Re: [nfsv4] WG last call for draft-ietf-nfsv4-rpcrdma-cm-pvt-data-02.txt (Ends May 31st)

Tom Talpey <tom@talpey.com> Tue, 11 June 2019 20:35 UTC

Return-Path: <tom@talpey.com>
X-Original-To: nfsv4@ietfa.amsl.com
Delivered-To: nfsv4@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6310120090 for <nfsv4@ietfa.amsl.com>; Tue, 11 Jun 2019 13:35:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nJGcqfbYAFB9 for <nfsv4@ietfa.amsl.com>; Tue, 11 Jun 2019 13:35:44 -0700 (PDT)
Received: from p3plsmtpa09-08.prod.phx3.secureserver.net (p3plsmtpa09-08.prod.phx3.secureserver.net [173.201.193.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1D9912003F for <nfsv4@ietf.org>; Tue, 11 Jun 2019 13:35:44 -0700 (PDT)
Received: from [192.168.0.56] ([24.218.182.144]) by :SMTPAUTH: with ESMTPSA id anUchgisHliGzanUchERY1; Tue, 11 Jun 2019 13:35:43 -0700
To: nfsv4@ietf.org
References: <CAFt6BanN_L9EyLyf3Hfpd1nBHaRNh5-jppcXNEGugCfiFvOKww@mail.gmail.com> <3d25b43c-cbb7-1681-e647-fc4b3c6ba0ba@talpey.com> <90FF728D-F043-4CB5-B3D8-D30FB5B95B6B@oracle.com>
From: Tom Talpey <tom@talpey.com>
Message-ID: <7e509bb4-461c-55f9-9e0d-3469daee84d2@talpey.com>
Date: Tue, 11 Jun 2019 16:35:41 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <90FF728D-F043-4CB5-B3D8-D30FB5B95B6B@oracle.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-CMAE-Envelope: MS4wfK2tFnfId3IbeAWQbMAuX2y8n3EF+rFNH5e+DbhaVWO9z6r5ggqqk87BIuSLn+oi16s6PrRBiTZeEMTTYbxOrHJcwEyseWCRAHeYmCEvmb7viV1dCtHw oS78xH2uhIK6j4P6HUSAn7/axeaG8pmDT3RZfk9fjEnVfoQe959/SBuS
Archived-At: <https://mailarchive.ietf.org/arch/msg/nfsv4/zvv5SfKUnM8snG90LnU-WMDRNO4>
Subject: Re: [nfsv4] WG last call for draft-ietf-nfsv4-rpcrdma-cm-pvt-data-02.txt (Ends May 31st)
X-BeenThere: nfsv4@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NFSv4 Working Group <nfsv4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nfsv4/>
List-Post: <mailto:nfsv4@ietf.org>
List-Help: <mailto:nfsv4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nfsv4>, <mailto:nfsv4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jun 2019 20:35:48 -0000

These changes look good, but I do have a few comments, inline.

On 6/11/2019 3:20 PM, Chuck Lever wrote:
> At this point WGLC closed over a week ago, so I will assume
> that there are no further pending comments on this document.
> As soon as Tom is satisfied that his comments have been
> addressed, I will submit the updated draft as
> 
>    draft-ietf-nfsv4-rpcrdma-cm-pvt-data-03
> 
> and it can proceed to the next step.
> 
> Tom- Thanks for your review!
> 
> I propose the following changes below to address your
> comments. Feel free to follow up if you have additional
> concerns.
> 
> 
>> On May 30, 2019, at 2:30 PM, Tom Talpey <tom@talpey.com> wrote:
>>
>> On 5/6/2019 12:46 PM, spencer shepler wrote:
>>> All,
>>> Thanks to Chuck, we have the following I-D entering working group last call.
>>> “RDMA Connection Manager Private Data For RPC-Over-RDMA Version 1”
>>> We will start the review today and end on May 31^st .
>>> The source of the I-D can be found here and comments should be sent to the WG alias.
>>> https://datatracker.ietf.org/doc/draft-ietf-nfsv4-rpcrdma-cm-pvt-data/
>>
>> I have some comments on final review.
>>
>> In the Abstract, it should be stated that the addition of the
>> private data payload specified in the draft is an optional
>> extension, and that the rpcrdmav1 protocol does not require it.
> 
> I plan to add the following two sentences to the end
> of the Abstract:
> 
> NEW TEXT:
> 
> The addition of the private data payload specified in this
> document is an OPTIONAL extension. The RPC-over-RDMA version
> 1 protocol does not require the payload to be present.

Looks good.

>> In the Introduction final paragraph the statement "The message
>> format can be extended as needed" is perhaps overly broad. I think
>> the better way to state what is meant here is that the specification
>> is intended to be further extensible, within the normal scope of
>> such IETF work, and it defines an IANA registry for this. A forward
>> reference to section 5 would help.
> 
> In the last paragraph of the Introduction:
> 
> OLD TEXT:
> 
> The message format can be extended as needed.
> 
> REPLACEMENT TEXT:
> 
> The message format is intended to be further extensible
> within the normal scope of such IETF work (see Section 5 for
> further details). Section 6 of the current document defines
> an IANA registry for this purpose.

Also good.

>> In section 3.2 third paragraph two comments. First, it describes an
>> advantage of avoiding a context switch. This is a local implementation
>> matter, and not really something the protocol can or cannot proscribe.
>> It would be state the benefit in protocol terms, such as "avoids
>> processing of the invalidate completion", then go on to say which may
>> enable avoiding interrupt(s) and context switch(es). Second, a nit - the
>> word "upshot" is slang. Suggest "benefit".
> 
> I plan to replace the third paragraph of Section 3.2:
> 
> OLD TEXT:
> 
> An RPC-over-RDMA responder can use remote invalidation
> when replying to an RPC request that provided Read or
> Write chunks. The requester thus avoids dispatching an
> extra Work Request, the resulting context switch, and
> the invalidation completion interrupt as part of
> completing an RPC transaction that uses chunks. The
> upshot is faster completion of RPC transactions that
> involve RDMA data transfer.
> 
> REPLACEMENT TEXT:
> 
> An RPC-over-RDMA responder can use remote invalidation
> when replying to an RPC request that provided chunks.
> The requester thus avoids processing an invalidation
> completion for that chunk. The benefit is faster
> completion of RPC transactions that involve RDMA data
> transfer.

The words "The requester thus avoids processing..." don't quite
capture the benefit, I feel. In particular, "processing" is a
rather passive term and doesn't capture the full benefit.

Here's a swag:

"This extensions provides a means for the RPC-over-RDMA requester
to signal the responder to optionally use this remote invalidation
when replying to an RPC request that provided chunks. In this way,
the RDMA provider performs the invalidation in the process of
delivering the response, which allows the requester to avoid
required additional, and possibly expensive, invalidation prior
to finalizing the results of the RPC."

I admit, it's tricky language to get right. Maybe it can be stated
more simply.

>> At the end of section 3.2, the final paragraph is quite mysterious. It
>> refers to "a simple signaling mechanism" and "some NFS/RDMA client".
>> Really, something more needs to be said here. If this signaling
>> mechanism involves a protocol payload, then definitely so. Can you
>> elaborate? I admit I don't fully understand what is meant here.
> 
> I plan to replace the final paragraph of Section 3.2:
> 
> OLD TEXT:
> 
> However, it is possible to provide a simple signaling mechanism
> for a requester to indicate it can deal with remote invalidation
> of any STag it has presented to a responder.
> There are some NFS/RDMA client implementations that
> can successfully make use of such a signaling mechanism.
> 
> REPLACEMENT TEXT:
> 
> There are some NFS/RDMA client implementations whose STags
> are always safe to invalidate remotely.
> For such clients, indicating to the responder that remote
> invalidation is always safe can allow such invalidation
> without the need for more complex communication between the
> requester and responder.

"...without the need for additional protocol to be defined for
management of STags between requester and responder."

Maybe?

>> In section 4, the scope of the properties are correctly confined to
>> the connection on which they are exchanged. But, this does not mention
>> the visibility of the properties to the upper layer consumer, which
>> must be aware of them, especially when reconnecting since RDMA behaviors
>> may change. I suggest a short statement in sectin 4.1 Interoperability
>> Considerations to this point.
> 
> In fact these properties are not visible to the upper layer
> consumer (if by "ULP consumer" you mean RPC). However, if you
> mean the RPC/RDMA transport implementation, yes, it does
> have to be prepared for those settings to change after a
> reconnect. I've inserted a sentence at the end of the second
> paragraph of Section 4 to clarify this:
> 
> OLD TEXT:
> 
> The transport properties exchanged via this mechanism are
> fixed for the life of the connection. Each new connection
> presents an opportunity for a fresh exchange.
> 
> REPLACEMENT TEXT:
> 
> The transport properties exchanged via this mechanism are
> fixed fo the life of the connection. Each new connection
> presents an opportunity for a fresh exchange. An
> implementation of the extension described in this document
> MUST be prepared for the settings to change upon a
> reconnection.

Good.

>> In section 7, the vulnerability is in the RDMA-CM protocol, not this
>> protocol. And, private data is carried differently by different lower
>> layers - for example in the IETF iWARP family, it's part of MPA.
>> Honestly, I'm not sure this is relevant to this document. It basically
>> inherits all the considerations of the protocols it extends.
> 
> I've replaced the entirety of the Security Considerations
> section as follows:
> 
> OLD TEXT:
> 
> RDMA-CM Private Data typically traverses the link layer in
> the clear. A man-in-the-middle attack could alter the
> settings exchanged at connect time such that one or both
> peers might perform operations that result in premature
> termination of the connection.
> 
> REPLACEMENT TEXT:
> 
> The private data extension specified in this document
> inherits the security considerations of the link layer
> protocols it extends (e.g., the RDMA-CM protocol).

Hmm, this will trigger the next logical question "where is this protocol
defined?", and the answer ("outside the IETF") will cause trouble.

Also, it's not strictly the link layer. All the IETF RDMA protocols
operate above transport.

I'd suggest keeping the example to the IETF-owned MPA protocol, which
is the one governing RDMA connection establishment and which carries
private data. I.e, RFC 5044 (MPA) and RFC6581 (MPA extensions). MPA, in 
turn, makes its own security considerations and refers to RFC5042 (the
original RDMA Security analysis), which may be a useful reference but
is not specifically about connection establishment.

Tom.