Just to double-check:

- This draft looks at security from the standpoint
  of tenants being potentially malicious, but the provider
  infrastructure is all trusted.
- It assumes that the provider-managed equipment
  is not compromised (e.g. the hypervisor is never
  compromised).

Is this correct?

Anoop

On Wed, Jun 20, 2012 at 1:59 AM,  <[email protected]> wrote:
>
> Hi, folks
>
> A new draft is posted, which is about the security framework for NVO3.
> Please review it, any comments are appreciated.
>
> Filename:                  draft-wei-nvo3-security-framework
> Revision:                  00
> Title:                                   NVO3 Security Framework
> Creation date:                  2012-06-20
> WG ID:                                   Individual Submission
> Number of pages: 8
> URL:
> http://www.ietf.org/internet-drafts/draft-wei-nvo3-security-framework-00.txt
> Status:
> http://datatracker.ietf.org/doc/draft-wei-nvo3-security-framework
> Htmlized:
> http://tools.ietf.org/html/draft-wei-nvo3-security-framework-00
>
>
> Abstract:
>   This document provides a security framework for overlay based network
>   virtualization.  It describes the security reference model, the
>   security threats and security requirements.
>
>
> -------------
> Yinxing Wei
> _______________________________________________
> nvo3 mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/nvo3
>
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to