Re: [auth48] AUTH48: RFC-to-be 9561 <draft-ietf-nfsv4-scsi-layout-nvme-07> for your review

"Black, David" <David.Black@dell.com> Fri, 08 March 2024 21:18 UTC

Return-Path: <prvs=179760441e=david.black@dell.com>
X-Original-To: auth48archive@ietfa.amsl.com
Delivered-To: auth48archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E307EC151095; Fri, 8 Mar 2024 13:18:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LRwFrN1DkrBZ; Fri, 8 Mar 2024 13:18:24 -0800 (PST)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89A3DC151092; Fri, 8 Mar 2024 13:18:20 -0800 (PST)
Received: from pps.filterd (m0170394.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 428HZDMu014570; Fri, 8 Mar 2024 16:18:12 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=7hxW6XmjM13DXLL1mvJYvYCU8vxo5NTnY4Wgrl7/RHM=; b=n+BwSC3cC5MDHcV6aOqZxO7lM/I8Zdd99UMUMwTuWcUkU2Rc+L8FzxfchhV784CUCsz5 CsPnj+TCktVmnoZFGDiWBb17RjBq96BdZnFYkw9qj02b5/u+2zd7o32veI1f38/83K23 oEoZlRN9vl0F+pa/62xBGhBRptAShfI4Pw0n/QhG9Pwbs1/zVUoDdu4IVc6XdWo4Tjy+ OQadIOi17Xmof9hQg5VsPfAbtmSuIOWd0dAAS3eQZTIW8QerLnw7MZqk+6Ef2tLgnN6h gw/fW1bDROvAKejPERZSu5Y9e/4ZMZknshxqVfYNGlPhoyDOVfDeDJfkBtxS3Ac4+ATW ZQ==
Received: from mx0b-00154901.pphosted.com (mx0b-00154901.pphosted.com [67.231.157.37]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 3wqb3wt3hs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 08 Mar 2024 16:18:12 -0500
Received: from pps.filterd (m0144103.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 428JC8v4030928; Fri, 8 Mar 2024 16:18:11 -0500
Received: from nam04-mw2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2168.outbound.protection.outlook.com [104.47.73.168]) by mx0b-00154901.pphosted.com (PPS) with ESMTPS id 3wr0bkgm2r-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 08 Mar 2024 16:18:11 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=e/ro+NbSZTT8nuczjnrqUfXBhWcAYiqsy6X7qONb64DBZ6b9wuE5RwgaRLwSpB7S6R5T0mWF0vQt2zpdH+/0eN3tSQX3okP9iCbT5Wby1ZjABBLlPQA4UXmO7Ua35NRY4aVd42Mxm+MrrU1aJ4110XNMu+7zi4h2X2k1e/V8FU4fJfMQlQH3Y3SxnLQ4Q4wqmMDTUG2293xbqj3d3IVkbgIBFgOwAKFwBSG2jBVx/Bnfbfmoh9oa95NUjzP++1YhHEVBvmfD5fojyrnx6FgDcuiHotLwJKeCio8yViQ9LCMM8AS8cLMmAC9WFSll0lcN8MCjqdDdRuEJHjevKo6EMQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7hxW6XmjM13DXLL1mvJYvYCU8vxo5NTnY4Wgrl7/RHM=; b=D8Imc0kH0sVWPkZKFlJ07RffGdA9pVyo2dfkUknL0TIGBtY1G+p3X0RwG6MglfibmnShMxHJUBijzw2tUVMCxeeoWsi3y+IPm5Oz74JigS+XTfIpwzUMUi/Tbys/P+c2q0MDnLYSLCa5BPTnOOQhdQWE87qtC76cG3UuXFFwhfae/MB8t8x9Iyn0xw5o9VUCOgq5o3A3WDS0zCGyLnh/pmAnPYW68ONp8fI0j0BIZyWlG8vfCYNB/6bhYmKahQ18zz5GHc2ObyALVvSXC9cpcRJCKKNhFTi9+ZIjyfEN0/nEf9gyOYf3ZrSlSDAJKtAf0GLFeY30QOlMRrEkfoaYxg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by MW3PR19MB4329.namprd19.prod.outlook.com (2603:10b6:303:4f::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.24; Fri, 8 Mar 2024 21:18:07 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::daf9:ac37:e670:397f]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::daf9:ac37:e670:397f%4]) with mapi id 15.20.7362.024; Fri, 8 Mar 2024 21:18:07 +0000
From: "Black, David" <David.Black@dell.com>
To: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "hch@lst.de" <hch@lst.de>, "chuck.lever@oracle.com" <chuck.lever@oracle.com>, "s.faibish@opendrives.com" <s.faibish@opendrives.com>
CC: "nfsv4-ads@ietf.org" <nfsv4-ads@ietf.org>, "nfsv4-chairs@ietf.org" <nfsv4-chairs@ietf.org>, "inacio@cert.org" <inacio@cert.org>, "zahed.sarker.ietf@gmail.com" <zahed.sarker.ietf@gmail.com>, "auth48archive@rfc-editor.org" <auth48archive@rfc-editor.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: AUTH48: RFC-to-be 9561 <draft-ietf-nfsv4-scsi-layout-nvme-07> for your review
Thread-Index: AQHacC5qeIsbfwmojUuOw9ezqxpO6bEuVgHQ
Date: Fri, 08 Mar 2024 21:18:07 +0000
Message-ID: <MN2PR19MB4045BB975F71D535DA7AE3D983272@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <20240307012555.CCCBD76356@rfcpa.amsl.com>
In-Reply-To: <20240307012555.CCCBD76356@rfcpa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=97129ccb-47fa-42b8-aa9e-30cdb12b6a70; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2024-03-08T21:00:40Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR19MB4045:EE_|MW3PR19MB4329:EE_
x-ms-office365-filtering-correlation-id: 3bb0c855-b738-4f74-00bf-08dc3fb53fc0
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bb0c855-b738-4f74-00bf-08dc3fb53fc0
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2024 21:18:07.0502 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: l0mwZK9BafVmreHJqqupmSVVD1o4GAzjju6bmj31i2dF8pcP/0BtTALeQydbDOqMpUjWTk6dQn9XIQqAf5bBIw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR19MB4329
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-03-08_08,2024-03-06_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 bulkscore=0 adultscore=0 mlxlogscore=999 malwarescore=0 clxscore=1015 priorityscore=1501 impostorscore=0 mlxscore=0 phishscore=0 spamscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2403080168
X-Proofpoint-GUID: JXXJWfgnMAWoNkvQ7JoTDeVg_ElVoD5N
X-Proofpoint-ORIG-GUID: JXXJWfgnMAWoNkvQ7JoTDeVg_ElVoD5N
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 adultscore=0 lowpriorityscore=0 malwarescore=0 priorityscore=1501 mlxscore=0 bulkscore=0 phishscore=0 impostorscore=0 spamscore=0 mlxlogscore=999 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2403080168
Archived-At: <https://mailarchive.ietf.org/arch/msg/auth48archive/U2KZ_R0Te_QG5SYzt0iDQfJzLpo>
Subject: Re: [auth48] AUTH48: RFC-to-be 9561 <draft-ietf-nfsv4-scsi-layout-nvme-07> for your review
X-BeenThere: auth48archive@rfc-editor.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Archiving AUTH48 exchanges between the RFC Production Center, the authors, and other related parties" <auth48archive.rfc-editor.org>
List-Unsubscribe: <https://mailman.rfc-editor.org/mailman/options/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/auth48archive/>
List-Post: <mailto:auth48archive@rfc-editor.org>
List-Help: <mailto:auth48archive-request@rfc-editor.org?subject=help>
List-Subscribe: <https://mailman.rfc-editor.org/mailman/listinfo/auth48archive>, <mailto:auth48archive-request@rfc-editor.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Mar 2024 21:18:29 -0000

Overall, the RFC Editor has done their usual thorough job of editing.  I found a few small changes that should be made.

Section 3	Security Considerations

First paragraph in text version has a line break in a bad location.

OLD:
   NFSv4.  NFSv4 and RPC security are not directly applicable to the I/
   Os to data servers using NVMe.  Refer to Sections 2.4.6 (Extents Are

NEW:
   NFSv4.  NFSv4 and RPC security are not directly applicable to the I/Os
   to data servers using NVMe.  Refer to Sections 2.4.6 (Extents Are

In general, line breaks should be prohibited in the middle of "I/O" and "I/Os".

Section 5.1	Normative References

Version updates for the three referenced NVMe standards

OLD:
   [NVME-BASE]
              NVM Express, Inc., "NVM Express Base Specification",
              Revision 2.0c, October 2022, <https://nvmexpress.org/wp-
              content/uploads/NVM-Express-Base-Specification-2.0c-
              2022.10.04-Ratified.pdf>.

   [NVME-NVM] NVM Express, Inc., "NVM Express NVM Command Set
              Specification, Revision 1.0c", October 2022,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              NVM-Command-Set-Specification-1.0c-
              2022.10.03-Ratified.pdf>.

   [NVME-TCP] NVM Express, Inc., "NVM Express TCP Transport
              Specification", Revision 1.0c, October 2022,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              TCP-Transport-Specification-1.0c-2022.10.03-Ratified.pdf>.

NEW:
   [NVME-BASE]
              NVM Express, Inc., "NVM Express Base Specification",
              Revision 2.0d, January 2024, <https://nvmexpress.org/wp- 
              content/uploads/NVM-Express-Base-Specification-2.0d-
              2024.01.11-Ratified.pdf>.

   [NVME-NVM] NVM Express, Inc., "NVM Express NVM Command Set
              Specification, Revision 1.0d", December 2023,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              NVM-Command-Set-Specification-1.0d-
              2023.12.28-Ratified.pdf>.

   [NVME-TCP] NVM Express, Inc., "NVM Express TCP Transport
              Specification", Revision 1.0d, December 2023,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              TCP-Transport-Specification-1.0d-2023.12.27-Ratified.pdf>.

Section 5.2	Informative References

Version update for the one referenced NVMe standard

OLD: 
   [NVME-PCIE]
              NVM Express, Inc., "NVMe over PCIe Transport
              Specification", Revision 1.0c, October 2022,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              PCIe-Transport-Specification-1.0c-
              2022.10.03-Ratified.pdf>.

NEW:
   [NVME-PCIE]
              NVM Express, Inc., "NVMe over PCIe Transport
              Specification", Revision 1.0d, December 2023,
              <https://nvmexpress.org/wp-content/uploads/NVM-Express-
              PCIe-Transport-Specification-1.0d-2023.12.27-Ratified.pdf>.

Thanks, --David

-----Original Message-----
From: rfc-editor@rfc-editor.org <rfc-editor@rfc-editor.org> 
Sent: Wednesday, March 6, 2024 8:26 PM
To: hch@lst.de; chuck.lever@oracle.com; s.faibish@opendrives.com; Black, David <David.Black@dell.com>
Cc: rfc-editor@rfc-editor.org; nfsv4-ads@ietf.org; nfsv4-chairs@ietf.org; inacio@cert.org; zahed.sarker.ietf@gmail.com; auth48archive@rfc-editor.org
Subject: AUTH48: RFC-to-be 9561 <draft-ietf-nfsv4-scsi-layout-nvme-07> for your review


[EXTERNAL EMAIL] 

*****IMPORTANT*****

Updated 2024/03/06

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies available as listed in the FAQ (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntWovlshB$ [rfc-editor[.]org]).

You and you coauthors are responsible for engaging other parties (e.g., Contributors or Working Group) as necessary before providing your approval.

Planning your review
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor 
   that have been included in the XML file as comments marked as 
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

   Please ensure that you review any changes submitted by your 
   coauthors.  We assume that if you do not speak up that you 
   agree to changes submitted by your coauthors.

*  Content 

   Please review the full content of the document, as this cannot 
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions 
   (TLP – https://urldefense.com/v3/__https://trustee.ietf.org/license-info/__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntT9P36_C$ [trustee[.]ietf[.]org]).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of  
   content are correctly tagged.  For example, ensure that <sourcecode> 
   and <artwork> are set correctly.  See details at 
   <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntSp6edKj$ [authors[.]ietf[.]org]>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the 
   formatted output, as generated from the markup in the XML file, is 
   reasonable.  Please note that the TXT will have formatting 
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all the parties CCed on this message need to see your changes. The parties
include:

   *  your coauthors
   
   *  rfc-editor@rfc-editor.org (the RPC team)

   *  other document participants, depending on the stream (e.g., 
      IETF Stream participants are your working group chairs, the 
      responsible ADs, and the document shepherd).
     
   *  auth48archive@rfc-editor.org, which is a new archival mailing list 
      to preserve AUTH48 conversations; it is not an active discussion 
      list:
     
     *  More info:
        https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntXLTv7Jd$ [mailarchive[.]ietf[.]org]
     
     *  The archive itself:
        https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntaWZrN_X$ [mailarchive[.]ietf[.]org]

     *  Note: If only absolutely necessary, you may temporarily opt out 
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you 
        have dropped the address. When the discussion is concluded, 
        auth48archive@rfc-editor.org will be re-added to the CC list and 
        its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem beyond editorial in nature, e.g., addition of new text, deletion of text, and technical changes.  Information about stream managers can be found in the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating that you approve this RFC for publication.  Please use ‘REPLY ALL’, as all the parties CCed on this message need to see your approval.


Files
-----

The files are available here:
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561.xml__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntSYI-kBk$ [rfc-editor[.]org]
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561.html__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntfwJ_89Z$ [rfc-editor[.]org]
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561.pdf__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntQogUspo$ [rfc-editor[.]org]
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561.txt__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntdUd7-Bw$ [rfc-editor[.]org]

Diff file of the text:
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561-diff.html__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntVMkuz5V$ [rfc-editor[.]org]
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561-rfcdiff.html__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntdRXZrNo$ [rfc-editor[.]org] (side by side)

Diff of the XML: 
   https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9561-xmldiff1.html__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntUVG2pKl$ [rfc-editor[.]org]

Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9561__;!!LpKI!kFXykM6a2gtfFrntz7AoPYzYQXplF4FJb8wAOL_BVgL0DpC6CLvZz8t7n4CdR7HnHMBlllVyNBgmzn5ntfoCOOBy$ [rfc-editor[.]org]

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC 9561 (draft-ietf-nfsv4-scsi-layout-nvme-07)

Title            : Using the Parallel NFS (pNFS) SCSI Layout to access NVMe storage devices
Author(s)        : C. Hellwig, C. Lever, S. Faibish, D. Black
WG Chair(s)      : Brian Pawlowski, Christopher Inacio
Area Director(s) : Martin Duke, Zaheduzzaman Sarker