Direct Data Placement Protocol (DDP) / Remote Direct Memory Access Protocol (RDMAP) Security
RFC 5042
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22 |
10 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
2012-08-22 |
10 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2007-11-05 |
10 | (System) | This was part of a ballot set with: draft-ietf-rddp-applicability |
2007-11-05 |
10 | Amy Vezza | [Note]: 'RFC 5045, RFC 5042' added by Amy Vezza |
2007-11-05 |
10 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2007-11-05 |
10 | Amy Vezza | [Note]: 'RFC 5045' added by Amy Vezza |
2007-10-31 |
10 | (System) | RFC published |
2006-11-08 |
10 | (System) | Request for Early review by SECDIR Completed. Reviewer: Derek Atkins. |
2006-11-08 |
10 | (System) | Request for Early review by SECDIR Completed. Reviewer: Patrick Cain. |
2006-08-01 |
10 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-07-26 |
10 | Michael Lee | IESG state changed to Approved-announcement sent |
2006-07-26 |
10 | Michael Lee | IESG has approved the document |
2006-07-26 |
10 | Michael Lee | Closed "Approve" ballot |
2006-07-25 |
10 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2006-06-28 |
10 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2006-06-28 |
10 | Russ Housley | [Ballot discuss] draft-ietf-rddp-applicability-07: The discussion in section 9.3 should consider DTLS (RFC 4347). |
2006-06-23 |
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-06-23 |
10 | (System) | New version available: draft-ietf-rddp-security-10.txt |
2006-06-04 |
10 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter |
2006-05-26 |
10 | (System) | Removed from agenda for telechat - 2006-05-25 |
2006-05-25 |
10 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2006-05-25 |
10 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault |
2006-05-25 |
10 | Jari Arkko | [Ballot comment] Nits on the applicability document s/existince/existence/ s/imbedded/embedded/ s/signifigant/significant/ Normative references that are not used: - Unused Reference: [1] is defined on line … [Ballot comment] Nits on the applicability document s/existince/existence/ s/imbedded/embedded/ s/signifigant/significant/ Normative references that are not used: - Unused Reference: [1] is defined on line 909, but not referenced - Unused Reference: [2] is defined on line 912, but not referenced - Unused Reference: [3] is defined on line 915, but not referenced - Unused Reference: [4] is defined on line 918, but not referenced - Unused Reference: [5] is defined on line 923, but not referenced - Unused Reference: [9] is defined on line 937, but not referenced |
2006-05-25 |
10 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko by Jari Arkko |
2006-05-25 |
10 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2006-05-25 |
10 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2006-05-25 |
10 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2006-05-24 |
10 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded for Ross Callon by Ross Callon |
2006-05-24 |
10 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
2006-05-24 |
10 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings |
2006-05-24 |
10 | Yoshiko Fong | IANA Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2006-05-24 |
10 | Dan Romascanu | [Ballot comment] Both documents depend on several normative references from the rddp wg. Specifically the Internet-Drafts defining DDP and RDMAP did not yet go through … [Ballot comment] Both documents depend on several normative references from the rddp wg. Specifically the Internet-Drafts defining DDP and RDMAP did not yet go through IESGLC. I am wondering if as result of the broader community review there is a chance that changes will happen to influence the security aspects and applicability statements related to DDP and RDMAP. The timing of approving these two documents before the protocols having even gone through Last Call seems questionable. |
2006-05-24 |
10 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu |
2006-05-23 |
10 | Sam Hartman | [Ballot discuss] The following text in section 2 of the security draft is not referenced in the normative requirements in section 12: > In any … [Ballot discuss] The following text in section 2 of the security draft is not referenced in the normative requirements in section 12: > In any event, it is the responsibility of the Privileged Resource > Manager to ensure that no STag can be created that exposes memory > that the consumer had no authority to expose. It seems clear that some normative requirement regarding this issue is needed. If the text in section 2 is not intended to be normative add some text and point to it from section 12. If the text in section 2 is intended to be normative point to it from section 12. |
2006-05-23 |
10 | Sam Hartman | [Ballot comment] The discussion of TLS in section 5.4 of the security draft does not make sense to me. How is the record length of … [Ballot comment] The discussion of TLS in section 5.4 of the security draft does not make sense to me. How is the record length of 2**14 bytes any worse than MTUs over common links? Also, Russ is right; you should analyze DTLS as well. The advice in section 5.4 implies that data source authentication is sufficient to defeat MITM without per-packet integrity. I don't understand how authentication of the source of a packet is meaningful without authenticating that the contents are unmodified. |
2006-05-23 |
10 | Sam Hartman | [Ballot comment] The discussion of TLS in section 5.4 does not make sense to me. How is the record length of 2**14 bytes any worse … [Ballot comment] The discussion of TLS in section 5.4 does not make sense to me. How is the record length of 2**14 bytes any worse than MTUs over common links? Also, Russ is right; you should analyze DTLS as well. The advice in section 5.4 implies that data source authentication is sufficient to defeat MITM without per-packet integrity. I don't understand how authentication of the source of a packet is meaningful without authenticating that the contents are unmodified. |
2006-05-23 |
10 | Sam Hartman | [Ballot discuss] The following text in section 2 is not referenced in the normative requirements in section 12: > In any event, it is the … [Ballot discuss] The following text in section 2 is not referenced in the normative requirements in section 12: > In any event, it is the responsibility of the Privileged Resource > Manager to ensure that no STag can be created that exposes memory > that the consumer had no authority to expose. It seems clear that some normative requirement regarding this issue is needed. If the text in section 2 is not intended to be normative add some text and point to it from section 12. If the text in section 2 is intended to be normative point to it from section 12. |
2006-05-23 |
10 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman |
2006-05-23 |
10 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Undefined by Lars Eggert |
2006-05-22 |
10 | Russ Housley | [Ballot discuss] draft-ietf-rddp-security-09: The discussion in section 5.4.2 should consider DTLS (RFC 4347). It might be best handled as a separate section. … [Ballot discuss] draft-ietf-rddp-security-09: The discussion in section 5.4.2 should consider DTLS (RFC 4347). It might be best handled as a separate section. draft-ietf-rddp-applicability-06: Section 6.6 says: > > A ULP that requires data integrity checking more thorough than an > end-to-end CRC32c should first invalidate all STags that reference > a buffer before applying their own integrity check. > Explanation is needed here. The next paragraph (which is repeated below) suggests the use of IPsec for this greater integrity protection. Why "invalidate all STags that reference a buffer" prior to IPsec encapsulation? Section 6.6 goes on to say: > > CRC32c only provides protection against random corruption. To > protect against unauthorized alteration or forging of data packets, > security methods must be applied. IPsec is supported for both SCTP > and MPA/TCP. > A bit more needs to be said about the use of IPsec. Please see draft-bellovin-useipsec-04.txt. At a minimum, the discussion of IPsec needs to say which IPsec protocol is to be used (AH or ESP) and say which mode is to be employed (transport mode or tunnel mode). Also, in this situation, the cryptography needs to provide integrity. Some encryption techniques provide confidentiality without providing integrity. I pointer to parts of RFC 3723 might resolve this concern. The discussion in section 9.3 should consider DTLS (RFC 4347). |
2006-05-22 |
10 | Russ Housley | [Ballot comment] s/IPSEC/IPsec/ In draft-ietf-rddp-applicability-06, please spell out the first use of ULP (Upper Layer Protocol). |
2006-05-22 |
10 | Russ Housley | [Ballot discuss] draft-ietf-rddp-security-09: The discussion in section 5.4.2 should consider DTLS (RFC 4347). It might be best handled as a separate section. … [Ballot discuss] draft-ietf-rddp-security-09: The discussion in section 5.4.2 should consider DTLS (RFC 4347). It might be best handled as a separate section. draft-ietf-rddp-applicability-06: Section 6.6 says: > > A ULP that requires data integrity checking more thorough than an > end-to-end CRC32c should first invalidate all STags that reference > a buffer before applying their own integrity check. > Explanation is needed here. The next paragraph (which is repeated below) suggests the use of IPsec for this greater integrity protection. Why "invalidate all STags that reference a buffer" prior to IPsec encapsulation? Section 6.6 goes on to say: > > CRC32c only provides protection against random corruption. To > protect against unauthorized alteration or forging of data packets, > security methods must be applied. IPsec is supported for both SCTP > and MPA/TCP. > A bit more needs to be said about the use of IPsec. Please see draft-bellovin-useipsec-04.txt. At a minimum, the discussion of IPsec needs to say which IPsec protocol is to be used (AH or ESP) and say which mode is to be employed (transport mode or tunnel mode). Also, in this situation, the cryptography needs to provide integrity. Some encryption techniques provide confidentiality without providing integrity. I pointer to parts of RFC 3723 might resolve this concern. The discussion in section 9.3 should consider DTLS (RFC 4347). |
2006-05-22 |
10 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley |
2006-05-22 |
10 | Lars Eggert | [Ballot comment] These are all about draft-ietf-rddp-applicability-06.txt. Overall: Cites RFC2119, doesn't have the boilerplate text, uses the terms in only a few subsections. Does this … [Ballot comment] These are all about draft-ietf-rddp-applicability-06.txt. Overall: Cites RFC2119, doesn't have the boilerplate text, uses the terms in only a few subsections. Does this AS actually _need_ to use RFC2119 terms? Needs to be idnits-, grammar- and spell-checked. Section 1., para. 0: 1. Introduction draft-ietf-rddp-security-09.txt has a much more readable introductory overview of the RDDP protocols and the ideas behind it. Since the security document is not the most obvious place for people to look for that sort of thing, it may therefore be worth pointing at it in this section. Section 2., para. 0: 2. Definitions Given that all six RDDP documents (the two in this ballot and the four others on their way to the IESG) duplicate subsets of the same terminology more or sometimes less consistently, it may make sense to consolidate the RDDP terminology in _one_ draft - this one? - and put a normative reference on it in the others. Section 3.2., para. 0: > Content access applications are primary examples of applications with > both high bandwidth and high content to required ULP interaction > ratios. These applications include file access protocols (NAS), > storage access (SAN), database access and other application specific > forms of content access such as HTTP, XML and email. Can't parse the first sentence of this paragraph. 3.2. Direct Placement using only the LLP May make sense to swap sections 3.1 and 3.2 for readability reasons. Section 3.2., para. 2: > An application that could predict incoming messages and required > nothing more than direct placement into buffers might be able to do > so with a properly designed local interface to SCTP or TCP. Doing so > for TCP requires making predictions at a byte level rather than a > message level. What does "requires making predictions at a byte level" mean? Section 4., para. 4: > Some examples of data that typically belongs in the untagged message > would include short fixed size control data that is inherently part > of the control message almost always should be included in the > untagged message, relatively short payload that is almost always > needed (especially when it would eliminate a round-trip to fetch the > data. For example, the initial data on a write request, and of > course advertising tagged buffers that specify the location of data > not in the untagged message. I can't parse this paragraph. Section 4.3., para. 2: > A ULP where all exchanges would naturally be only the untagged > message would derive virtually no benefit from the use of RDMAP/DDP > as opposed to SCTP. But while tagged buffers are the justification > for RDMAP/DDP, untagged buffers are still necessary. Without > untagged buffers the only method to exchange buffer advertisements > would involve out-of-band communications and/or sharing of compile > time constants. Most RDMA-aware ULPs use untagged buffers for > requests and responses. Buffer advertisements are typically done > within these untagged messages. Can't parse the first sentence. What does "sharing of compile-time constants" mean? Section 6.9.1., para. 4: > With SCTP, a pair of SCTP streams can be used for sequential > sessions. With MPA/TCP each connection can be used for at most one > session. However, the same source/destination pair of ports can be > re-used sequentially subject to normal TCP rules. What are "sequential" sessions, do you mean recurring? Section 9.1., para. 0: 9. Security considerations How does this relate to draft-ietf-rddp-security-09.txt? There seems to be some duplication of content. Is it maybe sufficient to point at draft-ietf-rddp-security-09.txt here? Section 10.1., para. 0: 10.1. Normative references These normative references are not cited anywhere, which seems odd: [1], [2], [3], [4], [5], [9] |
2006-05-22 |
10 | Lars Eggert | [Ballot Position Update] New position, Undefined, has been recorded for Lars Eggert by Lars Eggert |
2006-05-22 |
10 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund |
2006-05-18 |
10 | Jon Peterson | Placed on agenda for telechat - 2006-05-25 by Jon Peterson |
2006-05-18 |
10 | Jon Peterson | State Changes to IESG Evaluation from Waiting for Writeup by Jon Peterson |
2006-05-18 |
10 | Jon Peterson | [Ballot Position Update] New position, Yes, has been recorded for Jon Peterson |
2006-05-18 |
10 | Jon Peterson | Ballot has been issued by Jon Peterson |
2006-05-18 |
10 | Jon Peterson | Created "Approve" ballot |
2006-05-05 |
10 | Lars Eggert | Jon Peterson will process this set of documents. |
2006-05-05 |
10 | Lars Eggert | Shepherding AD has been changed to Jon Peterson from Lars Eggert |
2006-05-02 |
10 | Lars Eggert | Shepherding AD has been changed to Lars Eggert from Jon Peterson |
2006-05-01 |
09 | (System) | New version available: draft-ietf-rddp-security-09.txt |
2006-04-19 |
10 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2006-04-05 |
10 | Amy Vezza | Last call sent |
2006-04-05 |
10 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2006-04-05 |
10 | Jon Peterson | Last Call was requested by Jon Peterson |
2006-04-05 |
10 | Jon Peterson | State Changes to Last Call Requested from AD Evaluation::AD Followup by Jon Peterson |
2006-04-05 |
10 | (System) | Ballot writeup text was added |
2006-04-05 |
10 | (System) | Last call text was added |
2006-04-05 |
10 | (System) | Ballot approval text was added |
2006-03-10 |
10 | Jon Peterson | [Note]: 'PROTO Sherpherd: David Black (Black_David@emc.com)' added by Jon Peterson |
2006-03-10 |
10 | Jon Peterson | PROTO writeup: DDP/RDMAP Security draft-ietf-rddp-security-07.txt Requested Publication … PROTO writeup: DDP/RDMAP Security draft-ietf-rddp-security-07.txt Requested Publication Status: Proposed Standard PROTO shepherd: David L. Black (RDDP WG Chair) ------------------------------------------------------------------------ 1.a) Have the chairs personally reviewed this version of the Internet Draft (ID), and in particular, do they believe this ID is ready to forward to the IESG for publication? Yes. 1.b) Has the document had adequate review from both key WG members and key non-WG members? Yes, primarily from WG members. Do you have any concerns about the depth or breadth of the reviews that have been performed? The draft has had limited review outside the WG. 1.c) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? This is a security analysis document. The Security Area should be asked to review it sooner rather than later. 1.d) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or have concerns whether there really is a need for it. In any event, if your issues have been discussed in the WG and the WG has indicated it that it still wishes to advance the document, detail those concerns in the write-up. No. 1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Security expertise and interest exists in a limited portion of the WG. In general, WG members with scurity expertise or interest understand and agree with this document. 1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email to the Responsible Area Director. No. 1.g) Have the chairs verified that the document adheres to all of the ID nits? (see http://www.ietf.org/ID-Checklist.html). The ID nits checker says everything is ok. 1.h) Is the document split into normative and informative references? Yes. Are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (note here that the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) There are two normative references to Internet-Drafts: o draft-ietf-rddp-ddp - Publication has been requested along with this draft. o draft-ietf-rddp-rdmap - Publication has been requested along with this draft. 1.i) For Standards Track and BCP documents, the IESG approval announcement includes a write-up section with the following sections: * Technical Summary * Working Group Summary * Protocol Quality 1.j) Please provide such a write-up. Recent examples can be found in the "protocol action" announcements for approved documents. -- Technical Summary This document analyzes security issues around implementation and use of the Direct Data Placement Protocol(DDP) and Remote Direct Memory Access Protocol (RDMAP). It first defines an architectural model for an RDMA Network Interface Card (RNIC), which can implement DDP or RDMAP and DDP. The document reviews various attacks against the resources defined in the architectural model and the countermeasures that can be used to protect the system. Attacks are grouped into spoofing, tampering, information disclosure, denial of service, and elevation of privilege. Finally, the document concludes with a summary of security services for DDP and RDMAP, such as IPsec. -- Working Group Summary Serious security analysis takes time - this document is no exception. There has been extensive review of this document in the WG. The need for the Privileged Resource Manager was initially controversial, but the WG now has strong consensus for its necessity. -- Protocol Quality The protocol has been reviewed for the rddp WG by David L. Black. |
2006-03-09 |
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-03-09 |
08 | (System) | New version available: draft-ietf-rddp-security-08.txt |
2006-02-06 |
10 | Jon Peterson | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Jon Peterson |
2005-10-12 |
10 | Jon Peterson | State Changes to AD Evaluation from Publication Requested by Jon Peterson |
2005-10-12 |
10 | Jon Peterson | Merged with draft-ietf-rddp-ddp by Jon Peterson |
2005-08-04 |
10 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2005-04-12 |
07 | (System) | New version available: draft-ietf-rddp-security-07.txt |
2004-12-27 |
06 | (System) | New version available: draft-ietf-rddp-security-06.txt |
2004-12-17 |
(System) | Posted related IPR disclosure: Microsoft Corporation 's statement about IPR claimed in draft-ietf-rddp-security-05.txt | |
2004-08-27 |
05 | (System) | New version available: draft-ietf-rddp-security-05.txt |
2004-08-23 |
04 | (System) | New version available: draft-ietf-rddp-security-04.txt |
2004-08-09 |
03 | (System) | New version available: draft-ietf-rddp-security-03.txt |
2004-07-19 |
02 | (System) | New version available: draft-ietf-rddp-security-02.txt |
2003-10-22 |
01 | (System) | New version available: draft-ietf-rddp-security-01.txt |
2003-10-22 |
00 | (System) | New version available: draft-ietf-rddp-security-00.txt |