Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
	by ietfa.amsl.com (Postfix) with ESMTP id 1277CC14F5F7
	for <nfsv4@ietfa.amsl.com>; Sun,  8 Sep 2024 16:24:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level: 
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5
	tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
	DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
	HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001,
	RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001,
	SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01]
	autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
	header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194])
	by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id Nk1bVsEblzQo for <nfsv4@ietfa.amsl.com>;
	Sun,  8 Sep 2024 16:24:39 -0700 (PDT)
Received: from mail-qv1-xf2b.google.com (mail-qv1-xf2b.google.com
 [IPv6:2607:f8b0:4864:20::f2b])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256)
	(No client certificate requested)
	by ietfa.amsl.com (Postfix) with ESMTPS id 7FEC9C14F5F3
	for <nfsv4@ietf.org>; Sun,  8 Sep 2024 16:24:39 -0700 (PDT)
Received: by mail-qv1-xf2b.google.com with SMTP id
 6a1803df08f44-6c3603292abso21989676d6.1
        for <nfsv4@ietf.org>; Sun, 08 Sep 2024 16:24:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20230601; t=1725837878; x=1726442678; darn=ietf.org;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:from:to:cc:subject:date:message-id:reply-to;
        bh=gTHYosPLEOTN8vHW/6CmUZkAT2tQLBYnfN0YXxVEjWM=;
        b=OQr0TPLlopBaN0H1sMX5AOOMvDx3RcEMlYBdcuXPNTssSlxL7VAmV5lUGibEQ0D+2x
         bFT1MtPaR1ifULZswvT9HFiEQr1lqEgtz26xPDeVRugQQNZosM7V+0A+BJ18jTGe6Kgg
         IX8vKEz9BJrVlMwDA9900YKAWpakRQQrFhlrqXfs/mM2DRd+llIwoOfozPLOY+DPT1U6
         pI1JUClcIvAgZSauK/mq1W4axkWLT4XtyUZBPCeupPLuzvQMNISKxihQ5TbNaggSfpfq
         xIjKUt4tKGnTc94+hQmUjY1QiZM7/OOUwri/+YwjNl9yV+joTbJId27vQr+UC6UqdfMs
         7LYg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20230601; t=1725837878; x=1726442678;
        h=cc:to:subject:message-id:date:from:in-reply-to:references
         :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id
         :reply-to;
        bh=gTHYosPLEOTN8vHW/6CmUZkAT2tQLBYnfN0YXxVEjWM=;
        b=M0XdmC/AiWqwM8hHWmW3Q6b5cXe/1M1mXML8N6n/cGp0lEmhYpdI/0Ym0VS/7Xljrh
         GQy0ngHm3aWfXG1yjZIdDvipDhF7Z2fXOX0tv67tc7L/nT5b4cPBNLNXMcH9+ittSddU
         nF7+RQpHwCk6Svl4vmLb1ahQove/a/NVx/xroAJeIbzUQLSVQ0OWKbQQWxN5i0yU5Ekw
         jmvRO1rzhOawBy6TRZPc2pXa3DnI3QMp3ViTXwjv0vlr/cjgh3qVMupX/q++6EVNX7J5
         Ysei3VH3a/GAg0mFl1KXVw7RZSsohVJtDptS7PXcbdpZUz8G3eqpEwZvVNiHzvXQx8wE
         W+Hg==
X-Forwarded-Encrypted: i=1;
 AJvYcCWq1CgkSgvVV7jwfe1v7Xfz8WszZNH6M1AzbiO8yo6/N0s2FEkk9TC+TIKhOSS66EUsw1ztPQ==@ietf.org
X-Gm-Message-State: AOJu0Yy3Llp7Z+3L/2sMG+Or3S4YUG6ej15OdlN6ly4KyUitd2Bm8gQA
	URHneeaDdBJ64ioeHCzkUCYvBQ67KtolomdWoe1G56vREAkph8+OiIF6BTDQ+gMRHWdRe1AlKvO
	amQUhd3DF/AdvQ0mLqk/F2Gd5fHxH5A==
X-Google-Smtp-Source: 
 AGHT+IGCwu0b7qgpp8hv9vTtJScjMVNnqcgQGLK03XRRiLRoQUWSUsG7GxbJ4X4Fz7Q3HqLKveOuJTeUUSpZ2ahoLTg=
X-Received: by 2002:a05:6214:3205:b0:6c3:5b9e:699d with SMTP id
 6a1803df08f44-6c5282fa26bmr123544226d6.2.1725837878534; Sun, 08 Sep 2024
 16:24:38 -0700 (PDT)
MIME-Version: 1.0
References: <F2FA0129-5780-4257-8E18-E04865D6BCC4@cert.org>
 <CAM5tNy7fhU5s+EufRS3aq2zYSdjrtD_ijj1RgHcTv0WzGcbT0Q@mail.gmail.com>
 <CADaq8jey55znu5J1amhRj6F5uwoE=hO81ghEqZtrnsVw=_N5Pw@mail.gmail.com>
 <20240908163411.e2vobyl7yhaz6sdt@pali>
 <CAM5tNy601LJAW2q98ntkiWKDriVXbOchmY0VsNqy=Qye3d9Luw@mail.gmail.com>
In-Reply-To: 
 <CAM5tNy601LJAW2q98ntkiWKDriVXbOchmY0VsNqy=Qye3d9Luw@mail.gmail.com>
From: David Noveck <davenoveck@gmail.com>
Date: Sun, 8 Sep 2024 19:24:27 -0400
Message-ID: 
 <CADaq8jdPDWWHNZpqw7fPubXbaH9YZahuCcOj84+b9=k3y9Z5zg@mail.gmail.com>
To: Rick Macklem <rick.macklem@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000b0aabc0621a3f17e"
Message-ID-Hash: MJQXEN5T2IBUUXX7SAFITGWFCENNBMPF
X-Message-ID-Hash: MJQXEN5T2IBUUXX7SAFITGWFCENNBMPF
X-MailFrom: davenoveck@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency;
 loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0;
 nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size;
 news-moderation; no-subject; digests; suspicious-header
CC: =?UTF-8?Q?Pali_Roh=C3=A1r?= <pali-ietf-nfsv4@ietf.pali.im>,
 NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: =?utf-8?q?=5Bnfsv4=5D_Re=3A_Interim_meeting_agenda_topics?=
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: 
 <https://mailarchive.ietf.org/arch/msg/nfsv4/AJxj_VwWAhhx_kmQKES3z99v8vo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>

--000000000000b0aabc0621a3f17e
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sun, Sep 8, 2024, 6:12=E2=80=AFPM Rick Macklem <rick.macklem@gmail.com> =
wrote:

> On Sun, Sep 8, 2024 at 9:34=E2=80=AFAM Pali Roh=C3=A1r <pali-ietf-nfsv4@i=
etf.pali.im>
> wrote:
> >
> > On Sunday 08 September 2024 12:05:54 David Noveck wrote:
> > > On Fri, Sep 6, 2024, 4:35=E2=80=AFPM Rick Macklem <rick.macklem@gmail=
.com>
> wrote:
> > > > What is left to be resolved / is controversial on the POSIX_ACL
> draft?
> > >
> > > Nothing from my point of view.  I don't know of any issues Rick has.
>  It
> > > is reasonable to expect that anyone who does have issues to raise the=
m
> on
> > > the list.   We may need to confirm the non-existence of such issues a=
t
> the
> > > forthcoming interim meeting.  I think we should allocate five minutes
> for
> > > this.
> >
> > Hello, I have already pointed one issue on the list - problem with mode
> > attribute (two meaning modes: NFS4 and POSIX) and its backward/forward
> > compatibility on existing NFS4 servers for clients without POSIX ACL
> > extension.
> I'll admit I just do not understand what you are thinking.
>

My response is the same.  I guess we need to discuss this at the next
interim meeting.

For the proposal, at any one moment in time, a file object on the server
> will have, at most, one "true form" ACL. (Where "true form" is the ACL
> that is stored for the file object and used to determine access to the
> file.)
>

The treatment in the latest acl draft is consistent with that model.  It
provides for extensions such as yours, which define additional ACL models
with the assumption being that there will be at most one ACL model in
effect for any fike system object at any time.  The job of defining new ACL
models is left to extensions as such as yours.

>
> As such, I cannot understand why you would think there are two modes?
> (Where "mode" refers to the low order 9 bits of the mode attribute.)
>
> The interaction between setting of the low order 9 bits of mode and the
> setting of an ACL is determined by which "true form" the ACL has.
>

Yes.  According to the latest ACL draft, the job of defininin those
interactions in job of the acl document only when the ACL model in effect
for that object I'd the NFSv4 ACL model.  When it is any other ACL model,
it is the job of the standards-track extension defining that new ACL
model.

>
> For the weird case where a SETATTR is allowed to set an ACL of the
> other "true form" for a file object, the mode bits will be updated the
> same way as they would be if that ACL was set for the file object at
> any other time (ie. no previous ACL or a previous ACL of the same "true
> form"
>

Agree. Although you describe this case as wierd, I cannot disagree but have
to point out that this is much less weird than a number of presidential
candidates :-)

>
> W.r.t. clients that do not support the extension...
> These clients might set the mode bits and the effect would be no
> different than what occurs now.
> --> For a server that uses a "true form" of POSIX draft ACL, that
>      ACL might change, just as would happen now. It's just that the clien=
t
>      cannot actually "see" the ACL.
>
> W.r.t. servers that do not support the extension...
> The attributes will not be in the supported_attrs list and any
> attempt to GET/SET them should fail.
>
> rick
>

--000000000000b0aabc0621a3f17e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Sun, Sep 8, 2024, 6:12=E2=80=AFPM Rick Macklem &lt;=
<a href=3D"mailto:rick.macklem@gmail.com">rick.macklem@gmail.com</a>&gt; wr=
ote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">On Sun, Sep 8, 2024 at 9:34=E2=
=80=AFAM Pali Roh=C3=A1r &lt;<a href=3D"mailto:pali-ietf-nfsv4@ietf.pali.im=
" target=3D"_blank" rel=3D"noreferrer">pali-ietf-nfsv4@ietf.pali.im</a>&gt;=
 wrote:<br>
&gt;<br>
&gt; On Sunday 08 September 2024 12:05:54 David Noveck wrote:<br>
&gt; &gt; On Fri, Sep 6, 2024, 4:35=E2=80=AFPM Rick Macklem &lt;<a href=3D"=
mailto:rick.macklem@gmail.com" target=3D"_blank" rel=3D"noreferrer">rick.ma=
cklem@gmail.com</a>&gt; wrote:<br>
&gt; &gt; &gt; What is left to be resolved / is controversial on the POSIX_=
ACL draft?<br>
&gt; &gt;<br>
&gt; &gt; Nothing from my point of view.=C2=A0 I don&#39;t know of any issu=
es Rick has.=C2=A0 =C2=A0It<br>
&gt; &gt; is reasonable to expect that anyone who does have issues to raise=
 them on<br>
&gt; &gt; the list.=C2=A0 =C2=A0We may need to confirm the non-existence of=
 such issues at the<br>
&gt; &gt; forthcoming interim meeting.=C2=A0 I think we should allocate fiv=
e minutes for<br>
&gt; &gt; this.<br>
&gt;<br>
&gt; Hello, I have already pointed one issue on the list - problem with mod=
e<br>
&gt; attribute (two meaning modes: NFS4 and POSIX) and its backward/forward=
<br>
&gt; compatibility on existing NFS4 servers for clients without POSIX ACL<b=
r>
&gt; extension.<br>
I&#39;ll admit I just do not understand what you are thinking.<br></blockqu=
ote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto">My response i=
s the same.=C2=A0 I guess we need to discuss this at the next interim meeti=
ng.</div><div dir=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_=
quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex">
For the proposal, at any one moment in time, a file object on the server<br=
>
will have, at most, one &quot;true form&quot; ACL. (Where &quot;true form&q=
uot; is the ACL<br>
that is stored for the file object and used to determine access to the file=
.)<br></blockquote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto=
">The treatment in the latest acl draft is consistent with that model.=C2=
=A0 It provides for extensions such as yours, which define additional ACL m=
odels with the assumption being that there will be at most one ACL model in=
 effect for any fike system object at any time.=C2=A0 The job of defining n=
ew ACL models is left to extensions as such as yours.</div><div dir=3D"auto=
"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
As such, I cannot understand why you would think there are two modes?<br>
(Where &quot;mode&quot; refers to the low order 9 bits of the mode attribut=
e.)<br>
<br>
The interaction between setting of the low order 9 bits of mode and the<br>
setting of an ACL is determined by which &quot;true form&quot; the ACL has.=
<br></blockquote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto">=
Yes.=C2=A0 According to the latest ACL draft, the job of defininin those in=
teractions in job of the acl document only when the ACL model in effect for=
 that object I&#39;d the NFSv4 ACL model.=C2=A0 When it is any other ACL mo=
del, it is the job of the standards-track extension defining that new ACL m=
odel.=C2=A0=C2=A0</div><div dir=3D"auto"><div class=3D"gmail_quote"><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">
<br>
For the weird case where a SETATTR is allowed to set an ACL of the<br>
other &quot;true form&quot; for a file object, the mode bits will be update=
d the<br>
same way as they would be if that ACL was set for the file object at<br>
any other time (ie. no previous ACL or a previous ACL of the same &quot;tru=
e form&quot;<br></blockquote></div></div><div dir=3D"auto"><br></div><div d=
ir=3D"auto">Agree. Although you describe this case as wierd, I cannot disag=
ree but have to point out that this is much less weird than a number of pre=
sidential candidates :-)</div><div dir=3D"auto"><div class=3D"gmail_quote">=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
W.r.t. clients that do not support the extension...<br>
These clients might set the mode bits and the effect would be no<br>
different than what occurs now.<br>
--&gt; For a server that uses a &quot;true form&quot; of POSIX draft ACL, t=
hat<br>
=C2=A0 =C2=A0 =C2=A0ACL might change, just as would happen now. It&#39;s ju=
st that the client<br>
=C2=A0 =C2=A0 =C2=A0cannot actually &quot;see&quot; the ACL.<br>
<br>
W.r.t. servers that do not support the extension...<br>
The attributes will not be in the supported_attrs list and any<br>
attempt to GET/SET them should fail.<br>
<br>
rick<br>
</blockquote></div></div></div>

--000000000000b0aabc0621a3f17e--

