[nfsv4] Review of deaft-ietf-nfsv4-delsrid-01

"Noveck, David" <David.Noveck@netapp.com> Sat, 10 September 2022 12:24 UTC

Return-Path: <David.Noveck@netapp.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E990C14F745 for <nfsv4@ietfa.amsl.com>; Sat, 10 Sep 2022 05:24:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=netapp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K1lQVHFmutVQ for <nfsv4@ietfa.amsl.com>; Sat, 10 Sep 2022 05:24:48 -0700 (PDT)
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04on2054.outbound.protection.outlook.com [40.107.101.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B6C6C14F5E1 for <nfsv4@ietf.org>; Sat, 10 Sep 2022 05:24:47 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DtbqzwiQbL4CH02v03qv/MSmwlkznSV84ANTLgb/UcJ9XQLVtAajRXyJG2CmyEmcrLeU9adez6VSesJ+1u1o/JkYzxIy3ERz26x0Bp60nscMXnr2a6ngGZN6/XLh6OvcsUd+D21rAg0BgyeRYEWJetXf8hbiLrfyOASernjvNjxDHT+XvSXq8M6Qhrh0GAZFp8rkwmBYVn+VklwKJp1Y3ECuJIPEofNB5ub0gfjuFNYJmdIt6VF+Qd2IKIuslCGlF/KtfIo4sL8/QihfuIeUHWiSLBN1KlYoRzUcXKnxtf66KxaPFWzW7Ft3azTxGsm7Oc1X5lQSzoZ34OtDDKxClw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qhqm/BR50qTscehJSrNS06RImg2DBcWYiv5pvqZ+fQI=; b=JkT1J2lpZAFWQp7ocq3aR4cZyuLCMLjK/dPSwis8Lthz4BKcnFK7fyhItLuQlS4cQn0cOgEGDprCv8zWgC5fZE317DGbH7BxeMbRmxiV8xryXz/CR+wqr1q7YuMA29WLRFDKtqjq7B1Ysh8aK/DNCpvlQOr1ruVIDf5w9/iupvvsl/8ON0ns2r4OeJP0mEqf7zYTDxm6it7YUopyYsVyYXSKawOzg5RD+Zt6b6mIUuhjG/ZkNFSZgqIsUNCT6f/GjPOrTnKbbu82hajdChnUVFeV190IJZ4tFtUtfFotVkGw2QSpOwX5XiEt8XAc5McGocSRvJl3oeV6CGgnJIYgVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=netapp.com; dmarc=pass action=none header.from=netapp.com; dkim=pass header.d=netapp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netapp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qhqm/BR50qTscehJSrNS06RImg2DBcWYiv5pvqZ+fQI=; b=sOumZ8Y5ngO/WxxCSPmAXfzCaiFTcdlGatan2afpKJJ6Kmlg124/OZNRTFVf5ico7Yo4P47UFjzgyLfd1be8G8dkwfFbv0tHUDCIjEKL/jnfzZTdDFT1btTcSkskcetakVlgknrAmv6ykIiy0VGGlq0qezwtoLJKIWm298SyHn32hSsuvg07seiUlymwY9ei3UmJ72dn/PBQJpzfBduRDYo8OepjZk/0WlmKbj0SkOK60xUDnybO2Za86xHQBwTC2Bncduq7mr7+wqZSKfcyHQVrxGcdtWfCKYoRB00Hg0iNK0ToG4ub7/OOr4lnskQjS/+NYIs4GPSmWmbt4KBetg==
Received: from MN2PR06MB5597.namprd06.prod.outlook.com (2603:10b6:208:cf::24) by BN6PR06MB2339.namprd06.prod.outlook.com (2603:10b6:404:2e::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.19; Sat, 10 Sep 2022 12:24:42 +0000
Received: from MN2PR06MB5597.namprd06.prod.outlook.com ([fe80::9ccd:e70c:6f1a:ede]) by MN2PR06MB5597.namprd06.prod.outlook.com ([fe80::9ccd:e70c:6f1a:ede%7]) with mapi id 15.20.5612.019; Sat, 10 Sep 2022 12:24:42 +0000
From: "Noveck, David" <David.Noveck@netapp.com>
To: "loghyr@gmail.com" <loghyr@gmail.com>, "trondmy@gmail.com" <trondmy@gmail.com>
CC: "nfsv4@ietf.org" <nfsv4@ietf.org>
Thread-Topic: Review of deaft-ietf-nfsv4-delsrid-01
Thread-Index: AdjCt3SkMSf6bZAiR4CfAvmiVH79hQ==
Date: Sat, 10 Sep 2022 12:24:41 +0000
Message-ID: <MN2PR06MB5597DE7EEF3A36277F19D789E1429@MN2PR06MB5597.namprd06.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.6.600.2
dlp-reaction: no-action
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=netapp.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR06MB5597:EE_|BN6PR06MB2339:EE_
x-ms-office365-filtering-correlation-id: e198405a-cf61-4ba2-d3f7-08da93277013
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR06MB5597.namprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(39860400002)(136003)(346002)(376002)(396003)(366004)(26005)(33656002)(6506007)(7696005)(71200400001)(8676002)(316002)(110136005)(76116006)(9686003)(4326008)(66946007)(186003)(83380400001)(66446008)(64756008)(66476007)(66556008)(55016003)(8936002)(5660300002)(30864003)(2906002)(38070700005)(52536014)(86362001)(478600001)(41300700001)(38100700002)(122000001)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR06MB5597DE7EEF3A36277F19D789E1429MN2PR06MB5597namp_"
MIME-Version: 1.0
X-OriginatorOrg: netapp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR06MB5597.namprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e198405a-cf61-4ba2-d3f7-08da93277013
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Sep 2022 12:24:41.9233 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4b0911a0-929b-4715-944b-c03745165b3a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: B/omwlqbaU+P27Z9n/IBU9p8HAWK5EJUHaZ/mf2z979SxvrTFv92EwMv8LH7+BJoaaS2pYROPi2whrkitWwoTw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR06MB2339
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/vf-Pm_rlOizREd-QkSvCTuhFAV8>
Subject: [nfsv4] Review of deaft-ietf-nfsv4-delsrid-01
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Sep 2022 12:24:53 -0000

General Comments

Overall evaluation
This document contains useful extensions to NFSv4.2 which the working group needs to review and get published.  As it was three years ago, the document is ready to be adopted as a working group document.

Unfortunately little progress has been made during these three years so work needs to be done::

  *   Since there was little review of the document during six months that it was an unexpired working group document, that work needs to be done now,
  *   A number of things have changed in the interim, requiring further document updates.  For example, all references to RFC5661 now need to be changed to RFC8881.  These changes are not noted in the per-section comments  but they to need to be done.
Relation to flexible files layout
This document contains a mixture of extensions, some of which are usable by all of NFSv4 where others are limited to pNFS or to pNFS using a restricted set of layout types.   More clarity is needed to distinguish these classes of extensions.

Confusion about extension model
This document is less clear than it needs to be about the specific OPTIONAL protocol extensions proposed. At this point it seems as if all of the OPEN parameters have been revised en masse.    More detailed comments will appear later but it has to be made clear that the primary flag additions to the open arguments flags simply define unused bits and that the supported-flags attribute is a separate, ancillary feature that allows the client to determine which optional features the sever supports.

Compatibility Issues for the Flexible Files Layout Type
As discussed in more detail in 5.5.  Flex Files Layout Type, there are change mandated to flexible-file layout data structures that raise serious compatibility issues.  As a result, it may not be possible to fully define WCC_LAYOUT in this document.
Comments by Section

Abstract
The first sentence present a random fact about NFSv4 and should be deleted.  I'm not exactly sure what the second sentence says or if it is precisely true.  For now, let's delete it.

I will propose the following replacement abstract:

This document proposes several extensions to NFSv4.2 relating to opening a file and providing delegations to files.  Included is an attribute defining what optional features of open are supported by a server.

1. Introduction
Suggest combining the first two sentences with the following replacement.

In NFSv4, i.e. the Network File System version 4, granting a client a delegation allows it to act as the authority for the file's data and metadata.

1.1 Definitions
What appears as the definition of weak cache consistency is not a definition but a series of observations.

I note that:

  *   All of the discussion is about NFSv3 while this is an NFSv4 extension.
  *   There seems to be little point in citing this since does not provide consistency and you explicitly say the client is free to ignore the data.

1.2 Requirements Language
There are a number of matters that need to be addressed now rather than waiting for AUTH48.


  *   Rather than citing only rfc2119, should reference BCP14, rfc2119, and rfc8174.


  *   The keywords need to be wrapped in <bcp14></bcp14>.   Similarly, this needs to be done wherever in the document that these keywords appear.

2. Offline Files
This is an excellent idea for an extension but I have issues with the presentation.

In the first sentence, the term "locally" is confusing.  In addition, the data can be brought online when opened and not necessarily thrown away.  Suggest rewriting  the first paragraph as follows:

When files are offline, the server has immediate high-performance access to the files' attribute but not to the files' content.  The server has to be able to present to the client enough information to describe each such file, even though the corresponding content is not readily available.  The cost of retrieving the data is substantial, so that the content should only be retrieved when it is to be used.  For example, graphical file managers (e.g.  OSX's Finder) may only want to  access file content under certain circumstances, such as when a user is hovering his pointer over the file name,

In the last sentence of the last paragraph, suggest replacing "mean that" by "involve situations in which".

3. Determining the Arguments to OPEN
I found this section confusing and feel it needs considerable organizational work, for the following reasons:

*        The title of the section, "Determining the Arguments to OPEN", suggests that there has been a change in the way the arguments to OPEN are determined, when in fact there can be no such change.



A better title might be XDR extensions to OPEN, currently the title of Section 3.1.



*        The section combines, in a not very straightforward way, information about specific optional extensions to OPEN with a separate mechanism (a new attribute) to determine what optional extensions to OPEN a server supports.

I would like to propose the following changes.

*        devote section 3 to the open extensions while putting the detailed description of the attribute to determine support in its own top-level section.

*        limit the attribute description to optional open features.


With regard to the existing text of this section, propose replacing "Either type of stateid is suffucient to keep the file open" by "Either type of stateid is sufficient to enable the server to treat the file as if it were open."



In the last sentence, the use of "should" is problematic.  Do you want "SHOULD"?  Since I can't think of valid reasons to not do this, perhaps "MUST" is right.  If that makes you sound like a control freak, maybe you should rewrite it to not use these terms since this is just the way the protocol work and say something like the following:


In this case, the open stateid field, OPEN4resok.stateid (see Section 18.16.2 of [RFC5661]), will also be set to the special all zero stateid

3.1 XDR Modifications to OPEN
As discussed above, I am proposing moving this material into its own top-level section which I will refer to in this document as 3'.  I suggest Determining Open Feature Support.

The first paragraph needs to be revised, in large part because of its use of the confusing/nowhere-defined term "microversion".  Suggest the following replacement:

[RFC8178] (see Section 4.4.2) allows for extending a particular minor version of the NFSv4 protocol without requiring the definition of a new minor version.  The client can probe the capabilities of the server and based on the  result, determine if both it and the server support optional features not previously specified as part of the minor version.

With regard to the first sentence of the second paragraph, suggest the following replacement, which I believe is more accurate:

The XDR extensions presented in this section provide helpful support when  the OPEN   procedure is  extended in such a fashion.

With regard to the second sentence of the second paragraph, I feel this is flat-out wrong:

*        It does describe all the parameters to OPEN (e.g. file name, etc.) and there is no need to include them since they are REQUIRED parameter.

*        Similarly there is no need to include other REQUIRED parameters since the function of this is to determine which OPTIONAL parameters are supported.

With regard to the bulleted items:

With regard to   the third  paragraph, suggest the following replacement, which I believe is more accurate:

Subsequent extensions can use this framework when introducing new OPTIONAL functionality to OPEN, by creating a new flags for each OPTIONAL parameter.

With regard to the XDR code, I'd like to suggest:

*        That you delete material that only applies to REQUIRED parameters to avoid, unnecessary implementation complexity.

*        That you change "OPEN4" to "OPEN" in the introductory contents.

*        That you move the definitions of OPEN4_SHARE_ACCESS_WANT_OPEN_XOR_DELEGATION and OPEN4_RESULT_NO_OPEN_STATEID to Section 3.


4.  Proxying of Times
With regard to the penultimate sentence of the first paragraph, there is confusion generated by the use of the word "guarantee" since there is nothing done in this document to assure the continued validity of these time after the delegation is returned.  Suggest the following replacement:

While it is the authority for these values, it has no way to transfer these values to the server when the delegation is  being  returned and the server reclaims its authority with regard to these values.

With regard to the last sentence of the second paragraph, it needs to be made clearer that this applies only as long as the delegation is held, especially since the previous sentence refers to delegation return.


In the first sentence of the third paragraph, the phrase "it MUST be able to query" is problematic since it is addressing the server and the required action is to be performed by the client.   I think you need to rephrase. With regard to the last sentence, it needs to be clearer that the SETATTRs need to preceed the DELEGRETURN since ding them after is race-prone.

4.1.  Use case
I found this section hard to understand since there is no definition of "proxy".    Not sure whether it needs to be here or in the definitions section but it needs to be somewhere.

In the last sentence of the last paragraph, the combination of support for CB_GETATTR nd  SETATTR need to i be fixed.  It makes sense for a client to support CB_GETATTR, but a client does not support SETATTR. Rather, it uses support provide by the server.  Need to clarify.


The last sentence does not seem to be correct.  If a clienr/proxy holds a delegation, then it is, as you say elsewhere, the authority for those values and there is nothing to stop him returning those values in response to a GETATTR, rather than asking the server.   It might be more natural to do so with your extensions, but that is not what the documents says.


4.2.  XDR for Proxying of Times

I propose the following changes:

*        Since it isn't clear what client in quote marks means, please be more explicit.  Since section 4 talks about using these attributes even apart from pNFS layouts, this use should be included as well.

*        Use of the term "RECOMMENDED" is not in accord with RFC2119, it should not be used here.

*        The definition of OPEN4_SHARE_ACCESS_WANT_DELEG_TIMESTAMPS should be moved to section 3.

5.3.  DESCRIPTION
I think you need some introductory material for this new open, especially if it is intended to be limited to use with a pNFS when a single mapping type is in use, as I believe is the case here.   IIUC, all the other extensions are for general NFSv4.2 use.   Since layouts are mentioned, it is clear that pNFS use is assumed but clarification is needed on two other points:

*        Much of the text is written assuming this being used by the flexible file layout type.    If that is the case, it is best to say so explicitly, up front.  If there is any possibility of it being used by other layout types, this needs further discussion, especially since new layout-type-specific data structures would need to be defined.

*        All of the text assumes the data access protocol is NFSv3, while, IIUC other versions of NFS are supported.  It needs to be clearer whether this operation is limited to the case in which NFSv3 is the data access protocol.
I really don't see how the third paragraph adds to the discussion.  Further it talls about a cache consistency protocol which I don't believe either NFSv3 or NFSv4 supports.
5.5.  Flex Files Layout Type
Given the nature of the material in this section, this document should be marked as updating rfc8435, although, as discussed below, that wouldn't work either.
The use of "SHOULD" in the first paragraph following the XDR is not appropriate for a number of reasons:

*        There can be no "valid reason" to ignore the supposed recommendation.

*        The nature of this recommendation/requirement is such that use of RFC2119 terms are not appropriate, since the goal is not to tell implementations what to do.

It appeared at first that what was meant was something like "The data structure specified above have been designed so that there is a on-to-one correspondence between:"

However, if you look at rfc8435, and compare ff_data_server4 with  ff_data_server_wcc4, you find that the can be no one-to-one-correspondence despite the fact thar the wcc structure is a semantic extension of the structure defined in rfc8435, these two data structure are otw incompatible so that an implementation of the flex-files mapping type defined in rfc8435 cannot interoperate with the one assumed in this document.  Sigh!

I think you need two different flexible files layout types and a new document, obsoleting rfc8435, defining both of them.   WCC_LAYOUT needs to bemoved to that new document.



7.  Security Considerations
A couple of issues:

*        Given the quality of the Security Considerations in RFC7862 and the fact work is being done to address these, suggest referring, for now, to "documents addressing NFSv4.2 security in general"

*        Feel that there may be additional security considerations that arise from giving those with delegations the authority to change modify times.  Fpr example, ransomware might encrypt file data and hide the fact that a modification has been made by restoring the old modification time.

8. IANA Considerations
A better way to express this would be "This document does not require any actions by IANA"