Re: [nfsv4] I-D Action: draft-talpey-rdma-commit-02.txt

Chuck Lever III <chuck.lever@oracle.com> Sun, 29 January 2023 16:23 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01307C15154E for <nfsv4@ietfa.amsl.com>; Sun, 29 Jan 2023 08:23:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b="xCaJTacH"; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b="lnZVt9lj"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G3g9Ske1xpMS for <nfsv4@ietfa.amsl.com>; Sun, 29 Jan 2023 08:23:15 -0800 (PST)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC1F0C15154C for <nfsv4@ietf.org>; Sun, 29 Jan 2023 08:23:14 -0800 (PST)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30TFj3Mj029891; Sun, 29 Jan 2023 16:23:14 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2022-7-12; bh=YKw0eyyMM8v7SeeX9V6PaaaE3DKfPoCD7a0Chq1kpJg=; b=xCaJTacHYtCx4EGLdAJ35nd4M62VKNuWjHliRfflcrznewEXSUE0D0gDsQKYht1UZYU2 p34DmwkB3wMhz8cb8P4ZiUPjD24iYniGYrIP5saBd6lyV6KI9Xv23dil5Q4Tc5l9tbcF BwQqLaokWL0RxKee2Iu7V8Z01HBnicgrCbLuhIALjLrG8y9wJ1cIXsrupHxwHBeKnNCW Rf9QrPKSZXmpb8fLqnZOexjuu26/Hh5R4vXfETvGKVvAQebLoF5Au2ZHFdgI4FPs6yal HIA5EXmId53YX7Fvbmb74042bGhdZMwTZBbKryV/kbVM3PVH/szBwJm28xwlEFV/OR/S xQ==
Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3ncvr8hj5c-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 29 Jan 2023 16:23:13 +0000
Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 30TD2A54018758; Sun, 29 Jan 2023 16:23:12 GMT
Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2041.outbound.protection.outlook.com [104.47.57.41]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3nct5afc2a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 29 Jan 2023 16:23:12 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z39ARYGMq8KkDV07D90t5F1tz2Mku+J8olnCgKw3KWRmbBSFVj/yFX/S4+lgLU3m2Igde2ZYfqTi18v07je2aapWR0Fm96PtsKYWFkTPdU2Eqqth96ZNKu9QD1wmoU8wiup4g9LWa8bvPK0B9jCLrg4v1rt7WGsKjQ4XT1EHBQbhOummGmvpTyheeaaH+fVUvhtTb2TFT6tVZP5CUQPOoSNfVqfIBg7FlbGAeet9GZ9HFJ27DDFaJOFO/YjV6m5fca/v5ykKOh3YVgen7RRKzi47quQ2X4WBfZiok8ti3/Xa0cUaZOL7oQ0pYzIPLSQ5CxxmPxza4sy00bAmmku4hA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YKw0eyyMM8v7SeeX9V6PaaaE3DKfPoCD7a0Chq1kpJg=; b=WYgfU3Gk74kG2Plik2wJELifC1nYFXumDwovdMX+h+lU59uowO8PhWugcrg0ggTnVFjTxTXYwe8MnrQtZDzJJCHoCRa6y2DBIt2tfgQyCACSqXCqVtKOIch+DheskIAhTOVsl/KnrjBfDNhxty5+zeZfbUNk1I5q8VVs2Jt8KuHJwDIm6nJvD4cejJsBmiMLdz4p1CIBSe0kMoSbd3pW37bv9jeALYe8aRxlHcBTiOhWbCLT63SMd0lWa0+VscX6SoQN9Fu9NXJIA4rLJmAETnSIv2jiPeIBEWjkprbaDVwv160ZWZ3r1VJEWljjbyurPJMliPn6Qu1Pngv8Wg6fww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YKw0eyyMM8v7SeeX9V6PaaaE3DKfPoCD7a0Chq1kpJg=; b=lnZVt9ljF77kNmAvNfG0usoNxBdHYhRXtY+AVWYUrOgPp+Y7wAJJi3mQ0SG5fYmGpzLkSsM7oEzXjgGF+pWhpkZgVS6tNYXIEnMYQxQ3kLpr0AIpimxxxFRzCwaGMZL4rU9CCOX9fyGbn6NfTgl5BO7KBPTOswZmoaVjCN0mN4Q=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by SA2PR10MB4473.namprd10.prod.outlook.com (2603:10b6:806:11f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6064.19; Sun, 29 Jan 2023 16:23:10 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::96a2:2d53:eb8c:b5ed]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::96a2:2d53:eb8c:b5ed%5]) with mapi id 15.20.6064.019; Sun, 29 Jan 2023 16:23:10 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: Tom Talpey <tom@talpey.com>
CC: "nfsv4@ietf.org" <nfsv4@ietf.org>
Thread-Topic: [nfsv4] I-D Action: draft-talpey-rdma-commit-02.txt
Thread-Index: AQHZMdTiLpv7ZeefpEGIVZVgWmLXSq60FtMAgAGBdoA=
Date: Sun, 29 Jan 2023 16:23:10 +0000
Message-ID: <6C6CFD4F-1CB0-4787-83FA-BC90A9D632B2@oracle.com>
References: <167467274160.39051.3008830517684697598@ietfa.amsl.com> <1b04687d-92a3-8e70-d008-a96be7e32508@talpey.com> <1923E4A8-A466-4963-A891-0C3D08A60AA1@oracle.com> <cd9a7b53-0ed3-d93c-b9df-cd5bbc562bd7@talpey.com>
In-Reply-To: <cd9a7b53-0ed3-d93c-b9df-cd5bbc562bd7@talpey.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|SA2PR10MB4473:EE_
x-ms-office365-filtering-correlation-id: d09d3dbf-620c-494b-46c0-08db02151cc1
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(136003)(396003)(366004)(376002)(39860400002)(346002)(451199018)(86362001)(38100700002)(38070700005)(36756003)(33656002)(122000001)(2906002)(71200400001)(41300700001)(6486002)(478600001)(8936002)(66476007)(5660300002)(66446008)(66946007)(316002)(8676002)(4326008)(76116006)(6916009)(91956017)(64756008)(83380400001)(186003)(6512007)(26005)(6506007)(53546011)(2616005)(66556008)(66899018)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <C23E2AE7F07D234CB41C3147050AF241@namprd10.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: ylv6C9kGMZrM73LhgQpyDrc8v8fMsTuUgSkkbDEffRHFr1dytczIsPNDvc01voAiPWZXb7qyIlBlv2KBinquZ2h99xHArJ7Dwskbyb6rgJgOFWUfwpIEkruyhO+my8kcB6Jxg41iE5F4HuhtmLSKzKXGJIFnzdp2Zgmucm6nGw4FCpbcsELgpGuuyX0frXfeg6aQaiRzl37G7EkiDnfKLp3lYA5PlotMKa86Y70x6Y2eNZYEweZj28jqYSn8Alu4wvdyo8Wr4qnAUGrl712nkjtN95n2D+X7NtEr2pd4tDtcS66zIibB/vfJNr4iCxsFk/SbVaXdgIS2meLDoY5mKxuQvzZKtSu0AtY1ZevDyqx8k5j/mJhE4Tt+B4vMFKIey0D7EFU4pFFsgQP93uYd3pLWyiPc/0HFvzzelyWc9ses8Kp+JzojPtkbck/Xq5OjEDJG9OtGnZ4CwF92fPwxpLoHGZFdE7YYBgCBLs3NtPy6pg1nylBGFpyJzHf+kjqDEMRrTTdinIYX7k4h7LnlJj16+v1LXRiDrfaA4KTYEh3CUNgPXBvqVIVLZJSV1x90ZfwMPOSdrUxR6U0HY1XmDjAqshx8Aja2KxZfLkLxQE5qy07k57je3qUh24L3ZI0wnI53SGlqYtrJWHbrU6U50eqeraaJzI5WQRqD5Qa7W11xSxlqegOK+kYpt0Uy0gsN4SF2hcs6N6PWhm2uRCUWwDuwcqffSns1s10WYG7IOoUabDuQYId8jPOhVvoQQoZ8dRE/xIN+KWV+MlubTEmLiQ==
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d09d3dbf-620c-494b-46c0-08db02151cc1
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jan 2023 16:23:10.2898 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JkKSkPxqntiuvyTzdBUJILBQJlvc9IxwGmx1Gj4SPJ1QPRYmZU2Jc3vkFs8Xxtdflr5bx4L2LQhybNdjwEGKuA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR10MB4473
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-29_09,2023-01-27_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 phishscore=0 malwarescore=0 mlxscore=0 adultscore=0 suspectscore=0 spamscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301290162
X-Proofpoint-GUID: 3E5Ry6LxUcg7UDL4FA-FSKOuGLtFFsOl
X-Proofpoint-ORIG-GUID: 3E5Ry6LxUcg7UDL4FA-FSKOuGLtFFsOl
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/NnmeKVrnuf9Yyl9fejm3k02UC60>
Subject: Re: [nfsv4] I-D Action: draft-talpey-rdma-commit-02.txt
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Jan 2023 16:23:20 -0000


> On Jan 28, 2023, at 12:23 PM, Tom Talpey <tom@talpey.com> wrote:
> 
> On 1/26/2023 5:23 PM, Chuck Lever III wrote:
>> I read through this document to get a flavor. A couple of observations/comments follow:
> 
> Thanks for the early review!
> 
>> The Requirements Language section needs to be updated to include a reference to RFC 8174. For reference, the most recent version of the RL boilerplate looks like this:
> 
> Interesting, the id-nits tool does not flag this. Because this is still an individual draft, I didn't update any of the boilerplate from the earlier versions. Obviously this will be done if it becomes a WG document.
> 
>> Section 1 is lengthy and contains considerable repetition.
> 
> Yes, this informational section was lightly updated, but for this review it was left in place. We can certainly discuss what part(s) remain useful in a normative standards-track version, and either edit, move or delete.
> 
> One note however:
> 
>> 	• The definition of "Persistence" in Section 1.1 is confusing.
>> 		• Perhaps a short discussion of the terms "persistence" and "durability" (or a mention that they are synonyms) might be appropriate.
> 
> I intended to remove the no-longer-preferred term "durable", but oops I did neglect to delete the single reference to the term.
> 
> I also intended to remove "commit" where it was used to mean "flush", and there is at least one vestige. Its use in the filename is purely to maintain continuity and will be renamed if adopted.
> 
>> 	• Is there a purpose for "Global" in the definition of "Global Visibility" (as opposed to "Local Visibility")? A brief discussion of that distinction would help orient readers; or perhaps it is covered elsewhere in the document and I missed it.
> 
> Yes, "global" is an important qualifier and it's in the first sentence of the glossary. But it could be made clearer. In a nutshell, persistence is for storage semantics, while global visibility is for shared memory semantics. Upper layer processing is required to implement these over traditional RDMA.

I was also thinking that there seems to be some distinction between
when data becomes visible/durable when dealing with local persistent
memory versus the same for remote memory -- that might be missing from
the discussion here (and I'm not sure it's completely relevant to the
protocol itself, but it helps motivate it) -- or perhaps it is covered
in the Introduction in the area where I started skimming <bad Chuck,
no biscuit>.


>> Section 3 is marked "INCOMPLETE". What is the plan to complete this section? Is there other remaining significant work planned for this document?
> 
> It's intended to mirror the format of RFC5040 and RFC7306, but there are some new requirements that make the old table format difficult to reuse. I have an idea, but thought it was better to get the ball rolling now.
> 
> And, I don't plan other additions, apart from things that a WG discussion might generate.

Thanks, this is good to know.


>> Is there any implementation status to document via an "Implementation Status" section? I would like to see one... or at least an informal report on the mailing list about current implementation plans, as part of the planned IETF 116 discussion of this document.
> 
> There have been experimental implementations, which are not for me to cite in a standards-track document. There is also at least one non-IETF protocol which has implemented a similar set of functionalities, in fact whose semantics were based on earlier versions of this draft.

An "Implementation Status" section is often removed before
publication. I don't feel it's inappropriate as part of a WG
document. See RFC 7942 for a detailed discussion.


>> The third paragraph of "6. Security Considerations" touches on this, but what is the trust relationship between the peers in push mode? How do push mode peers authenticate to each other?
> 
> This is entirely the domain of the upper layer. It needs to determine whether the peer is trusted, prior to creating and advertising a push-mode memory handle for that peer. Perhaps this can be stated more forcefully.

Stating this would be very pertinent to Security Considerations,
I feel.


--
Chuck Lever