Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-rfc5666bis-10: (with COMMENT)

Chuck Lever <chuck.lever@oracle.com> Thu, 02 March 2017 20:06 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2BB11295C1; Thu, 2 Mar 2017 12:06:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atuz-FPOcZ1K; Thu, 2 Mar 2017 12:06:49 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A75D12951B; Thu, 2 Mar 2017 12:06:49 -0800 (PST)
Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id v22K6fmu016852 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 2 Mar 2017 20:06:42 GMT
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id v22K6fS5018419 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 2 Mar 2017 20:06:41 GMT
Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id v22K6eUE009855; Thu, 2 Mar 2017 20:06:40 GMT
Received: from dhcp184.cthon.org (/70.213.12.118) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 02 Mar 2017 12:06:40 -0800
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <148832579359.29544.2444756146429228739.idtracker@ietfa.amsl.com>
Date: Thu, 02 Mar 2017 12:06:20 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <BE771BD3-81C0-4B54-8788-6A990A868F49@oracle.com>
References: <148832579359.29544.2444756146429228739.idtracker@ietfa.amsl.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Mailer: Apple Mail (2.3124)
X-Source-IP: userv0021.oracle.com [156.151.31.71]
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/9cjJmEF5oF2P3KfJG8JDMFoWqQw>
Cc: draft-ietf-nfsv4-rfc5666bis@ietf.org, The IESG <iesg@ietf.org>, NFSv4 <nfsv4@ietf.org>, nfsv4-chairs@ietf.org
Subject: Re: [nfsv4] Stephen Farrell's No Objection on draft-ietf-nfsv4-rfc5666bis-10: (with COMMENT)
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Mar 2017 20:06:51 -0000

> On Feb 28, 2017, at 3:49 PM, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
> 
> Stephen Farrell has entered the following ballot position for
> draft-ietf-nfsv4-rfc5666bis-10: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-nfsv4-rfc5666bis/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> 
> - 3.4.5: Can a requester DoS a responder by asking the
> latter to read giga- or tera-bytes?

A storage server would be prepared to respond appropriately
to requests for that much data in a way that manages the
bandwidth of the connection, RNIC, and fabric.

The responder is free to reject requests with Read chunks
of unreasonable size (RCOUS's ;-).

The transport protocol does not place a limit on chunk
size. The Upper Layer Protocol may place a limit on the
amount of data transferred by one RPC. That limit might
be used as a chunk size sanity check by the transport.


> And the same question
> the other way about for 3.4.6.

In this case, the client provisions each Write chunk.
If the server transmits more data than the client is
prepared to receive in that chunk, the connection is
dropped immediately.

The client would have to reconnect to send more RPCs.
If any of them have Write chunks, and the server
overruns one or more of them, the client would drop
the connection again.

Other connections should be unaffected, depending on
the RNIC implementation.

So, a rogue server could prevent forward progress on
a connection.


> - 4.4.1: not having access to memory allocated for
> "cancelled RPCs" also seems like a potential DoS that ought
> be noted. Is it?

IMO signaled RPCs would not prevent forward progress
of other RPCs on each new connection, though it might
slow them down.


> - General: I was surprised see no mention of DoS. Is that
> covered in some reference? Even if so, I'd have expected
> some discussion of DoS attacks and mitigations.

As far as I am aware DoS is not covered in any of this
document's references, and was not covered in the
original text of RFC 5666.

I am open to suggestion about the addition of such
discussion, as I'm sure my co-authors are.


> - 8.2.1: "Protection below the RDMA layer is a more
> appropriate security mechanism for RDMA transports in
> performance-sensitive deployments." I think that's a bit
> over-stated. A deployment could be performance-sensitive
> but yet prioritise application layer crypto for various
> reasons. As you're really just talking about trade-offs,
> and I think that's sufficiently explained already, I figure
> you could omit that sentence.

That sentence could be considered implementation
advice. If my co-authors agree, I can remove it in the
next revision.


--
Chuck Lever