RE: [Ips] session re-instatement

"Sandars, Ken" <ken_sandars@adaptec.com> Tue, 27 February 2007 02:27 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HLs3t-0003JJ-CQ; Mon, 26 Feb 2007 21:27:29 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HLs2z-00021U-Vg for ips@ietf.org; Mon, 26 Feb 2007 21:26:33 -0500
Received: from mail-gw3.adaptec.com ([216.52.22.36]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HLs2y-0005OM-DJ for ips@ietf.org; Mon, 26 Feb 2007 21:26:33 -0500
Received: from aime2k302.adaptec.com (aime2k302.adaptec.com [10.25.8.48]) by mail-gw3.adaptec.com (Spam Firewall) with ESMTP id 1D7CD1834A9; Mon, 26 Feb 2007 18:26:07 -0800 (PST)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] session re-instatement
Date: Mon, 26 Feb 2007 18:26:05 -0800
Message-ID: <368FBF3D8437A748BA8222526BF9309901612DCA@aime2k302.adaptec.com>
In-Reply-To: <16236EEEF4D4264DA31C2E35E3607CFE03DA6E25@coex02.trans.corp>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Ips] session re-instatement
Thread-Index: AcdZwlsFNaGu4uqaSIqp1wvjQ+4J/AASx7Gw
References: <16236EEEF4D4264DA31C2E35E3607CFE03DA6E25@coex02.trans.corp>
From: "Sandars, Ken" <ken_sandars@adaptec.com>
To: Paul Hughes <phughes@pillardata.com>, "IP Storage Mailing List (E-mail)" <ips@ietf.org>
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 7268a2980febc47a9fa732aba2b737ba
Cc:
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1819036380=="
Errors-To: ips-bounces@ietf.org

Hi Paul,
 
Section 5.3.5 [RFC3720] para 2 states:

	The initiator session state MUST be FAILED (Section 7.3 Session
State Diagrams) when the initiator attempts a session reinstatement.

In your scenario the initiator violates this rule since both are in
state FREE (Q1).
 
The part of your question explores what happens at the target if this
scenario does occur.
 
The connection and session state machines for the target show that the
session begins life in the ACTIVE state (Q2) when the login phase of the
leading connection starts (S4). Once the leading connection transits
(T5) to LOGGED_IN (S5), the session performs the equivalent transit (N2)
to LOGGED_IN(Q3).
 
In your scenario, there are two new sessions in ACTIVE state, racing
towards LOGGED_IN. A sensible target implementation waits until a
connection makes the T5 transition (corresponding to the session's N2
transition) before enacting the session reinstatement action. Afterall,
it would be a shame to nuke a potentially viable session with a dodgy
login attempt.
 
Some sort of implementation-specific mutual exclusion mechanism must be
used on the target to ensure only one party manipulates the session
state. Hence one connection reaches the T5 transition point and runs the
session reinstatement algorithm.
 
At this point the other session is in Q2 and its connection is in S4
(albeit on the cusp of its transition). While not listed as a T7 reason,
I'd think a resilient target would take that action on the connection.
The session would make the N9 transition (again, not explicitly listed
as a reason, but follows as a consequence of the T7 transit).
 
In other words, the first one to reach full feature phase survives and
the other gets trashed. Sound fair?
 
Cheers
Ken

________________________________

From: Paul Hughes [mailto:phughes@pillardata.com] 
Sent: Tuesday, 27 February 2007 03:23
To: IP Storage Mailing List (E-mail)
Subject: [Ips] session re-instatement



Is there any text in RFC 3720 or the implementer's guide that prevents
an initiator from simultaneously logging-in on two connections to the
same target portal using the same InitiatorName, ISID, and TSIH=0?  If
the logins were done sequentially, the second login would re-instate the
session created by the first login, but I can see how a target might not
do session re-instatement if the sessions are being created
simultaneously.

Thanks, 
Paul 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips