Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items

"Black, David" <David.Black@dell.com> Tue, 02 August 2022 13:33 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7394C13CCDC for <nfsv4@ietfa.amsl.com>; Tue, 2 Aug 2022 06:33:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.687
X-Spam-Level:
X-Spam-Status: No, score=-2.687 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DNWgpxAk29kp for <nfsv4@ietfa.amsl.com>; Tue, 2 Aug 2022 06:33:49 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C717C15C512 for <nfsv4@ietf.org>; Tue, 2 Aug 2022 06:33:47 -0700 (PDT)
Received: from pps.filterd (m0170396.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 272AMJHI017183; Tue, 2 Aug 2022 09:33:46 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=jh5oGF4kIfhIUDyRC3B0cIWveCiY2OCVAiHsRa4SgWY=; b=MwBGUsU2ChLd6yismiLa6cO06evK3AAN/I4tGH1OH1BdakMs2UwONm/MiuixqJt2AoXv 7nc+8/lQixzsPYh8r/2i3pNj8JMW+LahjFiCdaSuu1hePQttaJrfsJOL8117ieM/kXy7 C+eQVVIWRVRaJYiLqTSqe9sELsvjEm/nAI5D0vvCUiva0dEBSKFMnOdqjF46uJTHwHfm BfPkZvC55Ro3cd9cV8I/pMJ2jn/Tqp4aL6ozAkr7kgoI3I8X3eIUNDwsAsR6KB7NX8on lhkM7kwd28+qy/pHJDvqItMlAX6zrJezH0N3RnWRLIzV5vf6gPM+8uvSeDtIcYbq2Qa3 Cg==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 3hn0g0jbwj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 02 Aug 2022 09:33:46 -0400
Received: from pps.filterd (m0142699.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 272D1feF007734; Tue, 2 Aug 2022 09:33:45 -0400
Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1anam02lp2049.outbound.protection.outlook.com [104.47.57.49]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 3hq2q22dy5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 02 Aug 2022 09:33:45 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EEbW63hkp+UDXKaYhOds81QPHifBffc0fCV2QPmj/cAhZSEWAzKyK0szzP4BXpqYZOeOx2JV5MpWVZ+vOjTjxllVQSv2Q1ZPLE2cZl52+o4i3KCCyl7CB6KBZvFUWElFPITJANC9im79IvBxjZ6mTgZNnDG6tiI5tN3oGZd0O8w/9TqpGPhjFbFPH69n1IZOM0juEto1rQubMmuR673EWYlDrM7oLvoquHV6cNsy28Nqfxj+Ro7oK/pejqUfYfeL5/0y7Xg/ZVUNL0u7W17PqOzFqUt3XqvAK8rr4mguOh+O3uvwKePkjtbbeqx2bCs6bEMBfmm1+c9qg7IB848Nww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jh5oGF4kIfhIUDyRC3B0cIWveCiY2OCVAiHsRa4SgWY=; b=H1fX+IPOLxrMg7W4JWFfviMb4Mv8BuyliOroJxtRBFc8K9JYyQGNcnhsFLQ3M7ybNdy5uZPSDelpZLd7XsqvH97r/6CB7e76u/AVq4dv7EOuv+Yxj0WaAt5y9JYxVpW1P2BDxSVmO6ZP/X6EJpANdrFYHfdrgdMEpr5dC9DOvRC87MJK7QIAwJEXC75w43klkb2H9lOd8+0gpUYjsJBQMq1vHVmLD9PmGm7Ltp4yaQF7u7wR8ThknXPbhqqKPMLdPxHmUDdc1i/aNKVCvwt5g9pICWgwjJ/tOhOkDAax9zM4P6L0Y7vnOqPvCQx9FAwUnqZTCqBz2LveV9dRyiY38Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by PH7PR19MB6112.namprd19.prod.outlook.com (2603:10b6:510:1df::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5482.16; Tue, 2 Aug 2022 13:33:40 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec%7]) with mapi id 15.20.5482.016; Tue, 2 Aug 2022 13:33:39 +0000
From: "Black, David" <David.Black@dell.com>
To: Rick Macklem <rmacklem@uoguelph.ca>, David Noveck <davenoveck@gmail.com>
CC: NFSv4 <nfsv4@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items
Thread-Index: AdiapeJPGDuOG31eRCOPOq4dar4KOwH5BeYWANjpVFAABlm1FAAaCj1Q
Date: Tue, 02 Aug 2022 13:33:39 +0000
Message-ID: <MN2PR19MB4045965236195D2DC755CDF7839D9@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <MN2PR06MB5597E737F236E8E35C02380FE18C9@MN2PR06MB5597.namprd06.prod.outlook.com> <20220726022100.GD30255@kduck.mit.edu> <CADaq8jfb0Ecbh-3AUW=wMJCT4yu1GwUX+y50cYNrZfRRHc8Dhg@mail.gmail.com> <MN2PR19MB4045F9FDDDD501D798B3B8A9839A9@MN2PR19MB4045.namprd19.prod.outlook.com> <YQBPR0101MB97426A8AF9FAF18186C495B8DD9D9@YQBPR0101MB9742.CANPRD01.PROD.OUTLOOK.COM>
In-Reply-To: <YQBPR0101MB97426A8AF9FAF18186C495B8DD9D9@YQBPR0101MB9742.CANPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-08-01T21:28:23Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=1bb410ca-1d02-4f8e-a5e6-4b9f5e0d70ba; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8c0b6375-d4e4-422b-0595-08da748b9c62
x-ms-traffictypediagnostic: PH7PR19MB6112:EE_
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: oglZ/XqwZckqtkDScbW9nDACVKTH9GTHUkm6l3zdSPsVqTeTNmVmocTzgNqWrghXjJ4EE1vyfafZ383KTQSrOg6Vi2vPR5beuAcXLayY0/CZ1x5iJWw3wMknKp79KVTHk6zmyR0HR04mfh2Pmr4I8g4mnvvaJ7YlUTmkhscGY4bPtAO0sJx2pYiTpOFLeRnOeH6Xjc1GVUwj0E0RiSi83s/Zm22rGL15MUpcm7HIjxMBIuDBXomRVgfddmAvwDV6LW/UxlBwNiEO5fmmvyGTfJSgWEs9gn030EPmIabGajPut8VuucPbHGcah1fQJ64Z09Fjoktw0P4RtcDx1XS/mhFx5D455j1gi0JVc1sqyCySjDKkd0RLmlR2q8GiqHntoJUSgfUNeU9yIkOljr0DwAbJIZJD/ZLVlrAfiB7Dqr4zZBWl+RY/QGcDKvXN/WswDJAzzWz71Uig0PVH3NqCxpR8OxNjgL6qxkQxnZR5kix7EQ2rfdv69JZ/7ozyyzQwWy8NGbuH9OsRFiTdfDv1RG3dBg9LT4NmAyME72BDZ96ZLI4yb69zWz03ZT3RpMC44mMynWSIdGqLd+Mk1mwpbDloLlOLPwtR4WSB7hKgDRCP30vCLr1VRSoJQbIOXEtW1O3SPntdF4vwlVG8XMd/84Dvs+XcF7i9t0nF9/STlwwmckD2R6NFIAGUlL8RMlRvRhE/NHp2aYoQ7XPnPp+qM3nW9mET804GwfrghZo6ZPcIr2gLB0psabrRGCGC1vy+ZvWRyi0fUf0ATB5eu0UCipxfXX0HKFRrjwGOEjlkZGr1cIAus8ct9appY//EcZwhdXnKYRsI3NVm3mFY5r1PWz1FmWOaOawm6k82L1cJx9pSiiG+igjKb4/vaBEvUjwF
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(376002)(136003)(346002)(39860400002)(366004)(396003)(41300700001)(54906003)(110136005)(107886003)(71200400001)(82960400001)(52536014)(7696005)(6506007)(53546011)(33656002)(26005)(8936002)(55016003)(9686003)(316002)(2906002)(786003)(38100700002)(478600001)(966005)(122000001)(186003)(86362001)(64756008)(8676002)(4326008)(66556008)(76116006)(66476007)(66446008)(66946007)(38070700005)(5660300002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c0b6375-d4e4-422b-0595-08da748b9c62
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Aug 2022 13:33:39.8979 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Pu1GtPK84drF/yQuLbnF1CDdyICjf198NPAQY9IepVhEWLNrdDHS8Z74KjTBpY61BsIkYtG1FTx6EDqrqVyF4g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR19MB6112
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-08-02_07,2022-08-02_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 suspectscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 clxscore=1015 phishscore=0 mlxscore=0 impostorscore=0 spamscore=0 lowpriorityscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2208020063
X-Proofpoint-GUID: Q2xiXCsl_shmts6k7EDn1vrSRJtdiWUI
X-Proofpoint-ORIG-GUID: Q2xiXCsl_shmts6k7EDn1vrSRJtdiWUI
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 adultscore=0 suspectscore=0 malwarescore=0 mlxlogscore=999 bulkscore=0 phishscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2208020063
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/94wn4vj-OOHnvN56WfI3EyesgiE>
Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2022 13:33:53 -0000

>>>       As a result, the domain string returned on a GETATTR of
>>>       the user id MUST be the same as that used when setting the
>>>       user id by the SETATTR.
>>
>>I would expect server implementations to do exactly that, but it'd be good >to check - would compliance with that "MUST" be a problem for any >known implementations?
>>
>>If so, please explain how the GETATTR and SETATTR user id values could >differ.
> For the FreeBSD name<->id mapping daemon, the domain string is
> considered to be case independent.
> i.e., UoGuelph.ca is considered the same as uoguelph.ca
> I think I did this because that is how DNS host domain names have
> traditionally been handled.

Unfortunately, the concept of case independence is significantly more complex in Unicode.  A common example is that in ASCII, 'i' is the lower-case counterpart of 'I', but that's not always the case for Unicode, e.g., in Turkish, the lower case counterpart of 'I' is U+0131 (&inodot), LATIN SMALL LETTER DOTLESS I (https://en.wikipedia.org/wiki/Dotless_I), and applying ASCII case independence produced incorrect results, as there are words in Turkish that differ only in dotted-i vs. dotless-i.

The "method one" that is proposed for elimination dealt with Unicode case insensitivity via use of ToASCII and ToUnicode - Unicode case mapping is buried in the NAMEPREP step.  Unfortunately, the entire NAMEPREP framework (including those mechanisms) is obsolete for a number of good reasons, including its dependence on a specific version of Unicode.  Case insensitivity of domain names has been moved to input processing, as indicated by this item in Appendix A of RFC 5891 (https://datatracker.ietf.org/doc/html/rfc5891#appendix-A): 

   4.   Remove the mapping and normalization steps from the protocol and
        have them, instead, done by the applications themselves,
        possibly in a local fashion, before invoking the protocol.

For NFS, the likely upshot is that language/locale-dependent (case) mapping and normalization has to be done by the client or code above it.  ASCII case insensitivity would be safe for a server that enforces a restriction to 7-bit ASCII, but it's not safe in general for UTF-8.

Thanks, --David

-----Original Message-----
From: Rick Macklem <rmacklem@uoguelph.ca> 
Sent: Monday, August 1, 2022 8:37 PM
To: Black, David; David Noveck
Cc: NFSv4
Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items


[EXTERNAL EMAIL] 

Black, David <David.Black=40dell.com@dmarc.ietf.org> wrote:
>Dave,
>
>> The core issue derives from the following text in RFC7530:
>
>[ ... SNIP ...]
>
>> The above text was suggested by David Black based on discussions with internationalization experts, and had no problems getting accepted by the IESG.
>
>In light of what has (not) transpired since then ...
>
>> The first method references RFC 3490, now obsolete, so cannot be transferred to a new NFSv4 internationalization document
>>
>> This reference should, almost certainly, not have appeared in RFC7530, but I'm not sure how it was approved.
>>
>> It seems very unlikely that the first method was ever implemented by any NFSv4 server, despite the fact it is recommended above.
>
>... while I could patch the text to deal with RFC 3490 being obsolete, I think "running code" wins this one ... i.e., I suggest that the WG proceed to:
>
>>    - eliminate the use of method one.
>
>That creates a small item to deal with, as method 2 contains a "MUST" >requirement that would apply to all implementations:
>
>
>>       As a result, the domain string returned on a GETATTR of

>>       the user id MUST be the same as that used when setting the

>>       user id by the SETATTR.
>
>I would expect server implementations to do exactly that, but it'd be good >to check - would compliance with that "MUST" be a problem for any >known implementations?
>
>If so, please explain how the GETATTR and SETATTR user id values could >differ.
For the FreeBSD name<->id mapping daemon, the domain string is
considered to be case independent.
ie. UoGuelph.ca is considered the same as uoguelph.ca
I think I did this because that is how DNS host domain names have
traditionally been handled.

rick

Thanks, --David

From: nfsv4 <nfsv4-bounces@ietf.org> On Behalf Of David Noveck
Sent: Thursday, July 28, 2022 9:57 AM
To: Benjamin Kaduk
Cc: Noveck, David; NFSv4
Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items


[EXTERNAL EMAIL]
The core issue derives from the following text in RFC7530:


   string sent SHOULD be in the form of one or more U-labels as

   defined by [RFC5890 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc5890__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR6jQoVSp$>].  If that is impractical, it can instead be in

   the form of one or more LDH labels [RFC5890 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc5890__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR6jQoVSp$>] or a UTF-8 domain name

   that contains labels that are not properly formatted U-labels.  The

   receiver needs to be able to accept domain and server names in any of

   the formats allowed.  The server MUST reject, using the error

   NFS4ERR_INVAL, a string that is not valid UTF-8, or that contains an

   ASCII label that is not a valid LDH label, or that contains an

   XN-label (begins with "xn--") for which the characters after "xn--"

   are not valid output of the Punycode algorithm [RFC3492 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3492__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR8HVeyrh$>].



   When a domain string is part of id@domain or group@domain, there are

   two possible approaches:

   1.  The server treats the domain string as a series of U-labels.  In

       cases where the domain string is a series of A-labels or

       Non-Reserved LDH (NR-LDH) labels, it converts them to U-labels

       using the Punycode algorithm [RFC3492 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3492__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR8HVeyrh$>].  In cases where the

       domain string is a series of other sorts of LDH labels, the

       server can use the ToUnicode function defined in [RFC3490 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3490__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVRw5pOT9y$>] to

       convert the string to a series of labels that generally conform

       to the U-label syntax.  In cases where the domain string is a

       UTF-8 string that contains non-U-labels, the server can attempt

       to use the ToASCII function defined in [RFC3490 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3490__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVRw5pOT9y$>] and then the

       ToUnicode function on the string to convert it to a series of

       labels that generally conform to the U-label syntax.  As a

       result, the domain string returned within a user id on a GETATTR

       may not match that sent when the user id is set using SETATTR,

       although when this happens, the domain will be in the form that

       generally conforms to the U-label syntax.



   2.  The server does not attempt to treat the domain string as a

       series of U-labels; specifically, it does not map a domain string

       that is not a U-label into a U-label using the methods described

       above.  As a result, the domain string returned on a GETATTR of

       the user id MUST be the same as that used when setting the

       user id by the SETATTR.



   A server SHOULD use the first method.






The above text was suggested by David Black based on discussions with internationalization experts, and had  no problems getting accepted by the IESG.
.

The first method references RFC 3490, now obsolete, so cannot be transferred to a new NFSv4 internationalization document

This reference should, almost certainly, not have appeared in RFC7530, but I'm not sure how it was approved.

It seems very unlikely that the first method was ever implemented by any NFSv4 server, despite the fact it is recommended above.

The basis of the recommendation is quite unclear and it is not easy to determine a situation in which the use of the first method would be needed/desirable.  Further, the use of "SHOULD" leaves unanswered the question of what are valid reasons to bypass the recommendation.

The existing handling is not transferrable to other NFSv4.  We need to  do one of the following:

   - eliminate the use of method one.

   - provide an alternative the process in method 1 that does not depend on RFC3490.



On Mon, Jul 25, 2022, 10:21 PM Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> wrote:
Hi David,

On Mon, Jul 18, 2022 at 01:05:25PM +0000, Noveck, David wrote:
>
>   *   draft-ietf-nfsv4-internationalization is now expired.  In order to get it anywhere wglc, I have to address the issues in section 12.
>
> I haven't been able to get idna information from the working group or the internationalization people. Please provide viable sources on email.  Ifno willing experts are to be found, will need to do further research and may have to update 7530 to not support idna, if that is possible.

While I don't consider myself an internationalization person, I do know a
few who would probably qualify.  Please forgive my only sporadic
attentiveness to this list -- is there a clean summary of the open issues
that I could send to people and ask for help?

Thanks,

Ben

_______________________________________________
nfsv4 mailing list
nfsv4@ietf.org<mailto:nfsv4@ietf.org>
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/nfsv4__;!!LpKI!j7NGRO1t2zpt74VohXnTaCVcI5yF4q6IlWSmly-txDjG1Zsps-m41aBflmY1EC2eDKCuH3y92J99lxNwrwyZXw$ [ietf[.]org] [ietf.org]<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/nfsv4__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR46uD3g8$>p