Skip to main content

Remote Direct Memory Access (RDMA) over IP Problem Statement
draft-ietf-rddp-problem-statement-05

Yes

(Allison Mankin)
(Jon Peterson)
(Thomas Narten)

No Objection

(Alex Zinin)
(Bert Wijnen)
(Bill Fenner)
(Margaret Cullen)
(Ned Freed)
(Steven Bellovin)
(Ted Hardie)

Note: This ballot was opened for revision 05 and is now closed.

(Allison Mankin; former steering group member) Yes

Yes ()

                            

(Jon Peterson; former steering group member) Yes

Yes ()

                            

(Thomas Narten; former steering group member) Yes

Yes ()

                            

(Alex Zinin; former steering group member) No Objection

No Objection ()

                            

(Bert Wijnen; former steering group member) No Objection

No Objection ()

                            

(Bill Fenner; former steering group member) No Objection

No Objection ()

                            

(Harald Alvestrand; former steering group member) (was Discuss) No Objection

No Objection (2004-10-27)
Reviewed by John Loughney, Gen-ART

(Margaret Cullen; former steering group member) No Objection

No Objection ()

                            

(Ned Freed; former steering group member) No Objection

No Objection ()

                            

(Russ Housley; former steering group member) No Objection

No Objection (2004-02-04)
  The Introduction provides a clear description of the situation.  However,
  I find the Abstract very confusing.  I believe that some wordsmithing will
  greatly improve the Abstract.

  The use of IPsec, TLS, or any other protocol that provides authentication
  will not fit well into the proposed architecture.  The integrity check
  cannot be performed until the entire packet (or record in the case of TLS)
  is available in memory.  So, the data must be copied from the I/O interface
  to memory, which may involve some reassembly, before the integrity check
  can be performed.  This issue should be discussed in the second paragraph
  of the security considerations.

  The security considerations section talks about 'threats.'  The use does
  not align with the definitions in RFC 2828.  I suggest some rewording. I
  think the authors ought to look review the definition of 'vulnerability'
  in RFC 2828.

  s/IPSec/IPsec/

  s/privacy/confidentiality/

(Steven Bellovin; former steering group member) No Objection

No Objection ()

                            

(Ted Hardie; former steering group member) No Objection

No Objection ()