[storm] iSER approach - update: Next Steps

<david.black@emc.com> Tue, 15 May 2012 17:54 UTC

Return-Path: <david.black@emc.com>
X-Original-To: storm@ietfa.amsl.com
Delivered-To: storm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCAB221F882B for <storm@ietfa.amsl.com>; Tue, 15 May 2012 10:54:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.474
X-Spam-Level:
X-Spam-Status: No, score=-110.474 tagged_above=-999 required=5 tests=[AWL=0.125, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0nDggGCIGZDG for <storm@ietfa.amsl.com>; Tue, 15 May 2012 10:54:58 -0700 (PDT)
Received: from mexforward.lss.emc.com (mexforward.lss.emc.com [128.222.32.20]) by ietfa.amsl.com (Postfix) with ESMTP id E1C9B21F8827 for <storm@ietf.org>; Tue, 15 May 2012 10:54:57 -0700 (PDT)
Received: from hop04-l1d11-si02.isus.emc.com (HOP04-L1D11-SI02.isus.emc.com [10.254.111.55]) by mexforward.lss.emc.com (Switch-3.4.3/Switch-3.4.3) with ESMTP id q4FHsuVF023463 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <storm@ietf.org>; Tue, 15 May 2012 13:54:57 -0400
Received: from mailhub.lss.emc.com (mailhubhoprd03.lss.emc.com [10.254.221.145]) by hop04-l1d11-si02.isus.emc.com (RSA Interceptor) for <storm@ietf.org>; Tue, 15 May 2012 13:54:49 -0400
Received: from mxhub25.corp.emc.com (mxhub25.corp.emc.com [10.254.110.181]) by mailhub.lss.emc.com (Switch-3.4.3/Switch-3.4.3) with ESMTP id q4FHsl2l029834 for <storm@ietf.org>; Tue, 15 May 2012 13:54:47 -0400
Received: from mx15a.corp.emc.com ([169.254.1.236]) by mxhub25.corp.emc.com ([10.254.110.181]) with mapi; Tue, 15 May 2012 13:54:47 -0400
From: david.black@emc.com
To: david.black@emc.com, storm@ietf.org
Importance: high
X-Priority: 1
Date: Tue, 15 May 2012 13:54:45 -0400
Thread-Topic: iSER approach - update: Next Steps
Thread-Index: Ac0pfCLPSE0AecLXRPSgPUVAZl/VUwJRrRVg
Message-ID: <8D3D17ACE214DC429325B2B98F3AE712057151F0@MX15A.corp.emc.com>
References: <8D3D17ACE214DC429325B2B98F3AE71203D1120D@MX15A.corp.emc.com>
In-Reply-To: <8D3D17ACE214DC429325B2B98F3AE71203D1120D@MX15A.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-EMM-MHVC: 1
Subject: [storm] iSER approach - update: Next Steps
X-BeenThere: storm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Storage Maintenance WG <storm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/storm>, <mailto:storm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/storm>
List-Post: <mailto:storm@ietf.org>
List-Help: <mailto:storm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/storm>, <mailto:storm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 May 2012 17:54:58 -0000

Having seen no dissension, I believe (with WG chair hat on) that we have
WG rough consensus for this updated approach to resolving the iSER issues
around SendSE, SendInv and SendInvSE.

Mike (Ko) - please update the draft accordingly, *BUT*, I want to see the
Security Considerations and related caching text for the following item
proposed to the list and worked out on the list before going into the next
version of t he draft (I'd be happy to review a first draft of this text
via private email if that would help):

> v) Some new text will be needed (especially Security Considerations) to
> 	make it clear that STag invalidation is the initiator's responsibility
> 	for security reasons, and the initiator cannot rely on the target
> 	using an Invalidate version of Send - the initiator MUST check and
> 	do its own invalidation as required.  The initiator MAY choose to cache
> 	mappings (i.e., reuse STags) across I/Os for efficiency, but that has
> 	security consequences (exposes initiator memory to remote access for
> 	longer) that have to be discussed in the new Security Considerations text.

In contrast, I believe the other five items are routine updates that can
just be made in the next version of the draft.

Thanks,
--David

> -----Original Message-----
> From: storm-bounces@ietf.org [mailto:storm-bounces@ietf.org] On Behalf Of
> david.black@emc.com
> Sent: Thursday, May 03, 2012 6:29 PM
> To: storm@ietf.org
> Subject: [storm] iSER approach - update
> 
> Attempting to summarize where we are ... the changes from my earlier attempt
> are:
> - Dropped the MUST for error reporting by the receiver.
> - Added a more general "SHOULD NOT use" to iii).
> - Added caching discussion and need for yet more security considerations
> 	text to v).
> - Added a warning about relying on SendSE and SendInvSE at receiver - new item
> 	vi).
> 
> Are we getting closer?  Here's the new version:
> 
> i) Some iSER implementations have not followed RFC 5046's strict requirements
> 	for use of SendSE, SendInv and SendInvSE; they use Send instead.
> ii) For interoperability, iSER implementations SHOULD accept and correctly
> 	process SendSE, SendInv and SendInvSE messages.
> iii) SendSE, SendInv and SendInvSE are to be regarded as optimizations or
> 	enhancements to the basic Send message, and their support may vary by
> 	RCaP protocol and specific implementation.  In general, these messages
> 	SHOULD NOT be used, unless the RCaP requires support for them in all
> 	implementations.  If these messages are used, the implementation SHOULD
> 	be capable of reverting to use of Send in order to work with a receiver
> 	that does not support these message (and we need to note that attempted
> 	use of these messages with a peer that doesn't support them may result
> 	in a fatal error that closes the RCaP connection).  A specific instance
> 	that needs to be noted is that these messages SHOULD NOT be used with
> 	the InfiniBand RCaP because InfiniBand does not require support for them
> 	in all cases.
> iv) New iSER implementations SHOULD use Send (and not these three additional
> 	messages) unless there are compelling reasons for doing otherwise
> 	(latter is implicit in use of "SHOULD", but worth saying explicitly,
> 	IMHO).
> v) Some new text will be needed (especially Security Considerations) to
> 	make it clear that STag invalidation is the initiator's responsibility
> 	for security reasons, and the initiator cannot rely on the target
> 	using an Invalidate version of Send - the initiator MUST check and
> 	do its own invalidation as required.  The initiator MAY choose to cache
> 	mappings (i.e., reuse STags) across I/Os for efficiency, but that has
> 	security consequences (exposes initiator memory to remote access for
> 	longer) that have to be discussed in the new Security Considerations text.
> vi) Similarly, iSER implementations SHOULD NOT rely on events triggered by
> 	SendSE and SendInvSE, as these messages may not be used.  In contrast
> 	to invalidation, there are no security consequences in this aspect.
> 
> Thanks,
> --David
> ----------------------------------------------------
> David L. Black, Distinguished Engineer
> EMC Corporation, 176 South St., Hopkinton, MA  01748
> +1 (508) 293-7953             FAX: +1 (508) 293-7786
> david.black@emc.com        Mobile: +1 (978) 394-7754
> ----------------------------------------------------
> 
> 
> _______________________________________________
> storm mailing list
> storm@ietf.org
> https://www.ietf.org/mailman/listinfo/storm