[nfsv4] Re: Review of draft-haynes-nfsv4-uncacheable

Thomas Haynes <loghyr@gmail.com> Wed, 20 November 2024 20:05 UTC

Return-Path: <loghyr@gmail.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D8A7C1D52FA for <nfsv4@ietfa.amsl.com>; Wed, 20 Nov 2024 12:05:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wMH0IhhjrG4h for <nfsv4@ietfa.amsl.com>; Wed, 20 Nov 2024 12:05:41 -0800 (PST)
Received: from mail-pf1-x432.google.com (mail-pf1-x432.google.com [IPv6:2607:f8b0:4864:20::432]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C66CAC1D6FB2 for <nfsv4@ietf.org>; Wed, 20 Nov 2024 12:05:41 -0800 (PST)
Received: by mail-pf1-x432.google.com with SMTP id d2e1a72fcca58-723db2798caso173399b3a.0 for <nfsv4@ietf.org>; Wed, 20 Nov 2024 12:05:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732133141; x=1732737941; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=bPn9/dzObC3N1wqxDKpG6sRFbpyQyMjm63+2YZ1D6lw=; b=lH8fXgXYwKTyGb27hgNQp4soSAX9zByGK8M5nPskcvlZHurKclLT/+y+rq9YpP9PR+ FvW/wAaiWRAqReYkgEomUrmqDmeaLnd4QCVzrQOA8RTLjmSxTLiEFvNqPdDiypR5adKd uaf8FBZjI8QSwt4silmR0fgbv9KmIS8IkRrsxZBJEe6ppJzRhka73JwVME9S45g6wdL8 fPHliS9yvXiAg2usxWf7OAOnenw4ZtM88R8dH2/rXUNNG0tQ/VMSkQLPzbaWgNHoM2ia 6zJqCKYWEtvuezWSxb9VFzgSJRgI2MaeFbtf4sNs7KaFthpqIB1UHaeJWdDP2SvKTEdC PDtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732133141; x=1732737941; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=bPn9/dzObC3N1wqxDKpG6sRFbpyQyMjm63+2YZ1D6lw=; b=XHcgNubj+rTblxRF/oLxSqE8NnqCRLcPS5TcKvj85FbpIQKi/W6HLwSUzRPiIKOqnF pYKnbS/EsyqZFOsBbIT0d6PS3uub2TVhSsG3xl+oVyIaWj00mxL4UC1u5gswx5Tyzhqk 7wcm4phcUe0Ft5DBldyJJ1oTHIS6a9x2MVYc6w8iRAFmpm+BdFVrelxibi8kDkfuATxv rPCg8xdsSlVP2oA9i541qXciWXviSLeBl+CXcUY3wtZuGZZYOXhxY40fB+0Y7ELUpU5u YfDwlNytvJDFfL/LGb8G3ZCIcn+gFHghzLFyaMbfU89kSgmulJTvDfIMY75bo1D3YpPH UJ6w==
X-Gm-Message-State: AOJu0YwolraPPIAf/Bdb17em+BxEngw1faOpx7XWH6rp2dfAyL9ZDlN/ /tqBKVtZNh3/3d3x3XKZXseCfHwsCJsGALLIfXNfu3gvHSHlZMSroxfiaD8j
X-Google-Smtp-Source: AGHT+IEDypN9ifPPj2tw3I4jQRwj8mujqzj7RAFt9Kyf/bo2LFjtduyC4o3diMV3YzylF3unywarag==
X-Received: by 2002:a05:6a00:188e:b0:71e:4ee1:6d78 with SMTP id d2e1a72fcca58-724bec87d71mr5388522b3a.1.1732133140881; Wed, 20 Nov 2024 12:05:40 -0800 (PST)
Received: from smtpclient.apple ([2601:647:5b00:bf9:89ee:8be6:8c5f:9c00]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-724beeb82afsm2055338b3a.10.2024.11.20.12.05.40 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 20 Nov 2024 12:05:40 -0800 (PST)
From: Thomas Haynes <loghyr@gmail.com>
Message-Id: <A2230F2A-074F-45C9-A563-DD9C7F335197@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_33CF9B0E-4559-4065-A30C-3A42608313BF"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3826.200.121\))
Date: Wed, 20 Nov 2024 12:05:29 -0800
In-Reply-To: <CADaq8jfYD5ok6dSBHFQ_haTvF13YWzbiHuSpifOuNCJv68a6SA@mail.gmail.com>
To: David Noveck <davenoveck@gmail.com>
References: <CADaq8jfYD5ok6dSBHFQ_haTvF13YWzbiHuSpifOuNCJv68a6SA@mail.gmail.com>
X-Mailer: Apple Mail (2.3826.200.121)
Message-ID-Hash: 3IJESPGLEDLO6GR4RWRNAFN6VFIVESSN
X-Message-ID-Hash: 3IJESPGLEDLO6GR4RWRNAFN6VFIVESSN
X-MailFrom: loghyr@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-nfsv4.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: NFSv4 <nfsv4@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [nfsv4] Re: Review of draft-haynes-nfsv4-uncacheable
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/t57vQGZTQ8o2l6LIN0t5rnVx-UE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Owner: <mailto:nfsv4-owner@ietf.org>
List-Post: <mailto:nfsv4@ietf.org>
List-Subscribe: <mailto:nfsv4-join@ietf.org>
List-Unsubscribe: <mailto:nfsv4-leave@ietf.org>


> On Nov 12, 2024, at 5:10 AM, David Noveck <davenoveck@gmail.com> wrote:
> 
> General Comments
> Brief Summary
> Although not specfically mentioned, the document under review is an attempt to provide support for the two features listed below.  Later, in Replacement Suggestions, we will discuss better ways of providing support for these features.
>  Access-based enumeration, although not explicitly mentioned, is clearly being referred to under the rubric "proprientary policies".  While the document under review does not explicitly make this feature valid and the reviewer has no objection to its incluson in NFSv4, the docment under review does so implicitly and then uses that presumed validity as a justification for the new uncacheable attribute.

Not all of it is proprietary policies, Labelled NFS ala RFC7862 has concerns here.

MAC-Functional NFSv4 servers which have non-MAC-Functional NFSv4 clients would also fall under this scope.

I.e., the MAC-Functional NFSv4 servers would want to apply security labels to each direct.