Re: [nfsv4] AD Evaluation of draft-ietf-nfsv4-layout-types-08

David Noveck <davenoveck@gmail.com> Tue, 06 February 2018 17:38 UTC

Return-Path: <davenoveck@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6E28127337; Tue, 6 Feb 2018 09:38:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WGNLSSfli_KY; Tue, 6 Feb 2018 09:38:33 -0800 (PST)
Received: from mail-io0-x236.google.com (mail-io0-x236.google.com [IPv6:2607:f8b0:4001:c06::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A486B127286; Tue, 6 Feb 2018 09:38:33 -0800 (PST)
Received: by mail-io0-x236.google.com with SMTP id f34so3308342ioi.13; Tue, 06 Feb 2018 09:38:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=gLjwZfmGK7D+IPp9IYnqp3dlLi3RxfntEMusChpwbl8=; b=m+NwmsVbfI1qJb6sG6asqoY5F/2EmtTo7UpGorTwZhYPRbTMhlqq6VXfv/uPdi+HUo W/gEtBprkWcfZIyOCkNYPybH56N6GOhPWiMBp2ugELL58SmJukvXYUHOYVyIb0jMZ69F CZHITESJlVUf6/4N8f17w6N4wTHh8ylSpUH9s/sX5fRpugMc19idw6qoHY97LFO81WfP O8vbmyFwmmVMKcEW551WNatgQnPvOU5IDZ9nXcdgFvmedd1AwZfeqjr4QvKOux2Y36Ug VMUh9fnC7UEd8AkOT7a7akXqDNTyYNkS6gYIksuid8I6oh6cV2K1Aeb1TaOvWET2rJTz 4NGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=gLjwZfmGK7D+IPp9IYnqp3dlLi3RxfntEMusChpwbl8=; b=nSIq5KY7/LR7m0ReABGvSu1zYSKCk9oNA2uLWSL4bzJkOYfQvLGs78Xi9t4nGWqC+w 5E37z9KnXvXiCV0PVL8fiPgcqKjXTqbdVaHgxSqlAtlGqUv1r/4ghtJQbyc6I/JO6QYz Y7gvDfcbphDkDwVKc0qkvJz27zb1hMEr7tI8I29RHOrQOomsSfwLW8uGfzAZiStb6zVF oj0eRINf7bGPhTFButfzcn1qMPVDa9xEsYmipH+q3rBIxPNmklChGvgKEihs72JV+GJO n8oihysRWcg8/6ifqAJEE7qkxElhr4l+FgIP+leIHhbuPWBYrhSBKeLpR5dUaWqCa+fX 9O9w==
X-Gm-Message-State: APf1xPDoGstXhCmMaN6izR4jPUiNOihDLUtBxKgdXF/oeC3h1VcM08T1 4sRiCwHtNQOT3HLKKra8qO+/YzY0EBKsX8+YDDo=
X-Google-Smtp-Source: AH8x225dDkksjOsDmeddJYueu7BWGSM/hM2Oftxutosi6i3iQxt2XcyokKCF9sWZjaCzi5pxHaxRYcTLQQ5aRxftDY8=
X-Received: by 10.107.88.19 with SMTP id m19mr3996031iob.113.1517938712779; Tue, 06 Feb 2018 09:38:32 -0800 (PST)
MIME-Version: 1.0
Received: by 10.107.181.132 with HTTP; Tue, 6 Feb 2018 09:38:32 -0800 (PST)
In-Reply-To: <F8150E58-8A4A-433C-BF11-DC11D7E09DE4@primarydata.com>
References: <CAKKJt-epFo2_iiOfH1hoXzzdDeEcxk8-U4-_bpSgUAP0CvYRTw@mail.gmail.com> <F8150E58-8A4A-433C-BF11-DC11D7E09DE4@primarydata.com>
From: David Noveck <davenoveck@gmail.com>
Date: Tue, 06 Feb 2018 12:38:32 -0500
Message-ID: <CADaq8jfSqAYQCFXTJezXVd423sdt1r0njBCaLDp9vQK_KKXwww@mail.gmail.com>
To: Thomas Haynes <loghyr@primarydata.com>
Cc: Spencer Dawkins <spencerdawkins.ietf@gmail.com>, "nfsv4-chairs@ietf.org" <nfsv4-chairs@ietf.org>, NFSv4 <nfsv4@ietf.org>, "draft-ietf-nfsv4-layout-types@ietf.org" <draft-ietf-nfsv4-layout-types@ietf.org>
Content-Type: multipart/alternative; boundary="f403043cd170c41f2605648ea533"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/IYIU-Sbab6nXMH2jhxAP-ryyRmw>
Subject: Re: [nfsv4] AD Evaluation of draft-ietf-nfsv4-layout-types-08
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Feb 2018 17:38:37 -0000

 > > I found myself wondering "unique within what scope?”


> The server and stateid type.

For v4.1, it's actually unique within the scope of a particlar
client-server pair as repeented by
a clientid.

Section 8.2 of RFC5661 says:

The server may assign stateids independently for different clients.

A stateid with the same bit pattern for one client may designate an

entirely different set of locks for a different client.  The stateid

is always interpreted with respect to the client ID associated with

the current session.  Stateids apply to all sessions associated with

the given client ID, and the client may use a stateid obtained from

one session on another session associated with the same client ID.



On Mon, Feb 5, 2018 at 6:00 PM, Thomas Haynes <loghyr@primarydata.com>
wrote:

>
>
> > On Feb 5, 2018, at 1:52 PM, Spencer Dawkins at IETF <
> spencerdawkins.ietf@gmail.com> wrote:
> >
> > Dear Authors,
> >
> > This draft looks quite clean. NFSv4 drafts usually do.
> >
> > I did make some notes during AD Evaluation, and would like to resolve
> them before requesting IETF Last Call.
> >
> > Please let me know what you think.
> >
> > Spencer
> >
> > In this text from the Abstract,
> >
> >   This document defines the requirements which individual pNFS layout
> >    types need to meet in order to work within the parallel NFS (pNFS)
> >    framework as defined in RFC5661.  In so doing, it aims to clearly
> >    distinguish between requirements for pNFS as a whole and those
> >    specifically directed to the pNFS File Layout.  The lack of a clear
> >    separation between the two set of requirements has been troublesome
> >    for those specifying and evaluating new Layout Types.  In this
> >    regard, this document effectively updates RFC5661.
> >
> > I'd suggest dropping "effectively" in the last sentence.
> >
>
> Okay
>
>
> > In this text,
> >
> >   The concept of layout type has a central role in the definition and
> >    implementation of Parallel Network File System (pNFS).  Clients and
> >    servers implementing different layout types behave differently in
> >    many ways while conforming to the overall pNFS framework defined in
> >    [RFC5661] and this document.
> >
> > I'd suggest adding the reference to [RFC5661] at the end of the first
> sentence, since that's where pNFS is defined (right?). The existing
> reference to [RFC5661] in the final sentence is fine.
> >
>
>
> Okay
>
>
> > In this text,
> >
> >   As a consequence, new internet drafts (see [FlexFiles] and [Lustre])
> >    may struggle to meet the requirements to be a pNFS layout type.
> >
> > I'd suggest "authors of new specifications" ... "may struggle”.
>
> Okay
>
>
> >
> > I understand that the Terminology section is in alphabetical order, but
> could you consider whether a different organization might be helpful?
> "loose coupling" and "tight coupling" seem useful to read together, for
> instance, but they don't appear on the same page. If you tell me that doing
> that doesn't seem helpful, I believe you …
>
> The only problem is that we might want to make the same change in the Flex
> Files document.
>
> I’ve rearranged them such that the major concepts are grouped together.
>
>
> >
> > In this text,
> >
> >   layout stateid:  is a 128-bit quantity returned by a server that
> >       uniquely defines the layout state provided by the server for a
> >       specific layout that describes a layout type and file (see
> >       Section 12.5.2 of [RFC5661]).
> >
> > I found myself wondering "unique within what scope?”
>
>
> The server and stateid type.
>
>
> >
> > In this text,
> >
> > 3.  The Control Protocol
> >
> >    A layout type has to meet the requirements that apply to the
> >    interaction between the metadata server and the storage device such
> >    that they present to the client a consistent view of stored data and
> >    lock state (Section 12.2.6 of [RFC5661]).  Particular implementations
> >    may satisfy these requirements in any manner they choose and the
> >    mechanism chosen need not be described as a protocol.
> >
> > could you give an example of a mechanism that wouldn't be described as a
> protocol? I can guess, but I'm guessing. The SCSI layout given as an
> example a bit further down this section is the kind of example I'm thinking
> about here.
> >
>
> I was actually thinking not of layout types, but of implementations of a
> Layout Type.
>
> The prime example is the NFSv4.1 file layout type as implemented in Data
> ONTAP by NetApp. The view of stored data, the stateid validation, and the
> locking state are handled by their clustering software. Do I have a
> citation for that? Nope.
>
>
>
> > The security considerations section deflects the reader to the security
> considerations that appear in layout type specifications, but doesn't
> provide any specific references to guide the user in finding such
> specifications. Would it be possible to provide pointers to layout type
> definition documents, even if there are only one or two that would make
> sense?
>
>
> While my intent is to say “read the security considerations of each Layout
> Type spec”, I can present an example.
>
> I went with adding this to the end of the paragraph:
>
>     For example, in Section 5 of <xref target="RFC5663" />, the lack
>     of finer-than-physical disk access control necessitates that the
>     client is delegated the responsibility to enforce the access
>     provided to them in the layout extent which they were granted by
>     the metadata server.
>
>
>
>
>
> _______________________________________________
> nfsv4 mailing list
> nfsv4@ietf.org
> https://www.ietf.org/mailman/listinfo/nfsv4
>