Re: [nfsv4] Gen-ART review of draft-ietf-nfsv4-federated-fs-protocol-13

Chuck Lever <chuck.lever@oracle.com> Mon, 22 October 2012 19:59 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6789421F8495 for <nfsv4@ietfa.amsl.com>; Mon, 22 Oct 2012 12:59:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.403
X-Spam-Level:
X-Spam-Status: No, score=-6.403 tagged_above=-999 required=5 tests=[AWL=-3.805, BAYES_00=-2.599, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a6SkVhTf5k5Z for <nfsv4@ietfa.amsl.com>; Mon, 22 Oct 2012 12:59:22 -0700 (PDT)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id DB3CC21F8446 for <nfsv4@ietf.org>; Mon, 22 Oct 2012 12:59:22 -0700 (PDT)
Received: from acsinet21.oracle.com (acsinet21.oracle.com [141.146.126.237]) by userp1040.oracle.com (Sentrion-MTA-4.2.2/Sentrion-MTA-4.2.2) with ESMTP id q9MJxKNK003163 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 22 Oct 2012 19:59:21 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id q9MJxJ2q022695 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 22 Oct 2012 19:59:20 GMT
Received: from abhmt102.oracle.com (abhmt102.oracle.com [141.146.116.54]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id q9MJxJ0M004389; Mon, 22 Oct 2012 14:59:19 -0500
Received: from moret.1015granger.net (/99.26.161.222) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 22 Oct 2012 12:59:19 -0700
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: Chuck Lever <chuck.lever@oracle.com>
In-Reply-To: <CALBz+sgtZ9CnC29a9ayr1WQeSXEh7mB9r7AwdCPuY99azeozQw@mail.gmail.com>
Date: Mon, 22 Oct 2012 15:59:18 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <8E883FB3-9B1C-4915-95FA-7791CD143EEA@oracle.com>
References: <C1FABBCE-9C99-473C-A156-E5ABEFAED592@oracle.com> <CALBz+sgtZ9CnC29a9ayr1WQeSXEh7mB9r7AwdCPuY99azeozQw@mail.gmail.com>
To: Daniel Ellard <ellard@gmail.com>
X-Mailer: Apple Mail (2.1499)
X-Source-IP: acsinet21.oracle.com [141.146.126.237]
Cc: NFSv4 mailing list <nfsv4@ietf.org>
Subject: Re: [nfsv4] Gen-ART review of draft-ietf-nfsv4-federated-fs-protocol-13
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nfsv4>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Oct 2012 19:59:23 -0000

On Oct 22, 2012, at 3:46 PM, Daniel Ellard <ellard@gmail.com> wrote:

> On Mon, Oct 22, 2012 at 3:37 PM, Chuck Lever <chuck.lever@oracle.com> wrote:
>> Hi-
>> 
>> Gen-ART review comment:
>> 
>>> Section 4.2.2.2, 5th paragraph: how is the prohibition on referencing
>>> other attributes in the fedfsFsn object class supposed to work if this
>>> document is the defining document for that object class?
>> 
>> 
>> The referenced paragraph, in it's entirety:
>> 
>>> A fedfsFsn MAY also have additional attributes, but these attributes
>>> MUST NOT be referenced by any part of this document.
>> 
>> Does anyone recall why this language is here?
> 
> Reconstructing part of a discussion from several years ago...
> 
> Someone wanted to add some additional fields to a fedfsFsn that
> mattered for some capability that only made sense in the context of
> their file system (automatic replication?  I don't remember).
> 
> I said that I couldn't prevent them from adding fields to the LDAP
> attributes, but they would only work on their implementation and must
> not be required for correct implementations, and they were OK with
> that.  Vendors can extend, but none of the extensions are required.

There are at least two ways implementations can extend these object classes without changing them:

1.  Define and use a fedfsAnnotation, as specified in this draft (this typically also requires interaction with IANA), or

2.  Define an additional object class, then have entries inherit from both the standard class and the vendor specific one

I can add words to this effect in section 4.2 (or elsewhere) if we think it's valuable to point this out.

> I wouldn't mind if this was removed.  I haven't heard anyone talking
> about vendor-specific extensions (but then again, I no longer work
> with any of the vendors, so I'm in no position to hear much).  If
> nobody steps forward to defend this, I'd be just as happy to remove
> it.

In any event, I'm not sure we can prevent an implementor from altering the object class definitions.  In fact some LDAP server implementations require schema changes.

If no-one barks, I'll remove that paragraph.

-- 
Chuck Lever
chuck[dot]lever[at]oracle[dot]com