Re: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis

Chuck Lever III <chuck.lever@oracle.com> Sat, 22 October 2022 17:03 UTC

Return-Path: <chuck.lever@oracle.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5106AC14CE27; Sat, 22 Oct 2022 10:03:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com header.b=1AbMsFCQ; dkim=pass (1024-bit key) header.d=oracle.onmicrosoft.com header.b=yOxtEJW1
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C5mSDFNM5Bug; Sat, 22 Oct 2022 10:02:53 -0700 (PDT)
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EAE8C14F693; Sat, 22 Oct 2022 10:02:52 -0700 (PDT)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 29M8WuJl014692; Sat, 22 Oct 2022 17:02:51 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=corp-2022-7-12; bh=WczYXU/3SjPUGO/wGcRd5gjwsSftyIvJ2CV/3oOMWsI=; b=1AbMsFCQAi2pe0vmgMmr5c44tilgPJNAWYqj/TvgZ9W2itmJihh6YSh4jzD6e9NKRMqG UAEEpyG12kUjKieX4QjDZ/12dUjPlEL6rs13K1uiH5DZ9+rLH5odrcACcqJpxNbUFfeG vCDNUa8DO8aOyF+7r3cgMgIbb8wFca7teRQ0RSuGCatZ2H5lmaMliJdURXAG+YpSOkX6 LvH0rE49CsuHkXUu7kKeK9HDXAQPaJQrCfYPZ/BZKLjX/VPmBZxYUemxWz4qNgRHhuL8 sQt1jiwwe55VezNETg7rdgHTg5o90T/XiAHvqb3GnPygqtrzfrIUqmGk0/EHyvWJcpPk HA==
Received: from phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta02.appoci.oracle.com [147.154.114.232]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3kc6xdrqjg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 22 Oct 2022 17:02:51 +0000
Received: from pps.filterd (phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.5/8.17.1.5) with ESMTP id 29MGpjRh030622; Sat, 22 Oct 2022 17:02:50 GMT
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2169.outbound.protection.outlook.com [104.47.58.169]) by phxpaimrmta02.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 3kc6y2jpph-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 22 Oct 2022 17:02:50 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MDqVJBEJuhddbeoNYAooxXb9FLNeaQCCHoZj4hEsWrUYzko2E6ZjFAooOJbUCdx8Sy2tKIH2LvbkesC4vUa9x4ZxOsru05KudCcFvGFQMbT955gP7sSftP5PvO7z7fiOTQNSGCqKTcbObJ1m/f2XHxFPUnhFdIkPDieMXPyT+lzEEHtdvq7hwHx5oXHxnXOsI//LpJDQjCa15RAQTBT2BiLlmv9U2oyvXO89iD/4Sl1GSrs9hOaOFwA0M1obKrqHF5D0TjGxf44Vtd580VJ9jRKwsDD7H3ECPe+VZNUDmX83n5hpnajgyv1yqmzvd6OvlKxhQxLKm82+JacIddw8ZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WczYXU/3SjPUGO/wGcRd5gjwsSftyIvJ2CV/3oOMWsI=; b=QJ4idzja7IWLoDMpct5uTllhw7kY6UmyDmG8MdXE/8DKEaRGMlq/Kc5H+OOJkW8nIoWSZ9mCb5qfQgWwz3qmcxUqcHXECYmaLR6YTyQY9vbHUq0rd6vidv13UGo9BPNL8g/vvRvUj3qopYBl9FLGaadRq6rzOgrpRGuaEZr7SdipaCeQE5Q/xTnOnmASugYi9NcDFEhDZZT0JprCifkqix+KzXJi2EEqZmuuXw9QG0tt/Gwc4kob5hIyIoG2xgfOc/MggEqfOBdvN3eY0nGr21IAX9HPWBi1KO0XZdW3qP/WSKjqE59aC+/bUpdWCZeZwEgwa3ZlJLTuMUsKUFbHYg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WczYXU/3SjPUGO/wGcRd5gjwsSftyIvJ2CV/3oOMWsI=; b=yOxtEJW1oyk/7xMypMl8s1kj4CEgwFEpZ7Go+MEjzIVM+N9IZTlWP5+GGYgaWcKLwQYOQlOwXR5oAdvCbi3uoknMHv+ObG1gWB7gmoSnCGo+dW8nFkx0qoBtSNeNhR2SRXA9l808V0BoV+YSgN2KqP1uxrFN4j53mEYn/dYySX8=
Received: from BN0PR10MB5128.namprd10.prod.outlook.com (2603:10b6:408:117::24) by CO1PR10MB4418.namprd10.prod.outlook.com (2603:10b6:303:94::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5746.21; Sat, 22 Oct 2022 17:02:46 +0000
Received: from BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a]) by BN0PR10MB5128.namprd10.prod.outlook.com ([fe80::5403:3164:f6c3:d48a%3]) with mapi id 15.20.5746.021; Sat, 22 Oct 2022 17:02:46 +0000
From: Chuck Lever III <chuck.lever@oracle.com>
To: NFSv4 <nfsv4@ietf.org>
CC: nfsv4-chairs <nfsv4-chairs@ietf.org>, "nfsv4-ads@ietf.org" <nfsv4-ads@ietf.org>
Thread-Topic: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis
Thread-Index: AQHY30aH4G77WjHzy0WyqIMQcVYSya4ZA/EAgAF21ACAADbjgA==
Date: Sat, 22 Oct 2022 17:02:46 +0000
Message-ID: <3D291DA6-3674-46E8-AFA0-92BF3306818A@oracle.com>
References: <CADaq8jcPg3YL4p2bPrxcrSVZjMjr=ieGNfn6ADOgJKkCtYnSyg@mail.gmail.com> <CAA600F6-82BB-4024-8B3C-A0E5685871A2@oracle.com> <CADaq8jdd_txX1U6Ff7ZGGq1734TWtsZJhFB=RsfC05goNHmvhQ@mail.gmail.com>
In-Reply-To: <CADaq8jdd_txX1U6Ff7ZGGq1734TWtsZJhFB=RsfC05goNHmvhQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0PR10MB5128:EE_|CO1PR10MB4418:EE_
x-ms-office365-filtering-correlation-id: 155d8894-565d-4225-be99-08dab44f3e2b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN0PR10MB5128.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(366004)(136003)(39860400002)(396003)(376002)(346002)(451199015)(2616005)(478600001)(186003)(2906002)(66556008)(5660300002)(66476007)(53546011)(30864003)(36756003)(33656002)(66446008)(8676002)(4326008)(76116006)(6506007)(64756008)(66946007)(6916009)(450100002)(91956017)(8936002)(86362001)(316002)(6512007)(41300700001)(26005)(54906003)(66899015)(6486002)(38070700005)(83380400001)(122000001)(71200400001)(38100700002)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_3D291DA6367446E8AFA092BF3306818Aoraclecom_"
MIME-Version: 1.0
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0PR10MB5128.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 155d8894-565d-4225-be99-08dab44f3e2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Oct 2022 17:02:46.4348 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8fsTVZod2JI1p/TRhw8HMGprFwQ9oXBaI0hnyUfWrx/FyskI6YKoSpKmKQZ9fdHEdOdy2J0UZLrF9bRUOXlO7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR10MB4418
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-21_04,2022-10-21_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0 suspectscore=0 malwarescore=0 phishscore=0 mlxscore=0 spamscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2209130000 definitions=main-2210220107
X-Proofpoint-GUID: RSGYqtwTO2A-fo1tfFmNGZZ2zEP0EWTg
X-Proofpoint-ORIG-GUID: RSGYqtwTO2A-fo1tfFmNGZZ2zEP0EWTg
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/xql4rP_pdk3nE14eiNvFdlTyL7E>
Subject: Re: [nfsv4] Adoption call for draft-dnoveck-rfc5661bis
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Oct 2022 17:03:00 -0000


On Oct 22, 2022, at 9:46 AM, David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com>> wrote:



On Fri, Oct 21, 2022, 11:24 AM Chuck Lever III <chuck.lever@oracle.com<mailto:chuck.lever@oracle.com>> wrote:


On Oct 13, 2022, at 4:57 PM,⁰ David Noveck <davenoveck@gmail.com<mailto:davenoveck@gmail.com>> wrote:

This is an adoption call for draft-dnoveck-nfsv4 which is intended to be a standards-track describing nfsv4.1, obsoleting rfc8881.

As it says in the abstract,

-----

This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC7530) and protocol extensions made subsequently.  The later minor version has no dependencies on NFS version 4 minor version 0, and was , until recently, documented as a completely separate protocol.

This document is part of a set of documents which collectively obsolete RFC 8881.  In addition to many corrections and clarification, it will rely on NFSv4-wide documents to substantially revise the treatment of protocol extension, internationalization, and security, superseding the description of those aspects of the protocol appearing in RFCs 5661 and 8881.

-----

The chairs would like to determine whether there is interest in adopting this document by the nfsv4 working group. The adoption call will run for two weeks and end on 10/26/2022 (UTC time). Please send any objections or expressions of support for adoption to the wg mailing list.

As stated previously, since I am editor of this document, I will not be involved in making a judgment as to the existence of consensus.  It is expected that Brian will be doing this with Zahed available as a backup if circumstances do not allow Brian to do this job.

I've examined rfc5661bis in order to address the question of whether it is ready for WG adoption.

Both the document and the diff are huge (for any reasonable definitions of "huge").

Sections 1.2 and 1.3 should be relocated to the Appendix to keep such material together and to help reduce churn in the document's chapter and section numbering (resulting in cleaner diffs now as work progresses, and once these sections are removed before publication).

OK.  I can do that.


Throughout:

  *   The terms "TLS-based encryption" and "transport-level encryption" need to be replaced with "transport-layer confidentiality". Let's adopt the terminology used by the rest of the community.

I don't  agree.  After all, rfc9289, uses "encryption" and not "confidentiality".

That usage of the term "encryption" distinguishes between specific mechanisms that TLS provides: encryption and peer authentication.


I presume this is because encryption is clearer and is in fact how  confidentiality is provided.

It's because these are specific mechanisms provided by TLS. Confidentiality is the security policy we want. Encryption is one way to provide it. Using a private network is another completely valid and long-recognized way to provide confidentiality, and needs to be included in any discussion of the security issues of AUTH_SYS.


  *   RPCSEC GSS already provides client peer authentication.

Does it?  As I understood things, it provided client principal authentication.  If it did, there would be no need for the special ops defined in v4.1 to provide state protection.

  *   The use of TLS peer authentication is not novel.

It is now.


  *   The principles introduced and used in this discussion need to be generic, because surely RPC-with-TLS will not be the final word in transport-layer security.

Do you have any specifics on what you'd like to see?  I agree with being compatible with future development but we cannot be so generic that implementors are not clear what to do.

Even existing capabilities can provide much or all of the security we want for AUTH_SYS.

  *   Private storage area LANs provide confidentiality and obviate the need for client authentication. That's why the spec allows the use of AUTH_SYS in that kind of deployment.
  *   VPNs (such as provided by openvpn, wireguard, and ssh tunneling, all features currently available in general purpose OSes) can provide both confidentiality and peer authentication on open networks today.
  *   IPsec provides confidentiality, at least, and might be used as an example where the endpoint authentication it provides is indeed not adequate for our purpose.

You see that encryption is only but one means to a security policy, and that policy is confidentiality of communication?

It's been pointed out to me that TLS is unlikely to be the only mechanism by which transport-layer security is provided, in exactly the same way that Kerberos is not the only mechanism that can be employed via GSS-API. A protocol specification can make statements about how to use RPC-with-TLS or Kerberos, but it can't assume these are the only mechanisms that might be available. We must express our security requirements as policy statements, and not by mandating the use of specific mechanisms.


Security will also be described in a separate document applying to
all minor versions.  The handling is different because there is a
wider range of security-relevant features within v4.1, despite the
fact that the fundamental approach is the same for all minor
versions.  As a result, for some features, the security document
will have the lead role while, for others, the v4.1 specification
will be the main source of information about the feature, although
the basic security functionality will be as defined by the
NFSv4-wide security document.

I question whether separation of the security discussion in this way is truly beneficial to readers. Scattering the discussion like this will make it easy to miss important information.

We have to trade off document hugeness and decided, with good reason, to divide things this way.

My quibble is with "for some features... the security document will have the lead role... for others, the 4.1 sepcification will be the main source". I don't recall a specific discussion about dividing security in half, putting some in this document, and putting some in another. I view that organization in particular as not beneficial to readers.


I don't think it makes sense to shift things now

Why not? We should be easily able to decide that existing document organization is awkward and that it needs to be reworked.

The WG is going to be stuck with this organization once it is finalized and published. Let's try to get it right rather than resist fixing problems because that might delay things a bit.


The section defining the GSS service principal (common to all minor versions of NFSv4) should be moved to the security document.

Will look at addressing.

Section 6 is problematic. I suspect the intention was Section 6 through 6.3 are meant to be part of Section 5, and Section 6.3.1 "Put Filehandle Operations" is supposed to start a new chapter. Sections 6 through 6.3 belong in the security document, IMO, not in RFC 5661bis.

Will look at addressing.


Section 16.9 "Security Considerations for pNFS" belongs in the nfsv4-wide security document. The only minor version this section does not apply to is NFSv4.0. The caveat about the discussion covering non-RPC storage protocols is not pertinent, IMO; general security considerations should be the same for all layout types.

The general principles/requirements are the same.  However, the implementation considerations and potential threats are definitely different.

Likewise, Section 17.12 "Security Considerations for the File Layout Type".

Will look at that.


Section 19.1.11.3.  "NFS4ERR_BAD_HIGH_SLOT (Error Code 10077)" First sentence was changed to a sentence fragment that does not match the form/style of other error descriptions.
Section 19.1.16.4.  "NFS4ERR_RESOURCE (Error Code 10018)" What is the need for re-adding the RESOURCE status code?

Will fix that up.

Section 22.29.  "Operation 33: SECINFO - Obtain Available Security" I don't agree with moving the mechanical description of this operation along with its arguments and results to the nfsv4-security document. This appears to be the only operation that has been changed in this way even though there are other security-related operations in common amongst all NFSv4 minor versions.

OK


Section 1.2.2 says:

This shift is necessary because the description of SECINFO needs
to be revised to allow negotiation of security-related transport
characteristics in addition to auth-flavors, associated mechanisms
and RPCSEC_GSS services.

No one has yet agreed to address negotiation this way; in fact, there have been active objections to it.

I'm not sure about that.  The last I heard from you I'd that the response was "tepid".  Am prepared to respond to working group consensus on this, as judged by Brian.


Further, it says:

Significant work has been done to provide rpc-tls-based state
protection which can be taken advantage even by clients who have
not implemented SP4_MACH_CRED or SP4_SSV or who are using
AUTH_SYS.

The Section 5.5.3 has been revised to allow, when SP4_NONE is
used, to allow client host authentication to be used for state
protection.

Although this work might not introduce new protocol elements, the implications of getting this feature wrong are significant.

So are those of getting it right.  Am prepared to move this issue to a separate document if the wg wants.

I strongly urge that this change be postponed to a future document so that prototypes can be created and adequately tested.

Noted.


The document editor has attempted to address every known problem in this update. However there are so many issues to be dealt with that the resulting tumult of document changes are difficult to assess individually.

Nevertheless, they have to be addressed individually since it makes sense to address them collectively.

Regardless of any worries about "tumult", you and other members of the working group need to discuss these issues, if we are to make progress

Please don't dismiss the words that I used. Putting "tumult" in scare quotes is disrespectful. This is not the first time you've used this tactic.

I ask only for better visibility of proposed replacement text for each individual issue. The reason I'm asking is there seem to be multiple places where unnecessary or unrationalized textual changes have been made.


This has led to a seemingly limitless increase in the scope of changes in the bis with no opportunities for WG oversight until now.
The first revision of rfc5661bis was submitted only a week

Not true.  -00 was submitted 12/2020 and there has been ample opportunity for review and discussion.

Fair enough, I was looking at the date on rfc5662bis.

However, rfc5661bis-05 is dated in late September. Still a challenge, though less of one.


or and a request for adoption followed after just a few days without any time for WG contributors to review and absorb this update. This in my opinion is an abuse of process.

Your opinion is clearly misguided.  Please review the facts.


In particular, we need mechanisms to attribute provenance to each text change (eg, who requested the change and why, who wrote the replacement), a way to set off text changes (change bars or a commit log), and a less unwieldy way to compare the bis document to its base document; rfcdiff by itself is easily confused by changes in sections generated automatically, and is wholly unable to deal with document splits.

I don't agree that we need all this new mechanism.  What is needed is discussion of the consensus issues listed in Appendix B.  If people are unwilling to do that without major process work than rfc5661bis is going to be delayed for a number of years.

You have no way to know that.


Technical details aside, when this work is finally adopted, there needs to be much greater transparency.

It would be desirable  but it is not necessary and so should not delay the work.

I disagree: it is absolutely necessary.

This is supposed to be an open and public process. I don't feel we should rush through it just for convenience, so I have no sympathy for arguments about delay. We'll end up with a new set of unreviewed issues in the final document, just as was with RFC 5661. My suggestions are intended to help avoid that all too real hazard.

What I'm proposing is that we adopt process for these documents that aims to prevent the loss of context, history, and provenance in the ways that these were lost with RFC 5661. The mechanisms that implement such process are already in common use.


I am philosophically in favor of updating NFSv4 specifications and systematically addressing their known flaws.

Perhaps so but this philosophically commitment needs to be complemented but concrete help to move the document forward.

As the editor of what is so far a personal draft, you are responsible for asking clearly for what you need. It would be inappropriate for any of us to step in and walk on your plans, and we can't read your mind. Your expectations seem out of line with how personal drafts are normally handled.


> However, because of the short time frame during which this document has been actually available for review.

Not so.  See above.

> the lack of tools to accurately assess the documents in question, and the amount of work remaining (both in terms of adding unfinished material and editing out unnecessary, controversial, or deferrable changes), I am not enthusiastic about WG adoption at this time.

That's putting it mildly

A sarcastic response in this forum is not necessary or appropriate.

What I did was state my concerns without explicitly objecting to adoption. Again, I didn't object. Eventually the document will be ready for adoption, and it might even be adopted soon, despite my personal trepidations.


I would prefer to see more progress on this document as a personal draft while the WG attempts to address process transparency issues. I do not believe there is any impediment to progress in the absence of WG adoption.

The only impediments are ones you propose.

You view them as impediments. I view them as the same process that I have used for my documents for several years, and I consider it to be a native part of open document composition. This process is a natural part of document workflow, adopted from the workflow used by other WGs who have tackled clusters of documents and mounds of text and errata. It is workflow that is used by most open source developers.

Therefore I don't view my request as either unprecedented or unreasonable or unworkable.


I hope the working group will help improve this document without extensive, potentially unrealizable, process modifications.

I take issue with your unfounded characterization of proposed process modifications as extensive and potentially unrealizable. I haven't proposed anything that has not been proven in actual use by other WGs, or that is not typically used by other standards bodies, or that I haven't suggested in the past, you agreed to use, and then surreptitiously dropped because you couldn't figure out the web interface.

Not to put too fine a point on it, but the rest of us already do things this way. It is your viewpoint that is strangely out of touch.


--
Chuck Lever