Re: [Gen-art] Gen-art telechat review of draft-ietf-nfsv4-minorversion2-40

Tom Haynes <> Fri, 22 January 2016 23:11 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id EFA051A9062 for <>; Fri, 22 Jan 2016 15:11:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001] autolearn=unavailable
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id A063FZXAvbVx for <>; Fri, 22 Jan 2016 15:11:24 -0800 (PST)
Received: from ( [IPv6:2607:f8b0:400e:c00::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id E26191A905F for <>; Fri, 22 Jan 2016 15:11:23 -0800 (PST)
Received: by with SMTP id e65so49491283pfe.0 for <>; Fri, 22 Jan 2016 15:11:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20150623; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=itgUzzinCvRIE20QQCm+nm77Mb8DeCfesrk3k5hjF6k=; b=vYZxth8XNB+VJ3mG37Xf1Q2mnngL2Jihvw/WG4KNuX+uoDnYVDjNzgxCdvOm8ikyK2 q4+1I4IBIxVyee5qpa3C8p6Xe3xN5UT7YGz29fOu+DEUr/Ofl0HckBQKOQ/89t84uQcl D8MJ5UvqYarki46Qd6Z/mBFFr93KOGaVqXL8UH/jlIDXx8GMyViIGY/l/AykygkTn6ng nhky+ETjVdvURbVlLq8YGHf6Tm1MCKjggm6moG2hsXa2ppbLIeFM5pxtS0DlpRqYd7/Q +S2D/UoXhGLeyhBDzl5NmLtbwlFer3VT/e6BXDJmRQwnWhcyEfyzu86im84B31aoxdPD nQ5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=itgUzzinCvRIE20QQCm+nm77Mb8DeCfesrk3k5hjF6k=; b=l0GxkWBZRQKYgZLY8Se5onjmvZCgN6Dd5Dmt2cXynA+IpL+/Yj+4zMPLAabMrhUPYF H0XmLwtCQPnP/VwE6TgXEqtY+JDH8IYQmpgSDmxmWSZB/UNKsTsiwn36L60pg+7+ojBy wDPxMtfRZqn/EBPcjZd2GaxRATbXTYTATDojlfs16SGLkZz0EVsCsfJMbo8+iQ0QB1nL H8b7tCd0hg981zm7VgnfKEQ99fpjoJBv3ixdDqku0z6mUdK186pvRo47jw8LjsrJW+ex h+S/7QRIndZSBkpXpJw6+zUg5WtzEqkyYn7N1oyXG+/nDEKVGIL03hznVSRsiSFBJ+Sm dB6w==
X-Gm-Message-State: AG10YORU4ePdxGDoTPfJQOB+8ae+7yQ5j/t2phz65id62y2xiJU6yLnyGEzvXeFchT7WdPXM
X-Received: by with SMTP id m4mr8135387pfi.79.1453504283506; Fri, 22 Jan 2016 15:11:23 -0800 (PST)
Received: from ( []) by with ESMTPSA id 16sm12015794pfh.48.2016. (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 22 Jan 2016 15:11:22 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Tom Haynes <>
In-Reply-To: <>
Date: Fri, 22 Jan 2016 15:11:22 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <>
References: <>
To: Elwyn Davies <>
X-Mailer: Apple Mail (2.3112)
Archived-At: <>
Cc: "" <>, General area reviewing team <>, "Adamson, Andy" <>
Subject: Re: [Gen-art] Gen-art telechat review of draft-ietf-nfsv4-minorversion2-40
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 22 Jan 2016 23:11:27 -0000

Hi Elwyn,

Comments inline,

Hi Andy,

Look for [Andy]

> On Jan 16, 2016, at 12:09 PM, Elwyn Davies <> wrote:
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair. Please wait for direction from your
> document shepherd or AD before posting a new version of the draft.
> For more information, please see the FAQ at
> <>.
> Document: draft-ietf-nfsv4-minorversion2-40.txt
> Reviewer: Elwyn Davies
> Review Date: 2016/01/16
> IETF LC End Date: 2015/12/09
> IESG Telechat date: 2016/01/21
> Summary: Almost ready.  Thank you for addressing almost all the issues that I raised in my last call review.  A couple of additional points have arisen as documented below.  Also I missed the usage 'we' phraseology on the first pass and there are a couple of typos that appeared in the modified text of -40.
> Major issues:
> Minor issues:
> s4., bullet #2: A late-breaking issue with RPCSEC_GSS v3 was raised just prior to the last IESG meeting (see email [1] quoted below).  I think the requirement to use QoP rpc_gss_svc_privacy for at least the privileges copy_from_auth and copy_to_auth for other reasons (the shared secret being carried) effectively mitigates the problem identified which relates to multi-principal authorization. However I am not clear if the problem would apply to the third privilege defined in this document (copy_confirm_auth_priv).  If it does then presumably extending the use of the privacy QoP to all the privileges would mitigate the problem.  As I understand it there is ongoing discussion of the appropriate changes needed in the RPCSEC_GSS v3 draft and there is a possibility that fixes applied there might have a knock-on effect in this draft:  Please liaise with the authors of draft-ietf-nfscv4-gssv3.

^^ I should have peeked ahead!

> Nits/editorial comments:
> General: I also missed a number of instances (17, I think) of the "we <do something>" construction familiar from scientific papers.   This is not appropriate phraseology for an RFC and needs to be changed to avoid the "we", e..g.,
> s1.4.5: s/We introduce WRITE_SAME (see Section 15.12)/The WRITE_SAME operation (see Section 15.12) is introduced/

I’ve fixed all of the royal we’s I found!

> Genera: I realized that there is no general terminology section in this document.  Clearly most of it is taken over from either or both of RFC 7530 (s1.5) and RFC 5661 (s1.6).  What triggered this was the point that stateid isn't actually defined in this doc.  A reference to one or both of these and/or possibly some copies of definitions would be helpful.
> s2, last para: s/metadata sever/metadata server/


> s3.3: s/E.g., as per Section 16.2.3 of [RFC5661],/For example, as per Section 16.2.3 of [RFC5661],/


> s4.1: Removing the s4.1 header would be in keeping with usual style as you have already done for other sections.

done earlier

> s4.2, para 2: s/intra-sever/intra-server/

done earlier
> s4.4.2, para 1:
> OLD:
> Other operations are OPTIONAL in the context of a particular feature Section 13,
> NEW:
> Other operations are OPTIONAL in the context of a particular feature (see Table 6 in Section 13),

I think this is Table 5

> s4.9, last para:
> I was supposed to be letting you know if some extra explanation of why seqid being zero is ambiguous.... so, yes, I do think a bit extra is needed. Here goes:
>> s15.8.3 notes that there can be multiple file copies associated with a single file going on at the same time.  This is only implicit up to that point I think.  It would be helpful to add a note about this possibility and the availability of asynchronous copy in general to the intro of section 4.
>> In the following I may not have exactly grokked what the copy offload stateid represents... if so please adjust the words
>> Add to intro (was in s4.1, s/b in s4) as new last para:
>> ADD:
>> The copy feature allows the server to perform the copying either synchronously or asynchronously.  The client can request synchronous copying but the server may not be able to honor this request.  If the server intends to perform asynchronous copying, it supplies the client with a request identifier that  the client can use to monitor the progress of the copying and, if appropriate, cancel a request in progress.   The request identifier is a stateid representing the internal locks held by the server while the copying is performed. Multiple asynchronous copies of all or part of a file may be in progress in parallel on a server; the stateid request identifier allows monitoring and canceling to be applied to the correct request.
>> END
>> Then modify the last para of s4.9:
>> OLD:
>>   A copy offload stateid's seqid MUST NOT be zero.  In the context of a
>>   copy offload operation, it is ambiguous to indicate the most recent
>>   copy offload operation using a stateid with seqid of zero. Therefore
>>   a copy offload stateid with seqid of zero MUST be considered invalid.
>> NEW:
>>   A copy offload stateid's seqid MUST NOT be zero.  In the context of a
>>   copy offload operation, it is inappropriate to indicate "the most recent
>>   copy offload operation" using a stateid with seqid of zero (see Section 8.2.2
>>   of [RFC5661] for the meaning of a seqid of zero).  It is inappropriate
>>   because the stateid refers to internal state in the server and there may
>>   be several asynchronous copy operations being performed in parallel
>>   on the same file by the server.  Therefore
>>   a copy offload stateid with seqid of zero MUST be considered invalid.
>> END 

Done earlier

> s4.10, para 2:  Is it essential that every server implements all three structured privileges?  As I understand the specification, a server that only acted as a source would only need copy_from_auth whereas a server that only acted as a destination would only need copy_to_auth  and copy_confirm_auth privileges.  Presumably this could alternatively be covered by appropriate policies in a server that implemented all three.. I am not sure whether the error responses would be clearer if the implementation was missing or the policy was used.  Is this worthy of a comment?


> s4.10.1.1, para 3: s/This features allow/This feature allows/


> s4.10.1.1: Some explanatory text has been added to the specification of structured privileges in draft-ietf-nfsv4-rpcsec-gssv3-15.  I suggest that some minor updates to s4.10.1.1 should be  made to tie in with this specification.  In particular minorversion2 needs to specify how the data structure is encoded as specified in the GSS draft - RPCSEC_GSSv3 doesn't know or care since it is treated as opaque data at the GSS level.  Clearly, for NFSv4.2, it is intended that XDR encoding is used but this should be stated explicitly.   I suggest adding a new para after the existing para 3 and making it clear that the string at the beginning of each section is passed in the rp_name field (also alter the "We define" which is not the correct style) :
> OLD (para 4):
>   We define three RPCSEC_GSSv3 structured privilege assertions that
>   work in tandem to authorize the copy:
> NEW:
>   For each structured privilege assertion defined by a RPC application
>   RPCSEC_GSSv3 requires the application to define a name string and a
>   data structure that will be encoded and passed between client and server
>   as opaque data.  For NFSv4 the data structures specified below MUST
>   be serialized using XDR.
>   Three RPCSEC_GSSv3 structured privilege assertions that
>   work together to authorize the copy are defined here.  For each of
>   the assertions the description starts with the name string passed in
>   the rp_name field of the rgss3_privs structure defined in
>   Section of [rpcsec_gssv3] and specifies the XDR encoding of
>   the associated structured data passed via the rp_privilege field of
>   the structure.