Re: [nfsv4] Minorversioning [was Re: New Version Notification for draft-haynes-nfsv4-flex-filesv2-00.txt]

David Noveck <davenoveck@gmail.com> Wed, 16 August 2017 21:43 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8625132743 for <nfsv4@ietfa.amsl.com>; Wed, 16 Aug 2017 14:43:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7NTSG4a-eUzY for <nfsv4@ietfa.amsl.com>; Wed, 16 Aug 2017 14:43:18 -0700 (PDT)
Received: from mail-io0-x22d.google.com (mail-io0-x22d.google.com [IPv6:2607:f8b0:4001:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A1FA132710 for <nfsv4@ietf.org>; Wed, 16 Aug 2017 14:43:17 -0700 (PDT)
Received: by mail-io0-x22d.google.com with SMTP id j32so17513929iod.0 for <nfsv4@ietf.org>; Wed, 16 Aug 2017 14:43:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Fpo2UYC8T2zK31ItNRsRkqqrCvrIqjyeay3fgACex4E=; b=lIPsBqVCo9FuoI4oqLKMEzTE54EKJzqNFlkrT8xkrGy+g6YbVxZvUfVoF/2LFzUMvX aBpSClnUb5xHyQMYeXA2zfj89Wk1H6kC+3uDSVSF6yMExAohIp+bvxO88/GstQ2B6d3R 0crvnSmCCjWN+cmkGqMoFnveOWqn8Ubzask2Gw+Bc0bSdxj5XCW502KHs/hZzwv4mB53 jsw8QlZCKdK0OSQcDVkwRkWSAAij83b1tAeXqVeQiO35dXZDusCghheGELb8RY78dD8n 6kjXjGK9CV2FdYz6bAiNRBI2dVkd+/5GWVDJ/UNz9GRiBLaZDJGBBsJu4EwQjG1ux+Mr PvQg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Fpo2UYC8T2zK31ItNRsRkqqrCvrIqjyeay3fgACex4E=; b=HrpFEyNY8GhydfUoKYZrO8T7Hg5+FIygU7vimjfvn1Ztvneb8yDTOkWW78wZBndgY1 LB6MsGBakSrLQBwynBvIf8xtmo2GObDWh8ERt7SMONgjW8VufAnWmqT+kDNX8/i1Xhuc Dk1ktQNDQGEld4KIaincZOvLYi07E4hJC1yY436nqClbN3/03r7q/8iBmXJZ6Nobh/X3 YdRxr5NfPSbohVB+1ELVm2zMJve1pkPbeinNrzTYV05MYmcB2abQARPuUw44ZaiAxREV S37Wg+3CBDXYGoDhRz3FGbuaP8ge58yP0GYlkZFa5w4Pr+BjAm/bcpHe7/QgFRAwaS7Y i+tQ==
X-Gm-Message-State: AHYfb5hKTHdldO4Jd+pTo4D/iaElKAjAJciJHp9cZU7st33QfJRRLCme AM+PuIm79NkrMXgZoykSuK0eeTaswg==
X-Received: by 10.107.137.15 with SMTP id l15mr2731281iod.13.1502919796357; Wed, 16 Aug 2017 14:43:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.142.72 with HTTP; Wed, 16 Aug 2017 14:43:15 -0700 (PDT)
In-Reply-To: <385281DA-99EE-4ACC-A038-02965392D0EB@primarydata.com>
References: <2CA259E3-BD3A-482B-BFBF-3B90425AD3EA@primarydata.com> <CAN-5tyETNMCPVC5wJ-_77vM5+hVB+-uasd37kn+M=hoCeK6P7w@mail.gmail.com> <CAABAsM6rmrDU4BR6Ho7YFjjYA2amEkwuRGtzN537VXUZ-Eh-hg@mail.gmail.com> <20170808185803.GQ70977@kduck.kaduk.org> <CAABAsM7xOpbopPa3v1YMtfcFZbNZ=Jygap37Bg6qGfDDAvRHhQ@mail.gmail.com> <20170808194916.GR70977@kduck.kaduk.org> <CAABAsM5dAUxbrNA754nxN0iJpkJ-Zep37xnbycRsZXbPQi+hwQ@mail.gmail.com> <CAN-5tyGTZUgCDtVGhCbiXt4Hs6iGNKrhaKcQp8Vo8AveEX04hw@mail.gmail.com> <CAABAsM7iB_KRNFVmd8p4UTmEZSBj01uZoDhHt+827DzpmveuHQ@mail.gmail.com> <CC8CD648-2657-4CC1-ACDD-C7FF8B3BEADB@gmail.com> <20170808232729.GU70977@kduck.kaduk.org> <CAABAsM4xo7-TWktFTcQJ92RCeBfJ0s9ukbAe8LB_X1sguqgpKA@mail.gmail.com> <CAN-5tyHqFwdeFsTvje-F-9DbwhAcKWLg6eHxxEtnE5O26A7WwQ@mail.gmail.com> <CAABAsM4PNpLvpnFTLxEj1puPTOFfey8OPAmQA+WUeS1OqOsNyA@mail.gmail.com> <385281DA-99EE-4ACC-A038-02965392D0EB@primarydata.com>
From: David Noveck <davenoveck@gmail.com>
Date: Wed, 16 Aug 2017 17:43:15 -0400
Message-ID: <CADaq8jcnEa8E+B6TvF4ooaaOHntcv=1tmT-LBKiR+LHGjjDciw@mail.gmail.com>
To: Thomas Haynes <loghyr@primarydata.com>
Cc: "nfsv4@ietf.org" <nfsv4@ietf.org>
Content-Type: multipart/alternative; boundary="001a113ed3a696809a0556e5c8e0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/AlroQy-M52i6jQ1AELGeRbGzKiw>
Subject: Re: [nfsv4] Minorversioning [was Re: New Version Notification for draft-haynes-nfsv4-flex-filesv2-00.txt]
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Aug 2017 21:43:22 -0000

> As I understand RFC8178, this would fall into Section 6. The client would
have to present LAYOUTAUTH > to the mds and hence Section 6.

That's right.

I don't think RFC 8178 specifically addresses the matter but my expectation
was always that extensions  to the base protocol would be done in teir own
standards-track documents.  In this case, your layout specification would
normatively reference the extension.


On Wed, Aug 16, 2017 at 5:21 PM, Thomas Haynes <loghyr@primarydata.com>
wrote:

>
> On Aug 9, 2017, at 12:17 PM, Trond Myklebust <trondmy@gmail.com> wrote:
>
> An alternative that might be worth exploring is to have the LAYOUTGET
> return a stateid representing the credential to use, and then add a
> separate LAYOUTAUTH call to convert the stateid into something that could
> be used to set up the RPCSEC_GSS session to the DS.
> The reason why that might be interesting is that it could allow the client
> to reuse an existing RPCSEC_GSS session if one is already available.
> It might also allow the client to share information such as supported
> encryption types, etc as extra arguments to the LAYOUTAUTH call.
>
>
> I had also been thinking about a LAYOUTAUTH type of procedure. I didn’t
> want to build a handshake into
> RPC-application-defined structured privilege assertion in RPCSEC_GSSv3.
>
> As I understand RFC8178, this would fall into Section 6. The client would
> have to present LAYOUTAUTH to the mds and hence Section 6.
>
> I’d like clarity on that before proposing a new op. :-)
>