The Zu:

I just came back from a business journey and saw your email. Thanks a lot for 
your comments. See my reply please.

> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of Zu
> Qiang
> Sent: Thursday, October 17, 2013 1:30 AM
> To: [email protected]
> Subject: [nvo3] Commnets on draft-ietf-nvo3-security-requirements-00.txt
> 
> Hello, Authors
>       I have a few comments on the draft which I have sent to a few weeks ago.
> Based on the offline discussions I have also added all my comments into a 
> draft
> for a better WG discussion.
> http://tools.ietf.org/html/draft-zu-nov3-security-requirements-01
>       I can summarize my comments here:
> -  the NVO3 network security requirement draft shall allow additional security
> mechanisms other than key management.
[Dacheng Zhang:] 
Maybe you misunderstood our points, we never try to argue the security 
solutions other than key management should not be used, although we do 
introduce how to use key management mechanisms to mitigate different security 
issues
> -  different network architecture may have different network security
> requirements which is missing in this draft.
[Dacheng Zhang:] 
I will think of this. It would be helpful to give us some examples of different 
types of network architectures that we need to consider. Do you mention them in 
your document?


> - as a requirement document, it would be good to have all requirements list in
> bullets which will be easier for an implementation to indicate which
> requirement it has supported.
>       Hope this helps.
> 
> Have a nice day
> Zu Qiang
> 
> 
> >-----Original Message-----
> >From: [email protected] [mailto:[email protected]] On Behalf Of
> >[email protected]
> >Sent: Tuesday, October 15, 2013 6:08 AM
> >To: [email protected]
> >Cc: [email protected]
> >Subject: [nvo3] I-D Action: draft-ietf-nvo3-security-requirements-00.txt
> >
> >
> >A New Internet-Draft is available from the on-line Internet-Drafts 
> >directories.
> > This draft is a work item of the Network Virtualization Overlays Working
> >Group of the IETF.
> >
> >     Title           : Security Requirements of NVO3
> >     Author(s)       : Sam Hartman
> >                          Dacheng Zhang
> >                          Margaret Wasserman
> >     Filename        : draft-ietf-nvo3-security-requirements-00.txt
> >     Pages           : 13
> >     Date            : 2013-09-28
> >
> >Abstract:
> >   This draft discusses the security requirements and several issues
> >   which need to be considered in securing a virtualized data center
> >   network for multiple tenants (a NVO3 network for short).  In
> >   addition, the draft also attempts to discuss how such issues could be
> >   addressed or mitigated.
> >
> >
> >
> >The IETF datatracker status page for this draft is:
> >https://datatracker.ietf.org/doc/draft-ietf-nvo3-security-requirements
> >
> >There's also a htmlized version available at:
> >http://tools.ietf.org/html/draft-ietf-nvo3-security-requirements-00
> >
> >
> >Please note that it may take a couple of minutes from the time of submission
> >until the htmlized version and diff are available at tools.ietf.org.
> >
> >Internet-Drafts are also available by anonymous FTP at:
> >ftp://ftp.ietf.org/internet-drafts/
> >
> >_______________________________________________
> >nvo3 mailing list
> >[email protected]
> >https://www.ietf.org/mailman/listinfo/nvo3
> _______________________________________________
> nvo3 mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/nvo3
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to