{"draft":"draft-ietf-rddp-security-10","doc_id":"RFC5042","title":"Direct Data Placement Protocol (DDP) \/ Remote Direct Memory Access Protocol (RDMAP) Security","authors":["J. Pinkerton","E. Deleganes"],"format":["ASCII","HTML"],"page_count":"52","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Remote Direct Data Placement","abstract":"This document analyzes security issues around implementation and \r\nuse of the Direct Data Placement Protocol (DDP) and Remote Direct \r\nMemory Access Protocol (RDMAP). It first defines an architectural \r\nmodel for an RDMA Network Interface Card (RNIC), which can \r\nimplement DDP or RDMAP and DDP. The document reviews various \r\nattacks against the resources defined in the architectural model \r\nand the countermeasures that can be used to protect the system.\r\nAttacks are grouped into those that can be mitigated by using secure\r\ncommunication channels across the network, attacks from Remote Peers,\r\nand attacks from Local Peers. Attack categories include spoofing,\r\ntampering, information disclosure, denial of service, and elevation of privilege. [STANDARDS-TRACK]","pub_date":"October 2007","keywords":["[--------|p]","rdma network interface card","rnic"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC7146"],"see_also":[],"doi":"10.17487\/RFC5042","errata_url":null}