Re: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis

Chuck Lever III <chuck.lever@oracle.com> Fri, 21 October 2022 15:24 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 361E0C1522AF; Fri, 21 Oct 2022 08:24:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=JB1/pJAE; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=JF2dTxzJ
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lMdqVp1EuwBM; Fri, 21 Oct 2022 08:24:49 -0700 (PDT)
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA44EC1522B1; Fri, 21 Oct 2022 08:24:49 -0700 (PDT)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 29LFObDK008072; Fri, 21 Oct 2022 15:24:49 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=corp-2022-7-12; bh=Gt/KvMnguIDoxKFVYVpzgmWeLaqN9DdT2hdQjrQ4K+A=; b=JB1/pJAEWQE1Tr19db5GA8bebJ5EWEW2CqFqs0AGzGawykOeYH20ydTPbTNyxILObcnj TuN+ergf7jigefZfeLamdcOKole2XGokMfSV5G3UUt+B2g4um1WDt86yCn3SVdjQVOfX jmrt4OcSw5N8/3dnjs4HniqGZIgcO/N1oAv5efM+NobrvP79Jhgifm94slJr0M15bjjQ gU2+/oUOZo5q923gtdqNCh3dfjTA8NqqzJP8gdk42h6EeOmWwvZW1RlxeIoPkbdO8R5h SN+zlloiXAQnYheQ6PLyrcehpmu3cAYTP6hJ8Kcw1qrfyLZdH+MMh/vZds7mwooDWayR LA==
Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3k99ntn1ss-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Oct 2022 15:24:48 +0000
Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 29LD0fjD017016; Fri, 21 Oct 2022 15:24:47 GMT
Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2047.outbound.protection.outlook.com [104.47.74.47]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3k8huaxx4b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Oct 2022 15:24:47 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QXSPtEvmihgtGebG3Iu9BD0QieYF93Qw8OqM8ni6BO7dnKEgSHsUEULAe9hOaZFA9Id1Rr8XCeP3XEiHpSyzAxhcA9OXqx4zLo3ZRrwv2eWfMU1Jfe5/TLckMA2A01zIOBxgs5ULL59vixv3wj1K4FKpLnuDtYz+aLkvg+BJdtu06Gd9eyghBXS9H3151S8dij/m/bMyNPohICQ+CjWuD2WQXM4JzdzgLIwj3KIncfOY4Uu/NcXFsxkGizyEkLfki0hHuAXPRPnmO6RZ7LvbWZmS/CzpHiL8XV9sePThtky3PWKArJV7VKufn0UHHz5DaTLg7CbFOehOZCOb3SCiQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Gt/KvMnguIDoxKFVYVpzgmWeLaqN9DdT2hdQjrQ4K+A=; b=OZHS81nSCXXY4oKkAo9+OK16CBcEgH7Xvtnljl3YgpQpm4FdqJ+9ax3QfwAUSg1vAL6rrH9+Q67CePCKMIzNUTWpBVjitMgbm1tgk1P5lLBiXMZrquk1uWQTn+/SQ0MGgrqXmxyxcwod4xbNm77SG1I3PjW4P3HAoDAtlYUbvs8ZBpycbgTDOKf3MQvcdgOGte+E7D+0XRvQekxDhtH5T5m/Qu7Z/hQsHHL+/VKUWdI2bt1q7ug7UGsym2rzSNzZy2dS3rEQozECT4zWufLTPiz/GH19iqTTNkHgCzoijShh6R/LObyLM9iTJpmbDQygaIVHP2jYeuxOMIfkwbG2sg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Gt/KvMnguIDoxKFVYVpzgmWeLaqN9DdT2hdQjrQ4K+A=; b=JF2dTxzJjaqv20pv20YlNM6nYc3yKgk1eEHrxZJMBnUumRwZLUpMGn0enjpF1bNSGgBHerQVkIh1oZ7aMC4CWAE9Jqw4x6j5AkVpFTTU1R72tJY90RWDl4GduTgEfxdgykyJRfMI0+GOuXXbLIRGR/TyCxxEUVIurIfTOSbCq6k=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by CH0PR10MB4955.namprd10.prod.outlook.com (2603:10b6:610:c2::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5746.21; Fri, 21 Oct 2022 15:24:45 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a%3]) with mapi id 15.20.5723.035; Fri, 21 Oct 2022 15:24:44 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: nfsv4-chairs <nfsv4-chairs@ietf.org>
CC: NFSv4 <nfsv4@ietf.org>, "nfsv4-ads@ietf.org" <nfsv4-ads@ietf.org>
Thread-Topic: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis
Thread-Index: AQHY30aH4G77WjHzy0WyqIMQcVYSya4ZA/EA
Date: Fri, 21 Oct 2022 15:24:44 +0000
Message-ID: <CAA600F6-82BB-4024-8B3C-A0E5685871A2@oracle.com>
References: <CADaq8jcPg3YL4p2bPrxcrSVZjMjr=ieGNfn6ADOgJKkCtYnSyg@mail.gmail.com>
In-Reply-To: <CADaq8jcPg3YL4p2bPrxcrSVZjMjr=ieGNfn6ADOgJKkCtYnSyg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|CH0PR10MB4955:EE_
x-ms-office365-filtering-correlation-id: f8497a3c-c53b-41cc-54d2-08dab37861ed
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(346002)(366004)(376002)(396003)(136003)(39860400002)(451199015)(76116006)(91956017)(66946007)(53546011)(6506007)(450100002)(66556008)(66476007)(66446008)(64756008)(8676002)(71200400001)(4326008)(54906003)(316002)(6916009)(36756003)(2616005)(2906002)(86362001)(186003)(6512007)(26005)(33656002)(66899015)(83380400001)(41300700001)(5660300002)(8936002)(6486002)(38070700005)(478600001)(38100700002)(122000001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CAA600F682BB40248B3CA0E5685871A2oraclecom_"
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f8497a3c-c53b-41cc-54d2-08dab37861ed
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Oct 2022 15:24:44.6425 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: n+cGlHegucW7nkCotKHPl7mUm52JCk/gVSvP0qwwol8GMZ15CSUlLJo/X5Meb+zHikzcd+W4pqAOFhS5slC1LQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR10MB4955
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-21_04,2022-10-21_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 adultscore=0 mlxscore=0 spamscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210210092
X-Proofpoint-ORIG-GUID: cKdw-13Vc89dB7mlnmo7piRBiRBrmkci
X-Proofpoint-GUID: cKdw-13Vc89dB7mlnmo7piRBiRBrmkci
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/vEGzp2KFJe5GULiAf-aWPUeHYqM>
Subject: Re: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2022 15:24:52 -0000


On Oct 13, 2022, at 4:57 PM, David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com>> wrote:

This is an adoption call for draft-dnoveck-nfsv4 which is intended to be a standards-track describing nfsv4.1, obsoleting rfc8881.

As it says in the abstract,

-----

This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC7530) and protocol extensions made subsequently.  The later minor version has no dependencies on NFS version 4 minor version 0, and was , until recently, documented as a completely separate protocol.

This document is part of a set of documents which collectively obsolete RFC 8881.  In addition to many corrections and clarification, it will rely on NFSv4-wide documents to substantially revise the treatment of protocol extension, internationalization, and security, superseding the description of those aspects of the protocol appearing in RFCs 5661 and 8881.

-----

The chairs would like to determine whether there is interest in adopting this document by the nfsv4 working group. The adoption call will run for two weeks and end on 10/26/2022 (UTC time). Please send any objections or expressions of support for adoption to the wg mailing list.

As stated previously, since I am editor of this document, I will not be involved in making a judgment as to the existence of consensus.  It is expected that Brian will be doing this with Zahed available as a backup if circumstances do not allow Brian to do this job.

I've examined rfc5661bis in order to address the question of whether it is ready for WG adoption.

Both the document and the diff are huge (for any reasonable definitions of "huge").

Sections 1.2 and 1.3 should be relocated to the Appendix to keep such material together and to help reduce churn in the document's chapter and section numbering (resulting in cleaner diffs now as work progresses, and once these sections are removed before publication).

Throughout:

  *   The terms "TLS-based encryption" and "transport-level encryption" need to be replaced with "transport-layer confidentiality". Let's adopt the terminology used by the rest of the community.
  *   RPCSEC GSS already provides client peer authentication. The use of TLS peer authentication is not novel. The principles introduced and used in this discussion need to be generic, because surely RPC-with-TLS will not be the final word in transport-layer security.

Security will also be described in a separate document applying to
all minor versions.  The handling is different because there is a
wider range of security-relevant features within v4.1, despite the
fact that the fundamental approach is the same for all minor
versions.  As a result, for some features, the security document
will have the lead role while, for others, the v4.1 specification
will be the main source of information about the feature, although
the basic security functionality will be as defined by the
NFSv4-wide security document.

I question whether separation of the security discussion in this way is truly beneficial to readers. Scattering the discussion like this will make it easy to miss important information.

The section defining the GSS service principal (common to all minor versions of NFSv4) should be moved to the security document.

Section 6 is problematic. I suspect the intention was Section 6 through 6.3 are meant to be part of Section 5, and Section 6.3.1 "Put Filehandle Operations" is supposed to start a new chapter. Sections 6 through 6.3 belong in the security document, IMO, not in RFC 5661bis.

Section 16.9 "Security Considerations for pNFS" belongs in the nfsv4-wide security document. The only minor version this section does not apply to is NFSv4.0. The caveat about the discussion covering non-RPC storage protocols is not pertinent, IMO; general security considerations should be the same for all layout types. Likewise, Section 17.12 "Security Considerations for the File Layout Type".

Section 19.1.11.3.  "NFS4ERR_BAD_HIGH_SLOT (Error Code 10077)" First sentence was changed to a sentence fragment that does not match the form/style of other error descriptions.
Section 19.1.16.4.  "NFS4ERR_RESOURCE (Error Code 10018)" What is the need for re-adding the RESOURCE status code?

Section 22.29.  "Operation 33: SECINFO - Obtain Available Security" I don't agree with moving the mechanical description of this operation along with its arguments and results to the nfsv4-security document. This appears to be the only operation that has been changed in this way even though there are other security-related operations in common amongst all NFSv4 minor versions.

Section 1.2.2 says:

This shift is necessary because the description of SECINFO needs
to be revised to allow negotiation of security-related transport
characteristics in addition to auth-flavors, associated mechanisms
and RPCSEC_GSS services.

No one has yet agreed to address negotiation this way; in fact, there have been active objections to it.

Further, it says:

Significant work has been done to provide rpc-tls-based state
protection which can be taken advantage even by clients who have
not implemented SP4_MACH_CRED or SP4_SSV or who are using
AUTH_SYS.



The Section 5.5.3 has been revised to allow, when SP4_NONE is
used, to allow client host authentication to be used for state
protection.

Although this work might not introduce new protocol elements, the implications of getting this feature wrong are significant. I strongly urge that this change be postponed to a future document so that prototypes can be created and adequately tested.

The document editor has attempted to address every known problem in this update. However there are so many issues to be dealt with that the resulting tumult of document changes are difficult to assess individually. This has led to a seemingly limitless increase in the scope of changes in the bis with no opportunities for WG oversight until now. The first revision of rfc5661bis was submitted only a week or two ago, and a request for adoption followed after just a few days without any time for WG contributors to review and absorb this update. This in my opinion is an abuse of process.

In particular, we need mechanisms to attribute provenance to each text change (eg, who requested the change and why, who wrote the replacement), a way to set off text changes (change bars or a commit log), and a less unwieldy way to compare the bis document to its base document; rfcdiff by itself is easily confused by changes in sections generated automatically, and is wholly unable to deal with document splits. Technical details aside, when this work is finally adopted, there needs to be much greater transparency.

I am philosophically in favor of updating NFSv4 specifications and systematically addressing their known flaws. However, because of the short time frame during which this document has been actually available for review, the lack of tools to accurately assess the documents in question, and the amount of work remaining (both in terms of adding unfinished material and editing out unnecessary, controversial, or deferrable changes), I am not enthusiastic about WG adoption at this time.

I would prefer to see more progress on this document as a personal draft while the WG attempts to address process transparency issues. I do not believe there is any impediment to progress in the absence of WG adoption.


--
Chuck Lever