Re: [nfsv4] feedback on draft-ietf-nfsv4-versioning-07

David Noveck <davenoveck@gmail.com> Tue, 01 November 2016 16:15 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB3411294C8 for <nfsv4@ietfa.amsl.com>; Tue, 1 Nov 2016 09:15:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rN48ySeSYZ2I for <nfsv4@ietfa.amsl.com>; Tue, 1 Nov 2016 09:15:02 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6241A12945F for <nfsv4@ietf.org>; Tue, 1 Nov 2016 09:15:02 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id v84so146676893oie.3 for <nfsv4@ietf.org>; Tue, 01 Nov 2016 09:15:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=qF2JwmSUR2yZ8ogal+3uo3IszFjGt1WGmU7roj7H470=; b=JUcnQdE9WSLakFINiIyhFd2zspZwIXuEok2qxslNqL+Q5QTxi7qUlwK1J9hqyxUVax 9gxMlegPaFs1BcqW+tFDqExa4xooPoOMHkWSUTfd2zoT3O3GX1lDL8NAY7tWpCrA/ps5 WqvplaWikK7YSHDZfwRjQTKamKIjQfzKmOKqW8wfnCvhOHXuItkbQnIDX0QJnqD4JVSe EEr1+8a/Ldym1geNLAU0JFNTwCKQ/kwKPO+3K9Dr49zBZ6CydoOkudtAQsRqlwg8Y/Z4 7f4Iod8OPd9QaAIxP682jjOnuQ4HE1QjJIOVaCAMq9YtrSr/752XuNv6W9TFPfQ1h3ee P6gg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=qF2JwmSUR2yZ8ogal+3uo3IszFjGt1WGmU7roj7H470=; b=D9fTTtYO8b9xABOm0K8S8bfASF9qCp3kfx8UDV6wW3Ajnj80v1lEMPwiNcMNOVwSVh hVWDAGhk92PjvlUZVhxlVd1z70KeGOcCTdzjce1l5ScVCMOvExtcbDlepuJ9JEIEaOqy Z6nAx2sZ46oCkLlrfWH2vPKf6HARHGJla+bMZ0p9OGJqZ58KXW4SEmERZSfyWbQA4o6h eZMtSn0yNTQmPM5q+pOi1iOZw8oH5PCR30V6k0NlS/AaG/+B58sqDY1bI0OsHQukHrf3 FwdMkCy9Y0R5Q6xT8+37CeCsWHQe7PeJs4p0makqbN8kscsV3+gd7Uzcih5htjsgMmwz 9OzQ==
X-Gm-Message-State: ABUngvdFm/Dbu/ftQYf0t+Qk5bRrdyhWMF/+vbyvYQ9m8Gg6RFMOZbxb9pNg/5v7xWduL5KBgNrJptKdTy8cUg==
X-Received: by 10.202.89.136 with SMTP id n130mr18553793oib.29.1478016901427; Tue, 01 Nov 2016 09:15:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.29.3 with HTTP; Tue, 1 Nov 2016 09:15:00 -0700 (PDT)
In-Reply-To: <20161031210804.GA17349@fieldses.org>
References: <ote01sz4f8tk.fsf@athyra-vm1.us.oracle.com> <CADaq8jcSUO5rkf-4+njbk-O0Fv5gTedTRZnceVJRdz1T4zyH1Q@mail.gmail.com> <ote0oa2668pg.fsf@jurassic.us.oracle.com> <CADaq8jcOwbdc8O7am+tSdpa9hFDFfc5ULkM1qhOt9HPn7m-Ujw@mail.gmail.com> <ote0a8dp8xel.fsf@jurassic.us.oracle.com> <CADaq8jdfjLQz2YxLAROmLK5V5-BMjuHaABeic7mKmfZDtWBn=g@mail.gmail.com> <20161031020435.GC5869@fieldses.org> <CADaq8jfdUr5Qc2xfWafqYFUAN2bh00d7Nch_SaJt_nHbEM3izA@mail.gmail.com> <01312C48-0018-4F77-A6E1-12B55C03B011@gmail.com> <20161031210804.GA17349@fieldses.org>
From: David Noveck <davenoveck@gmail.com>
Date: Tue, 01 Nov 2016 12:15:00 -0400
Message-ID: <CADaq8jfToX56t-52N4kxPCS_Lg+ehfPu1azVK08FRu=CryXX1Q@mail.gmail.com>
To: Fields Bruce James <bfields@fieldses.org>
Content-Type: multipart/alternative; boundary="001a113d393e61bb4705403fa0ee"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/3eeakJZxeLkPYIRl6IMKVjMIByU>
Cc: List IETF NFSv4 WG Mailing <nfsv4@ietf.org>
Subject: Re: [nfsv4] feedback on draft-ietf-nfsv4-versioning-07
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2016 16:15:06 -0000

> That's a subtle distinction.

Not really.

> I'm not sure I completely understand the rationale.

I'll try to clarify below.

> So adding a new attribute flag is OK,

There isn't a new attribute flag.  There is a new attribute, which means
that suppattr would be longer. It is true that there are clients with bugs
that would be exposed by adding attributes, but the idea of adding
attributes in extensions has not been considered troubling in the years the
working group has been considering a new versioning approach.  I don't see
why issues regarding newly defined flags in responses should change that.

In fact there are two documents that propose this very thing now nearing
working group last call: draft-ietf-nfsv4-umask-03
and draft-ietf-nfsv4-xattrs-03.

> but e.g. a new open result flag is out?

Yes.  That is a new flag which the extension would have to assign a meaning
to.

> Are you judging that a client is more likely to give up
> and throw an EIO on an unknown open result flag than
> on an unknown attribute flag?

No.  There has been no consideration of what buggy
clients might do.

The reason is that when the responder sends a response, it needs to know
that the requester understands it.  With new request flags, the responder
can tell the requester "Huh?"  using NFS4ERR_INVAL. as we have been
discussing and the  client and server can adopt a protocol variant they
both understand.
There is no way the requester can tell the responder that it doesn't
understand something in a response so we have to avoid that situation.

If you want a new open response flag, an extension could define an OPEN2 op
that has a more extensive response. The responder knows that if you use
OPEN2, you are prepared for the more extensive response.

Regarding issues with buggy clients, I didn't deal with them in the
extension document.  However, they should be discussed when we consider and
review individual extensions.

> Personally I'd put my money on the attribute case
> being more likely, if only because it's variable-length
> and, as Trond says, we've actually seen bugs here before
> in practice.

With regard to proposed extensions to v4.2, I don't see this as being
worrisome.  Extensions to v4.2, including new attributes have been under
discussion for some time.  Implementers should be aware of the fact that
suppattr is defined as variable-length item.

If you feel this is a serious concern in the v4.2 context, then the issue
can be discussed when extensions containing new attributes are reviewed.

> I wasn't too worried about this kind of thing when I thought
> we were just talking about allowing new minorversions
> to be extensible,

I think that is what we are talking about.

> or maybe opening up 4.2 in retrospect,

I consider 4.2 a new minor version.  I will do so until at least a few
months after it is published as a Proposed Standard.

> but extending 4.0 this way makes me nervous.

draft-ietf-nfsv4-versioning-7 does allow this, but the decision to actually
do it for an existing minor version is something that the working group has
to decide to do.  In doing so, it will be considering compatibility issues
such as the ones your concerned about.

While I have speculated about possibly backporting umask to v4.0, nobody,
including me, has actually proposed doing it.    When someone submits an
I-D proposing that, the working group will review the document and you and
others can state their concerns, including issues with buggy clients.
Similarly, when it is proposed to make that a working group document, and
when it is proposed to move it forward to the IESG.  This would all be done
by consensus.   I don't see the working group rushing ahead in this way
without considering fully the sort of  issues you are concerned about.






On Mon, Oct 31, 2016 at 5:08 PM, Fields Bruce James <bfields@fieldses.org>
wrote:

> On Mon, Oct 31, 2016 at 01:57:40PM -0400, Trond Myklebust wrote:
> >
> > > On Oct 31, 2016, at 13:25, David Noveck <davenoveck@gmail.com>
> > > wrote:
> > >
> > > > So, that rules out adding attributes?
> > >
> > > No it doesn't.
> > >
> > > > (Since you'd have to return new bits in the supported_attribute
> > > > attribute).
> > >
> > > I said adding "bit flags" and I think that means a new definition of
> > > a previously unknown flag bit.
> > >
> > > Each bit in the bit mask of supported attribute already has a
> > > definition and when I write the text, I'll make sure that it is
> > > clear that expanding supported_attrs is not going to change that
> > > For example bit 128 means the server supports attribute 128.  The
> > > further information regarding what attribute that is would be
> > > provided by the extension that defines attribute 128, the effect of
> > > which is already clear.  The point is that the client who does not
> > > know about attribute 128 is not going to puzzle over this new bit.
> > > He knows it indicates that the server supports some attribute he
> > > doesn't know about.
>
> That's a subtle distinction.  I'm not sure I completely understand the
> rationale.  So adding a new attribute flag is OK, but e.g. a new open
> result flag is out?  Are you judging that a client is more likely to
> give up and throw an EIO on an unknown open result flag than on an
> unknown attribute flag?
>
> Personally I'd put my money on the attribute case being more likely, if
> only because it's variable-length and, as Trond says, we've actually
> seen bugs here before in practice.
>
> > One thing to note is that we’ve had issues before where both clients
> > and servers have been known to assume things about the maximum size of
> > the bitmaps being returned.
>
> I wasn't too worried about this kind of thing when I thought we were
> just talking about allowing new minorversions to be extensible, or maybe
> opening up 4.2 in retrospect, but extending 4.0 this way makes me
> nervous.
>
> Bugs happen, and we fix them, but the older the protocol the more likely
> there's old implementations out there that aren't getting much
> maintenance.  I don't know.
>
> --b.
>