Re: [nfsv4] AD Evaluation of draft-ietf-nfsv4-layout-types-08

Thomas Haynes <loghyr@primarydata.com> Mon, 05 February 2018 23:00 UTC

Return-Path: <loghyr@primarydata.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED0DF127419 for <nfsv4@ietfa.amsl.com>; Mon, 5 Feb 2018 15:00:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=primarydata.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hitL6pwH4w4o for <nfsv4@ietfa.amsl.com>; Mon, 5 Feb 2018 15:00:20 -0800 (PST)
Received: from us-smtp-delivery-194.mimecast.com (us-smtp-delivery-194.mimecast.com [63.128.21.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9494124BAC for <nfsv4@ietf.org>; Mon, 5 Feb 2018 15:00:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=primarydata.com; s=mimecast20170802; t=1517871618; h=from:subject:date:message-id:to:cc:mime-version:content-type:content-transfer-encoding:in-reply-to:references; bh=5Nyh63yrcGWYc3xV32R88f37NoluuSYkpLMcYke7bYM=; b=TOKwvWerHmdjtnIOMimVJ4ckLXu+KDNvxWPROmAFDk9+1S9GATgQUbH/WCQP4GQi4LHEcYdeyeeXIFt/5zIeAl9R7mkVSvefq8Q9VSTPe7y4TaOuukA3MVUM0ljLw5x6/aelu4lp9llYlGn4P0LOt8k8/FW5m3STlsOCGR8vmQ4=
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02lp0080.outbound.protection.outlook.com [207.46.163.80]) (Using TLS) by us-smtp-1.mimecast.com with ESMTP id us-mta-94-jk6VsKJJMtaDk0KFYfMyKw-1; Mon, 05 Feb 2018 18:00:15 -0500
Received: from BY2PR1101MB1093.namprd11.prod.outlook.com (10.164.166.21) by BY2PR1101MB1160.namprd11.prod.outlook.com (10.164.166.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.464.11; Mon, 5 Feb 2018 23:00:11 +0000
Received: from BY2PR1101MB1093.namprd11.prod.outlook.com ([10.164.166.21]) by BY2PR1101MB1093.namprd11.prod.outlook.com ([10.164.166.21]) with mapi id 15.20.0464.015; Mon, 5 Feb 2018 23:00:11 +0000
From: Thomas Haynes <loghyr@primarydata.com>
To: Spencer Dawkins <spencerdawkins.ietf@gmail.com>
CC: "draft-ietf-nfsv4-layout-types@ietf.org" <draft-ietf-nfsv4-layout-types@ietf.org>, "nfsv4-chairs@ietf.org" <nfsv4-chairs@ietf.org>, NFSv4 <nfsv4@ietf.org>
Thread-Topic: AD Evaluation of draft-ietf-nfsv4-layout-types-08
Thread-Index: AQHTnsufWR5Rb04Ri0iQ2/2Ir+ObHqOWbIyA
Date: Mon, 5 Feb 2018 23:00:11 +0000
Message-ID: <F8150E58-8A4A-433C-BF11-DC11D7E09DE4@primarydata.com>
References: <CAKKJt-epFo2_iiOfH1hoXzzdDeEcxk8-U4-_bpSgUAP0CvYRTw@mail.gmail.com>
In-Reply-To: <CAKKJt-epFo2_iiOfH1hoXzzdDeEcxk8-U4-_bpSgUAP0CvYRTw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [63.157.6.18]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BY2PR1101MB1160; 7:5W/NtVcCkNuajE8YnK8nNpqhXtY2DmATZFp/40ouNmdrDKR3IZ+IRN8Nk14sJqxCX+Tn8ox/FlAJm9qeM9XZrlBNej6D3b7Yj79TheGIJo4EgiTY/laX7ECoeg1Mzd6vILedwTrZJjsXaMs1NNu0thGg4z9LLySea7cOCg7uQsau5RRsR+Ub/62fY+rv3XuX36PFJem2Hv+0k163i2tt4xYbkj5tvamAVprqi5wjWNZeocTcQTXGWz+jNXRgZp8f; 20:Fpf4f2hwbSLwhdvO4ecfDoKWQ5cAr7Tk2zqNlDiZ0krzB169rKh9xe754QL/tHbMgSK2KUi8n90Ud4Qq1gG30jRC9wXJcEtQASg10ugtWKq74IPb1p6dN1nwcRnLMbYaAH/3mrZ+FsFjiUJOOn2OyKL4fKMgL8XkavQvBQxTXgA=
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: b42792f2-ea12-49ed-2a9b-08d56cec35dd
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(7021125)(4534165)(7022125)(4603075)(4627221)(201702281549075)(7048125)(7024125)(7027125)(7028125)(7023125)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:BY2PR1101MB1160;
x-ms-traffictypediagnostic: BY2PR1101MB1160:
x-microsoft-antispam-prvs: <BY2PR1101MB11604AE515CD07A0E06B2BDECEFE0@BY2PR1101MB1160.namprd11.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(192374486261705)(85827821059158);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(3231101)(2400082)(944501161)(6041288)(20161123560045)(20161123564045)(20161123558120)(20161123562045)(2016111802025)(6072148)(6043046)(201708071742011); SRVR:BY2PR1101MB1160; BCL:0; PCL:0; RULEID:; SRVR:BY2PR1101MB1160;
x-forefront-prvs: 0574D4712B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39830400003)(346002)(376002)(396003)(39380400002)(189003)(199004)(76104003)(8936002)(2906002)(186003)(105586002)(81166006)(2900100001)(7736002)(106356001)(77096007)(6916009)(82746002)(81156014)(8676002)(478600001)(83716003)(413944005)(3660700001)(86362001)(39060400002)(2950100002)(54906003)(97736004)(5660300001)(102836004)(14454004)(316002)(33656002)(26005)(59450400001)(6486002)(53936002)(3280700002)(66066001)(6246003)(76176011)(229853002)(6506007)(53546011)(6512007)(305945005)(36756003)(68736007)(4326008)(25786009)(99286004)(6116002)(3846002)(6436002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR1101MB1160; H:BY2PR1101MB1093.namprd11.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-microsoft-antispam-message-info: jNV/3KU/aa1D0gFWof1XfJ6Yh47PvvAo4UQ1avva4xai7Q6OFxMS95GiHX/m8mEJW9zx2QlExePoNx7LhwMcVQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-ID: <18C8174FD131174385421DEF720CF6DA@namprd11.prod.outlook.com>
MIME-Version: 1.0
X-OriginatorOrg: primarydata.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b42792f2-ea12-49ed-2a9b-08d56cec35dd
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Feb 2018 23:00:11.0342 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 03193ed6-8726-4bb3-a832-18ab0d28adb7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR1101MB1160
X-MC-Unique: jk6VsKJJMtaDk0KFYfMyKw-1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/gN561GLKECaGBZOyY8R8HLa2Rxo>
Subject: Re: [nfsv4] AD Evaluation of draft-ietf-nfsv4-layout-types-08
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2018 23:00:23 -0000


> On Feb 5, 2018, at 1:52 PM, Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> wrote:
> 
> Dear Authors,
> 
> This draft looks quite clean. NFSv4 drafts usually do.
> 
> I did make some notes during AD Evaluation, and would like to resolve them before requesting IETF Last Call.
> 
> Please let me know what you think.
> 
> Spencer
> 
> In this text from the Abstract,
> 
>   This document defines the requirements which individual pNFS layout
>    types need to meet in order to work within the parallel NFS (pNFS)
>    framework as defined in RFC5661.  In so doing, it aims to clearly
>    distinguish between requirements for pNFS as a whole and those
>    specifically directed to the pNFS File Layout.  The lack of a clear
>    separation between the two set of requirements has been troublesome
>    for those specifying and evaluating new Layout Types.  In this
>    regard, this document effectively updates RFC5661.
> 
> I'd suggest dropping "effectively" in the last sentence.
> 

Okay


> In this text,
> 
>   The concept of layout type has a central role in the definition and
>    implementation of Parallel Network File System (pNFS).  Clients and
>    servers implementing different layout types behave differently in
>    many ways while conforming to the overall pNFS framework defined in
>    [RFC5661] and this document.
> 
> I'd suggest adding the reference to [RFC5661] at the end of the first sentence, since that's where pNFS is defined (right?). The existing reference to [RFC5661] in the final sentence is fine.
> 


Okay


> In this text,
> 
>   As a consequence, new internet drafts (see [FlexFiles] and [Lustre])
>    may struggle to meet the requirements to be a pNFS layout type. 
> 
> I'd suggest "authors of new specifications" ... "may struggle”.

Okay


> 
> I understand that the Terminology section is in alphabetical order, but could you consider whether a different organization might be helpful? "loose coupling" and "tight coupling" seem useful to read together, for instance, but they don't appear on the same page. If you tell me that doing that doesn't seem helpful, I believe you …

The only problem is that we might want to make the same change in the Flex Files document.

I’ve rearranged them such that the major concepts are grouped together.


> 
> In this text,
> 
>   layout stateid:  is a 128-bit quantity returned by a server that
>       uniquely defines the layout state provided by the server for a
>       specific layout that describes a layout type and file (see
>       Section 12.5.2 of [RFC5661]). 
> 
> I found myself wondering "unique within what scope?”


The server and stateid type. 


> 
> In this text, 
> 
> 3.  The Control Protocol
> 
>    A layout type has to meet the requirements that apply to the
>    interaction between the metadata server and the storage device such
>    that they present to the client a consistent view of stored data and
>    lock state (Section 12.2.6 of [RFC5661]).  Particular implementations
>    may satisfy these requirements in any manner they choose and the
>    mechanism chosen need not be described as a protocol. 
> 
> could you give an example of a mechanism that wouldn't be described as a protocol? I can guess, but I'm guessing. The SCSI layout given as an example a bit further down this section is the kind of example I'm thinking about here.
> 

I was actually thinking not of layout types, but of implementations of a Layout Type.

The prime example is the NFSv4.1 file layout type as implemented in Data ONTAP by NetApp. The view of stored data, the stateid validation, and the locking state are handled by their clustering software. Do I have a citation for that? Nope. 



> The security considerations section deflects the reader to the security considerations that appear in layout type specifications, but doesn't provide any specific references to guide the user in finding such specifications. Would it be possible to provide pointers to layout type definition documents, even if there are only one or two that would make sense?


While my intent is to say “read the security considerations of each Layout Type spec”, I can present an example.

I went with adding this to the end of the paragraph:

    For example, in Section 5 of <xref target="RFC5663" />, the lack
    of finer-than-physical disk access control necessitates that the
    client is delegated the responsibility to enforce the access
    provided to them in the layout extent which they were granted by
    the metadata server.