<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.10 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC8772 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8772.xml">
<!ENTITY RFC8773 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8773.xml">
<!ENTITY RFC8612 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8612.xml">
<!ENTITY I-D.ietf-dots-multihoming SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dots-multihoming.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc docName="draft-ietf-dots-use-cases-22" category="info">

  <front>
    <title abbrev="DOTS Use Cases">Use cases for DDoS Open Threat Signaling</title>

    <author initials="R." surname="Dobbins" fullname="Roland Dobbins">
      <organization>Arbor Networks</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>Singapore</country>
        </postal>
        <email>rdobbins@arbor.net</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Moskowitz" fullname="Robert Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
        <postal>
          <street></street>
          <city>Oak Park, MI</city>
          <code>48237</code>
          <country>USA</country>
        </postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>
    <author initials="N." surname="Teague" fullname="Nik Teague">
      <organization>Iron Mountain Data Centers</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <code></code>
          <country>UK</country>
        </postal>
        <email>nteague@ironmountain.co.uk</email>
      </address>
    </author>
    <author initials="L." surname="Xia" fullname="Liang Xia">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>No. 101, Software Avenue, Yuhuatai District</street>
          <city>Nanjing</city>
          <country>China</country>
        </postal>
        <email>Frank.xialiang@huawei.com</email>
      </address>
    </author>
    <author initials="K." surname="Nishizuka" fullname="Kaname Nishizuka">
      <organization>NTT Communications</organization>
      <address>
        <postal>
          <street>GranPark 16F 3-4-1 Shibaura, Minato-ku</street>
          <city>Tokyo</city>
          <code>108-8118</code>
          <country>Japan</country>
        </postal>
        <email>kaname@nttv6.jp</email>
      </address>
    </author>

    <date year="2020" month="May" day="29"/>

    <area>Security</area>
    <workgroup>DOTS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The DDoS Open Threat Signaling (DOTS) effort is intended to provide
protocols to facilitate interoperability across disparate DDoS
mitigation solutions. This document presents sample use cases which describe
the interactions expected between the DOTS components as well as DOTS
messaging exchanges. These use cases are meant to identify the
interacting DOTS components, how they collaborate, and what are the
typical information to be exchanged.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>At the time of writing, distributed denial-of-service (DDoS) attack
mitigation solutions are largely based upon siloed, proprietary
communications schemes with vendor lock-in as a side-effect. This can
result in the configuration, provisioning, operation, and activation of
these solutions being a highly manual and often time-consuming process.
Additionally, coordinating multiple DDoS mitigation solutions
simultaneously is fraught with both technical and process-related
hurdles. This greatly increases operational complexity which, in turn,
can degrade the efficacy of mitigations.</t>

<t>The DDoS Open Threat Signaling (DOTS) effort is intended to specify
protocols that facilitate interoperability between diverse DDoS
mitigation solutions and ensure greater integration in term of
attack detection, mitigation requests, and attack characterization patterns.</t>

<t>As DDoS solutions are broadly heterogeneous among vendors, the
primary goal of DOTS is to provide high-level interaction amongst
differing DDoS solutions, such as detecting DDoS attacks,
initiating/terminating DDoS mitigation assistance, or requesting the
status of a DDoS mitigation.</t>

<t>This document provides sample use cases that provided input for the design of
the DOTS protocols <xref target="RFC8772"/><xref target="RFC8773"/>. The use cases are not exhaustive and future use cases are
expected to emerge as DOTS is adopted and evolves.</t>

</section>
<section anchor="terminology-and-acronyms" title="Terminology and Acronyms">

<t>This document makes use of the same terminology and definitions as
<xref target="RFC8612"/>. In addition it uses the terms defined
below:</t>

<t><list style="symbols">
  <t>DDoS Mitigation Service Provider: designates the administrative entity
providing the DDoS Mitigation Service.</t>
  <t>DDoS Mitigation System (DMS): A system that performs DDoS mitigation.
The DDoS Mitigation System may be composed by a cluster of hardware
and/or software resources, but could also involve an orchestrator that
may take decisions such as outsourcing some or all of the mitigation
to another DDoS Mitigation System.</t>
  <t>DDoS Mitigation: The action performed by the DDoS Mitigation System.</t>
  <t>DDoS Mitigation Service: designates a service provided to a
customer to mitigate DDoS attacks. Service subscriptions usually involve Service
Level Agreement (SLA) that have to be met. It is the responsibility of
the DDoS Service provider to instantiate the DDoS Mitigation System to
meet these SLAs.</t>
  <t>Internet Transit Provider (ITP): designates the entity that delivers
the traffic to a customer network. It can be an Internet Service Provider
(ISP), or an upstream entity delivering the traffic to the ISP.</t>
</list></t>

</section>
<section anchor="use-cases" title="Use Cases">

<section anchor="use-case-1" title="Upstream DDoS Mitigation by an Upstream Internet Transit Provider">

<t>This use case describes how an enterprise or a residential customer
network may take advantage of a pre-existing relation with its Internet
Transit Provider (ITP) in order to mitigate a DDoS attack targeting its
network.</t>

<t>For clarity of discussion, the targeted network is indicated as an enterprise
network, but the same scenario applies to any downstream network, including
residential and cloud hosting networks.</t>

<t>As the ITP provides connectivity to the enterprise
network, it is already on the path of the inbound and outbound traffic of
the enterprise network and well aware of the networking parameters
associated to the enterprise network WAN connectivity. This eases both the
configuration and the instantiation of a DDoS Mitigation Service.</t>

<t>This
section considers two kind of DDoS Mitigation Service between an
enterprise network and an ITP:</t>

<t><list style="symbols">
  <t>The upstream ITP may instantiate a DDoS Mitigation System (DMS) upon
receiving a request from the enterprise network. This typically
corresponds to the case when the enterprise network is under attack.</t>
  <t>On the other hand, the ITP may identify an enterprise network as the
source of an attack and send a mitigation request to the enterprise DMS
to mitigate this at the source.</t>
</list></t>

<t>The two scenarios, thought different, have similar interactions between
the DOTS client and server. For the sake of simplicity, only the first
scenario will be detailed in this section. Nevertheless, the second scenario is also in scope for DOTS.</t>

<t>In the first scenario, as depicted in Figure 1, an enterprise network
with self-hosted Internet-facing properties such as Web servers,
authoritative DNS servers, and VoIP servers has a DMS deployed to
protect those servers and applications from DDoS attacks. In addition to
on-premise DDoS defense capability, the enterprise has contracted with
its ITP for DDoS Mitigation Services when attacks
threaten to overwhelm the bandwidth of their WAN link(s).</t>

<figure><artwork><![CDATA[
    +------------------+        +------------------+
    | Enterprise       |        | Upstream         |
    | Network          |        | Internet Transit |
    |                  |        | Provider         |
    |      +--------+  |        |             DDoS Attack
    |      | DDoS   |  | <=================================
    |      | Target |  | <=================================
    |      +--------+  |        |  +------------+  |
    |                  | +-------->| DDoS       |  |
    |                  | |      |S | Mitigation |  |
    |                  | |      |  | System     |  |
    |                  | |      |  +------------+  |
    |                  | |      |                  |
    |                  | |      |                  |
    |                  | |      |                  |
    |  +------------+  | |      |                  |
    |  | DDoS       |<---+      |                  |
    |  | Mitigation |C |        |                  |
    |  | System     |  |        |                  |
    |  +------------+  |        |                  |
    +------------------+        +------------------+

       * C is for DOTS client functionality
       * S is for DOTS server functionality

    Figure 1: Upstream Internet Transit Provider DDoS Mitigation
]]></artwork></figure>

<t>The enterprise DMS is configured such that if the incoming Internet
traffic volume exceeds 50% of the provisioned upstream Internet WAN
link capacity, the DMS will request DDoS mitigation assistance from the
upstream transit provider. More sophisticated detection means may be considered
as well.</t>

<t>The requests to trigger, manage, and finalize a DDoS Mitigation between
the enterprise DMS and the ITP is performed using DOTS. The enterprise
DMS implements a DOTS client while the ITP implements a DOTS server
which is integrated with their DMS in this example.</t>

<t>When the enterprise DMS locally detects an inbound DDoS attack targeting
its resources (e.g., servers, hosts, or applications), it immediately
begins a DDoS Mitigation.</t>

<t>During the course of the attack, the inbound traffic volume to the enterprise network exceeds the
50% threshold and the enterprise DMS escalates the DDoS mitigation. The
enterprise DMS DOTS client signals to the DOTS server on the upstream ITP
to initiate DDoS Mitigation. The DOTS server replies to the DOTS client
that it can serve this request, and mitigation is initiated on the ITP
network by the ITP DMS.</t>

<t>Over the course of the attack, the DOTS server of the ITP periodically
informs the DOTS client on the mitigation status,
statistics related to DDoS attack traffic mitigation, and related
information. Once the DDoS attack has ended, or decreased to the certain
level that the enterprise DMS might handle by itself, the DOTS server
signals the enterprise DMS DOTS client that the attack has subsided.</t>

<t>The DOTS client on the enterprise DMS then requests the ITP to terminate
the DDoS Mitigation. The DOTS server on the ITP receives this request
and once the mitigation has ended, confirms the end of upstream DDoS
Mitigation to the enterprise DMS DOTS client.</t>

<t>The following is an overview of the DOTS communication model for this
use-case:</t>

<t><list style="symbols">
  <t>(a) A DDoS attack is initiated against resources of a
network organization (here, the enterprise) which has deployed a
DOTS-capable DMS - typically a DOTS client.</t>
  <t>(b) The enterprise DMS detects, classifies, and begins the DDoS
 Mitigation.</t>
  <t>(c) The enterprise  DMS determines that its capacity and/or capability
to mitigate the DDoS attack is insufficient, and sends via its DOTS
client a DOTS DDoS Mitigation request to one or more DOTS servers
residing on the upstream ITP.</t>
  <t>(d) The DOTS server which receives the DOTS Mitigation request
determines that it has been configured to honor requests from the
requesting DOTS client, and honors the request by orchestrating
its own DMS.</t>
  <t>(e) While the DDoS Mitigation is active, the DOTS server
regularly transmits DOTS DDoS Mitigation status updates to the DOTS
client.</t>
  <t>(f) Informed by the DOTS server status update that the attack has
ended or subsided, the DOTS client transmits a DOTS DDoS Mitigation
termination request to the DOTS server.</t>
  <t>(g) The DOTS server terminates DDoS Mitigation, and sends the
notification to the DOTS client.</t>
</list></t>

<t>Note that communications between the enterprise DOTS client and the
upstream ITP DOTS server may take place in-band within the main Internet
WAN link between the enterprise and the ITP; out-of-band via a separate,
dedicated wireline network link utilized solely for DOTS signaling; or
out-of-band via some other form of network connectivity such as a
third-party wireless 4G network connectivity.</t>

<t>Note also that a DOTS client that sends a DOTS Mitigation request
may be also triggered by a network admin that manually confirms the
request to the upstream ITP, in which case the request may be sent from
an application such as a web browser or a dedicated mobile application.</t>

<t>Note also that when the enterprise is multihomed and connected to
multiple upstream ITPs, each ITP is only able to provide a DDoS
Mitigation Service for the traffic it transits. As a result, the
enterprise network may be required to coordinate the various DDoS Mitigation
Services associated to each link. More multi-homing considerations are
discussed in <xref target="I-D.ietf-dots-multihoming"/>.</t>

</section>
<section anchor="use-case-2" title="DDoS Mitigation by a Third Party DDoS Mitigation Service Provider">

<t>This use case differs from the previous use case described in Section
3.1 in that the DDoS Mitigation Service is not provided by an upstream
ITP. In other words, as represented in Figure 2, the traffic is not
forwarded through the DDoS Mitigation Service Provider by default. In
order to steer the traffic to the DDoS Mitigation Service Provider, some
network configuration changes are required. As such, this use case is
likely to apply to large enterprises or large data centers, but as for
the other use cases is not exclusively limited to them.</t>

<t>Another typical scenario for this use case is for there to be a relationship
between DDoS Mitigation Service Providers, forming an overlay of DMS. When
a DDoS Mitigation Service Provider mitigating a DDoS attack reaches its
resources capacity, it may chose to delegate the DDoS Mitigation to
another DDoS Mitigation Service Provider.</t>

<figure><artwork><![CDATA[
   +------------------+        +------------------+
   | Enterprise       |        | Upstream         |
   | Network          |        | Internet Transit |
   |                  |        | Provider         |
   |      +--------+  |        |             DDoS Attack
   |      | DDoS   |  | <=================================
   |      | Target |  | <=================================
   |      +--------+  |        |                  |
   |                  |        |                  |
   |                  |        +------------------+
   |                  |                            
   |                  |        +------------------+
   |                  |        | DDoS Mitigation  |
   |                  |        | Service Provider |
   |                  |        |                  |
   |  +------------+  |        |  +------------+  |
   |  | DDoS       |<------------>| DDoS       |  | 
   |  | Mitigation |C |        | S| Mitigation |  |
   |  | System     |  |        |  | System     |  |
   |  +------------+  |        |  +------------+  |
   +------------------+        +------------------+

       * C is for DOTS client functionality
       * S is for DOTS server functionality

   Figure 2: DDoS Mitigation between an Enterprise Network and Third
             Party DDoS Mitigation Service Provider
]]></artwork></figure>

<t>In this scenario, an enterprise network has entered into a pre-arranged
DDoS mitigation assistance agreement with one or more third-party DDoS
Mitigation Service Providers in order to ensure that sufficient DDoS
mitigation capacity and/or capabilities may be activated in the event
that a given DDoS attack threatens to overwhelm the ability of the
enterprise's or any other given DMS to mitigate the attack on its own.</t>

<t>The pre-arrangement typically includes agreement on the mechanisms
used to redirect the traffic to the DDoS Mitigation Service Provider, as
well as the mechanism to re-inject the traffic back to the Enterprise
Network. Redirection to the DDoS Mitigation Service Provider typically
involves BGP prefix announcement or DNS redirection, while re-injection
of the scrubbed traffic to the enterprise network may be performed via
tunneling mechanisms (e.g., GRE). These exact mechanisms
used for traffic steering are out of scope of DOTS, but will need to be pre-arranged, while in some contexts such changes could be detected and considered as an attack.</t>

<t>In some cases the communication between the enterprise DOTS client and
the DOTS server of the DDoS Mitigation Service Provider may go through
the ITP carrying the DDoS attack, which would affect the communication.
On the other hand, the communication between the DOTS client and DOTS
server may take a path that is not undergoing a DDoS attack.</t>

<figure><artwork><![CDATA[
  +------------------+        +------------------+
  | Enterprise       |        | Upstream         |
  | Network          |        | Internet Transit |
  |                  |        | Provider         |
  |      +--------+  |        |             DDoS Attack
  |      | DDoS   |  |<----------------+         | ++====
  |      | Target |  |    Mitigated    |         | || ++=
  |      +--------+  |        |        |         | || ||
  |                  |        |        |         | || ||
  |                  |        +--------|---------+ || ||
  |                  |                 |           || ||
  |                  |        +--------|---------+ || ||
  |                  |        | DDoS Mitigation  | || ||
  |                  |        | Service Provider | || ||
  |                  |        |        |         | || ||
  |  +------------+  |        |  +------------+  | || ||
  |  | DDoS       |<------------>| DDoS       |  | || ||
  |  | mitigation |C |        |S | mitigation |<===++ ||
  |  | system     |  |        |  | system     |<======++
  |  +------------+  |        |  +------------+  |
  +------------------+        +------------------+

       * C is for DOTS client functionality
       * S is for DOTS server functionality

  Figure 3: Redirection to a DDoS Mitigation Service Provider
]]></artwork></figure>

<t>When the enterprise network is under attack or at least is reaching its
capacity or ability to mitigate a given DDoS attack, the DOTS
client sends a DOTS request to the DDoS Mitigation Service Provider to
initiate network traffic diversion &#8211; as represented in Figure 3 &#8211; and
DDoS mitigation activities. Ongoing attack and mitigation status
messages may be passed between the enterprise network and the DDoS
Mitigation Service Provider using DOTS. If the DDoS attack has stopped or the
severity of the attack has subsided, the DOTS client can request the
DDoS Mitigation Service Provider to terminate the DDoS Mitigation.</t>

</section>
<section anchor="use-case-3" title="DDoS Orchestration">

<t>In this use case, one or more DDoS telemetry systems or monitoring
devices monitor a network &#8211; typically an ISP network, an enterprise
network, or a data center. Upon detection of a DDoS attack, these DDoS
telemetry systems alert an orchestrator in charge of coordinating the
various DMS's within the domain. The DDoS telemetry systems may be
configured to provide required information, such as a preliminary
analysis of the observation, to the orchestrator.</t>

<t>The orchestrator analyses the various information it receives from DDoS
telemetry systems, and initiates one or more DDoS mitigation
strategies. For example, the orchestrator could select the DDoS
mitigation system in the enterprise network or one provided by the ITP.</t>

<t>DDoS Mitigation System selection and DDoS Mitigation techniques may
depend on the type of the DDoS attack. In some case, a manual confirmation
or selection may also be required to choose a proposed strategy to
initiate a DDoS Mitigation. The DDoS Mitigation may consist of multiple
steps such as configuring the network, or of updating already instantiated
DDoS mitigation functions. Eventually, the coordination of the
mitigation may involve external DDoS mitigation resources such as a
transit provider or a Third Party DDoS Mitigation Service Provider.</t>

<t>The communication used to trigger a DDoS Mitigation between the DDoS
telemetry and monitoring systems and the orchestrator is performed using
DOTS. The DDoS telemetry system implements a DOTS client while the
orchestrator implements a DOTS server.</t>

<t>The communication between a network administrator and the orchestrator
is also performed using DOTS. The network administrator uses a web
interface which interacts with a DOTS client, while the orchestrator
implements a DOTS server.</t>

<t>The communication between the orchestrator and the DDoS Mitigation
Systems is performed using DOTS. The orchestrator implements a DOTS
client while the DDoS Mitigation Systems implement a DOTS server.</t>

<t>The configuration aspects of each DDoS Mitigation System, as well as the
instantiations of DDoS mitigation functions or network configuration is
not part of DOTS. Similarly, the discovery of available DDoS mitigation
functions is not part of DOTS; and as such is out of scope.</t>

<figure><artwork><![CDATA[
       +----------+              
       | network  |C            (Enterprise Network)
       | adminis  |<-+
       | trator   |  |
       +----------+  |
                     |                       
       +----------+  | S+--------------+     +-----------+
       |telemetry/|  +->|              |C   S| DDoS      |+
       |monitoring|<--->| Orchestrator |<--->| mitigation||
       |systems   |C   S|              |<-+  | systems   ||
       +----------+     +--------------+C |  +-----------+|
                                          |    +----------+
       -----------------------------------|-----------------
                                          |
                                          |
          (Internet Transit Provider)     |  
                                          |  +-----------+
                                          | S| DDoS      |+
                                          +->| mitigation||
                                             | systems   ||
                                             +-----------+|
       * C is for DOTS client functionality    +----------+
       * S is for DOTS server functionality

         Figure 4: DDoS Orchestration
]]></artwork></figure>

<t>The DDoS telemetry systems monitor various network traffic and perform
some measurement tasks.</t>

<t>These systems are configured so that when an event or some measurement
indicators reach a predefined level their associated DOTS client sends a
DOTS mitigation request to the orchestrator DOTS server. The DOTS
mitigation request may be associated with some optional mitigation hints
to let the orchestrator know what has triggered the request. In particular, it's possible for something that locally to one telemetry system looks like an attack is not actually an attack when seen from the broader scope (e.g., of the orchestrator)</t>

<t>Upon receipt of the DOTS mitigation request from the DDoS telemetry
system, the orchestrator DOTS server responds with an acknowledgment, to
avoid retransmission of the request for mitigation. The orchestrator
may begin collecting additional fine-grained and specific information
from various DDoS telemetry systems in order to correlate the
measurements and provide an analysis of the event. Eventually, the
orchestrator may ask for additional information from the DDoS telemetry
system; however, the collection of this information is out of scope of DOTS.</t>

<t>The orchestrator may be configured to start a DDoS Mitigation upon
approval from a network administrator. The analysis from the
orchestrator is reported to the network administrator via a web
interface. If the network administrator decides to start the mitigation,
the network administrator triggers the DDoS mitigation request using the
web interface of a DOTS client communicating to the orchestrator DOTS
server. This request is expected to be associated with a context that
provides sufficient information to the orchestrator DOTS server to infer
the DDoS Mitigation to elaborate and coordinate.</t>

<t>Upon receiving a request to mitigate a DDoS attack aimed at a
target, the orchestrator may evaluate the volume of the attack as
well as the value that the target represents. The orchestrator may
select the DDoS Mitigation Service Provider based on the attack
severity. It may also coordinate the DDoS Mitigation performed by the
DDoS Mitigation Service Provider with some other tasks such as, for
example, moving the target to another network so new sessions will not
be impacted. The orchestrator requests a DDoS Mitigation by the selected
DDoS mitigation systems via its DOTS client, as described in Section
3.1.</t>

<t>The orchestrator DOTS client is notified that the DDoS Mitigation is
effective by the selected DDoS mitigation systems. The orchestrator DOTS
servers returns this information back to the network administrator.</t>

<t>Similarly, when the DDoS attack has stopped, the orchestrator DOTS
client is notified and the orchestrator's DOTS servers indicate
to the DDoS telemetry systems as well as to the network administrator
the end of the DDoS Mitigation.</t>

<t>In addition to the above DDoS Orchestration, the selected DDoS
mitigation system can return back a mitigation request to the
orchestrator as an offloading. For example, when the DDoS attack becomes severe and
the DDoS mitigation system's utilization rate reaches its maximum
capacity, the DDoS mitigation system can send mitigation requests with
additional hints such as its blocked traffic information to the
orchestrator.  Then the orchestrator can take further actions like
requesting forwarding nodes such as routers to filter the traffic. In
this case, the DDoS mitigation system implements a DOTS client while the
orchestrator implements a DOTS server. Similar to other DOTS use cases, the offloading scenario assumes that some validation checks are followed by the DMS, the orchestrator, or both (e.g., avoid exhausting the resources of the forwarding nodes or inadvertent disruption of legitimate services). These validation checks are part of the mitigation, and are therefore out of the scope of the document.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The document does not describe any protocol, though there are still a few
high-level security considerations to discuss.</t>

<t>DOTS is at risk from three primary attacks: DOTS agent impersonation, traffic
injection, and signaling blocking.</t>

<t>Impersonation and traffic injection mitigation can be mitigated through
current secure communications best practices including mutual authentication. Preconfigured mitigation
steps to take on the loss of keepalive traffic can partially mitigate
signal blocking, but in general it is impossible to comprehensively
defend against an attacker that can selectively block any or all traffic.
Alternate communication paths that are (hopefully) not subject to blocking
by the attacker in question is another potential mitigation.</t>

<t>Additional details of DOTS security requirements can be found in
<xref target="RFC8612"/>.</t>

<t>Service disruption may be experienced if inadequate mitigation actions are applied. These considerations are out of the scope of DOTS.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>No IANA considerations exist for this document.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>The authors would like to thank among others Tirumaleswar Reddy; Andrew
Mortensen; Mohamed Boucadair; Artyom Gavrichenkov; Jon Shallow, Yuuhei
Hayashi, the DOTS WG chairs, Roman Danyliw and Tobias Gondrom as well as
the Security AD Benjamin Kaduk for their valuable feedback.</t>

<t>We also would like to thank Stephan Fouant that was part of the initial
co-authors of the documents.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC8772;
&RFC8773;
&RFC8612;


    </references>

    <references title='Informative References'>

&I-D.ietf-dots-multihoming;


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

