Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt

Chuck Lever <chuck.lever@oracle.com> Mon, 08 October 2018 15:03 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40C5D130DCC for <nfsv4@ietfa.amsl.com>; Mon, 8 Oct 2018 08:03:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ec9xzIsCVwwB for <nfsv4@ietfa.amsl.com>; Mon, 8 Oct 2018 08:03:30 -0700 (PDT)
Received: from aserp2120.oracle.com (aserp2120.oracle.com [141.146.126.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0066E130EA9 for <nfsv4@ietf.org>; Mon, 8 Oct 2018 08:03:28 -0700 (PDT)
Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w98EwmdZ182642 for <nfsv4@ietf.org>; Mon, 8 Oct 2018 15:03:27 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : content-type : content-transfer-encoding : mime-version : subject : date : references : to : in-reply-to : message-id; s=corp-2018-07-02; bh=i7Xvk7/g76nKzVSxfZvTJGeQ4itxQsM//fgMAYl9fOo=; b=VEG7P8PBAUX5THMm+Vbgqjzrv5bzEf8kQ7D6wGVsLcyvG6LVDoKObdsCvDxyLKuaDZVk URV5qb+O9ulT36hcBsin+qZ7qv3QdYMAMge7PhvYtl5VBaWMf+TMspXkUjkoUZzEnLGl EH2CLCFb6HMtXAGjt0GRQ9EYazRfmdThiQk9m0jOfrpf8wdhg9L8u1lyssx1pYQkLKN1 d578RTZFXqLKzKNkfppH+B8Wnaw9qWGvPHwMe82SIEbbRQXLTCLk7+BbgMfFnb9J/NG2 moTUFS/RZiIPCOdNvQ2UIvykq93k96WIgIkmEuy1b73T4O2ZyOZ/7EbzsZ8nV4ExNFrg mQ==
Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by aserp2120.oracle.com with ESMTP id 2mxn0pq8vu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <nfsv4@ietf.org>; Mon, 08 Oct 2018 15:03:27 +0000
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w98F3Qxv019376 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <nfsv4@ietf.org>; Mon, 8 Oct 2018 15:03:26 GMT
Received: from abhmp0002.oracle.com (abhmp0002.oracle.com [141.146.116.8]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w98F3QhJ030077 for <nfsv4@ietf.org>; Mon, 8 Oct 2018 15:03:26 GMT
Received: from anon-dhcp-171.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 08 Oct 2018 15:03:26 +0000
From: Chuck Lever <chuck.lever@oracle.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Mon, 08 Oct 2018 11:03:25 -0400
References: <153901060913.16390.8389561648327812120@ietfa.amsl.com>
To: NFSv4 <nfsv4@ietf.org>
In-Reply-To: <153901060913.16390.8389561648327812120@ietfa.amsl.com>
Message-Id: <1AEC6BC9-D910-40C8-A967-E4B1F992964D@oracle.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9039 signatures=668706
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1810080145
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/48900i27MZa7eNy45mGd0sJOaj8>
Subject: Re: [nfsv4] I-D Action: draft-ietf-nfsv4-integrity-measurement-02.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Oct 2018 15:03:32 -0000


> On Oct 8, 2018, at 10:56 AM, internet-drafts@ietf.org wrote:
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Network File System Version 4 WG of the IETF.
> 
>        Title           : File Content Provenance for Network File System version 4
>        Author          : Charles Lever
> 	Filename        : draft-ietf-nfsv4-integrity-measurement-02.txt
> 	Pages           : 13
> 	Date            : 2018-10-08
> 
> Abstract:
>   This document specifies an OPTIONAL extension to NFS version 4 minor
>   version 2 that enables file provenance information to be conveyed
>   between NFS version 4.2 servers and clients.  File provenance
>   information authenticates the creator of a file's content and helps
>   guarantee the content's integrity from creation to use.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-nfsv4-integrity-measurement/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-nfsv4-integrity-measurement-02
> https://datatracker.ietf.org/doc/html/draft-ietf-nfsv4-integrity-measurement-02
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-nfsv4-integrity-measurement-02
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/

With this revision I hope to have addressed Craig's, Bruce's, and Dave's
review comments. I've introduced text that explains the broad architecture
of provenance assessment and who is responsible for the assessment policy
and FPI format. A number of smaller corrections and clarifications have
also been done.

I believe the only outstanding issue is Section 5.2.1, which will describe
the issues around authorizing FPI updates.


--
Chuck Lever