Network File System (NFS) Remote Direct Memory Access (RDMA) Problem Statement
draft-ietf-nfsv4-nfs-rdma-problem-statement-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
08 | (System) | Notify list changed from nfsv4-chairs@ietf.org, draft-ietf-nfsv4-nfs-rdma-problem-statement@ietf.org to (None) |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the Yes position for Sam Hartman |
2009-05-06
|
08 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
2009-05-06
|
08 | Cindy Morgan | [Note]: 'RFC 5532' added by Cindy Morgan |
2009-05-05
|
08 | (System) | RFC published |
2008-03-11
|
08 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2008-03-05
|
08 | (System) | IANA Action state changed to No IC from In Progress |
2008-03-05
|
08 | (System) | IANA Action state changed to In Progress |
2008-03-05
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent |
2008-03-05
|
08 | Amy Vezza | IESG has approved the document |
2008-03-05
|
08 | Amy Vezza | Closed "Approve" ballot |
2008-03-05
|
08 | Lars Eggert | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Lars Eggert |
2008-03-05
|
08 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Yes from Discuss by Sam Hartman |
2008-02-28
|
08 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2008-02-28
|
08 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2008-02-21
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-02-21
|
08 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-08.txt |
2007-11-30
|
08 | Lars Eggert | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Lars Eggert |
2007-11-16
|
08 | Samuel Weiler | Assignment of request for Telechat review by SECDIR to Uri Blumenthal was rejected |
2007-11-16
|
08 | (System) | Removed from agenda for telechat - 2007-11-15 |
2007-11-15
|
08 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2007-11-15
|
08 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-11-15
|
08 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2007-11-15
|
08 | Sam Hartman | [Ballot discuss] This technology creates a new security requirement for a security mechanism that provides the necessary security services for NFS (authentication, integrity and confidentiality) … [Ballot discuss] This technology creates a new security requirement for a security mechanism that provides the necessary security services for NFS (authentication, integrity and confidentiality) in a manner that will meet the performance requirements that motivated this RDDP work. Of course this security needs to interact well with the infrastructure used for NFS authentication. Please document this new security requirement in the security considerations section. |
2007-11-15
|
08 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman |
2007-11-15
|
08 | Chris Newman | [Ballot comment] I'm voting no objection, but support Tim's discuss on the security considerations. Two pieces of advice: * A reference to the security considerations … [Ballot comment] I'm voting no objection, but support Tim's discuss on the security considerations. Two pieces of advice: * A reference to the security considerations of RFC 4297 from the security considerations section of this document may be about a 70% solution. * When NFS requires security, I understand GSS/Kerberos is one mechanism that is at least widely implemented and may be used more than NFS+IPsec. A discussion similar to the ones in RFC 4297 for IPsec and TLS would be helpful to understand the impact of the GSS/Kerberos mechanism on RDMA. If you need help with such text, I recommend asking Nicolas Williams for help. |
2007-11-15
|
08 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko |
2007-11-15
|
08 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-11-15
|
08 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-11-14
|
08 | Tim Polk | [Ballot discuss] Sandy Murphy's Security Directorate review identified a number of issues. I am holding this discuss pending resolution of her issues. I have included … [Ballot discuss] Sandy Murphy's Security Directorate review identified a number of issues. I am holding this discuss pending resolution of her issues. I have included her comments in their entirety below. Following Sandy's review, I have appended a couple of related issues under the heading "Part 2: AD Issues". This is a review of draft-ietf-nfsv4-nfs-rdma-problem-statement-07.txt I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document describes the use of NFS (over RPC) over RDMA. Most of the text surveys current literature as to why doing RDMA to avoid data copying would be a good thing. The security considerations section is quite short: The NFS protocol, in conjunction with its layering on RPC, provides a rich and widely interoperable security model to applications and systems. Any layering of NFS over RDMA transports must address the NFS security requirements, and additionally must ensure that no new vulnerabilities are introduced. For RDMA, the integrity, and any privacy, of the data stream are of particular importance. Security Considerations must be addressed by any relevant RDMA transport layering. The protocol described in [RPCRDMA] provides one such approach. I don't think the particularly important aspects of RDMA transfer are limited to integrity and privacy. I think that one of the important security considerations would be the authorization of the source of the RDMA transfer to be reading or writing into whatever memory or data buffers it was writing into. The RPCRDMA draft does not address this question. It discusses the integrity and privacy of the data transferred, as here. The RDDP has a draft which discusses DDP/RDMA security in depth. I think that the draft http://www.ietf.org/internet-drafts/draft-ietf-rddp-security-10.txt is a suitable reference for this draft. It's on the RFC Ed queue according to the I-D tracker. (In particular, it talks about the idea of a protection domain: A correct implementation of a Protection Domain requires that resources which belong to a given Protection Domain can not be used on a resource belonging to another Protection Domain, because Protection Domain membership is checked by the RNIC prior to taking any action involving such a resource. Protection Domains are therefore used to ensure that an STag can only be used to access an associated data buffer on one or more Streams that are associated with the same Protection Domain as the specific STag. I think that settles my question of authorizing the RDMA transfer. The rddp-rdmap-07 draft has a nice summary (sect 8.1) of the security requirements derived from the discussion in the rddp-security draft. There's also a discussion of security services in RFC4296, the DDP and RDMA Architecture. E.g.: Peer connections that do not pass authentication and authorization checks must not be permitted to begin processing in RDMA mode with an inappropriate endpoint. Once associated, peer accesses to buffer regions must be authenticated and made subject to authorization checks in the context of the association and endpoint (socket) on which they are to be performed, prior to any transfer operation or data being accessed. The RDMA protocols must ensure that these region protections be under strict application control. Of course there's the question of relating the authentication and authorization done by RPC_GSSAPI to the protection domain of the RDMA security, and both to the SA of the IPSec if that is used to protect the RDMA transfer. Perhaps this is just one channel binding, perhaps it is channel binding squared, perhaps the CCM referenced in the rpsrdma draft is sufficient for both. I just can't tell. A process question. This draft (and the rpcrdma draft) contain a normative reference called "rfc1831bis", with a title of R. Thurlow, Ed., "RPC: Remote Procedure Call Protocol Specification Version 2", Standards Track RFC That would seem to be a reference to draft-ietf-nfsv4-rfc1831bis-06.txt, but the I-D Tracker has that listed as "Dead". Also. Not my job, but the rpcrdma draft has a reference: [CCM] M. Eisler, N. Williams, "CCM: The Credential Cache GSS Mechanism", Internet Draft Work in Progress, draft-ietf- nfsv4-ccm But on tools.ietf.org (the draft has expired from the internet-drafts list, but at least it is still called "I-D Exists" in the I-D Tracker) the title is: The Channel Conjunction Mechanism (CCM) for GSS draft-ietf-nfsv4-ccm-03 Another not-my-job question. The rpcrdma draft and the rddp-security draft both mention transport over Infiniband, but everything that I've been able to find imply that Infiniband is not an IP protocol. So IPSec would not apply, presumably. Do the discussions of security in the nfsv4 and rddp drafts still work if Infiniband is the RDMA transport? In particular, rddp-security says For RDDP, IPsec is the better choice for a security framework, and hence is mandatory-to-implement (as specified elsewhere in this document). Also, the rddp-security draft seems to assume the reliable, ordered delivery of TCP, and I can not tell if that is provided by Infiniband. --Sandy Part 2: AD issues The security considerations section states that "Any layering of NFS over RDMA transports must address the NFS security requirements", but it is unclear where these requirements are documented. In the absence of a clear reference, some elaboration of the NFS security requirements is needed here. The second clause of that same sentence is also troublesome. Here is the complete sentence (emphasis added): Any layering of NFS over RDMA transports must address the NFS security requirements, *and additionally must ensure that no new vulnerabilities are introduced*. I don't believe this provides enough guidance regarding the types of vulnerabilities that one should be worried about. While this can never be comprehensive, some assitance to protocol designers is probably in order. The RDMA over IP problem statement (RFC 4297) provided a much more robust analysis with respect to the types of problems that could be encountered. For example, the security considerations section begins with the following paragraph: Solutions to the problem of reducing copying overhead in high bandwidth transfers may introduce new security concerns. Any proposed solution must be analyzed for security vulnerabilities and any such vulnerabilities addressed. Potential security weaknesses -- due to resource issues that might lead to denial-of-service attacks, overwrites and other concurrent operations, the ordering of completions as required by the RDMA protocol, the granularity of transfer, and any other identified vulnerabilities -- need to be examined, described, and an adequate resolution to them found. Given the brevity of the security considerations section in this document, it is unclear if the potential security weaknesses have been adequately explored. That is, it is unclear if the "NFS security requirements" are really complete with respect to NFS with RDMA. |
2007-11-14
|
08 | Tim Polk | [Ballot discuss] Sandy Murphy's Security Directorate review identified a number of issues. I am holding this discuss pending resolution of her issues. I have included … [Ballot discuss] Sandy Murphy's Security Directorate review identified a number of issues. I am holding this discuss pending resolution of her issues. I have included her comments in their entirety below. Following Sandy's review, I have appended a couple of related issues under the heading "Part 2: AD Issues". This is a review of draft-ietf-nfsv4-nfs-rdma-problem-statement-07.txt I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document describes the use of NFS (over RPC) over RDMA. Most of the text surveys current literature as to why doing RDMA to avoid data copying would be a good thing. The security considerations section is quite short: The NFS protocol, in conjunction with its layering on RPC, provides a rich and widely interoperable security model to applications and systems. Any layering of NFS over RDMA transports must address the NFS security requirements, and additionally must ensure that no new vulnerabilities are introduced. For RDMA, the integrity, and any privacy, of the data stream are of particular importance. Security Considerations must be addressed by any relevant RDMA transport layering. The protocol described in [RPCRDMA] provides one such approach. I don't think the particularly important aspects of RDMA transfer are limited to integrity and privacy. I think that one of the important security considerations would be the authorization of the source of the RDMA transfer to be reading or writing into whatever memory or data buffers it was writing into. The RPCRDMA draft does not address this question. It discusses the integrity and privacy of the data transferred, as here. The RDDP has a draft which discusses DDP/RDMA security in depth. I think that the draft http://www.ietf.org/internet-drafts/draft-ietf-rddp-security-10.txt is a suitable reference for this draft. It's on the RFC Ed queue according to the I-D tracker. (In particular, it talks about the idea of a protection domain: A correct implementation of a Protection Domain requires that resources which belong to a given Protection Domain can not be used on a resource belonging to another Protection Domain, because Protection Domain membership is checked by the RNIC prior to taking any action involving such a resource. Protection Domains are therefore used to ensure that an STag can only be used to access an associated data buffer on one or more Streams that are associated with the same Protection Domain as the specific STag. I think that settles my question of authorizing the RDMA transfer. The rddp-rdmap-07 draft has a nice summary (sect 8.1) of the security requirements derived from the discussion in the rddp-security draft. There's also a discussion of security services in RFC4296, the DDP and RDMA Architecture. E.g.: Peer connections that do not pass authentication and authorization checks must not be permitted to begin processing in RDMA mode with an inappropriate endpoint. Once associated, peer accesses to buffer regions must be authenticated and made subject to authorization checks in the context of the association and endpoint (socket) on which they are to be performed, prior to any transfer operation or data being accessed. The RDMA protocols must ensure that these region protections be under strict application control. Of course there's the question of relating the authentication and authorization done by RPC_GSSAPI to the protection domain of the RDMA security, and both to the SA of the IPSec if that is used to protect the RDMA transfer. Perhaps this is just one channel binding, perhaps it is channel binding squared, perhaps the CCM referenced in the rpsrdma draft is sufficient for both. I just can't tell. A process question. This draft (and the rpcrdma draft) contain a normative reference called "rfc1831bis", with a title of R. Thurlow, Ed., "RPC: Remote Procedure Call Protocol Specification Version 2", Standards Track RFC That would seem to be a reference to draft-ietf-nfsv4-rfc1831bis-06.txt, but the I-D Tracker has that listed as "Dead". Also. Not my job, but the rpcrdma draft has a reference: [CCM] M. Eisler, N. Williams, "CCM: The Credential Cache GSS Mechanism", Internet Draft Work in Progress, draft-ietf- nfsv4-ccm But on tools.ietf.org (the draft has expired from the internet-drafts list, but at least it is still called "I-D Exists" in the I-D Tracker) the title is: The Channel Conjunction Mechanism (CCM) for GSS draft-ietf-nfsv4-ccm-03 Another not-my-job question. The rpcrdma draft and the rddp-security draft both mention transport over Infiniband, but everything that I've been able to find imply that Infiniband is not an IP protocol. So IPSec would not apply, presumably. Do the discussions of security in the nfsv4 and rddp drafts still work if Infiniband is the RDMA transport? In particular, rddp-security says For RDDP, IPsec is the better choice for a security framework, and hence is mandatory-to-implement (as specified elsewhere in this document). Also, the rddp-security draft seems to assume the reliable, ordered delivery of TCP, and I can not tell if that is provided by Infiniband. --Sandy Part 2: AD issues The security considerations section states that "Any layering of NFS over RDMA transports must address the NFS security requirements", but it is unclear where these requirements are documented. In the absence of a clear reference, some elaboration of the NFS security requirements is needed here. The second clause of that same sentence is also troublesome: Any layering of NFS over RDMA transports must address the NFS security requirements, and additionally must ensure that no new vulnerabilities are introduced. I don't believe this provides enough guidance reagrding the types of vulnerabilities that one should be worried about. While this can never be comprehensive, some assitance to protocol designers is probably in order. The RDMA over IP problem statement (RFC 4297) provided a much more robust analysis. For example, the security considerations section begins with the following paragraph: Solutions to the problem of reducing copying overhead in high bandwidth transfers may introduce new security concerns. Any proposed solution must be analyzed for security vulnerabilities and any such vulnerabilities addressed. Potential security weaknesses -- due to resource issues that might lead to denial-of-service attacks, overwrites and other concurrent operations, the ordering of completions as required by the RDMA protocol, the granularity of transfer, and any other identified vulnerabilities -- need to be examined, described, and an adequate resolution to them found. Given the brevity of the security considerations section in this document, it is unclear if the potential security weaknesses have really been explored. That is, it is unclear if the "NFS security requirements" are really complete with respect to NFS with RDMA. |
2007-11-14
|
08 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2007-11-13
|
08 | Russ Housley | [Ballot comment] I have not seen a response to the Last Call comments raised by Sandy Murphy in her SecDir Review. |
2007-11-13
|
08 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2007-11-12
|
08 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2007-10-31
|
08 | Lars Eggert | Placed on agenda for telechat - 2007-11-15 by Lars Eggert |
2007-10-31
|
08 | Lars Eggert | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lars Eggert |
2007-10-30
|
08 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-10-19
|
08 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Sandra Murphy. |
2007-10-16
|
08 | Amy Vezza | Last call sent |
2007-10-16
|
08 | Amy Vezza | State Changes to In Last Call from Waiting for AD Go-Ahead by Amy Vezza |
2007-10-15
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2007-10-15
|
08 | Lars Eggert | Removed from agenda for telechat - 2007-10-18 by Lars Eggert |
2007-10-12
|
08 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-10-12
|
08 | Amanda Baber | IANA Last Call comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2007-10-12
|
08 | Lars Eggert | [Ballot Position Update] New position, Yes, has been recorded for Lars Eggert |
2007-10-12
|
08 | Lars Eggert | Ballot has been issued by Lars Eggert |
2007-10-12
|
08 | Lars Eggert | Created "Approve" ballot |
2007-10-11
|
08 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Uri Blumenthal |
2007-10-11
|
08 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Uri Blumenthal |
2007-09-29
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sandra Murphy |
2007-09-29
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sandra Murphy |
2007-09-28
|
08 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-09-28
|
08 | Lars Eggert | Putting this tentatively on the agenda for Oct 18. |
2007-09-28
|
08 | Lars Eggert | Placed on agenda for telechat - 2007-10-18 by Lars Eggert |
2007-09-28
|
08 | Lars Eggert | AD review performed during WGLC. |
2007-09-28
|
08 | Lars Eggert | State Changes to Last Call Requested from AD Evaluation by Lars Eggert |
2007-09-28
|
08 | Lars Eggert | Last Call was requested by Lars Eggert |
2007-09-28
|
08 | (System) | Ballot writeup text was added |
2007-09-28
|
08 | (System) | Last call text was added |
2007-09-28
|
08 | (System) | Ballot approval text was added |
2007-09-28
|
08 | Lars Eggert | [Note]: 'Document Shepherd: Spencer Shepler (spencer.shepler@sun.com)' added by Lars Eggert |
2007-09-28
|
08 | Lars Eggert | State Changes to AD Evaluation from Publication Requested by Lars Eggert |
2007-09-28
|
08 | Lars Eggert | State Change Notice email list have been change to nfsv4-chairs@tools.ietf.org, draft-ietf-nfsv4-nfs-rdma-problem-statement@tools.ietf.org from nfsv4-chairs@tools.ietf.org |
2007-09-27
|
08 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The document shepherd is Spencer Shepler. Spencer has reviewed the documents and believes they are ready for publication. (1.b) Has the document had adequate review both from key members of the interested community and others? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The documents have been reviewed via two working group last calls: WG last call on Aug 17, 2006 http://www1.ietf.org/mail-archive/web/nfsv4/current/msg03706.html WG last call on May 8th, 2007 http://www1.ietf.org/mail-archive/web/nfsv4/current/msg04322.html And the documents have received external review as well. There are no remaining concerns related to depth or breadth of the reviews that have occurred. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No concerns exist. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? No such concerns exist. (1.e) How solid is the consensus of the interested community behind this document? There is broad consensus within the NFS and RPC communities in this work. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? Yes. (1.h) Has the document split its references into normative and informative? Yes. Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? No. If such normative references exist, what is the strategy for their completion? Not applicable. Are there normative references that are downward references, as described in [RFC3967]? Yes. If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. RFC1813 "NFS Version 3 Protocol Specification" (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? Yes. If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? Yes. Yes. If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? Not Applicable. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Yes. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Document Announcement Write-Up for: "NFS RDMA Problem Statement" draft-ietf-nfsv4-nfs-rdma-problem-statement-07.txt --------------------------------------------------------------- Technical Summary Motivation for the application of Remote Direct Memory Access to the NFS protocols is described. NFS implementations historically incur significant overhead due to data copies on end-host systems, as well as other processing overhead. The potential benefits of RDMA to these implementations are explored, and the reasons why RDMA is especially well-suited to NFS and network file protocols in general are evaluated. Working Group Summary There is consensus in the WG to publish these documents. Document Quality As the Informative References demonstrate, this work has drawn on a variety of work in academia and industry and appropriately motivates the appropriate use of RDMA technologies for protocols such as NFS. |
2007-09-27
|
08 | Dinara Suleymanova | State Changes to Publication Requested from AD is watching by Dinara Suleymanova |
2007-09-27
|
08 | Dinara Suleymanova | Intended Status has been changed to Informational from None |
2007-06-30
|
07 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-07.txt |
2007-05-09
|
08 | (System) | State Changes to AD is watching from Dead by system |
2007-05-08
|
06 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-06.txt |
2007-04-26
|
08 | (System) | State Changes to Dead from AD is watching by system |
2007-04-26
|
08 | (System) | Document has expired |
2006-10-23
|
05 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-05.txt |
2006-08-22
|
08 | Lars Eggert | Draft Added by Lars Eggert in state AD is watching |
2006-06-22
|
04 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-04.txt |
2005-10-27
|
03 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-03.txt |
2005-02-21
|
02 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-02.txt |
2004-07-02
|
01 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-01.txt |
2004-02-12
|
00 | (System) | New version available: draft-ietf-nfsv4-nfs-rdma-problem-statement-00.txt |