Re: [nfsv4] rfc3530bis-28 draft - i18n material

"Noveck, David" <david.noveck@emc.com> Wed, 23 October 2013 16:33 UTC

Return-Path: <david.noveck@emc.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17D2F21F968B for <nfsv4@ietfa.amsl.com>; Wed, 23 Oct 2013 09:33:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ew0WmiGzEdIm for <nfsv4@ietfa.amsl.com>; Wed, 23 Oct 2013 09:33:17 -0700 (PDT)
Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) by ietfa.amsl.com (Postfix) with ESMTP id B97E511E8436 for <nfsv4@ietf.org>; Wed, 23 Oct 2013 09:33:14 -0700 (PDT)
Received: from maildlpprd54.lss.emc.com (maildlpprd54.lss.emc.com [10.106.48.158]) by mailuogwprd51.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9NGXCKw025433 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <nfsv4@ietf.org>; Wed, 23 Oct 2013 12:33:13 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd51.lss.emc.com r9NGXCKw025433
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1382545994; bh=ClpA5CkND/dzZtNSjeA5D8VsYjU=; h=From:To:Date:Subject:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=KpyN0YYOdRGBlS9wPOlzamN+xIgzZII5eUqps3GUg5fkduqNFsbLuGl3Bh9LaebnT EMGHd/Sawt9H9R32kEpwiPj6W2jBeR6o91bWw0VkeBieNM63l0rVQZpg+U4zZwWVbL hB1lxDDwMuKjeI8npNEn/pOi6bQOO6FN6kzHj3OU=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd51.lss.emc.com r9NGXCKw025433
Received: from mailusrhubprd52.lss.emc.com (mailusrhubprd52.lss.emc.com [10.106.48.25]) by maildlpprd54.lss.emc.com (RSA Interceptor) for <nfsv4@ietf.org>; Wed, 23 Oct 2013 12:33:00 -0400
Received: from mxhub01.corp.emc.com (mxhub01.corp.emc.com [10.254.141.103]) by mailusrhubprd52.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9NGWxtT011937 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <nfsv4@ietf.org>; Wed, 23 Oct 2013 12:33:00 -0400
Received: from mx31a.corp.emc.com ([169.254.1.171]) by mxhub01.corp.emc.com ([10.254.141.103]) with mapi; Wed, 23 Oct 2013 12:33:00 -0400
From: "Noveck, David" <david.noveck@emc.com>
To: "Black, David" <david.black@emc.com>, "nfsv4@ietf.org" <nfsv4@ietf.org>
Date: Wed, 23 Oct 2013 12:32:58 -0400
Thread-Topic: rfc3530bis-28 draft - i18n material
Thread-Index: Ac7QABuPcwHXRrUdR4u5vhuaqqs1VwACPP9A
Message-ID: <5DEA8DB993B81040A21CF3CB332489F608AB816D85@MX31A.corp.emc.com>
References: <8D3D17ACE214DC429325B2B98F3AE712025DED6E56@MX15A.corp.emc.com>
In-Reply-To: <8D3D17ACE214DC429325B2B98F3AE712025DED6E56@MX15A.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_5DEA8DB993B81040A21CF3CB332489F608AB816D85MX31Acorpemcc_"
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd52.lss.emc.com
X-RSA-Classifications: public
Subject: Re: [nfsv4] rfc3530bis-28 draft - i18n material
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2013 16:33:21 -0000

Most of the things that you mention in your list are things that I thought were appropriate for the post-rfc3530bis internationalization document.  As I read your message, you feel that at least the list of components we don't control needs to be in a new version of rfc3530bis.



I don't feel that that's a problem, but including some of the other items would add a  lot of time/uncertainty/confusion that the document-things-as-implemented approach was intended to avoid.  Could you clarify where you intend to draw the line between rfc3530bis-xy and draft-ietf-nfsv4-i18n-someday-somehow-00 (that addresses all nfsv4 minor versions)?



Now as to your specific items:



Ø  For the latter, I think it's important to state that both NFC-based and NFD-based physical filesystems are in use on NFS servers (with examples),



I'm not even sure that is true and I certainly don't have examples.  Also, I don't think it adds anything to arguing the untenability of mandating a protocol-wide normalization form.  If filesystems that used both forms exist, and there were not normalization-unaware filesystems, you could translate between NFC and NFD, right above the filesystem layer, if necessary.  It is the presence of normalization-unaware filesystems and normalization-unaware users who don't like their filenames changed, in their view gratuitously, that makes a normalization form mandate untenable.



Ø  Beyond that, I don't know how far to go into Nico's discussion of normalization insensitivity and normalization preservation as the only possible way forward, but I think some of that rationale should be included as rationale - Section 12.3 will need to grow, but I hope it won't be necessary to explain everything that's been explored on the list.



I don't think we want to make the case that the only possible way forward, but that's up to the working group.  I assume that we will need to explain it as a possible way forward but that's in the context of a future document.  Right now, we simply say it is allowed because there is a server that does it and it interoperates with existing clients.  It's a "MAY" and you're free to think of it as a way forward or backward or sideways :)



Ø  so perhaps we should set up a side meeting on 3530bis i18n for later in the week?



Sounds good.  How about right after the précis meeting?







-----Original Message-----
From: nfsv4-bounces@ietf.org [mailto:nfsv4-bounces@ietf.org] On Behalf Of Black, David
Sent: Wednesday, October 23, 2013 10:57 AM
To: nfsv4@ietf.org
Subject: [nfsv4] rfc3530bis-28 draft - i18n material



With my name having been mentioned in connection with the i18n changes in this draft, I took an initial look at the new i18n text in section 12 of the -28 version.



While I need to look at the text more carefully, it looked reasonable on an initial quick read, and I definitely support the "document the running code"

approach being taken.  FWIW, I've been here recently with another "document the running code" draft that made backwards-incompatible changes to iSER in order to match what was implemented and is being used (the story there is somewhat analogous - there were some clever ideas added to the spec which implementers roundly ignored)  FWIW, that draft has been approved by the IESG and is in the RFC Editor's Queue:



                http://datatracker.ietf.org/doc/draft-ietf-storm-iser/



Something that I would suggest capturing in the 3530bis draft is the WG discussion around software components that are beyond the IETF's control in addition to the "running code" aspects of dealing with what's deployed and actually in use (and mostly working, although perhaps not perfectly in all possible cases).  My initial list of components (all of which deal with Unicode in filenames in some fashion) is:



- Runtime library, including locale.  Some Unicode processing can only

                be done here.

- Client OS filesystem framework.  May impose requirements.

* NFS client

* NFS server

- Server OS filesystem framework.  May impose requirements..

- Server physical filesystem.  Definitely imposes requirements.



A couple of important (IMHO) things to point out are that (1) the IETF specifies only the two *'d components, not the other four, and that (2) physical filesystems do not have a standard way of dealing with Unicode.

For the latter, I think it's important to state that both NFC-based and NFD-based physical filesystems are in use on NFS servers (with examples), in addition to the draft's existing text that points out that the OS filesystem frameworks may use different normalization forms (also seen in actual NFS usage), in support of the conclusion that mandating a single normalization form on the wire is untenable.  A useful example to provide is that if a single NFS client is talking to multiple NFS servers that use a mix of NFC and NFD, there's no single "right answer"

for the on-the-wire normalization form.



Beyond that, I don't know how far to go into Nico's discussion of normalization insensitivity and normalization preservation as the only possible way forward, but I think some of that rationale should be included as rationale - Section 12.3 will need to grow, but I hope it won't be necessary to explain everything that's been explored on the list.



Unfortunately, I cannot be in Vancouver for the nfsv4 WG meeting - due to a conflicting standards meeting (T10 SCSI standards), I won't arrive until late Tuesday evening.  I'll be in Vancouver all day Wed-Fri, so perhaps we should set up a side meeting on 3530bis i18n for later in the week?



Thanks,

--David

----------------------------------------------------

David L. Black, Distinguished Engineer

EMC Corporation, 176 South St., Hopkinton, MA  01748

+1 (508) 293-7953             FAX: +1 (508) 293-7786

david.black@emc.com<mailto:david.black@emc.com>        Mobile: +1 (978) 394-7754

----------------------------------------------------

_______________________________________________

nfsv4 mailing list

nfsv4@ietf.org<mailto:nfsv4@ietf.org>

https://www.ietf.org/mailman/listinfo/nfsv4