Skip to main content

DDoS Open Threat Signaling
charter-ietf-dots-00-01

The information below is for an older proposed charter
Document Proposed charter DDoS Open Threat Signaling WG (dots) Snapshot
Title DDoS Open Threat Signaling
Last updated 2015-06-04
State Start Chartering/Rechartering (Internal Steering Group/IAB Review)
WG State Proposed
IESG Responsible AD Paul Wouters
Charter edit AD Kathleen Moriarty
Send notices to (None)

charter-ietf-dots-00-01

The aim of DDoS Open Threat Signaling (DOTS) is to develop a standards
based approach for the realtime signaling of DDoS related telemetry and
threat handling requests and data between elements concerned with DDoS
attack detection, classification, traceback, and mitigation.

The elements may be described as:
* On-premise DDoS mitigation platforms
* Service provider DDoS mitigation platforms
* Other network elements and services with the ability to analyze and/or
influence network traffic

Elements may participate in DDoS detection, classification, traceback and
mitigation individually or within the context of a larger collaborative
system.

These elements may be communicating inter-domain or intra-domain over
links that may be congested by attack traffic resulting in hostile
conditions for connection oriented approaches and more generalized
signaling and telemetry solutions. Robustness under these conditions is
paramount while ensuring appropriate regard for authentication,
authorization, privacy and data integrity. Elements may be deployed as
part of a wider strategy incorporating multiple points of DDoS detection,
classification, traceback and mitigation, both on premise or service
provider based. Should changing conditions necessitate altering the
specifics of mitigation actions and/or the topological scope of mitigation
coverage, timely and effective signaling of telemetry and current threat
status to all elements involved in the mitigation is essential. Feedback
between participating elements is required for increased awareness
supporting effective decision making.

The WG will, where appropriate, reuse or extend existing standard
protocols and mechanisms (for example, IPFIX and its associated templating
and extension mechanisms). The WG may coordinate on a situationally
appropriate basis with other working groups and initiatives which
compliment the DOTS effort e.g. SACM, MILE, SUPA, I2NSF et. al.

The charter of the working group is to produce one or more standards track
specifications to provide for this open signaling in the DDoS problem
space. While the resulting standards should be designed so they apply to
network security applications beyond the DDoS problem space, this working
group will focus on signaling and coordination mechanisms directly related
to DDoS attack detection, classification, traceback and mitigation,
incorporating the general principles articulated in RFC5218
https://tools.ietf.org/html/rfc5218. Focusing the WG efforts on DDoS is
intended to meet the community's desire for a deployable solution in the
near term. The specification(s) produced by the WG will include a
standard mechanism for authentication and authorization, data integrity,
and providing for privacy in operation.

The WG will produce the following deliverables and milestones:

  • Document or Documents describing the problem space, use cases, protocol
    requirements and other qualifying information as the WG sees fit.
  • Document or Documents specifying protocols and associated data models to
    address the stated goals of the WG.