Re: [nfsv4] I-D Action:draft-ietf-nfsv4-ipv4v6-00.txt

Trond Myklebust <trond.myklebust@fys.uio.no> Mon, 18 October 2010 20:26 UTC

Return-Path: <trond.myklebust@fys.uio.no>
X-Original-To: nfsv4@core3.amsl.com
Delivered-To: nfsv4@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 681E33A6AEF for <nfsv4@core3.amsl.com>; Mon, 18 Oct 2010 13:26:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.398
X-Spam-Level:
X-Spam-Status: No, score=-6.398 tagged_above=-999 required=5 tests=[AWL=0.201, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y9M6y8-wQ8LS for <nfsv4@core3.amsl.com>; Mon, 18 Oct 2010 13:26:47 -0700 (PDT)
Received: from mail-out1.uio.no (mail-out1.uio.no [129.240.10.57]) by core3.amsl.com (Postfix) with ESMTP id 15AB63A6A12 for <nfsv4@ietf.org>; Mon, 18 Oct 2010 13:26:47 -0700 (PDT)
Received: from mail-mx2.uio.no ([129.240.10.30]) by mail-out1.uio.no with esmtp (Exim 4.69) (envelope-from <trond.myklebust@fys.uio.no>) id 1P7wJZ-0008Pu-Ki; Mon, 18 Oct 2010 22:28:13 +0200
Received: from c-68-40-206-115.hsd1.mi.comcast.net ([68.40.206.115] helo=[192.168.1.29]) by mail-mx2.uio.no with esmtpsa (SSLv3:CAMELLIA256-SHA:256) user trondmy (Exim 4.69) (envelope-from <trond.myklebust@fys.uio.no>) id 1P7wJY-0002RA-P4; Mon, 18 Oct 2010 22:28:13 +0200
From: Trond Myklebust <trond.myklebust@fys.uio.no>
To: Nicolas Williams <Nicolas.Williams@oracle.com>
In-Reply-To: <20101018201956.GV1635@oracle.com>
References: <20101018174520.EB8BA3A6B8B@core3.amsl.com> <C9B236F2-1F42-4070-A083-1A776B5C9C92@netapp.com> <20101018201956.GV1635@oracle.com>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 18 Oct 2010 16:28:09 -0400
Message-ID: <1287433689.3646.27.camel@heimdal.trondhjem.org>
Mime-Version: 1.0
X-Mailer: Evolution 2.30.3 (2.30.3-1.fc13)
Content-Transfer-Encoding: 7bit
X-UiO-Ratelimit-Test: rcpts/h 3 msgs/h 1 sum rcpts/h 4 sum msgs/h 2 total rcpts 1040 max rcpts/h 20 ratelimit 0
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, UIO_MAIL_IS_INTERNAL=-5, uiobl=NO, uiouri=NO)
X-UiO-Scanned: 615FA7ED6817BE304CF4772CFDCEAE3145EAE710
X-UiO-SPAM-Test: remote_host: 68.40.206.115 spam_score: -49 maxlevel 80 minaction 2 bait 0 mail/h: 1 total 414 max/h 7 blacklist 0 greylist 0 ratelimit 0
Cc: nfsv4@ietf.org
Subject: Re: [nfsv4] I-D Action:draft-ietf-nfsv4-ipv4v6-00.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Oct 2010 20:26:48 -0000

On Mon, 2010-10-18 at 15:19 -0500, Nicolas Williams wrote:
> On Mon, Oct 18, 2010 at 02:28:05PM -0500, Thomas Haynes wrote:
> > Minor nits:
> 
> Add this to the nist list: "Foreword" is mispelled (as "forward") in the
> Foreword.
> 
> > Page 7:
> > 
> >         same server identifier.  An example of well generated server
> >         identifier can be the one that includes the following:
> >    (c)
> >         (a)  a) MAC address
> >         (b)  b) Machine serial number
> > 
> > I would expect these items to be part of (b) above (The ':' gives me that expectation).
> > 
> > I find the (a) a) to be confusing.
> 
> +1 regarding (a) a).
> 
> > A larger question on the draft as a whole would be whether we could
> > add some additional operations to NFSv4.2 to get rid of the guessing.
> > I.e., could a client send a server a list of IPv4 and IPv6 addresses
> > that it is using and in return the server respond with the equivalence
> > addresses that it is using?
> 
> We could move the status/lock callbacks into NFS proper.  That way we
> need never have communications initiated by the server.  That would be
> very useful for firewalling in general, and it'd help get rid of the
> remaining non-port-2049 protocols and resulting firewall complexity.

This was already done in NFSv4.1.

> > One issue I can see is that the machines might be on different subnets
> > that use the same IP addresses. I.e., 192.168.2.14 on the filer's e0a
> > might be a different private subnet than the 192.168.2.15 on the
> > client's e1.
> 
> See below.
> 
> > Finally, it is understated, so I think you should bring more attention
> > to it, but the problem you deal with in Section 6 applies to symmetric
> > single stack mode topologies as well. I.e., all current multi-homed
> > IPv4 deployments.
> 
> Yes.  This should be solved in NFSv4.2 if at all possible.  Some
> suggestions for how to solve this problem:
> 
>  - have an operation by which the server can list its IP addresses to
>    the client
> 
>  - have a server UUID
> 
>  - both of the above, so that clients could ID servers by {server-
>    address-list, server-UUID}, which is bound to be unique for all
>    servers, even when private addresses overlap.
> 
>    If two servers claim to speak NFS on {1.2.3.4, 10.20.30.40} and
>    {1.2.3.5, 10.20.30.40} respectively, then they are necessarily
>    different servers, even if they should both happen to claim the same
>    UUID.  The servers might use 10.20.30.40 on distinct subnets for
>    backup purposes.
> 
> This would improve server multi-homing support in NFSv4.  Clients could
> avoid creating same-client conflicts by referring to the same server via
> different addresses.

As I said earlier, this too is a problem that was supposed to be
resolved by the introduction of EXCHANGE_ID in NFSv4.1. So what is the
hole in the current spec that causes the multi-homed server issue to be
broken?

Trond