Movatterモバイル変換


[0]ホーム

URL:


Search RFCs

Advanced Search

RFC Editor

RFC 9133

Controlling Filtering Rules Using Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel,September 2021

File formats:

icon for HTMLicon for text fileicon for v3pdficon for XML
Also available:XML file for editing
 
Status:
PROPOSED STANDARD
Authors:
K. Nishizuka
M. Boucadair
T. Reddy.K
T. Nagata
Stream:
IETF
Source:
dots (sec)

Cite this RFC:TXT  | XML  |  BibTeX

DOI:  https://doi.org/10.17487/RFC9133

Discuss this RFC: Send questions or comments to the mailing listdots@ietf.org

Other actions:Submit Errata  | Find IPR Disclosures from the IETF  | View History of RFC 9133


Abstract

This document specifies an extension to the DistributedDenial-of-Service Open Threat Signaling (DOTS) signal channelprotocol so that DOTS clients can control their filtering rules whenan attack mitigation is active.

Particularly, this extension allows a DOTS client to activate ordeactivate existing filtering rules during a DistributedDenial-of-Service (DDoS) attack. The characterization of thesefiltering rules is conveyed by a DOTS client during an 'idle' time(i.e., no mitigation is active) by means of the DOTS data channelprotocol.


For the definition ofStatus,seeRFC 2026.

For the definition ofStream, seeRFC 8729.




IABIANAIETFIRTFISEISOCIETF Trust
ReportsPrivacy StatementSite MapContact Us

Advanced Search

[8]ページ先頭

©2009-2026 Movatter.jp