DOTS M. Chen Internet-Draft Li. Su Intended status: Informational CMCC Expires: September 10, 2019 March 9, 2019 Using attack bandwidth in signal channel draft-chen-dots-attack-bandwidth-expansion-00 Abstract This document describes a DDoS Mitigation Request parameter used in the Signal Channel request, as an expansion of the signal channel for mitigating DDoS attack accurately with target-bandwidth. The proposed parameter will help to choose the mitigation method, to be blackhole directly or to be drainaged for clean. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 10, 2019. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Chen & Su Expires September 10, 2019 [Page 1] Internet-Draft dots attack bandwidth March 2019 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Mitigation Use Case . . . . . . . . . . . . . . . . . . . . . 3 4. Request Mitigation expansion . . . . . . . . . . . . . . . . 5 5. Security Considerations . . . . . . . . . . . . . . . . . . . 7 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 7. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 7 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 8.1. Normative References . . . . . . . . . . . . . . . . . . 7 8.2. Informative References . . . . . . . . . . . . . . . . . 7 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 1. Introduction Distributed Denial of Service (DDoS) is a type of resource-consuming attack, which exploits a large number of attack resources and uses standard protocols to attack target objects. DDoS attacks consume a large amount of target object network resources or server resources (including computing power, storage capacity, etc.) of the target object, so that the target object cannot provide network services normally. At present, DDoS attack is one of the most powerful and indefensible attacks on the Internet, and due to the extensive use of mobile devices and IoT devices in recent years, it is easier for DDoS attackers to attack with real attack sources (broilers). Volume based distributed denial-of-service attack bring huge amount of attack traffic on the link, and the peaks keep hitting new highs, the economic loss that causes is bigger also. For the service providers to immediately protect their network services from DDoS attacks, DDoS mitigation needs to be automated. DDoS Open Threat Signaling (DOTS) is a protocol to standardize real- time signaling, threat-handling requests[I-D.ietf-dots-signal-channel], when attack target is under attack, dots client send mitigation request to dots server for help, If the mitigation request contains enough messages of the attack, then the mitigator can respond very effectively. Currently, there are two selections to deal with ddos attacks on the link, one is blackhole, the other is flow clean. Blackhole means that all packets send to the attack target will be discarded by routers on the path, this way can instantly reduce the link load, Other managed services on this link will not be affected, but for the attack target all the normal business messages will be severely damaged, for example, if the attack target provide News and Chen & Su Expires September 10, 2019 [Page 2] Internet-Draft dots attack bandwidth March 2019 information services and under ddos attack, all users will be inaccessible if the attack target choose blackhole for mitigation. Flow clean means that all the flow will be drainaged by routers to clean center, the clean center will recognize the attack flow from normal business traffic, then reinjects normal business traffic to network link by routers after the operation of attack flow discard, in this way the attack target will not be effected. This document describes attack-bandwidth, as a parameter expansion used in the mitigation request. attack-bandwidth means the amount of traffic under attack, this parameter can effectively reflect the degree of an attack, it will be more convenient for mitigator to choose the method for disposition when carry target-bandwidth in the mitigation request. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] The readers should be familiar with the terms defined in [I-D.ietf-dots-requirements] [I-D.ietf-dots-use-cases] The terminology related to YANG data modules is defined in [RFC7950] In addition, this document uses the terms defined below: Attack-bandwidth: the amount of traffic under attack, it is usually expressed numerically. Flow clean: one selection of Attack traffic deposition, the operation contains recognize, discard and reinage. 3. Mitigation Use Case when attack target is under attack, it has to make corresponding disposal, there are two options for disposal, one is blackhole directly, in this way all the attack flow will be discarded by router upper path of attack target, this means that the attack target will not receive any traffic during the attack, all the traffic forwards attack target will be discarded, this has a huge impact on the work environment, especially the host that provide external service. The other way of the disposition is to drainage all the traffic flow to clean center from router, then the clean center will use pattern Chen & Su Expires September 10, 2019 [Page 3] Internet-Draft dots attack bandwidth March 2019 matching or any other method to find out the attack traffic flow to discard, finally, clean center reinage the normal business traffic back to attack target by upper router, the whole process above is defined as flow clean(Figure 1). attack flow +--------+ +--------+ ----------->| router |------------------>| clean | 1 +--------+ 2 | center | | +--------+ 3 | | | +--------+ | +------>| attack |<-------------+ | target | +--------+ Figure 1: diagram of DDoS Mitigation usecase Generally, the bandwidth of the link 1 must be larger than link 2 and link 3, and the clean ability of clean center limited to hardware resources. An example of link situation is as below(Figure 2): +------------+------------+ | figure | bandwidth/ | | tag | capability | +------------+------------+ | link 1 | 100Gb | | link 2 | 50Gb | | link 3 | 10Gb | |clean center| 80Gb | +------------+------------+ Figure 2: an example of link bandwidth The Figure2 is a scenario of the link bandwidth, when a ddos attack is ongoing, if the link 1 bandwidth is completely jammed, the best way to mitigate the attack is to discard all the attack flow; if the amount of the traffic flow is lower than the remainder cleaning ability, the most suitable deposition is to drainage all the attack flow to clean center. Therefore, it is an obvious requirement in the current network environment. In the architecture of DOTS, Dots client send mitigation request to dots server, the parameters in the mitigation request contains some message of attack target, but there have not Chen & Su Expires September 10, 2019 [Page 4] Internet-Draft dots attack bandwidth March 2019 any messages of attack, if add attack-bandwidth to mitigation request as an expansion, it will be more effective and convenient for the disposition of mitigator. 4. Request Mitigation expansion When a DOTS client requires mitigation for some reason, the DOTS client uses the CoAP PUT method to send a mitigation request to its DOTS server(s). If a DOTS client is entitled to solicit the DOTS service, the DOTS server enables mitigation on behalf of the DOTS client by communicating the DOTS client's request to a mitigator (which may be colocated with the DOTS server) and relaying the feedback of the thus-selected mitigator to the requesting DOTS client. DOTS clients use the PUT method to request mitigation from a DOTS server. During active mitigation, DOTS clients may use PUT requests to carry mitigation efficacy updates to the DOTS server. The new parameter in the CBOR body (Figure 3) is described below: Chen & Su Expires September 10, 2019 [Page 5] Internet-Draft dots attack bandwidth March 2019 Content-Format: "application/dots+cbor" { "ietf-dots-signal-channel:mitigation-scope": { "scope": [ { "target-prefix": [ "string" ], "target-port-range": [ { "lower-port": number, "upper-port": number } ], "target-protocol": [ number ], "target-fqdn": [ "string" ], "attack-bandwidth":[ "string" ], "target-uri": [ "string" ], "alias-name": [ "string" ], "lifetime": number, "trigger-mitigation": true|false } ] } } Figure 3: PUT to Convey DOTS Mitigation Requests attack-bandwidth: bandwidth occupied by an attack, The recommended format is numerical form, such as xxGb. Different attack has different attack bandwidth, numerical value directly reflects the urgency of the current attack. Serious attacks are treated with blackhole, Other cases use flow cleaning, attack-bandwidth is conducive to the selection of disposal mode. This is an optional attribute. Chen & Su Expires September 10, 2019 [Page 6] Internet-Draft dots attack bandwidth March 2019 The definition of the rest parameters are the same as the [I-D.ietf-dots-signal-channel] 5. Security Considerations TBD 6. IANA Considerations TBD 7. Acknowledgement TBD 8. References 8.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", RFC 7950, DOI 10.17487/RFC7950, August 2016, . 8.2. Informative References [I-D.ietf-dots-requirements] Mortensen, A., K, R., and R. Moskowitz, "Distributed Denial of Service (DDoS) Open Threat Signaling Requirements", draft-ietf-dots-requirements-20 (work in progress), February 2019. [I-D.ietf-dots-signal-channel] K, R., Boucadair, M., Patil, P., Mortensen, A., and N. Teague, "Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification", draft- ietf-dots-signal-channel-30 (work in progress), March 2019. [I-D.ietf-dots-use-cases] Dobbins, R., Migault, D., Fouant, S., Moskowitz, R., Teague, N., Xia, L., and K. Nishizuka, "Use cases for DDoS Open Threat Signaling", draft-ietf-dots-use-cases-17 (work in progress), January 2019. Chen & Su Expires September 10, 2019 [Page 7] Internet-Draft dots attack bandwidth March 2019 Authors' Addresses Meiling Chen CMCC 32, Xuanwumen West BeiJing , BeiJing 100053 China Email: chenmeiling@chinamobile.com Li Su CMCC 32, Xuanwumen West BeiJing 100053 China Email: suli@chinamobile.com Chen & Su Expires September 10, 2019 [Page 8]