Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items
"Black, David" <David.Black@dell.com> Tue, 02 August 2022 13:33 UTC
Return-Path: <David.Black@dell.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7394C13CCDC for <nfsv4@ietfa.amsl.com>; Tue, 2 Aug 2022 06:33:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.687
X-Spam-Level:
X-Spam-Status: No, score=-2.687 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DNWgpxAk29kp for <nfsv4@ietfa.amsl.com>; Tue, 2 Aug 2022 06:33:49 -0700 (PDT)
Received: from mx0b-00154904.pphosted.com (mx0b-00154904.pphosted.com [148.163.137.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C717C15C512 for <nfsv4@ietf.org>; Tue, 2 Aug 2022 06:33:47 -0700 (PDT)
Received: from pps.filterd (m0170396.ppops.net [127.0.0.1]) by mx0b-00154904.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 272AMJHI017183; Tue, 2 Aug 2022 09:33:46 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=smtpout1; bh=jh5oGF4kIfhIUDyRC3B0cIWveCiY2OCVAiHsRa4SgWY=; b=MwBGUsU2ChLd6yismiLa6cO06evK3AAN/I4tGH1OH1BdakMs2UwONm/MiuixqJt2AoXv 7nc+8/lQixzsPYh8r/2i3pNj8JMW+LahjFiCdaSuu1hePQttaJrfsJOL8117ieM/kXy7 C+eQVVIWRVRaJYiLqTSqe9sELsvjEm/nAI5D0vvCUiva0dEBSKFMnOdqjF46uJTHwHfm BfPkZvC55Ro3cd9cV8I/pMJ2jn/Tqp4aL6ozAkr7kgoI3I8X3eIUNDwsAsR6KB7NX8on lhkM7kwd28+qy/pHJDvqItMlAX6zrJezH0N3RnWRLIzV5vf6gPM+8uvSeDtIcYbq2Qa3 Cg==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0b-00154904.pphosted.com (PPS) with ESMTPS id 3hn0g0jbwj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 02 Aug 2022 09:33:46 -0400
Received: from pps.filterd (m0142699.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 272D1feF007734; Tue, 2 Aug 2022 09:33:45 -0400
Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1anam02lp2049.outbound.protection.outlook.com [104.47.57.49]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 3hq2q22dy5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 02 Aug 2022 09:33:45 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EEbW63hkp+UDXKaYhOds81QPHifBffc0fCV2QPmj/cAhZSEWAzKyK0szzP4BXpqYZOeOx2JV5MpWVZ+vOjTjxllVQSv2Q1ZPLE2cZl52+o4i3KCCyl7CB6KBZvFUWElFPITJANC9im79IvBxjZ6mTgZNnDG6tiI5tN3oGZd0O8w/9TqpGPhjFbFPH69n1IZOM0juEto1rQubMmuR673EWYlDrM7oLvoquHV6cNsy28Nqfxj+Ro7oK/pejqUfYfeL5/0y7Xg/ZVUNL0u7W17PqOzFqUt3XqvAK8rr4mguOh+O3uvwKePkjtbbeqx2bCs6bEMBfmm1+c9qg7IB848Nww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jh5oGF4kIfhIUDyRC3B0cIWveCiY2OCVAiHsRa4SgWY=; b=H1fX+IPOLxrMg7W4JWFfviMb4Mv8BuyliOroJxtRBFc8K9JYyQGNcnhsFLQ3M7ybNdy5uZPSDelpZLd7XsqvH97r/6CB7e76u/AVq4dv7EOuv+Yxj0WaAt5y9JYxVpW1P2BDxSVmO6ZP/X6EJpANdrFYHfdrgdMEpr5dC9DOvRC87MJK7QIAwJEXC75w43klkb2H9lOd8+0gpUYjsJBQMq1vHVmLD9PmGm7Ltp4yaQF7u7wR8ThknXPbhqqKPMLdPxHmUDdc1i/aNKVCvwt5g9pICWgwjJ/tOhOkDAax9zM4P6L0Y7vnOqPvCQx9FAwUnqZTCqBz2LveV9dRyiY38Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by PH7PR19MB6112.namprd19.prod.outlook.com (2603:10b6:510:1df::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5482.16; Tue, 2 Aug 2022 13:33:40 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::f5c4:c449:dc5b:a0ec%7]) with mapi id 15.20.5482.016; Tue, 2 Aug 2022 13:33:39 +0000
From: "Black, David" <David.Black@dell.com>
To: Rick Macklem <rmacklem@uoguelph.ca>, David Noveck <davenoveck@gmail.com>
CC: NFSv4 <nfsv4@ietf.org>, "Black, David" <David.Black@dell.com>
Thread-Topic: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items
Thread-Index: AdiapeJPGDuOG31eRCOPOq4dar4KOwH5BeYWANjpVFAABlm1FAAaCj1Q
Date: Tue, 02 Aug 2022 13:33:39 +0000
Message-ID: <MN2PR19MB4045965236195D2DC755CDF7839D9@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <MN2PR06MB5597E737F236E8E35C02380FE18C9@MN2PR06MB5597.namprd06.prod.outlook.com> <20220726022100.GD30255@kduck.mit.edu> <CADaq8jfb0Ecbh-3AUW=wMJCT4yu1GwUX+y50cYNrZfRRHc8Dhg@mail.gmail.com> <MN2PR19MB4045F9FDDDD501D798B3B8A9839A9@MN2PR19MB4045.namprd19.prod.outlook.com> <YQBPR0101MB97426A8AF9FAF18186C495B8DD9D9@YQBPR0101MB9742.CANPRD01.PROD.OUTLOOK.COM>
In-Reply-To: <YQBPR0101MB97426A8AF9FAF18186C495B8DD9D9@YQBPR0101MB9742.CANPRD01.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2022-08-01T21:28:23Z; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=1bb410ca-1d02-4f8e-a5e6-4b9f5e0d70ba; MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8c0b6375-d4e4-422b-0595-08da748b9c62
x-ms-traffictypediagnostic: PH7PR19MB6112:EE_
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR19MB4045.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(376002)(136003)(346002)(39860400002)(366004)(396003)(41300700001)(54906003)(110136005)(107886003)(71200400001)(82960400001)(52536014)(7696005)(6506007)(53546011)(33656002)(26005)(8936002)(55016003)(9686003)(316002)(2906002)(786003)(38100700002)(478600001)(966005)(122000001)(186003)(86362001)(64756008)(8676002)(4326008)(66556008)(76116006)(66476007)(66446008)(66946007)(38070700005)(5660300002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c0b6375-d4e4-422b-0595-08da748b9c62
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Aug 2022 13:33:39.8979 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Pu1GtPK84drF/yQuLbnF1CDdyICjf198NPAQY9IepVhEWLNrdDHS8Z74KjTBpY61BsIkYtG1FTx6EDqrqVyF4g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR19MB6112
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.883,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-08-02_07,2022-08-02_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 suspectscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 clxscore=1015 phishscore=0 mlxscore=0 impostorscore=0 spamscore=0 lowpriorityscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2208020063
X-Proofpoint-GUID: Q2xiXCsl_shmts6k7EDn1vrSRJtdiWUI
X-Proofpoint-ORIG-GUID: Q2xiXCsl_shmts6k7EDn1vrSRJtdiWUI
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 adultscore=0 suspectscore=0 malwarescore=0 mlxlogscore=999 bulkscore=0 phishscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2206140000 definitions=main-2208020063
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/94wn4vj-OOHnvN56WfI3EyesgiE>
Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2022 13:33:53 -0000
>>> As a result, the domain string returned on a GETATTR of >>> the user id MUST be the same as that used when setting the >>> user id by the SETATTR. >> >>I would expect server implementations to do exactly that, but it'd be good >to check - would compliance with that "MUST" be a problem for any >known implementations? >> >>If so, please explain how the GETATTR and SETATTR user id values could >differ. > For the FreeBSD name<->id mapping daemon, the domain string is > considered to be case independent. > i.e., UoGuelph.ca is considered the same as uoguelph.ca > I think I did this because that is how DNS host domain names have > traditionally been handled. Unfortunately, the concept of case independence is significantly more complex in Unicode. A common example is that in ASCII, 'i' is the lower-case counterpart of 'I', but that's not always the case for Unicode, e.g., in Turkish, the lower case counterpart of 'I' is U+0131 (&inodot), LATIN SMALL LETTER DOTLESS I (https://en.wikipedia.org/wiki/Dotless_I), and applying ASCII case independence produced incorrect results, as there are words in Turkish that differ only in dotted-i vs. dotless-i. The "method one" that is proposed for elimination dealt with Unicode case insensitivity via use of ToASCII and ToUnicode - Unicode case mapping is buried in the NAMEPREP step. Unfortunately, the entire NAMEPREP framework (including those mechanisms) is obsolete for a number of good reasons, including its dependence on a specific version of Unicode. Case insensitivity of domain names has been moved to input processing, as indicated by this item in Appendix A of RFC 5891 (https://datatracker.ietf.org/doc/html/rfc5891#appendix-A): 4. Remove the mapping and normalization steps from the protocol and have them, instead, done by the applications themselves, possibly in a local fashion, before invoking the protocol. For NFS, the likely upshot is that language/locale-dependent (case) mapping and normalization has to be done by the client or code above it. ASCII case insensitivity would be safe for a server that enforces a restriction to 7-bit ASCII, but it's not safe in general for UTF-8. Thanks, --David -----Original Message----- From: Rick Macklem <rmacklem@uoguelph.ca> Sent: Monday, August 1, 2022 8:37 PM To: Black, David; David Noveck Cc: NFSv4 Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items [EXTERNAL EMAIL] Black, David <David.Black=40dell.com@dmarc.ietf.org> wrote: >Dave, > >> The core issue derives from the following text in RFC7530: > >[ ... SNIP ...] > >> The above text was suggested by David Black based on discussions with internationalization experts, and had no problems getting accepted by the IESG. > >In light of what has (not) transpired since then ... > >> The first method references RFC 3490, now obsolete, so cannot be transferred to a new NFSv4 internationalization document >> >> This reference should, almost certainly, not have appeared in RFC7530, but I'm not sure how it was approved. >> >> It seems very unlikely that the first method was ever implemented by any NFSv4 server, despite the fact it is recommended above. > >... while I could patch the text to deal with RFC 3490 being obsolete, I think "running code" wins this one ... i.e., I suggest that the WG proceed to: > >> - eliminate the use of method one. > >That creates a small item to deal with, as method 2 contains a "MUST" >requirement that would apply to all implementations: > > >> As a result, the domain string returned on a GETATTR of >> the user id MUST be the same as that used when setting the >> user id by the SETATTR. > >I would expect server implementations to do exactly that, but it'd be good >to check - would compliance with that "MUST" be a problem for any >known implementations? > >If so, please explain how the GETATTR and SETATTR user id values could >differ. For the FreeBSD name<->id mapping daemon, the domain string is considered to be case independent. ie. UoGuelph.ca is considered the same as uoguelph.ca I think I did this because that is how DNS host domain names have traditionally been handled. rick Thanks, --David From: nfsv4 <nfsv4-bounces@ietf.org> On Behalf Of David Noveck Sent: Thursday, July 28, 2022 9:57 AM To: Benjamin Kaduk Cc: Noveck, David; NFSv4 Subject: Re: [nfsv4] My probable non-participation in IETF114 meeting -- missing agenda items [EXTERNAL EMAIL] The core issue derives from the following text in RFC7530: string sent SHOULD be in the form of one or more U-labels as defined by [RFC5890 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc5890__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR6jQoVSp$>]. If that is impractical, it can instead be in the form of one or more LDH labels [RFC5890 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc5890__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR6jQoVSp$>] or a UTF-8 domain name that contains labels that are not properly formatted U-labels. The receiver needs to be able to accept domain and server names in any of the formats allowed. The server MUST reject, using the error NFS4ERR_INVAL, a string that is not valid UTF-8, or that contains an ASCII label that is not a valid LDH label, or that contains an XN-label (begins with "xn--") for which the characters after "xn--" are not valid output of the Punycode algorithm [RFC3492 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3492__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR8HVeyrh$>]. When a domain string is part of id@domain or group@domain, there are two possible approaches: 1. The server treats the domain string as a series of U-labels. In cases where the domain string is a series of A-labels or Non-Reserved LDH (NR-LDH) labels, it converts them to U-labels using the Punycode algorithm [RFC3492 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3492__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR8HVeyrh$>]. In cases where the domain string is a series of other sorts of LDH labels, the server can use the ToUnicode function defined in [RFC3490 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3490__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVRw5pOT9y$>] to convert the string to a series of labels that generally conform to the U-label syntax. In cases where the domain string is a UTF-8 string that contains non-U-labels, the server can attempt to use the ToASCII function defined in [RFC3490 [datatracker.ietf.org]<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc3490__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVRw5pOT9y$>] and then the ToUnicode function on the string to convert it to a series of labels that generally conform to the U-label syntax. As a result, the domain string returned within a user id on a GETATTR may not match that sent when the user id is set using SETATTR, although when this happens, the domain will be in the form that generally conforms to the U-label syntax. 2. The server does not attempt to treat the domain string as a series of U-labels; specifically, it does not map a domain string that is not a U-label into a U-label using the methods described above. As a result, the domain string returned on a GETATTR of the user id MUST be the same as that used when setting the user id by the SETATTR. A server SHOULD use the first method. The above text was suggested by David Black based on discussions with internationalization experts, and had no problems getting accepted by the IESG. . The first method references RFC 3490, now obsolete, so cannot be transferred to a new NFSv4 internationalization document This reference should, almost certainly, not have appeared in RFC7530, but I'm not sure how it was approved. It seems very unlikely that the first method was ever implemented by any NFSv4 server, despite the fact it is recommended above. The basis of the recommendation is quite unclear and it is not easy to determine a situation in which the use of the first method would be needed/desirable. Further, the use of "SHOULD" leaves unanswered the question of what are valid reasons to bypass the recommendation. The existing handling is not transferrable to other NFSv4. We need to do one of the following: - eliminate the use of method one. - provide an alternative the process in method 1 that does not depend on RFC3490. On Mon, Jul 25, 2022, 10:21 PM Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>> wrote: Hi David, On Mon, Jul 18, 2022 at 01:05:25PM +0000, Noveck, David wrote: > > * draft-ietf-nfsv4-internationalization is now expired. In order to get it anywhere wglc, I have to address the issues in section 12. > > I haven't been able to get idna information from the working group or the internationalization people. Please provide viable sources on email. Ifno willing experts are to be found, will need to do further research and may have to update 7530 to not support idna, if that is possible. While I don't consider myself an internationalization person, I do know a few who would probably qualify. Please forgive my only sporadic attentiveness to this list -- is there a clean summary of the open issues that I could send to people and ask for help? Thanks, Ben _______________________________________________ nfsv4 mailing list nfsv4@ietf.org<mailto:nfsv4@ietf.org> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/nfsv4__;!!LpKI!j7NGRO1t2zpt74VohXnTaCVcI5yF4q6IlWSmly-txDjG1Zsps-m41aBflmY1EC2eDKCuH3y92J99lxNwrwyZXw$ [ietf[.]org] [ietf.org]<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/nfsv4__;!!LpKI!gD1BRtFwwUpp8etNt74yc4T_v57MvYaRpGrXsWpU9X61X1wbdZB1UvN3ftbQldXRpIblsAw3UTPVR46uD3g8$>p
- [nfsv4] My probable non-participation in IETF114 … Noveck, David
- Re: [nfsv4] My probable non-participation in IETF… Benjamin Kaduk
- Re: [nfsv4] My probable non-participation in IETF… David Noveck
- Re: [nfsv4] My probable non-participation in IETF… Black, David
- Re: [nfsv4] My probable non-participation in IETF… Rick Macklem
- Re: [nfsv4] My probable non-participation in IETF… Black, David
- Re: [nfsv4] My probable non-participation in IETF… David Noveck
- Re: [nfsv4] My probable non-participation in IETF… David Noveck
- Re: [nfsv4] My probable non-participation in IETF… Chuck Lever III
- Re: [nfsv4] My probable non-participation in IETF… Chuck Lever III