Re: [nfsv4] Comments on minutes of wg meeting at IETF114

Chuck Lever III <chuck.lever@oracle.com> Mon, 12 September 2022 16:25 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AE11C14CE2B for <nfsv4@ietfa.amsl.com>; Mon, 12 Sep 2022 09:25:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.808
X-Spam-Level:
X-Spam-Status: No, score=-2.808 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=hMaswGf9; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=Tv9UYL6W
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UjSAAQyVU7xu for <nfsv4@ietfa.amsl.com>; Mon, 12 Sep 2022 09:25:08 -0700 (PDT)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43A5EC14CE28 for <nfsv4@ietf.org>; Mon, 12 Sep 2022 09:25:08 -0700 (PDT)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 28CFtgCA023117; Mon, 12 Sep 2022 16:25:06 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=corp-2022-7-12; bh=tf/v+WHHF1yKuE4qJisHJbytGDy9ahdBGGMZj7/6f48=; b=hMaswGf9GdqucOeu0+SSKUpujp3UJI61I0qEUPcJ+9knkQuRuiwbaYxormWdxQOSNvJ2 RWxVWXRgjFYrbAkzFzQMtQotf52EUdgRGxrGWpZ4agGTvUeU+QjjIxvwui6P40NYxe8l IeRKpIWzm/wps5teB1TvQe/79c5e10PxWfdbLnuOVsOvb3QoYikN7GhxDgcvhFaVJvCf dxxkHup+nyuFApkamx3pDcnF3by48DDZ+p8m76BY0Li+QHiJdVBCOvRVzCwM7VPNDeiG t3vdUwJo40MKjTfTPz7e1cG2IOa4Wa3QPcw8S8+N9CwJyBvysHdClvJ+cnTMeO1ycv1m rg==
Received: from phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta02.appoci.oracle.com [147.154.114.232]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3jgjf9v077-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 12 Sep 2022 16:25:05 +0000
Received: from pps.filterd (phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 28CECTSG017365; Mon, 12 Sep 2022 16:25:04 GMT
Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2048.outbound.protection.outlook.com [104.47.74.48]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 3jj6b1mp6h-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 12 Sep 2022 16:25:04 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Lr5liRoqYXzQnPuS4EU55IJmfrBoo/FI3ZWxeJZSsn7P9+k5t/4BruIm/9xCdEU03uQ3vZEfseEQvdrETP7WB9n1hGQM+GYZeAxiIR7vEMO77yYQKS5lDlTTVcIDpzwmCI2l7AAyZNBV+4VaMPB7Um1cRttq8eqZcEdAOC/E9OSxcmAGND8lpBK0H6AMh8YAUu5TpK4DMWXzIXyx6uz5BUY3bip2OzPnHkqAf/GEASMr5JaxiAa/OiX4YeOe7q7IZD9HkbrC5FidoZWrtqLn6+FXM6kABDjOV3xdCE7yp+MqPqZTDbKi5w4pGfVfTRONB40ONaoGFTNUq/FUpBrJow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tf/v+WHHF1yKuE4qJisHJbytGDy9ahdBGGMZj7/6f48=; b=gQ+D8tPEDSOCZTUB2ShTJ6Yv9oeOiN4ygVBh//WkIoqY3wSSXvnCYXmZJQ/XbCteP5oyTxomS3U0wJMkOG5PgOE8l5/PCrPRSh+WrP5X8EXNIFL6z01x2l3hcN3tObFiXiTzedVJshoxiz8P463pbUuKMxpxYz/TOS50n/RSvd/GESHGXYY3hENtu0sIqpxMnqJgF+hBi3RyXTZajVUyTwKZP0nnIuWyh/AXmFPPIH/K3ZUk8I1HwTaqX5hF90tkEbdfuwE+xouGntR3w7J+uJjgklv6ndxVF3WAfEtPBAvu8hNGI5sK+YxNxNO651cN40MlsNY32Dqf0urGImVMvQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tf/v+WHHF1yKuE4qJisHJbytGDy9ahdBGGMZj7/6f48=; b=Tv9UYL6Wyrwt601kCzcJfYY1GqKjZidMiEPSdImJM1SXcootZHdEwFujcnkmOReiAKvfjuuo8tZkwa9V/y64svIviHy66nrN2e3TGw6tmAlOjY9XqJn5GTvKRPCALrWgo5r7YJ8t9IhC96e9G4TtmOKHvC56mC4ejhQM+AX929A=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by CO6PR10MB5604.namprd10.prod.outlook.com (2603:10b6:303:14b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.16; Mon, 12 Sep 2022 16:25:01 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::25d6:da15:34d:92fa]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::25d6:da15:34d:92fa%4]) with mapi id 15.20.5612.022; Mon, 12 Sep 2022 16:25:01 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: NFSv4 <nfsv4@ietf.org>
Thread-Topic: [nfsv4] Comments on minutes of wg meeting at IETF114
Thread-Index: AQHYxjPDm6k+YDWREEG5Y4QNw6y1YK3b7L6A
Date: Mon, 12 Sep 2022 16:25:00 +0000
Message-ID: <2CCC6B48-118F-48C3-A764-1380BAB72066@oracle.com>
References: <CADaq8jd4+FPhH0m5AuBgop_xJiYMjrRKva8mX0A-gioW_8b+5A@mail.gmail.com>
In-Reply-To: <CADaq8jd4+FPhH0m5AuBgop_xJiYMjrRKva8mX0A-gioW_8b+5A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|CO6PR10MB5604:EE_
x-ms-office365-filtering-correlation-id: a9925760-804f-4acc-7106-08da94db5750
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230017)(396003)(136003)(39860400002)(366004)(346002)(376002)(6486002)(33656002)(186003)(478600001)(53546011)(6506007)(41300700001)(316002)(36756003)(4326008)(8676002)(122000001)(38100700002)(91956017)(8936002)(66446008)(76116006)(71200400001)(6916009)(86362001)(38070700005)(26005)(6512007)(2616005)(83380400001)(66476007)(66556008)(2906002)(66946007)(64756008)(5660300002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: ofhveuznGZWhkbesIEYVP4LqF6qT0wGVJpwart84QORt+zK1mfhp/cOaCQi+IigBVS2ryBDvMfrKv4LoLmvyWt97ij4z5w8z6HXo/w8GQ0EyaNyfP1agI8H5RGwdBUnUE1m8wDLsF3o9jtYcEOe9aH+06mShkaMf2qSS1yc1e3y/74aydkmA2D1vN+FX0j/sNnAY6zn0QYnmJKx/y0D4zvdsGV6kKAy6nCsuIdIAwZ9O/FINeVnwiKCK4oIx9bSwfGNFig1htAtkRQyOMlpHDqyNORh8HhFMQFgvNto4PgJ8M4KixZGL2IMXeGM/ubuYchnBerW4QQTDCXAPb98JKS9AxgOKiSBYuqmSk2KeIDNubSiY1GqSEBfEUrXUuuvhGfrTQt9oFrcj6UrY8RpkGguzYALihzCL0FObggsn4ocpbn4aB2op1KYVGB5Ulxa7y7aMJsx35Oa/f+tv/A+NHCHHybPcCdpbNBa9wVFhpUPG9dJt7FHSOC7+A6DeC1F7uA5i4DdGkKrGz84sl9R4iNzD2dG6W64A7U432NSFuWrRD9du46ReGKl4HZl6ARU/YHqeC4w4UiFkM18BYgJHCefmeHJbGzLyRoIeFiCkSjMQlsakL8ddxtYN8XIa2hgm/R7CY4hqejw/Zm07hH2PzCszroVzQQGgupq2fiuBXvxMA+1wHW6KbhRLLqg3QjEpzLzVO7LH3lOnSlIpgPhV42wJbV2T8dLsXyQr3lyccFp1c5Sc7oaWJnHrT00FrzgdtWz75UZ6IrZCBzz4yRFwWxqxI6FbqoDl2wv0aQdVCQ8wRcAJBA7vsppJFkA0ktODkRlJa28nt4puMGRIzoocUmf/HHIyJ0Dl31v7HF/uxNFE8Z/Qf6JU+cRK4TzOHdv7nv6ETg+eI8n/25XYEbQ+XlWfdxAnuWmWj3xkNoUNtLOm6oxyXo5oytxYK34C8hlSVkvAQg5Pq41+yxgn7h9vwFpuJEmPQeoMC4sCgwCb0w6moGA06fwwrZk8eyggh1Kt4sFA3tED2/xkSTIZxhv7T8PKkpia15Mqz2yx2IYwVNTJgvZXPlKioU194BySePCMacPQsEAZyBZ0GzgbhpHgzm5jvf+y4ca6uTKrhURSWYOp2NoVt2pdlPbA6x3w9IxN6QQpQOxBvVpe1gE2RwELC2Trm/zfpiYXp+yqKeJCplTApHscJt97EvRhEzMQbRTaDBBLZiemhsxUOj8vLqiMTXFiMHJFMrRSZhD3IWnBd/SZs3G3l5Mr6G94MFp14yz8hjh6MrH+WhmXuGB0yrh3PqnogyDxrcS1sFBocyhfroZpPoNVuDug4DV+PC8RBYJk/Jd3a7ZHD8maJvD+dhdXNtHO3o7M23tlm93CYHy/Dm6MWDmNjbqqsTzVeyY3NwAxoke+c9Z9eIJRzQfucHCrSUCZOk9HRLxiucgrplQmmsAeLZKnOaYMwYQZIGo1mHqA86bAV0hDO7sgHSr/JnYUbNfAL5uxNZi2QVt+7Op8sntPdfmODNx53TU0/VVvIEkJ4WqnOrFGDfaNayiAJ2o51FT+lTeZbmezBO1OSf6l1rcMidfGu+7l80a2M+Enkq0W
Content-Type: multipart/alternative; boundary="_000_2CCC6B48118F48C3A7641380BAB72066oraclecom_"
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a9925760-804f-4acc-7106-08da94db5750
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Sep 2022 16:25:00.9828 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QD0ErWj/gqp2odNZF/VI9IswgvZx/OHZSiT06GNbsnx/M4moC6uAOkvcs/v+MIHo6cYW99QT3Z5Hlvtz4auviA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR10MB5604
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.528,FMLib:17.11.122.1 definitions=2022-09-12_12,2022-09-12_02,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 adultscore=0 phishscore=0 spamscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2207270000 definitions=main-2209120056
X-Proofpoint-GUID: X711rC0_F2XnCMY875_YsbX7Q5I3GJ3v
X-Proofpoint-ORIG-GUID: X711rC0_F2XnCMY875_YsbX7Q5I3GJ3v
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/F8gLnYIN0P65JEwZ9weaYJJ02WU>
Subject: Re: [nfsv4] Comments on minutes of wg meeting at IETF114
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Sep 2022 16:25:09 -0000

On Sep 11, 2022, at 4:11 PM, David Noveck <davenoveck@gmail.com> wrote:



> BIS document will be discussed on the mailing list.

Good idea.  Since it hasn't been done yet, I wil have to start the discussion.  See below.

Chuck
Lever         20m  RDMA.     RPC-over-RDMA

> Major concern is lack of security in the protocol.

We need to address this.

David Black wonders what is practical to implement.

In any case, we need to provide a protocol.

>Tom Talpey and David Black think QUIC would be straightforward - suggest avoiding TLS for RDMA.

No problem with this on my part.

> Richard S wants a security standard protocol.

No sure what this means.

> Christoph believes security and performance can co-exist.

I agree.

> Perhaps a new WG to explore extensions to both NFS and RDMA?

I don't see the point.   We have an NFSv4 working group and it has successfully done RDMA-related protocol work.

> Chuck believes urgency of v2 is less than it used to be.

I agree if security is addressed otherwise.

> Should we let this work expire?

I agree it is not urgent but that doesn't means it is useless.

>Tom Talpey agrees to let the document sit as a reference.

Not sure how to work this out.

The conclusion of this discussion was to let the RDMA and ULB documents expire and remove the charter milestone.

A version 2 of RPC/RDMA is not in demand by any customer. I feel it’s time to let it rest, unless or until there are sufficient resources to attack the addition of transport-layer security to MPA/RDMAP.

I fear these minutes do not capture the entire discussion. Is there a video recording of the session available?


Chuck has informed me that a wg decision was made to abandon this document but that does not appear in the minutes.  In any case, I need either this document or some replacement to proceed with security-05

Rick says he plans to implement a simple rejection of RPCs when a server’s security policy does not permit AUTH_SYS without TLS, using existing RPC or upper layer status code. The client can decide to retry with TLS (why was it not defaulting to TLS in the first place?) or let such requests fail.

I’d like Rick to write a brief description of his idea.


> Zahed questions whether we had an adoption call for the BIS document?

I guess not.   The issue is complicated by current plans for document split-up.

We haven’t had any deep public discussion of the scope of each the replacement documents. They have grown to encompass quite a bit more than what was in RFC 5661. I would feel more comfortable if the WG could agree on a limited scope for each of these to prevent scope creep from making them impossible to complete.

The idea that we are addressing every errata against RFC 5661 with the bis effort is new to me. I know we had some vague plans to address some of them, and I had proposed keeping track of these with the github issue tracker. However, github has not been adopted for any of these documents, so at this time there is no real tracking of these outstanding issues.

There are, of course, errata against other RFCs that this WG is responsible for. My impression of the discussion during the session was that all of these errata were a problem, not just the errata against RFC 5661.