigation service initiation request may be automatically initiated by the network infrastructure elements, or may be manually triggered by personnel of the requesting organization in response to an alert from the network elements or a management system which monitors them (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been to honor requests from the requesting network infrastructure elements, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the requesting network infrastructure elements indicating that upstream DDoS mitigation service has been initiated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the requesting requesting network infrastructure elements. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the network infrastructure elements may optionally regularly transmit DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the network infrastructure elements indicating that the DDoS attack has ceased. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The network infrastructure elements transmit a DOTS mitigation service termination request to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG. This DOTS mitigation service termination request may be automatically initiated by the network infrastructure elements, or may be manually triggered by personnel of the requesting organization in response to an alert from the mitigators (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the network infrastructure elements indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The network infrastructure elements transmit a DOTS mitigation termination status acknowledgement to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t> 
</list>
</t>
    </section>


    <section title="Successful Automatic or Operator-Assisted CPE or PE Attack Telemetry Detection/Classification System Request to Upstream Mitigator">

<t>In this scenario, CPE or PE Attack Telemetry Detection/Classification Systems which have DOTS client capabilities may be configured so that upon detecting and classifying a DDoS attack, they signal one or more DOTS servers in order to request upstream DDoS mitigation service initiation.  DDoS mitigation service may be terminated either automatically or manually via a DOTS mitigation service termination request initiated by the Attack Telemetry Detection/Classification System when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS clients and DOTS servers in this use case may be communicated directly between the DOTS clients and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>

<t>
    <list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization with DOTS-client-capable CPE or PE Attack Telemetry Detection/Classification Systems deployed.</t>

<t>The CPE or PE Attack Telemetry Detection/Classification Systems utilize their DOTS client functionality to send a DOTS mitigation service initiation request to one or more DOTS servers residing on one or more upstream transit networks, peer networks, or overlay MSSP networks, either directly or via intermediate DOTS relays residing upon the requesting organization’s network, the upstream mitigation provider’s network, or both.  [The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service initiation request may be automatically initiated by the CPE or PE Attack Telemetry Detection/Classification Systems, or may be manually triggered by personnel of the requesting organization in response to an alert from the CPE or PE Attack Telemetry Detection/Classification Systems (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been to honor requests from the requesting CPE or PE Attack Telemetry Detection/Classification Systems, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the requesting CPE or PE Attack Telemetry Detection/Classification Systems indicating that upstream DDoS mitigation service has been initiated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the requesting CPE or PE Attack Telemetry Detection/Classification Systems. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the CPE or PE Attack Telemetry Detection/Classification Systems may optionally regularly transmit DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the CPE or PE Attack Telemetry Detection/Classification Systems indicating that the DDoS attack has ceased. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE Attack Telemetry Detection/Classification Systems transmit a DOTS mitigation service termination request to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG. This DOTS mitigation service termination request may be automatically initiated by the CPE or PE Attack Telemetry Detection/Classification Systems, or may be manually triggered by personnel of the requesting organization in response to an alert from the CPE or PE Attack Telemetry Detection/Classification Systems (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the CPE or PE Attack Telemetry Detection/Classification Systems indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE Attack Telemetry Detection/Classification Systems transmit a DOTS mitigation termination status acknowledgement to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
</list>
</t>
    </section>

      <section title="Successful Automatic or Operator-Assisted Targeted Service/Application Request to Upstream Mitigator">
  
<t>In this scenario, a service or application which is the target of a DDoS attack and which has the capability to detect and classify DDoS attacks (i.e, Apache mod_security <xref target="APACHE"/>, BIND RRL <xref target="RRL"/>, etc.) as well as DOTS client functionality may be configured so that upon detecting and classifying a DDoS attack, it signals one or more DOTS servers in order to request upstream DDoS mitigation service initiation.  DDoS mitigation service may be terminated either automatically or manually via a DOTS mitigation service termination request initiated by the service/application when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS clients and DOTS servers in this use case may be communicated directly between the DOTS clients and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>
<t>
    <list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization which include DOTS-client-capable services or applications that are the specific target(s) of the attack.</t>

<t>The targeted services or applications utilize their DOTS client functionality to send a DOTS mitigation service initiation request to one or more DOTS servers residing on the same network as the services or applications, one or more upstream transit networks, peer networks, or overlay MSSP networks, either directly or via intermediate DOTS relays residing upon the requesting organization’s network, the upstream mitigation provider’s network, or both. The scope, format, and content of these messages must be codified by the DOTS WG. This DOTS mitigation service initiation request may be automatically initiated by the targeted services or applications, or may be manually triggered by personnel of the requesting organization in response to an alert from the targeted services or applications or a system which monitors them (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been provisioned to honor requests from the requesting services or applications, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the services or applications indicating that upstream DDoS mitigation service has been initiated. [The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the requesting services or applications. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the requesting services or applications may optionally regularly transmit DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the requesting services or applications indicating that the DDoS attack has ceased. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The targeted services or applications transmit a DOTS mitigation service termination request to the DOTS servers.  [The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service termination request may be automatically initiated by the targeted services or applications, or may be manually triggered by personnel of the requesting organization in response to an alert from a system which monitors them (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the targeted services or applications indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The targeted services or applications transmit a DOTS mitigation termination status acknowledgement to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
</list>
</t>
   
      </section>

      <section title="Successful Manual Web Portal Request to Upstream Mitigator">

<t>In this scenario, a Web portal which has DOTS client capabilities has been configured in order to allow authorized personnel of organizations which are targeted by DDoS attacks to manually request upstream DDoS mitigation service initiation from a DOTS server.  When an organization has reason to believe that it is under active attack, authorized personnel may utilize the Web portal to manually initiate a DOTS client mitigation request to one or more DOTS servers.  DDoS mitigation service may be terminated manually via a DOTS mitigation service termination request through the Web portal when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS client and DOTS servers in this use case may be communicated directly between the DOTS client and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>

<t>
<list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization have access to a Web portal which incorporates DOTS client functionality and can generate DOTS mitigation service requests upon demand.</t>

<t>Authorized personnel utilize the Web portal to send a DOTS mitigation service initiation request to one or more upstream transit networks, peer networks, or overlay MSSP networks, either directly or via intermediate DOTS relays residing upon the requesting organization’s network, the upstream mitigation provider’s network, or both.  [The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service initiation request is manually triggered by personnel of the requesting organization when it is judged that the organization is under DDoS attack (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been provisioned to honor requests from the Web portal, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the Web portal indicating that upstream DDoS mitigation service has been initiated. [The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the Web portal. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the Web portal may optionally regularly transmit manually-triggered DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the Web portal indicating that the DDoS attack has ceased.  [The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The Web portal transmits a manually-triggered DOTS mitigation service termination request to the DOTS servers (the mechanism by which this process takes place is beyond the scope of this document). The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the Web portal indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The Web portal transmits a DOTS mitigation termination status acknowledgement to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
</list>
</t>
      </section>

      <section title="Successful Manual Mobile Device Application Request to Upstream Mitigator">

<t>In this scenario, an application for mobile devices such as smartphones and tablets which incorporates DOTS client capabilities has been made available to authorized personnel of an organization. When the organization has reason to believe that it is under active DDoS attack, authorized personnel may utilize the mobile device application to manually initiate a DOTS client mitigation request to one or more DOTS servers in order to initiate upstream DDoS mitigation services.  DDoS mitigation service may be terminated manually via a DOTS mitigation service termination request initiated through the mobile device application when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS client and DOTS servers in this use case may be communicated directly between the DOTS client and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>

<t>
<list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization have access to a Web portal which incorporates DOTS client functionality and can generate DOTS mitigation service requests upon demand.</t>

<t>Authorized personnel utilize the mobile application to send a DOTS mitigation service initiation request to one or more DOTS servers residing on the same network as the targeted Internet properties, one or more upstream transit networks, peer networks, or overlay MSSP networks, either directly or via intermediate DOTS relays residing upon the requesting organization’s network, the upstream mitigation provider’s network, or both.  [The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service initiation request is manually triggered by personnel of the requesting organization when it is judged that the organization is under DDoS attack (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been provisioned to honor requests from the mobile application, and initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the mobile application indicating that upstream DDoS mitigation service has been initiated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the DOTS servers regularly transmit DOTS mitigation status updates to the mobile application. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>While DDoS mitigation services are active, the mobile application may optionally regularly transmit manually-triggered DOTS mitigation efficacy updates to the relevant DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>When the upstream DDoS mitigators determine that the DDoS attack has ceased, they indicate this change in status to their respective DOTS servers (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the mobile application indicating that the DDoS attack has ceased. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The mobile application transmits a manually-triggered DOTS mitigation service termination request to the DOTS servers (the mechanism by which this process takes place is beyond the scope of this document). The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The DOTS servers terminate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS mitigation status update to the mobile application indicating that DDoS mitigation services have been terminated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The mobile application transmits a DOTS mitigation termination status acknowledgement to the DOTS servers. The scope, format, and content of these messages must be codified by the DOTS WG.</t>
</list>
</t>

      </section>

      <section title="Unsuccessful Automatic or Operator-Assisted CPE or PE Mitigators Request Upstream DDoS Mitigation Services">

<t>In this scenario, one or more CPE or PE mitigators with DOTS client capabilities may be configured to signal to one or more DOTS servers in order to request upstream DDoS mitigation service initiation during an attack when DDoS attack volumes and/or attack characteristics exceed the capabilities of such CPE mitigators.  DDoS mitigation service may be terminated either automatically or manually via a DOTS mitigation service termination request initiated by the mitigator when it has been determined that the DDoS attack has ended.</t>

<t>All DOTS messages exchanged between the DOTS clients and DOTS servers in this use case may be communicated directly between the DOTS clients and servers, or mediated by one or more DOTS relays residing on the network of the originating network, the network where upstream DDoS mitigation service takes place, an intervening network or networks, or some combination of the above.</t>

<t>
<list style="format (%c)">
<t>A DDoS attack is initiated against online properties of an organization which has deployed DOTS-client-capable DDoS mitigators.</t>

<t>CPE or PE DDoS mitigators detect, classify, and begin mitigating the DDoS attack.</t>

<t>CPE or PE DDoS mitigators determine that their capacity and/or capability to mitigate the DDoS attack is insufficient, and utilize their DOTS client functionality to send a DOTS mitigation service initiation request to one or more DOTS servers residing on one or more upstream transit networks, peer networks, or overlay MSSP networks. The scope, format, and content of these messages must be codified by the DOTS WG.] This DOTS mitigation service initiation request may be automatically initiated by the CPE or PE DDoS mitigators, or may be manually triggered by personnel of the requesting organization in response to an alert from the mitigators (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers which receive the DOTS mitigation service initiation requests determine that they have been to honor requests from the requesting CPE or PE mitigators, and attempt to initiate situationally-appropriate DDoS mitigation service on their respective networks (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DDoS mitigators on the upstream network report back to the DOTS servers that they are unable to initiate DDoS mitigation service for the requesting organization due to mitigation capacity constraints, bandwidth constraints, functionality constraints, hardware casualties, or other impediments (the mechanism by which this process takes place is beyond the scope of this document).</t>

<t>The DOTS servers transmit a DOTS service status message to the requesting CPE or PE mitigators indicating that upstream DDoS mitigation service cannot be initiated as requested. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE mitigators may optionally regularly re-transmit DOTS mitigation status request messages to the relevant DOTS servers until acknowledgement that mitigation services have been initiated. The scope, format, and content of these messages must be codified by the DOTS WG.</t>

<t>The CPE or PE mitigators may optionally transmit a DOTS mitigation service initiation request to DOTS servers associated with a configured fallback upstream DDoS mitigation service. The scope, format, and content of these messages must be codified by the DOTS WG. Multiple fallback DDoS mitigation services may optionally be configured.</t>

<t>The process describe above cyclically continues until the DDoS mitigation service request is fulfilled; the CPE or PE mitigators determine that the DDoS attack volume has decreased to a level and/or complexity which they themselves can successfully mitigate; the DDoS attack has ceased; or manual intervention by personnel of the requesting organization has taken place.</t>
</list>
</t>
      </section>
    </section>

    <section title="Ancillary Use Cases">

    <section title="Auto-registration of DOTS clients with DOTS servers">
            <t> An additional benefit of DOTS is that by utilizing agreed-upon authentication mechanisms, DOTS clients can automatically register for DDoS mitigation service with one or more upstream DOTS servers.  The details of such registration are beyond the scope of this document.</t>
    </section>
    <section title="Auto-provisioning of DDoS countermeasures">
         <t>The largely manual tasks associated with provisioning effective, situationally-appropriate DDoS countermeasures is a significant barrier to providing/obtaining DDoS mitigation services for both mitigation providers and mitigation recipients.  Due to the ‘self-descriptive’ nature of DOTS registration messages and mitigation requests, the implementation and deployment of DOTS has the potential to automate countermeasure selection and configuration for DDoS mitigators.  The details of such provisioning are beyond the scope of this document.</t>
    </section>

             <section title="Informational DDoS attack notification to interested and authorized third parties">
         <t>In addition to its primary role of providing a standardized, programmatic approach to the automated and/or operator-assisted request of DDoS mitigation services and providing status updates of those mitigations to requesters, DOTS may be utilized to notify security researchers, law enforcement agencies, regulatory bodies, etc. of DDoS attacks against attack targets, assuming that organizations making use of DOTS choose to share such third-party notifications, in keeping with all applicable laws, regulations, privacy and confidentiality considerations, and contractual agreements between DOTS users and said third parties.</t> 
        </section>
    </section>
    </section>




      <section title="Security Considerations">
        <t>DOTS is at risk from three primary attacks: DOTS agent impersonation, traffic injection, and signaling blocking. The DOTS protocol MUST be designed for minimal data transfer to address the blocking risk.</t>

<t>Impersonation and traffic injection mitigation can be managed through current secure communications best practices. DOTS is not subject to anything new in this area. One consideration could be to minimize the security technologies in use at any one time. The more needed, the greater the risk of failures coming from assumptions on one technology providing protection that it does not in the presence of another technology.</t>
      </section>

    <!-- section anchor="IANA" title="IANA Considerations" -->
    <section title="IANA Considerations">
      <t></t>
    </section>

    <!-- section anchor="Acknowledgments" title="Acknowledgments" -->
    <section title="Acknowledgments">
      <t>
      </t>
    </section>
  </middle>
  <back>
    <references title="Normative References">
           <?rfc include="reference.RFC.0768.xml"?>      
           <?rfc include="reference.RFC.0793.xml"?>      
           <?rfc include="reference.RFC.2119.xml"?>      
          <?rfc include="reference.RFC.1518.xml"?>      
          <?rfc include="reference.RFC.4632.xml"?>
    </references>

    <references title="Informative References">

   <reference anchor="APACHE" target="https://www.modsecurity.org">
        <front>
        <title>Apache mod_security</title>
        <author>
        <organization></organization>
        </author>
        <date/>
        </front>
    </reference>

   <reference anchor="RRL" target="https://deepthought.isc.org/article/AA-00994/0/Using-the-Response-Rate-Limiting-Feature-in-BIND-9.10.html">
        <front>
        <title>BIND RRL</title>
        <author>
        <organization></organization>
        </author>
        <date/>
        </front>
    </reference>





    </references>

  </back>
</rfc>

PAFTECH AB 2003-20262026-04-24 02:42:03