From owner-ips@ece.cmu.edu  Fri Mar  1 02:58:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA15943
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 02:58:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g217H5W03973
	for ips-outgoing; Fri, 1 Mar 2002 02:17:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g217H3H03962
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 02:17:03 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA32858;
	Fri, 1 Mar 2002 08:16:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g217Ifn46100;
	Fri, 1 Mar 2002 08:18:41 +0100
To: ISCSIPerson@aol.com
Cc: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iscsi: Another "silly" question: TotalAHSLength
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF8ADB2D36.C642DAE8-ONC2256B6F.0026D853@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 09:18:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 09:18:51,
	Serialize complete at 01/03/2002 09:18:51
Content-Type: multipart/alternative; boundary="=_alternative 00270C93C2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00270C93C2256B6F_=
Content-Type: text/plain; charset="us-ascii"

Greg A,

Here is a silly answer - So that the length can be calculated without 
looking at the type field.
In the future other PDU types might also use AHS.
This issue was discussed on the list.

Julo




ISCSIPerson@aol.com
01-03-02 02:19

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     ips@ece.cmu.edu
        Subject:        iscsi: Another "silly" question: TotalAHSLength

 

Here is a silly question: 

If the TotalAHSLength field is "only used in SCSI Command PDUs and MUST be 
0 in all other PDUs" (draft-11 section 9.2.1.4), why is it included 
(instead of reserved) in the "other PDUs"? 

Thanks in advance, 

Greg A. 


--=_alternative 00270C93C2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Greg A,</font>
<br>
<br><font size=2 face="sans-serif">Here is a silly answer - So that the length can be calculated without looking at the type field.</font>
<br><font size=2 face="sans-serif">In the future other PDU types might also use AHS.</font>
<br><font size=2 face="sans-serif">This issue was discussed on the list.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>ISCSIPerson@aol.com</b></font>
<p><font size=1 face="sans-serif">01-03-02 02:19</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iscsi: Another &quot;silly&quot; question: TotalAHSLength</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=3 face="Arial">Here is a silly question: <br>
<br>
If the TotalAHSLength field is &quot;only used in SCSI Command PDUs and MUST be 0 in all other PDUs&quot; (draft-11 section 9.2.1.4), why is it included (instead of reserved) in the &quot;other PDUs&quot;? <br>
<br>
Thanks in advance, <br>
<br>
Greg A. </font>
<br>
<br>
--=_alternative 00270C93C2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 03:00:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA16025
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 03:00:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g217gDf05382
	for ips-outgoing; Fri, 1 Mar 2002 02:42:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g217gBH05378
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 02:42:11 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id IAA16238;
	Fri, 1 Mar 2002 08:41:59 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g217gZQ103976;
	Fri, 1 Mar 2002 08:42:38 +0100
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: referenced task tag
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFBFB1AB36.729601FA-ONC2256B6F.00284B48@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 09:42:34 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 09:42:38,
	Serialize complete at 01/03/2002 09:42:38
Content-Type: multipart/alternative; boundary="=_alternative 00296BDFC2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00296BDFC2256B6F_=
Content-Type: text/plain; charset="us-ascii"

The reason was to allow the two functions - "abort" and "fill-the-hole" be 
performed by a the abort-task task management request. This is important 
both on a single connection and on multiple (when switching connections 
all the commands on the logged-out connection after expcmdsn have either 
to be reissued or aborted). If we want to abort them selectively or 
collectively we still have to fill the holes and the only way to do it is 
ether abort them with task abort or fill them with nop (otherwise commands 
from other connections are held-up).
Your previous note outlines correctly the mechanism and yes you have to 
check for RefCmdSN only when the task is not there!

Julo




"Mallikarjun C." <cbm@rose.hp.com>
01-03-02 03:49

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc: 
        Subject:        referenced task tag

 

Julian,

I don't see the use of Referenced Task Tag field (9.6.2).

Can you please comment on why we decided to retain it?

Thanks!

Mallikarjun
 




--=_alternative 00296BDFC2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">The reason was to allow the two functions - &quot;abort&quot; and &quot;fill-the-hole&quot; be performed by a the abort-task task management request. This is important both on a single connection and on multiple (when switching connections all the commands on the logged-out connection after expcmdsn have either to be reissued or aborted). If we want to abort them selectively or collectively we still have to fill the holes and the only way to do it is ether abort them with task abort or fill them with nop (otherwise commands from other connections are held-up).</font>
<br><font size=2 face="sans-serif">Your previous note outlines correctly the mechanism and yes you have to check for RefCmdSN only when the task is not there!</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</b></font>
<p><font size=1 face="sans-serif">01-03-02 03:49</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;referenced task tag</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Julian,<br>
<br>
I don't see the use of Referenced Task Tag field (9.6.2).<br>
<br>
Can you please comment on why we decided to retain it?<br>
<br>
Thanks!<br>
<br>
Mallikarjun<br>
 &nbsp;<br>
<br>
</font>
<br>
<br>
--=_alternative 00296BDFC2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 03:01:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA16079
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 03:01:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g217H6D03975
	for ips-outgoing; Fri, 1 Mar 2002 02:17:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g217H3H03963
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 02:17:03 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id IAA135540;
	Fri, 1 Mar 2002 08:16:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g217Ifn79748;
	Fri, 1 Mar 2002 08:18:42 +0100
To: "Robert D. Russell" <rdr@io.iol.unh.edu>
Cc: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: version
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFBA12593C.85B4A390-ONC2256B6F.00271947@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 09:18:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 09:18:51,
	Serialize complete at 01/03/2002 09:18:51
Content-Type: multipart/alternative; boundary="=_alternative 0027EC55C2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0027EC55C2256B6F_=
Content-Type: text/plain; charset="us-ascii"

Robert, Mark & all,

Per David Black's unequivocal instructions (... if not there is not going 
to be a WG last call!) I am resetting the version to 0.

You will have to instruct Plugfest participants to use a X-key (along 
Eddy's recommendation) to convey temporarily the version.

I hope this will not harm too much those that have a version to protect 
nor will it help too much those that don't have any :-)

Regards,
Julo
--=_alternative 0027EC55C2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Robert, Mark &amp; all,</font>
<br>
<br><font size=2 face="sans-serif">Per David Black's unequivocal instructions (... if not there is not going to be a WG last call!) I am resetting the version to 0.</font>
<br>
<br><font size=2 face="sans-serif">You will have to instruct Plugfest participants to use a X-key (along Eddy's recommendation) to convey temporarily the version.</font>
<br>
<br><font size=2 face="sans-serif">I hope this will not harm too much those that have a version to protect nor will it help too much those that don't have any :-)</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br><font size=2 face="sans-serif">Julo</font>
--=_alternative 0027EC55C2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 04:33:47 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA02191
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 04:33:47 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g218cmt08512
	for ips-outgoing; Fri, 1 Mar 2002 03:38:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g218cjH08501;
	Fri, 1 Mar 2002 03:38:46 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id JAA83192;
	Fri, 1 Mar 2002 09:38:39 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g218eWQ57788;
	Fri, 1 Mar 2002 09:40:32 +0100
To: pat_thaler@agilent.com
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iscsi: header digest issue
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF99F7C8E1.7F3983EE-ONC2256B6F.002C9B83@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 10:40:30 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 10:40:34,
	Serialize complete at 01/03/2002 10:40:34
Content-Type: multipart/alternative; boundary="=_alternative 002EF8A1C2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002EF8A1C2256B6F_=
Content-Type: text/plain; charset="us-ascii"

Pat,

We discussed several alternative formats including a separate protection 
(parity) for the length fields.
All where dropped. The probability of an undetected error of length 1 in 
the header - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits. 
On the total feasible header length (not very long) the probability is 
still far under the value you quoted (according to the draft we have 
submitted together yesterday :-)). I agree that the recovery logic becomes 
at bit more complicated if the digest is at an unknown position but the 
"goodput" is simpler and the "badput" is not critical.

In addition the logic for putting the header digest at a fixed position 
but including the AHS in the digest has the same flaw and the alternatives 
(include the AHS the data digest or provide a separated AHS digest) are 
not nice as they may (somewhat) complicate placement.

There are some radically different layouts - that may include a framer and 
lengths protected by CRCs and
and followed by Data+Header protected by a single CRC.  But we may want to 
leave those for iSCSI-2 :-)

Julo





pat_thaler@agilent.com
Sent by: owner-ips@ece.cmu.edu
01-03-02 03:38

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        iscsi: header digest issue

 


We have a concern about the header digest location in the PDU. Currently,
the header digest is located after the AHS. This is convenient for the
transmitter since it calculates the header digest over the BHS and AHS and
then appends the digest. 

The problem is that the receiver must read a field that is covered by the
header digest in order to know the position of the digest. This has two
problems: it reduces the hamming distance protection of the digest to one
and it can cause an error recovery problem when an error changes the 
length
field to a value that is beyond the end of the transmitted data stream.

The CRC generally has a hamming distance of 4 and we went to some effort 
to
pick a CRC that was robust in the presence of small numbers of bad bits.
With the current PDU definition, an error in the TotalAHSLength field will
cause the wrong value of the stream being read as the AHS. There is a
possibility that this location contains a value that is the same as the 
CRC
of the bytes up to that point. A single bit error has a 2^-32 chance of
producing an undetectable error.

The second concern is on error recovery when an error occurs in a PDU that
is not followed by other PDUs. The error may change the length field so 
that
it indicates a position beyond the end of the actual PDU. The receiver 
waits
for more data to arrive so that it can check the digest and then process 
the
packet. Since there is no more data arriving it will hang waiting until a
timeout occurs. Therefore, when this kind of error occurs the error 
recovery
doesn't function.

Both problems could be solved by placing the header digest after the BHS 
and
before the AHS headers. 

Regards,
Pat Thaler



--=_alternative 002EF8A1C2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Pat,</font>
<br>
<br><font size=2 face="sans-serif">We discussed several alternative formats including a separate protection (parity) for the length fields.</font>
<br><font size=2 face="sans-serif">All where dropped. The probability of an undetected error of length 1 in the header - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits. &nbsp;On the total feasible header length (not very long) the probability is still far under the value you quoted (according to the draft we have submitted together yesterday :-)). I agree that the recovery logic becomes at bit more complicated if the digest is at an unknown position but the &quot;goodput&quot; is simpler and the &quot;badput&quot; is not critical.</font>
<br>
<br><font size=2 face="sans-serif">In addition the logic for putting the header digest at a fixed position but including the AHS in the digest has the same flaw and the alternatives (include the AHS the data digest or provide a separated AHS digest) are not nice as they may (somewhat) complicate placement.</font>
<br>
<br><font size=2 face="sans-serif">There are some radically different layouts - that may include a framer and lengths protected by CRCs and</font>
<br><font size=2 face="sans-serif">and followed by Data+Header protected by a single CRC. &nbsp;But we may want to leave those for iSCSI-2 :-)</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>pat_thaler@agilent.com</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">01-03-02 03:38</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iscsi: header digest issue</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
We have a concern about the header digest location in the PDU. Currently,<br>
the header digest is located after the AHS. This is convenient for the<br>
transmitter since it calculates the header digest over the BHS and AHS and<br>
then appends the digest. <br>
<br>
The problem is that the receiver must read a field that is covered by the<br>
header digest in order to know the position of the digest. This has two<br>
problems: it reduces the hamming distance protection of the digest to one<br>
and it can cause an error recovery problem when an error changes the length<br>
field to a value that is beyond the end of the transmitted data stream.<br>
<br>
The CRC generally has a hamming distance of 4 and we went to some effort to<br>
pick a CRC that was robust in the presence of small numbers of bad bits.<br>
With the current PDU definition, an error in the TotalAHSLength field will<br>
cause the wrong value of the stream being read as the AHS. There is a<br>
possibility that this location contains a value that is the same as the CRC<br>
of the bytes up to that point. A single bit error has a 2^-32 chance of<br>
producing an undetectable error.<br>
<br>
The second concern is on error recovery when an error occurs in a PDU that<br>
is not followed by other PDUs. The error may change the length field so that<br>
it indicates a position beyond the end of the actual PDU. The receiver waits<br>
for more data to arrive so that it can check the digest and then process the<br>
packet. Since there is no more data arriving it will hang waiting until a<br>
timeout occurs. Therefore, when this kind of error occurs the error recovery<br>
doesn't function.<br>
<br>
Both problems could be solved by placing the header digest after the BHS and<br>
before the AHS headers. <br>
<br>
Regards,<br>
Pat Thaler<br>
</font>
<br>
<br>
--=_alternative 002EF8A1C2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 08:50:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24466
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 08:50:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21D86203969
	for ips-outgoing; Fri, 1 Mar 2002 08:08:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21D84H03962
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 08:08:05 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id OAA69210;
	Fri, 1 Mar 2002 14:07:53 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g21D9dn95242;
	Fri, 1 Mar 2002 14:09:39 +0100
To: internet-drafts@ietf.org
Cc: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: revised draft
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF3ABA3363.FB0A0629-ONC2256B6F.0046F00E@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 15:09:47 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 15:09:49,
	Serialize complete at 01/03/2002 15:09:49
Content-Type: multipart/alternative; boundary="=_alternative 004744EFC2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004744EFC2256B6F_=
Content-Type: text/plain; charset="us-ascii"

On behalf of the team of authors, for the IPS working group, I submit a 
draft for immediate publication.
The text and pdf versions can be found at:

http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.txt

http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.pdf


This version completely replaces:

draft-ietf-ips-iscsi-10.txt (and .pdf)



Julian Satran - IBM Research Laboratory at Haifa






















--=_alternative 004744EFC2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br>
<br>
<br><font size=2 face="sans-serif">On behalf of the team of authors, for the IPS working group, I submit a draft for immediate publication.</font>
<br><font size=2 face="sans-serif">The text and pdf versions can be found at:</font>
<br>
<br><font size=2 face="sans-serif">http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.txt</font>
<br>
<br><font size=2 face="sans-serif">http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.pdf</font>
<br>
<br>
<br><font size=2 face="sans-serif">This version completely replaces:</font>
<br>
<br><font size=2 face="sans-serif">draft-ietf-ips-iscsi-10.txt (and .pdf)</font>
<br>
<br>
<br>
<br><font size=2 face="sans-serif">Julian Satran - IBM Research Laboratory at Haifa</font>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
--=_alternative 004744EFC2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 08:53:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24609
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 08:53:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21DJSc04636
	for ips-outgoing; Fri, 1 Mar 2002 08:19:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21DJRH04631
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 08:19:27 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id OAA57730
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 14:19:20 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g21DL4n53140
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 14:21:04 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: iSCSI 11 pdf & text version
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFAEC61A29.0D7045E8-ONC2256B6F.00487A5F@telaviv.ibm.com>
Date: Fri, 1 Mar 2002 15:21:12 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 01/03/2002 15:21:14,
	Serialize complete at 01/03/2002 15:21:14
Content-Type: multipart/alternative; boundary="=_alternative 0048F53FC2256B6F_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0048F53FC2256B6F_=
Content-Type: text/plain; charset="us-ascii"

Although the pdf & text versions just submitted are identical in content 
they differ in pagination and the text version misses a TOC.  I hope to 
have a good conversion soon and I will provide you with an repaginated 
(but not re-eedited) text soon.

Julo
--=_alternative 0048F53FC2256B6F_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Although the pdf &amp; text versions just submitted are identical in content they differ in pagination and the text version misses a TOC. &nbsp;I hope to have a good conversion soon and I will provide you with an repaginated (but not re-eedited) text soon.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
--=_alternative 0048F53FC2256B6F_=--


From owner-ips@ece.cmu.edu  Fri Mar  1 09:45:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA27696
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 09:45:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21EN2008693
	for ips-outgoing; Fri, 1 Mar 2002 09:23:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21EMxH08688
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 09:23:00 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPMR1>; Fri, 1 Mar 2002 09:22:59 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5675@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: RefCmdSN != CmdSN
Date: Fri, 1 Mar 2002 09:22:53 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Yes, but I don't think the statement "Targets however must consider ..." is
necessary because the initiator must always make them consistent and it is a
target implementation issue as to which it actually uses.


Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Thursday, February 28, 2002 8:47 PM
To: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: RefCmdSN != CmdSN


Eddy,

I agree that targets don't have to check both always, only when it
is needed.

The intended role of RefCmdSN is to help identify the right command
when the command to be aborted had not arrived - the command
could be lost due to digest errors or as part of connection failure.
So I think the quoted text should be rephrased to:

Section 9.5.4
For the ABORT TASK function, initiators MUST always set this to the
CmdSN of the task identified by the Initiator Task Tag field.  Targets
however
must consider the field valid only when the task indicated by the Initiator
Task Tag field does not exist.

Section 9.6.1
For the ABORT TASK function,
    a) if the ITT identifies a valid task leading to a successful
termination,
        targets must return the "Function complete" response.
    b)if the ITT does not identify an existing task but if the CmdSN
indicated
       by the RefCmdSN field in the task management function request is
within
       the valid CmdSN window, targets must consider the CmdSN received
       and return the "Function complete" response.
   c) if the ITT does not identify an existing task and if the CmdSN
indicated
       by the RefCmdSN field in the task management function request is
outside
       the valid CmdSN window, targets must return the "Task does not exist"
response.

Comments?
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747

----- Original Message -----
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Thursday, February 28, 2002 4:46 PM
Subject: iSCSI: RefCmdSN != CmdSN


> Is there a reason that this check is mandated? Is there a case where this
> can happen with bug free code?
>
>  If RefCmdSN does not match the CmdSN of the command to be aborted at the
>  target, the abort action MUST NOT be performed and the response MUST
>  be 'function rejected'.
>
>
> Eddy_Quicksall@iVivity.com
>


From owner-ips@ece.cmu.edu  Fri Mar  1 09:45:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA27718
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 09:45:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21Dojr06593
	for ips-outgoing; Fri, 1 Mar 2002 08:50:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21C3QH00420
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 07:03:26 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA13137;
	Fri, 1 Mar 2002 07:03:22 -0500 (EST)
Message-Id: <200203011203.HAA13137@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-boot-05.txt
Date: Fri, 01 Mar 2002 07:03:21 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Bootstrapping Clients using the iSCSI Protocol
	Author(s)	: P. Sarkar, D. Missimer, C. Sapuntzakis
	Filename	: draft-ietf-ips-iscsi-boot-05.txt
	Pages		: 10
	Date		: 28-Feb-02
	
The Small Computer Systems Interface (SCSI) is a popular family of
protocols for communicating with I/O devices, especially storage
devices.  iSCSI is a proposed transport protocol for SCSI that
operates on top of TCP[12].  This memo describes a standard mechanism
to enable clients to bootstrap themselves using the iSCSI protocol.
The goal of this standard is to enable iSCSI boot clients to obtain
the information to open an iSCSI session with the iSCSI boot server,
assuming this information is not available.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-boot-05.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-boot-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-boot-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020228134529.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-boot-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-boot-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020228134529.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Fri Mar  1 09:46:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA27797
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 09:46:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21Dos106611
	for ips-outgoing; Fri, 1 Mar 2002 08:50:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21C3UH00432
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 07:03:30 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA13156;
	Fri, 1 Mar 2002 07:03:26 -0500 (EST)
Message-Id: <200203011203.HAA13156@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-security-10.txt
Date: Fri, 01 Mar 2002 07:03:26 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Securing Block Storage Protocols over IP
	Author(s)	: B. Aboba et al.
	Filename	: draft-ietf-ips-security-10.txt
	Pages		: 66
	Date		: 28-Feb-02
	
This document discusses how block storage protocols running over IP,
including iSCSI, iFCP and FCIP, can utilize IPsec for security.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-security-10.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-security-10.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-security-10.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020228134543.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-security-10.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-security-10.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020228134543.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Fri Mar  1 12:18:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07587
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 12:18:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21GCD217541
	for ips-outgoing; Fri, 1 Mar 2002 11:12:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21GC9H17534
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 11:12:09 -0500 (EST)
Received: from hq-ex-c3.brocade.com (hq-ex-c3 [192.168.126.211])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id IAA04434
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 08:12:03 -0800 (PST)
Received: by hq-ex-c3.brocade.com with Internet Mail Service (5.5.2653.19)
	id <FXKYBRZ0>; Fri, 1 Mar 2002 08:11:29 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D1190F@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
Date: Fri, 1 Mar 2002 08:11:59 -0800 
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


There has always been a feeling that it was nice to do things
on convenient boundaries, including memory page boundaries and
device physical block boundaries, but SCSI has long since 
elected to perform any operation on almost any boundary.  SCSI drives
and related operating systems have commonly used block sizes of 512
bytes and 520 bytes and less commonly of other values.  

The only requirement we were able to enforce in previous
SCSI protocols is that all but the last PDU of a transfer
were required to be on 4 byte boundaries.  We were also
able to enforce the maximum values and a requirement that
the transferred data count exactly match the requested byte
count.

I would strongly suggest that you not bother to enforce any
other boundary restrictions.

I believe Eddy was right when he asked:

	Given that the TCP issues of reassembly 
	are so much more complicated than
	the concatenation issues necessary for 
	target data alignment, is there
	really a problem here?

My answer to him would be, no, there is not a problem.

Bob Snively                        e-mail:    rsnively@brocade.com
Brocade Communications Systems     phone:  408 487 8135
1745 Technology Drive
San Jose, CA 95110



From owner-ips@ece.cmu.edu  Fri Mar  1 12:48:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09797
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 12:48:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21HD7B22682
	for ips-outgoing; Fri, 1 Mar 2002 12:13:07 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g21HD3H22674
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 12:13:04 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21HCp021302
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 12:12:51 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21HCpK21293;
	Fri, 1 Mar 2002 12:12:51 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g21HCoi13043;
	Fri, 1 Mar 2002 12:12:50 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15487.46738.943000.884695@gargle.gargle.HOWL>
Date: Fri, 1 Mar 2002 12:12:50 -0500
From: Paul Koning <ni1d@arrl.net>
To: Nick.Martin@compaq.com
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
References: <31891B757C09184BBFEC5275F85D5595104E43@cceexc18.americas.cpqcorp.net>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I like the way you've filled in the details on this.

It would make sense for targets to negotiate burst size limits, and
send requested length in R2T PDUs, that are multiples of the specified
DataPDUAlignment.  Is it necessary to specify that explicitly?  I
think it would make sense to do it, even though the current (rev 10 at
least) rules don't make it necessary).

       paul



From owner-ips@ece.cmu.edu  Fri Mar  1 12:49:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09931
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 12:49:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21GoPq20676
	for ips-outgoing; Fri, 1 Mar 2002 11:50:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21GoNH20671
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 11:50:23 -0500 (EST)
Received: from nisser.cisco.com (nisser.cisco.com [171.71.176.85])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id g21GoHN03944
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 08:50:17 -0800 (PST)
Received: from cisco.com (58509@mbakke-lnx.cisco.com [161.44.68.87]) by nisser.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id IAA14797 for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 08:50:16 -0800 (PST)
Message-ID: <3C7FADC6.5D26FE1E@cisco.com>
Date: Fri, 01 Mar 2002 10:35:18 -0600
From: Mark Bakke <mbakke@cisco.com>
X-Mailer: Mozilla 4.72 [en] (X11; U; Linux 2.2.16-3.uid32 i686)
X-Accept-Language: en, de
MIME-Version: 1.0
To: IPS <ips@ece.cmu.edu>
Subject: iSCSI: New SLP draft available
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


The latest SLP template for iSCSI has been submitted, and
is currently available at:

ftp://ftpeng.cisco.com/mbakke/ips/iscsi/draft-ietf-ips-iscsi-slp-03.txt

-- 
Mark A. Bakke
Cisco Systems
mbakke@cisco.com
763.398.1054


From owner-ips@ece.cmu.edu  Fri Mar  1 12:49:44 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09945
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 12:49:43 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21H7WF22226
	for ips-outgoing; Fri, 1 Mar 2002 12:07:32 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g21H7NH22205
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 12:07:25 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21H78021207
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 12:07:08 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21H75K21195;
	Fri, 1 Mar 2002 12:07:05 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g21H74Z12373;
	Fri, 1 Mar 2002 12:07:04 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15487.46393.36000.573971@gargle.gargle.HOWL>
Date: Fri, 1 Mar 2002 12:07:05 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: pat_thaler@agilent.com, ips@ece.cmu.edu
Subject: Re: iscsi: header digest issue
References: <OF99F7C8E1.7F3983EE-ONC2256B6F.002C9B83@telaviv.ibm.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 1 March 2002) by Julian Satran:
> Pat,
> 
> We discussed several alternative formats including a separate protection 
> (parity) for the length fields.
> All where dropped. The probability of an undetected error of length 1 in 
> the header - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits. 

That's a true statement for CRC-32 for the case where you've correctly
identified where the CRC field is in the data.

If you use the wrong value for the length (and therefore the wrong
value for the position of the CRC) then you have a 2^-32 probability
of accepting the header as valid.  

So the question becomes: how big a change to the header is needed to
make you look for the CRC field in the wrong place?  The answer is one
bit, because any one-bit change to the TotalAHSLength field does
that.  You might be able to make this less likely by using a rule that
only some TotalAHSLength values are valid, but that doesn't change the
outcome.  The values 0 and 2 are both legal, and these differ in only
one bit. 

So Pat is right: given the encoding chosen, the Hamming distance is
one.  

> ...
> In addition the logic for putting the header digest at a fixed position 
> but including the AHS in the digest has the same flaw.

That's true.  For example, if a single bit error changes the
TotalAHSLength from 0 to 2, even if you put the CRC in a fixed place,
you have just changed the bitstring it acts on by 64 bits.  That's
longer than the burst error limit of CRC-32, so there is a non-zero
probability of accepting such a damaged header as valid.  

> There are some radically different layouts - that may include a framer and 
> lengths protected by CRCs and
> and followed by Data+Header protected by a single CRC.  But we may want to 
> leave those for iSCSI-2 :-)

That one would work.  (It's how DDCMP was done...)  And I agree,
that's not a solution to be considered now.

       paul



From owner-ips@ece.cmu.edu  Fri Mar  1 12:53:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10182
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 12:53:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21HJSB23274
	for ips-outgoing; Fri, 1 Mar 2002 12:19:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21HJQH23267
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 12:19:26 -0500 (EST)
Received: from nisser.cisco.com (nisser.cisco.com [171.71.176.85])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id g21HJKN24129
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 09:19:20 -0800 (PST)
Received: from cisco.com (58509@mbakke-lnx.cisco.com [161.44.68.87]) by nisser.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id JAA07258 for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 09:19:19 -0800 (PST)
Message-ID: <3C7FB494.293BBDCE@cisco.com>
Date: Fri, 01 Mar 2002 11:04:20 -0600
From: Mark Bakke <mbakke@cisco.com>
X-Mailer: Mozilla 4.72 [en] (X11; U; Linux 2.2.16-3.uid32 i686)
X-Accept-Language: en, de
MIME-Version: 1.0
To: IPS <ips@ece.cmu.edu>
Subject: iSCSI: New SCSI MIB is now available
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

A new version of the SCSI MIB has been submitted, and is available at:

ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/draft-ietf-ips-scsi-mib-02.txt

Its corresponding object model is also available:

ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-uml-model-02.pdf

as well as a high-level MIB family model showing how the
SCSI, iSCSI, and (potential) FCP MIBs are related:

ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-mib-family-02.pdf

Enjoy,

-- 
Mark A. Bakke
Cisco Systems
mbakke@cisco.com
763.398.1054


From owner-ips@ece.cmu.edu  Fri Mar  1 14:03:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15644
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 14:03:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21I9nY27495
	for ips-outgoing; Fri, 1 Mar 2002 13:09:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g21I9iH27478
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 13:09:45 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21I9Z021951
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 13:09:35 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g21I9ZK21942;
	Fri, 1 Mar 2002 13:09:35 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g21I9Yj16519;
	Fri, 1 Mar 2002 13:09:35 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15487.50143.178000.681934@gargle.gargle.HOWL>
Date: Fri, 1 Mar 2002 13:09:35 -0500
From: Paul Koning <ni1d@arrl.net>
To: rsnively@Brocade.COM
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
References: <FFD40DB4943CD411876500508BAD027905D1190F@sj5-ex2.brocade.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 1 March 2002) by Robert Snively:
> 
> There has always been a feeling that it was nice to do things
> on convenient boundaries, including memory page boundaries and
> device physical block boundaries, but SCSI has long since 
> elected to perform any operation on almost any boundary.  SCSI drives
> and related operating systems have commonly used block sizes of 512
> bytes and 520 bytes and less commonly of other values.  
> 
> The only requirement we were able to enforce in previous
> SCSI protocols is that all but the last PDU of a transfer
> were required to be on 4 byte boundaries.  We were also
> able to enforce the maximum values and a requirement that
> the transferred data count exactly match the requested byte
> count.

I don't see that last point.  Certainly not for unsolicited data --
and for R2T I can find no stated requirement to send exactly the
requested count either.  Or did you mean the total for the entire
operation as opposed to the individual bursts?
 
> I would strongly suggest that you not bother to enforce any
> other boundary restrictions.
> 
> I believe Eddy was right when he asked:
> 
> 	Given that the TCP issues of reassembly 
> 	are so much more complicated than
> 	the concatenation issues necessary for 
> 	target data alignment, is there
> 	really a problem here?
> 
> My answer to him would be, no, there is not a problem.

I answered it before when Eddy said that, but I'll summarize it again:
I'm not talking about a problem, I'm talking about an opportunity for
simplifying the target and making it more efficient.

Given alignment, each iSCSI PDU that carries data can be sent to disk
by itself, because it corresponds exactly to one or more disk blocks.
Without alignment, doing writes when the data arrives is still
possible, but it clearly adds complexity because PDU boundaries don't
match disk block boundaries.

I made the proposal because it clearly helps the target and appears to
add no significant burden on the initiator.  The feedback to date
indicates that this is indeed the case.

Are you saying "I don't care one way or the other" or are you saying
"I feel this is a bad idea because it creates problems you haven't
thought of"?  I'm reading your comment as the former; if you meant the
latter, could you elaborate?

	paul



From owner-ips@ece.cmu.edu  Fri Mar  1 14:03:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15670
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 14:03:51 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21Ih9B00289
	for ips-outgoing; Fri, 1 Mar 2002 13:43:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21Ih6H00284
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 13:43:07 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP
	id 17AE460085A; Fri,  1 Mar 2002 10:42:59 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA28843; Fri, 1 Mar 2002 10:44:39 -0800 (PST)
Message-ID: <000c01c1c150$e85fc720$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
References: <25369470B6F0D41194820002B328BDD22F5675@ATLOPS>
Subject: Re: iSCSI: RefCmdSN != CmdSN
Date: Fri, 1 Mar 2002 10:42:57 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

It isn't quite an implementation issue.  The spec *requires* 
the target to look at RefCmdSN - and that's only when the 
ITT doesn't point to a valid task.  

I believe we should have some text that specifies the target
is required to look at RefCmdSN.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747


----- Original Message ----- 
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Friday, March 01, 2002 6:22 AM
Subject: RE: iSCSI: RefCmdSN != CmdSN


> Yes, but I don't think the statement "Targets however must consider ..." is
> necessary because the initiator must always make them consistent and it is a
> target implementation issue as to which it actually uses.
> 
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Thursday, February 28, 2002 8:47 PM
> To: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> 
> Eddy,
> 
> I agree that targets don't have to check both always, only when it
> is needed.
> 
> The intended role of RefCmdSN is to help identify the right command
> when the command to be aborted had not arrived - the command
> could be lost due to digest errors or as part of connection failure.
> So I think the quoted text should be rephrased to:
> 
> Section 9.5.4
> For the ABORT TASK function, initiators MUST always set this to the
> CmdSN of the task identified by the Initiator Task Tag field.  Targets
> however
> must consider the field valid only when the task indicated by the Initiator
> Task Tag field does not exist.
> 
> Section 9.6.1
> For the ABORT TASK function,
>     a) if the ITT identifies a valid task leading to a successful
> termination,
>         targets must return the "Function complete" response.
>     b)if the ITT does not identify an existing task but if the CmdSN
> indicated
>        by the RefCmdSN field in the task management function request is
> within
>        the valid CmdSN window, targets must consider the CmdSN received
>        and return the "Function complete" response.
>    c) if the ITT does not identify an existing task and if the CmdSN
> indicated
>        by the RefCmdSN field in the task management function request is
> outside
>        the valid CmdSN window, targets must return the "Task does not exist"
> response.
> 
> Comments?
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Thursday, February 28, 2002 4:46 PM
> Subject: iSCSI: RefCmdSN != CmdSN
> 
> 
> > Is there a reason that this check is mandated? Is there a case where this
> > can happen with bug free code?
> >
> >  If RefCmdSN does not match the CmdSN of the command to be aborted at the
> >  target, the abort action MUST NOT be performed and the response MUST
> >  be 'function rejected'.
> >
> >
> > Eddy_Quicksall@iVivity.com
> >
> 


From owner-ips@ece.cmu.edu  Fri Mar  1 15:13:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22800
	for <ips-archive@lists.ietf.org>; Fri, 1 Mar 2002 15:13:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21JKkq03621
	for ips-outgoing; Fri, 1 Mar 2002 14:20:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21JKiH03616
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 14:20:44 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel12.hp.com (Postfix) with ESMTP
	id 5BAB16006D7; Fri,  1 Mar 2002 10:52:57 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA00565; Fri, 1 Mar 2002 10:54:37 -0800 (PST)
Message-ID: <001901c1c152$4ccc48e0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>
References: <OFBFB1AB36.729601FA-ONC2256B6F.00284B48@telaviv.ibm.com>
Subject: Re: iSCSI:referenced task tag
Date: Fri, 1 Mar 2002 10:52:56 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Julian,

I am not sure you're referring to the same field as I was.

I am referring to the named field in the TMF response PDU -
why the non-existent ITT needs to be sent back by the target?

Here is the text I am referring to:

9.6.2 Referenced Task Tag

If the Request was ABORT TASK and the Response is "task does not exist", the
Referenced Task Tag contains the Initiator Task Tag of the task that was to be
aborted. In other cases, it MUST be set to 0xffffffff.

Thanks.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747


----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>
Sent: Thursday, February 28, 2002 11:42 PM
Subject: Re: referenced task tag


> The reason was to allow the two functions - "abort" and "fill-the-hole" be
> performed by a the abort-task task management request. This is important
> both on a single connection and on multiple (when switching connections
> all the commands on the logged-out connection after expcmdsn have either
> to be reissued or aborted). If we want to abort them selectively or
> collectively we still have to fill the holes and the only way to do it is
> ether abort them with task abort or fill them with nop (otherwise commands
> from other connections are held-up).
> Your previous note outlines correctly the mechanism and yes you have to
> check for RefCmdSN only when the task is not there!
>
> Julo
>
>
>
>
> "Mallikarjun C." <cbm@rose.hp.com>
> 01-03-02 03:49
>
>
>         To:     Julian Satran/Haifa/IBM@IBMIL
>         cc:
>         Subject:        referenced task tag
>
>
>
> Julian,
>
> I don't see the use of Referenced Task Tag field (9.6.2).
>
> Can you please comment on why we decided to retain it?
>
> Thanks!
>
> Mallikarjun
>
>
>
>
>



From owner-ips@ece.cmu.edu  Fri Mar  1 15:15:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22985
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 15:15:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21JCGm02919
	for ips-outgoing; Fri, 1 Mar 2002 14:12:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from c003.snv.cp.net (c003-h016.c003.snv.cp.net [209.228.32.230])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g21JCEH02912
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 14:12:14 -0500 (EST)
Received: (cpmta 13751 invoked from network); 1 Mar 2002 11:12:07 -0800
Received: from 66.123.21.234 (HELO littlejoy)
  by smtp.telocity.com (209.228.32.230) with SMTP; 1 Mar 2002 11:12:07 -0800
X-Sent: 1 Mar 2002 19:12:07 GMT
From: "Douglas Otis" <dotis@sanlight.net>
To: <ips@ece.cmu.edu>
Subject: RE: iscsi: header digest issue
Date: Fri, 29 Mar 2002 11:12:15 -0800
Message-ID: <NEBBJGDMMLHHCIKHGBEJOEKECOAA.dotis@sanlight.net>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Importance: Normal
In-Reply-To: <15487.46393.36000.573971@gargle.gargle.HOWL>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul,

One future solution could be SCTP-DDP and an IANA registration for SCSI.
Data transfers in the DDP_WITH_TAG mode where Placement Tag matches the CDB
tag.  The SCSI CDBs and responses use the ANONYMOUS mode where the tag
remains in the same position within the Data Chunk but interpreted by a
process associated with the Stream and not used for direct placement.  The
SCSI PDUs are contained within a Data Chunk and SCTP provides assured
structure-packet alignment with a fixed location of the CRC digest.

http://groups.yahoo.com/group/SCTP-DDP/files/

Doug

> Excerpt of message (sent 1 March 2002) by Julian Satran:
> > Pat,
> >
> > We discussed several alternative formats including a separate
> > protection (parity) for the length fields. All where dropped.
> > The probability of an undetected error of length 1 in the header
> > - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits.
>
> That's a true statement for CRC-32 for the case where you've correctly
> identified where the CRC field is in the data.
>
> If you use the wrong value for the length (and therefore the wrong
> value for the position of the CRC) then you have a 2^-32 probability
> of accepting the header as valid.
>
> So the question becomes: how big a change to the header is needed to
> make you look for the CRC field in the wrong place?  The answer is one
> bit, because any one-bit change to the TotalAHSLength field does
> that.  You might be able to make this less likely by using a rule that
> only some TotalAHSLength values are valid, but that doesn't change the
> outcome.  The values 0 and 2 are both legal, and these differ in only
> one bit.
>
> So Pat is right: given the encoding chosen, the Hamming distance is
> one.
>
> > ...
> > In addition the logic for putting the header digest at a fixed
> > position but including the AHS in the digest has the same flaw.
>
> That's true.  For example, if a single bit error changes the
> TotalAHSLength from 0 to 2, even if you put the CRC in a fixed place,
> you have just changed the bitstring it acts on by 64 bits.  That's
> longer than the burst error limit of CRC-32, so there is a non-zero
> probability of accepting such a damaged header as valid.
>
> > There are some radically different layouts - that may include a
> > framer and lengths protected by CRCs and followed by Data+Header
> > protected by a single CRC.  But we may want to leave those for
> > iSCSI-2 :-)
>
> That one would work.  (It's how DDCMP was done...)  And I agree,
> that's not a solution to be considered now.
>
>        paul
>
>



From owner-ips@ece.cmu.edu  Fri Mar  1 16:32:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA29748
	for <ips-archive@lists.ietf.org>; Fri, 1 Mar 2002 16:32:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21KTji09559
	for ips-outgoing; Fri, 1 Mar 2002 15:29:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21KThH09555
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 15:29:43 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPMX4>; Fri, 1 Mar 2002 15:29:33 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5685@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: RefCmdSN != CmdSN
Date: Fri, 1 Mar 2002 15:29:25 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

If the initiator must make them consistent, why does the spec have to
specify how the target uses them?

For example, the ITT could exist in one of the "out of sequence buckets".
Those buckets are indexed by the CmdSN (RefCmdSN in this case).

Now, in this case the ITT does exist but it would be silly for the target to
search the buckets for the ITT when it could just do a direct reference
using the RefCmdSN. That is why it is an implementation issue. (note, to the
target the ITT is not a pointer).

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 01, 2002 1:43 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: RefCmdSN != CmdSN


It isn't quite an implementation issue.  The spec *requires* 
the target to look at RefCmdSN - and that's only when the 
ITT doesn't point to a valid task.  

I believe we should have some text that specifies the target
is required to look at RefCmdSN.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747


----- Original Message ----- 
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Friday, March 01, 2002 6:22 AM
Subject: RE: iSCSI: RefCmdSN != CmdSN


> Yes, but I don't think the statement "Targets however must consider ..."
is
> necessary because the initiator must always make them consistent and it is
a
> target implementation issue as to which it actually uses.
> 
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Thursday, February 28, 2002 8:47 PM
> To: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> 
> Eddy,
> 
> I agree that targets don't have to check both always, only when it
> is needed.
> 
> The intended role of RefCmdSN is to help identify the right command
> when the command to be aborted had not arrived - the command
> could be lost due to digest errors or as part of connection failure.
> So I think the quoted text should be rephrased to:
> 
> Section 9.5.4
> For the ABORT TASK function, initiators MUST always set this to the
> CmdSN of the task identified by the Initiator Task Tag field.  Targets
> however
> must consider the field valid only when the task indicated by the
Initiator
> Task Tag field does not exist.
> 
> Section 9.6.1
> For the ABORT TASK function,
>     a) if the ITT identifies a valid task leading to a successful
> termination,
>         targets must return the "Function complete" response.
>     b)if the ITT does not identify an existing task but if the CmdSN
> indicated
>        by the RefCmdSN field in the task management function request is
> within
>        the valid CmdSN window, targets must consider the CmdSN received
>        and return the "Function complete" response.
>    c) if the ITT does not identify an existing task and if the CmdSN
> indicated
>        by the RefCmdSN field in the task management function request is
> outside
>        the valid CmdSN window, targets must return the "Task does not
exist"
> response.
> 
> Comments?
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Thursday, February 28, 2002 4:46 PM
> Subject: iSCSI: RefCmdSN != CmdSN
> 
> 
> > Is there a reason that this check is mandated? Is there a case where
this
> > can happen with bug free code?
> >
> >  If RefCmdSN does not match the CmdSN of the command to be aborted at
the
> >  target, the abort action MUST NOT be performed and the response MUST
> >  be 'function rejected'.
> >
> >
> > Eddy_Quicksall@iVivity.com
> >
> 


From owner-ips@ece.cmu.edu  Fri Mar  1 17:10:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA02907
	for <ips-archive@lists.ietf.org>; Fri, 1 Mar 2002 17:10:11 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21L9VP15078
	for ips-outgoing; Fri, 1 Mar 2002 16:09:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel8.hp.com (atlrel8.hp.com [156.153.255.206])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21L9TH15072
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 16:09:29 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel8.hp.com (Postfix) with ESMTP id 61BCFA00A92
	for <ips@ece.cmu.edu>; Fri,  1 Mar 2002 16:09:23 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id NAA29530 for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 13:11:03 -0800 (PST)
Message-ID: <009701c1c165$5bed4aa0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
References: <25369470B6F0D41194820002B328BDD22F5685@ATLOPS>
Subject: Re: iSCSI: RefCmdSN != CmdSN
Date: Fri, 1 Mar 2002 13:09:21 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> If the initiator must make them consistent, why does the spec have to
> specify how the target uses them?

You are correct, but it is only partially related to what I said -

" I believe we should have some text that specifies the target
  is required to look at RefCmdSN."

There is one case where the target must use RefCmdSN in one
way - to act on a command that it had not received, by plugging
the CmdSN slot.  This must be clear in the draft to prevent
incorrect target implementations.

You are discussing the other cases where the target may use 
RefCmdSN and suggesting relaxing the wording I proposed - 
that's fine with me.  I was only pointing out that it's not all 
implementation dependent.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747


----- Original Message ----- 
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Friday, March 01, 2002 12:29 PM
Subject: RE: iSCSI: RefCmdSN != CmdSN


> If the initiator must make them consistent, why does the spec have to
> specify how the target uses them?
> 
> For example, the ITT could exist in one of the "out of sequence buckets".
> Those buckets are indexed by the CmdSN (RefCmdSN in this case).
> 
> Now, in this case the ITT does exist but it would be silly for the target to
> search the buckets for the ITT when it could just do a direct reference
> using the RefCmdSN. That is why it is an implementation issue. (note, to the
> target the ITT is not a pointer).
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Friday, March 01, 2002 1:43 PM
> To: Eddy Quicksall
> Cc: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> 
> It isn't quite an implementation issue.  The spec *requires* 
> the target to look at RefCmdSN - and that's only when the 
> ITT doesn't point to a valid task.  
> 
> I believe we should have some text that specifies the target
> is required to look at RefCmdSN.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668 
> Roseville CA 95747
> 
> 
> ----- Original Message ----- 
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Friday, March 01, 2002 6:22 AM
> Subject: RE: iSCSI: RefCmdSN != CmdSN
> 
> 
> > Yes, but I don't think the statement "Targets however must consider ..."
> is
> > necessary because the initiator must always make them consistent and it is
> a
> > target implementation issue as to which it actually uses.
> > 
> > 
> > Eddy
> > 
> > -----Original Message-----
> > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > Sent: Thursday, February 28, 2002 8:47 PM
> > To: ips@ece. cmu. edu (E-mail)
> > Subject: Re: iSCSI: RefCmdSN != CmdSN
> > 
> > 
> > Eddy,
> > 
> > I agree that targets don't have to check both always, only when it
> > is needed.
> > 
> > The intended role of RefCmdSN is to help identify the right command
> > when the command to be aborted had not arrived - the command
> > could be lost due to digest errors or as part of connection failure.
> > So I think the quoted text should be rephrased to:
> > 
> > Section 9.5.4
> > For the ABORT TASK function, initiators MUST always set this to the
> > CmdSN of the task identified by the Initiator Task Tag field.  Targets
> > however
> > must consider the field valid only when the task indicated by the
> Initiator
> > Task Tag field does not exist.
> > 
> > Section 9.6.1
> > For the ABORT TASK function,
> >     a) if the ITT identifies a valid task leading to a successful
> > termination,
> >         targets must return the "Function complete" response.
> >     b)if the ITT does not identify an existing task but if the CmdSN
> > indicated
> >        by the RefCmdSN field in the task management function request is
> > within
> >        the valid CmdSN window, targets must consider the CmdSN received
> >        and return the "Function complete" response.
> >    c) if the ITT does not identify an existing task and if the CmdSN
> > indicated
> >        by the RefCmdSN field in the task management function request is
> > outside
> >        the valid CmdSN window, targets must return the "Task does not
> exist"
> > response.
> > 
> > Comments?
> > --
> > Mallikarjun
> > 
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> > 
> > ----- Original Message -----
> > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > Sent: Thursday, February 28, 2002 4:46 PM
> > Subject: iSCSI: RefCmdSN != CmdSN
> > 
> > 
> > > Is there a reason that this check is mandated? Is there a case where
> this
> > > can happen with bug free code?
> > >
> > >  If RefCmdSN does not match the CmdSN of the command to be aborted at
> the
> > >  target, the abort action MUST NOT be performed and the response MUST
> > >  be 'function rejected'.
> > >
> > >
> > > Eddy_Quicksall@iVivity.com
> > >
> > 
> 


From owner-ips@ece.cmu.edu  Fri Mar  1 18:39:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06380
	for <ips-archive@lists.ietf.org>; Fri, 1 Mar 2002 18:39:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g21McbG21943
	for ips-outgoing; Fri, 1 Mar 2002 17:38:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g21McYH21934
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 17:38:34 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPMZ7>; Fri, 1 Mar 2002 17:38:34 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5693@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>,
        "ips@ece. cmu. edu (E-mail)"
	 <ips@ece.cmu.edu>
Subject: RE: iSCSI: RefCmdSN != CmdSN
Date: Fri, 1 Mar 2002 17:38:31 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Based on that, may I suggest this wording?

Section 9.5.4
For the ABORT TASK function, initiators MUST always set this to the
CmdSN of the task identified by the Initiator Task Tag field.  Targets 
use this field when the command has not yet arrived. Otherwise the
target has the option of using either RefCmdSN or Initiator Task Tag
to locate the command.

That way, you are not mandating the implementation.

--snip for backward reference--
>Targets however
>must consider the field valid only when the task indicated by the Initiator
>Task Tag field does not exist.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 01, 2002 4:09 PM
To: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: RefCmdSN != CmdSN


> If the initiator must make them consistent, why does the spec have to
> specify how the target uses them?

You are correct, but it is only partially related to what I said -

" I believe we should have some text that specifies the target
  is required to look at RefCmdSN."

There is one case where the target must use RefCmdSN in one
way - to act on a command that it had not received, by plugging
the CmdSN slot.  This must be clear in the draft to prevent
incorrect target implementations.

You are discussing the other cases where the target may use 
RefCmdSN and suggesting relaxing the wording I proposed - 
that's fine with me.  I was only pointing out that it's not all 
implementation dependent.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747


----- Original Message ----- 
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Friday, March 01, 2002 12:29 PM
Subject: RE: iSCSI: RefCmdSN != CmdSN


> If the initiator must make them consistent, why does the spec have to
> specify how the target uses them?
> 
> For example, the ITT could exist in one of the "out of sequence buckets".
> Those buckets are indexed by the CmdSN (RefCmdSN in this case).
> 
> Now, in this case the ITT does exist but it would be silly for the target
to
> search the buckets for the ITT when it could just do a direct reference
> using the RefCmdSN. That is why it is an implementation issue. (note, to
the
> target the ITT is not a pointer).
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Friday, March 01, 2002 1:43 PM
> To: Eddy Quicksall
> Cc: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> 
> It isn't quite an implementation issue.  The spec *requires* 
> the target to look at RefCmdSN - and that's only when the 
> ITT doesn't point to a valid task.  
> 
> I believe we should have some text that specifies the target
> is required to look at RefCmdSN.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668 
> Roseville CA 95747
> 
> 
> ----- Original Message ----- 
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Friday, March 01, 2002 6:22 AM
> Subject: RE: iSCSI: RefCmdSN != CmdSN
> 
> 
> > Yes, but I don't think the statement "Targets however must consider ..."
> is
> > necessary because the initiator must always make them consistent and it
is
> a
> > target implementation issue as to which it actually uses.
> > 
> > 
> > Eddy
> > 
> > -----Original Message-----
> > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > Sent: Thursday, February 28, 2002 8:47 PM
> > To: ips@ece. cmu. edu (E-mail)
> > Subject: Re: iSCSI: RefCmdSN != CmdSN
> > 
> > 
> > Eddy,
> > 
> > I agree that targets don't have to check both always, only when it
> > is needed.
> > 
> > The intended role of RefCmdSN is to help identify the right command
> > when the command to be aborted had not arrived - the command
> > could be lost due to digest errors or as part of connection failure.
> > So I think the quoted text should be rephrased to:
> > 
> > Section 9.5.4
> > For the ABORT TASK function, initiators MUST always set this to the
> > CmdSN of the task identified by the Initiator Task Tag field.  Targets
> > however
> > must consider the field valid only when the task indicated by the
> Initiator
> > Task Tag field does not exist.
> > 
> > Section 9.6.1
> > For the ABORT TASK function,
> >     a) if the ITT identifies a valid task leading to a successful
> > termination,
> >         targets must return the "Function complete" response.
> >     b)if the ITT does not identify an existing task but if the CmdSN
> > indicated
> >        by the RefCmdSN field in the task management function request is
> > within
> >        the valid CmdSN window, targets must consider the CmdSN received
> >        and return the "Function complete" response.
> >    c) if the ITT does not identify an existing task and if the CmdSN
> > indicated
> >        by the RefCmdSN field in the task management function request is
> > outside
> >        the valid CmdSN window, targets must return the "Task does not
> exist"
> > response.
> > 
> > Comments?
> > --
> > Mallikarjun
> > 
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> > 
> > ----- Original Message -----
> > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > Sent: Thursday, February 28, 2002 4:46 PM
> > Subject: iSCSI: RefCmdSN != CmdSN
> > 
> > 
> > > Is there a reason that this check is mandated? Is there a case where
> this
> > > can happen with bug free code?
> > >
> > >  If RefCmdSN does not match the CmdSN of the command to be aborted at
> the
> > >  target, the abort action MUST NOT be performed and the response MUST
> > >  be 'function rejected'.
> > >
> > >
> > > Eddy_Quicksall@iVivity.com
> > >
> > 
> 


From owner-ips@ece.cmu.edu  Fri Mar  1 21:59:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA12074
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 21:59:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g221xfO04287
	for ips-outgoing; Fri, 1 Mar 2002 20:59:41 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g221xdH04281
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 20:59:39 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id F0D13400854; Fri,  1 Mar 2002 17:59:33 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id RAA18110;
	Fri, 1 Mar 2002 17:59:28 -0800 (PST)
Message-ID: <3C8032CE.8BACF77C@cup.hp.com>
Date: Fri, 01 Mar 2002 18:02:54 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Cc: T10 Reflector <t10@t10.org>
Subject: iscsi : changes involving tgt portal group tag.
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

All,

I believe iscsi needs to make 2 changes :

1) to mandate persistence of the portal group tag (and thus, persistence
of its scsi target port identifier). 

2) to send the portal group tag (scsi target port identifier) as a part
of the iscsi login request.


The rationale for (1) is :
--------------------------
SAM-2 requires scsi port names to be persistent and world-wide-unique.
(SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :

"A scsi port name shall never change and may be used to persistently
identify a scsi initiator port or target port...".

iscsi defines scsi target port name as :

iscsi target name + NULL delimiter + 't' + NULL	+ (0 - 3) bytes of NULL
padding + 2 byte portal group tag (in big endian format).

In order for the above scsi target port name to meet SAM-2's requirement
of being persistent, the portal group tag needs to be persistent.


The rationale for (2) is :
--------------------------
Consider an initiator node establishing multiple sessions to a scsi tgt
port, with each session established to a subset of the network portals
within the tgt portal group. 

Consider an iscsi transport event involving the re-configuration of
target portal groups on the iscsi target node. This may be preceeded by
the iscsi sessions seeing an async message "target requests logout",
followed by session logout, portal group re-configuration, and then, the
initiator re-establishes sessions.

Across a transport event that results in such session termination and
re-establishment, the initiator needs to authenticate that it is still
speaking to the same [i]scsi target port, in order to ensure that any
open/active I-T-L nexus traffic on that session is not incorrectly
routed to a wrong LUN after such a transport event.

Note that the session end-points in such sessions  are individual
network portals within a portal group (tgt port) and a target
re-configuration involving the moving of network portals from 1 portal
group to another can occur.

Following such a re-configuration, if an initiator were to re-establish
a session to the same session end-points, since there is no addressing
information carried in the iscsi login request which carries the target
port identifier, the session may be established to the same network
portal, but under a different scsi target port and the I-T-L nexus
traffic incorrectly routed to a different scsi tgt port, resulting in
potential data corruption.

Other session oriented SCSI transports like FCP and SRP address this
problem by defining authentication schemes as well and/or explicitly
carrying the target port identifier in their login requests, which allow
them to identify such an authentication mis-match.

To prevent such authentication issues, iscsi can send the iscsi target
port identifier (portal group tag) explicitly in the login request, and
the login can be rejected by the target on a portal group tag mis-match.
(if the network portal does not belong to the addressed portal group
tag).

Also, on any portal group re-configuration, iscsi targets MUST terminate
the session to avoid such scenarios as described above.

Comments ?

Regards,
Santosh




-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Fri Mar  1 22:32:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA13448
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 22:32:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g222igN06782
	for ips-outgoing; Fri, 1 Mar 2002 21:44:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel8.hp.com (atlrel8.hp.com [156.153.255.206])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g222ieH06777
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 21:44:40 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel8.hp.com (Postfix) with ESMTP id DC434A007E8
	for <ips@ece.cmu.edu>; Fri,  1 Mar 2002 21:44:34 -0500 (EST)
Received: from rose.hp.com (hpsil34.rose.hp.com [15.43.211.225]) by core.rose.hp.com with ESMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id SAA27621 for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 18:46:14 -0800 (PST)
Message-Id: <200203020246.SAA27621@core.rose.hp.com>
Date: Fri, 01 Mar 2002 18:59:13 -0800
From: "Mallikarjun C." <cbm@rose.hp.com>
Reply-To: cbm@rose.hp.com
Organization: Hewlett-Packard, Roseville
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.10.20 9000/715)
X-Accept-Language: en
MIME-Version: 1.0
To: ips <ips@ece.cmu.edu>
Subject: Re: iSCSI: RefCmdSN != CmdSN
References: <25369470B6F0D41194820002B328BDD22F5693@ATLOPS>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I would actually tweak it a little further - dropping "yet"
(since it wouldn't ever be received), adding more text to 
deal with a received and concluded task (RefCmdSN out of 
the valid CmdSN window), and also dropping the last sentence 
which is really describing the options (I don't mind adding
it in either...).

Section 9.5.4
 For the ABORT TASK function, initiators MUST always set this to the
 CmdSN of the task identified by the Initiator Task Tag field.  Targets
 must use this field as described in section 9.6.1 when the task 
 identified by the ITT field is not with the target. 


-- 
Mallikarjun 


Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
MS 5668	Hewlett-Packard, Roseville.
cbm@rose.hp.com


Eddy Quicksall wrote:
> 
> Based on that, may I suggest this wording?
> 
> Section 9.5.4
> For the ABORT TASK function, initiators MUST always set this to the
> CmdSN of the task identified by the Initiator Task Tag field.  Targets
> use this field when the command has not yet arrived. Otherwise the
> target has the option of using either RefCmdSN or Initiator Task Tag
> to locate the command.
> 
> That way, you are not mandating the implementation.
> 
> --snip for backward reference--
> >Targets however
> >must consider the field valid only when the task indicated by the Initiator
> >Task Tag field does not exist.
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Friday, March 01, 2002 4:09 PM
> To: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> > If the initiator must make them consistent, why does the spec have to
> > specify how the target uses them?
> 
> You are correct, but it is only partially related to what I said -
> 
> " I believe we should have some text that specifies the target
>   is required to look at RefCmdSN."
> 
> There is one case where the target must use RefCmdSN in one
> way - to act on a command that it had not received, by plugging
> the CmdSN slot.  This must be clear in the draft to prevent
> incorrect target implementations.
> 
> You are discussing the other cases where the target may use
> RefCmdSN and suggesting relaxing the wording I proposed -
> that's fine with me.  I was only pointing out that it's not all
> implementation dependent.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Friday, March 01, 2002 12:29 PM
> Subject: RE: iSCSI: RefCmdSN != CmdSN
> 
> > If the initiator must make them consistent, why does the spec have to
> > specify how the target uses them?
> >
> > For example, the ITT could exist in one of the "out of sequence buckets".
> > Those buckets are indexed by the CmdSN (RefCmdSN in this case).
> >
> > Now, in this case the ITT does exist but it would be silly for the target
> to
> > search the buckets for the ITT when it could just do a direct reference
> > using the RefCmdSN. That is why it is an implementation issue. (note, to
> the
> > target the ITT is not a pointer).
> >
> > Eddy
> >
> > -----Original Message-----
> > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > Sent: Friday, March 01, 2002 1:43 PM
> > To: Eddy Quicksall
> > Cc: ips@ece. cmu. edu (E-mail)
> > Subject: Re: iSCSI: RefCmdSN != CmdSN
> >
> >
> > It isn't quite an implementation issue.  The spec *requires*
> > the target to look at RefCmdSN - and that's only when the
> > ITT doesn't point to a valid task.
> >
> > I believe we should have some text that specifies the target
> > is required to look at RefCmdSN.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> >
> > ----- Original Message -----
> > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > Sent: Friday, March 01, 2002 6:22 AM
> > Subject: RE: iSCSI: RefCmdSN != CmdSN
> >
> >
> > > Yes, but I don't think the statement "Targets however must consider ..."
> > is
> > > necessary because the initiator must always make them consistent and it
> is
> > a
> > > target implementation issue as to which it actually uses.
> > >
> > >
> > > Eddy
> > >
> > > -----Original Message-----
> > > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > > Sent: Thursday, February 28, 2002 8:47 PM
> > > To: ips@ece. cmu. edu (E-mail)
> > > Subject: Re: iSCSI: RefCmdSN != CmdSN
> > >
> > >
> > > Eddy,
> > >
> > > I agree that targets don't have to check both always, only when it
> > > is needed.
> > >
> > > The intended role of RefCmdSN is to help identify the right command
> > > when the command to be aborted had not arrived - the command
> > > could be lost due to digest errors or as part of connection failure.
> > > So I think the quoted text should be rephrased to:
> > >
> > > Section 9.5.4
> > > For the ABORT TASK function, initiators MUST always set this to the
> > > CmdSN of the task identified by the Initiator Task Tag field.  Targets
> > > however
> > > must consider the field valid only when the task indicated by the
> > Initiator
> > > Task Tag field does not exist.
> > >
> > > Section 9.6.1
> > > For the ABORT TASK function,
> > >     a) if the ITT identifies a valid task leading to a successful
> > > termination,
> > >         targets must return the "Function complete" response.
> > >     b)if the ITT does not identify an existing task but if the CmdSN
> > > indicated
> > >        by the RefCmdSN field in the task management function request is
> > > within
> > >        the valid CmdSN window, targets must consider the CmdSN received
> > >        and return the "Function complete" response.
> > >    c) if the ITT does not identify an existing task and if the CmdSN
> > > indicated
> > >        by the RefCmdSN field in the task management function request is
> > > outside
> > >        the valid CmdSN window, targets must return the "Task does not
> > exist"
> > > response.
> > >
> > > Comments?
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > > To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > > Sent: Thursday, February 28, 2002 4:46 PM
> > > Subject: iSCSI: RefCmdSN != CmdSN
> > >
> > >
> > > > Is there a reason that this check is mandated? Is there a case where
> > this
> > > > can happen with bug free code?
> > > >
> > > >  If RefCmdSN does not match the CmdSN of the command to be aborted at
> > the
> > > >  target, the abort action MUST NOT be performed and the response MUST
> > > >  be 'function rejected'.
> > > >
> > > >
> > > > Eddy_Quicksall@iVivity.com
> > > >
> > >
> >


From owner-ips@ece.cmu.edu  Fri Mar  1 23:23:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA14314
	for <ips-archive@odin.ietf.org>; Fri, 1 Mar 2002 23:23:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g223cgJ09654
	for ips-outgoing; Fri, 1 Mar 2002 22:38:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from siaar2ab.compuserve.com (siaar2ab.compuserve.com [149.174.40.138])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g223ceH09649
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 22:38:40 -0500 (EST)
Received: (from mailgate@localhost)
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) id WAA11505
	for ips@ece.cmu.edu; Fri, 1 Mar 2002 22:38:34 -0500 (EST)
Received: from compuserve.com (dal-tgn-tvm-vty9.as.wcom.net [206.175.227.9])
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) with ESMTP id WAA11494
	for <ips@ece.cmu.edu>; Fri, 1 Mar 2002 22:38:27 -0500 (EST)
Message-ID: <3C804A7C.EDA10881@compuserve.com>
Date: Fri, 01 Mar 2002 21:43:56 -0600
From: Ralph Weber <ralphoweber@compuserve.com>
Reply-To: roweber@acm.org
X-Mailer: Mozilla 4.7 [en]C-CCK-MCD NSCPCD47  (Win95; I)
X-Accept-Language: en,pdf
MIME-Version: 1.0
CC: ips@ece.cmu.edu
Subject: Re: Huntington Beach DRAFT minutes
References: <277DD60FB639D511AC0400B0D068B71E029374F7@CORPMX14>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I cannot find in these minutes any mention of the
presentation on the SRP Patents given by David Black.

FYI

Ralph...





From owner-ips@ece.cmu.edu  Sat Mar  2 01:19:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA17048
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 01:19:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g225Y6015634
	for ips-outgoing; Sat, 2 Mar 2002 00:34:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail04.ztx.compaq.com (ztxmail04.ztx.compaq.com [161.114.1.208])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g225Y4H15629
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 00:34:04 -0500 (EST)
Received: from cceexg13.americas.cpqcorp.net (cceexg13.americas.cpqcorp.net [16.110.250.119])
	by ztxmail04.ztx.compaq.com (Postfix) with ESMTP
	id 742AC38C9; Fri,  1 Mar 2002 23:33:58 -0600 (CST)
Received: from cceexc18.americas.cpqcorp.net ([16.110.250.64]) by cceexg13.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Fri, 1 Mar 2002 23:33:58 -0600
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: RE: sector alignment for DataOut PDUs?
Date: Fri, 1 Mar 2002 23:33:57 -0600
Message-ID: <31891B757C09184BBFEC5275F85D5595104E44@cceexc18.americas.cpqcorp.net>
Thread-Topic: sector alignment for DataOut PDUs?
Thread-Index: AcHBRGJIArgWLLUXQL6+JOiOScawXgAXEkyg
From: "Martin, Nick" <Nick.Martin@compaq.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <ips@ece.cmu.edu>
X-OriginalArrivalTime: 02 Mar 2002 05:33:58.0172 (UTC) FILETIME=[D9DBE5C0:01C1C1AB]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g225Y4H15630
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Paul,

Yes, it makes sense to select other values to have the same alignment, and most implementations would do so anyway.  I think all of the currently specified values limiting data size are likely (not required) to be powers of 2 from 2**9 (512) to 2**18 (256K).  I don't think anything breaks if they are not multiples of DataPDUAlignment which is likely (not required) to be a power of 2 from 2**0 (1) to 16 (64K).  If we make that a requirement and an something does not follow it, then what?  Do we want to get into specifying those kind of error cases?  I think this falls under "be conservative in what you send and liberal in what you accept" common sense rules.  If it does not break anything, why enforce it?  The benefits of doing it are clear enough.  

I thought about having DataPDUAlignment just specify the power of 2 (range 0 to 23), but I don't think restricting it in this way is called for.  It could make the length calculations slightly more efficient, but that just doesn't seem very important to me.

We will get into trouble of some of the other limits are less than DataPDULength because the only integer multiple allowed would be 0, potentially causing an infinite sequence of 0 length PDU payloads.  I will study how to correct this.

Thanks,
Nick
-----Original Message-----
From: Paul Koning [mailto:ni1d@arrl.net]
Sent: Friday, March 01, 2002 11:13 AM
To: Martin, Nick
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?


I like the way you've filled in the details on this.

It would make sense for targets to negotiate burst size limits, and
send requested length in R2T PDUs, that are multiples of the specified
DataPDUAlignment.  Is it necessary to specify that explicitly?  I
think it would make sense to do it, even though the current (rev 10 at
least) rules don't make it necessary).

       paul



From owner-ips@ece.cmu.edu  Sat Mar  2 04:09:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA26417
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 04:09:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g228IEe23818
	for ips-outgoing; Sat, 2 Mar 2002 03:18:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g228IDH23811
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 03:18:13 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id JAA48216;
	Sat, 2 Mar 2002 09:18:04 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g228JnR41920;
	Sat, 2 Mar 2002 09:19:49 +0100
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu, pat_thaler@agilent.com
MIME-Version: 1.0
Subject: Re: iscsi: header digest issue
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFF59E2F52.9E61571E-ONC2256B70.002A8485@telaviv.ibm.com>
Date: Sat, 2 Mar 2002 10:19:56 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 02/03/2002 10:20:00,
	Serialize complete at 02/03/2002 10:20:00
Content-Type: multipart/alternative; boundary="=_alternative 002AAFCFC2256B70_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002AAFCFC2256B70_=
Content-Type: text/plain; charset="us-ascii"

the logit is bit more trickier - with 1 bit distance you will get to a 
WRONG CRC - Julo




Paul Koning <ni1d@arrl.net>
01-03-02 19:07

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     pat_thaler@agilent.com, ips@ece.cmu.edu
        Subject:        Re: iscsi: header digest issue

 

Excerpt of message (sent 1 March 2002) by Julian Satran:
> Pat,
> 
> We discussed several alternative formats including a separate protection 

> (parity) for the length fields.
> All where dropped. The probability of an undetected error of length 1 in 

> the header - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits. 


That's a true statement for CRC-32 for the case where you've correctly
identified where the CRC field is in the data.

If you use the wrong value for the length (and therefore the wrong
value for the position of the CRC) then you have a 2^-32 probability
of accepting the header as valid. 

So the question becomes: how big a change to the header is needed to
make you look for the CRC field in the wrong place?  The answer is one
bit, because any one-bit change to the TotalAHSLength field does
that.  You might be able to make this less likely by using a rule that
only some TotalAHSLength values are valid, but that doesn't change the
outcome.  The values 0 and 2 are both legal, and these differ in only
one bit. 

So Pat is right: given the encoding chosen, the Hamming distance is
one. 

> ...
> In addition the logic for putting the header digest at a fixed position 
> but including the AHS in the digest has the same flaw.

That's true.  For example, if a single bit error changes the
TotalAHSLength from 0 to 2, even if you put the CRC in a fixed place,
you have just changed the bitstring it acts on by 64 bits.  That's
longer than the burst error limit of CRC-32, so there is a non-zero
probability of accepting such a damaged header as valid. 

> There are some radically different layouts - that may include a framer 
and 
> lengths protected by CRCs and
> and followed by Data+Header protected by a single CRC.  But we may want 
to 
> leave those for iSCSI-2 :-)

That one would work.  (It's how DDCMP was done...)  And I agree,
that's not a solution to be considered now.

       paul




--=_alternative 002AAFCFC2256B70_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">the logit is bit more trickier - with 1 bit distance you will get to a WRONG CRC - Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Paul Koning &lt;ni1d@arrl.net&gt;</b></font>
<p><font size=1 face="sans-serif">01-03-02 19:07</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;pat_thaler@agilent.com, ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iscsi: header digest issue</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Excerpt of message (sent 1 March 2002) by Julian Satran:<br>
&gt; Pat,<br>
&gt; <br>
&gt; We discussed several alternative formats including a separate protection <br>
&gt; (parity) for the length fields.<br>
&gt; All where dropped. The probability of an undetected error of length 1 in <br>
&gt; the header - using a CRC32 is 0 and holds at 0 for bursts up to 31 bits. <br>
<br>
That's a true statement for CRC-32 for the case where you've correctly<br>
identified where the CRC field is in the data.<br>
<br>
If you use the wrong value for the length (and therefore the wrong<br>
value for the position of the CRC) then you have a 2^-32 probability<br>
of accepting the header as valid. &nbsp;<br>
<br>
So the question becomes: how big a change to the header is needed to<br>
make you look for the CRC field in the wrong place? &nbsp;The answer is one<br>
bit, because any one-bit change to the TotalAHSLength field does<br>
that. &nbsp;You might be able to make this less likely by using a rule that<br>
only some TotalAHSLength values are valid, but that doesn't change the<br>
outcome. &nbsp;The values 0 and 2 are both legal, and these differ in only<br>
one bit. <br>
<br>
So Pat is right: given the encoding chosen, the Hamming distance is<br>
one. &nbsp;<br>
<br>
&gt; ...<br>
&gt; In addition the logic for putting the header digest at a fixed position <br>
&gt; but including the AHS in the digest has the same flaw.<br>
<br>
That's true. &nbsp;For example, if a single bit error changes the<br>
TotalAHSLength from 0 to 2, even if you put the CRC in a fixed place,<br>
you have just changed the bitstring it acts on by 64 bits. &nbsp;That's<br>
longer than the burst error limit of CRC-32, so there is a non-zero<br>
probability of accepting such a damaged header as valid. &nbsp;<br>
<br>
&gt; There are some radically different layouts - that may include a framer and <br>
&gt; lengths protected by CRCs and<br>
&gt; and followed by Data+Header protected by a single CRC. &nbsp;But we may want to <br>
&gt; leave those for iSCSI-2 :-)<br>
<br>
That one would work. &nbsp;(It's how DDCMP was done...) &nbsp;And I agree,<br>
that's not a solution to be considered now.<br>
<br>
 &nbsp; &nbsp; &nbsp; paul<br>
<br>
</font>
<br>
<br>
--=_alternative 002AAFCFC2256B70_=--


From owner-ips@ece.cmu.edu  Sat Mar  2 05:33:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27229
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 05:33:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g229ei608391
	for ips-outgoing; Sat, 2 Mar 2002 04:40:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g229efH08386
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 04:40:42 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id KAA05328
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 10:40:35 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g229gV910032
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 10:42:31 +0100
Subject: iSCSI - 11 - wrong appendix
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF10A64FCA.16DA22E3-ONC2256B70.003451C3@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Sat, 2 Mar 2002 11:36:07 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 02/03/2002 11:42:32
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear colleagues,

Due to a mechanical mistake the Clearing Effects Appendix was the correct
one in the text file and the older (10-94) one in the pdf file.

I have corrected the file on my site but I will have to wait to see what is
getting to the I-D site.

Sorry for the inconvenience.

Julo



From owner-ips@ece.cmu.edu  Sat Mar  2 10:02:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA01305
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 10:02:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g22E3ne21460
	for ips-outgoing; Sat, 2 Mar 2002 09:03:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g22E3lH21454
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 09:03:47 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPM7Z>; Sat, 2 Mar 2002 09:03:46 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F569C@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: cbm@rose.hp.com, ips <ips@ece.cmu.edu>
Subject: RE: iSCSI: RefCmdSN != CmdSN
Date: Sat, 2 Mar 2002 09:03:36 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

That sounds good. 

Eddy 

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 01, 2002 9:59 PM
To: ips
Subject: Re: iSCSI: RefCmdSN != CmdSN


I would actually tweak it a little further - dropping "yet"
(since it wouldn't ever be received), adding more text to 
deal with a received and concluded task (RefCmdSN out of 
the valid CmdSN window), and also dropping the last sentence 
which is really describing the options (I don't mind adding
it in either...).

Section 9.5.4
 For the ABORT TASK function, initiators MUST always set this to the
 CmdSN of the task identified by the Initiator Task Tag field.  Targets
 must use this field as described in section 9.6.1 when the task 
 identified by the ITT field is not with the target. 


-- 
Mallikarjun 


Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
MS 5668	Hewlett-Packard, Roseville.
cbm@rose.hp.com


Eddy Quicksall wrote:
> 
> Based on that, may I suggest this wording?
> 
> Section 9.5.4
> For the ABORT TASK function, initiators MUST always set this to the
> CmdSN of the task identified by the Initiator Task Tag field.  Targets
> use this field when the command has not yet arrived. Otherwise the
> target has the option of using either RefCmdSN or Initiator Task Tag
> to locate the command.
> 
> That way, you are not mandating the implementation.
> 
> --snip for backward reference--
> >Targets however
> >must consider the field valid only when the task indicated by the
Initiator
> >Task Tag field does not exist.
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Friday, March 01, 2002 4:09 PM
> To: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: RefCmdSN != CmdSN
> 
> > If the initiator must make them consistent, why does the spec have to
> > specify how the target uses them?
> 
> You are correct, but it is only partially related to what I said -
> 
> " I believe we should have some text that specifies the target
>   is required to look at RefCmdSN."
> 
> There is one case where the target must use RefCmdSN in one
> way - to act on a command that it had not received, by plugging
> the CmdSN slot.  This must be clear in the draft to prevent
> incorrect target implementations.
> 
> You are discussing the other cases where the target may use
> RefCmdSN and suggesting relaxing the wording I proposed -
> that's fine with me.  I was only pointing out that it's not all
> implementation dependent.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> Sent: Friday, March 01, 2002 12:29 PM
> Subject: RE: iSCSI: RefCmdSN != CmdSN
> 
> > If the initiator must make them consistent, why does the spec have to
> > specify how the target uses them?
> >
> > For example, the ITT could exist in one of the "out of sequence
buckets".
> > Those buckets are indexed by the CmdSN (RefCmdSN in this case).
> >
> > Now, in this case the ITT does exist but it would be silly for the
target
> to
> > search the buckets for the ITT when it could just do a direct reference
> > using the RefCmdSN. That is why it is an implementation issue. (note, to
> the
> > target the ITT is not a pointer).
> >
> > Eddy
> >
> > -----Original Message-----
> > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > Sent: Friday, March 01, 2002 1:43 PM
> > To: Eddy Quicksall
> > Cc: ips@ece. cmu. edu (E-mail)
> > Subject: Re: iSCSI: RefCmdSN != CmdSN
> >
> >
> > It isn't quite an implementation issue.  The spec *requires*
> > the target to look at RefCmdSN - and that's only when the
> > ITT doesn't point to a valid task.
> >
> > I believe we should have some text that specifies the target
> > is required to look at RefCmdSN.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> >
> > ----- Original Message -----
> > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > Sent: Friday, March 01, 2002 6:22 AM
> > Subject: RE: iSCSI: RefCmdSN != CmdSN
> >
> >
> > > Yes, but I don't think the statement "Targets however must consider
..."
> > is
> > > necessary because the initiator must always make them consistent and
it
> is
> > a
> > > target implementation issue as to which it actually uses.
> > >
> > >
> > > Eddy
> > >
> > > -----Original Message-----
> > > From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> > > Sent: Thursday, February 28, 2002 8:47 PM
> > > To: ips@ece. cmu. edu (E-mail)
> > > Subject: Re: iSCSI: RefCmdSN != CmdSN
> > >
> > >
> > > Eddy,
> > >
> > > I agree that targets don't have to check both always, only when it
> > > is needed.
> > >
> > > The intended role of RefCmdSN is to help identify the right command
> > > when the command to be aborted had not arrived - the command
> > > could be lost due to digest errors or as part of connection failure.
> > > So I think the quoted text should be rephrased to:
> > >
> > > Section 9.5.4
> > > For the ABORT TASK function, initiators MUST always set this to the
> > > CmdSN of the task identified by the Initiator Task Tag field.  Targets
> > > however
> > > must consider the field valid only when the task indicated by the
> > Initiator
> > > Task Tag field does not exist.
> > >
> > > Section 9.6.1
> > > For the ABORT TASK function,
> > >     a) if the ITT identifies a valid task leading to a successful
> > > termination,
> > >         targets must return the "Function complete" response.
> > >     b)if the ITT does not identify an existing task but if the CmdSN
> > > indicated
> > >        by the RefCmdSN field in the task management function request
is
> > > within
> > >        the valid CmdSN window, targets must consider the CmdSN
received
> > >        and return the "Function complete" response.
> > >    c) if the ITT does not identify an existing task and if the CmdSN
> > > indicated
> > >        by the RefCmdSN field in the task management function request
is
> > > outside
> > >        the valid CmdSN window, targets must return the "Task does not
> > exist"
> > > response.
> > >
> > > Comments?
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
> > > To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
> > > Sent: Thursday, February 28, 2002 4:46 PM
> > > Subject: iSCSI: RefCmdSN != CmdSN
> > >
> > >
> > > > Is there a reason that this check is mandated? Is there a case where
> > this
> > > > can happen with bug free code?
> > > >
> > > >  If RefCmdSN does not match the CmdSN of the command to be aborted
at
> > the
> > > >  target, the abort action MUST NOT be performed and the response
MUST
> > > >  be 'function rejected'.
> > > >
> > > >
> > > > Eddy_Quicksall@iVivity.com
> > > >
> > >
> >


From owner-ips@ece.cmu.edu  Sat Mar  2 12:20:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA02633
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 12:20:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g22GJvF28411
	for ips-outgoing; Sat, 2 Mar 2002 11:19:57 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g22GJtH28407
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 11:19:55 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id RAA03078
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 17:19:48 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO v5.01) with ESMTP id g22GLj931124
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 17:21:45 +0100
Subject: new text file
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF90AA5898.61362E41-ONC2256B70.005942AF@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Sat, 2 Mar 2002 18:18:07 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 02/03/2002 18:21:46
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear colleagues,

Thanks to Luben Tuikov that pointed out to me the Xpdf tool we have now a
decent text file
derived of the pdf (and thus guaranteed to be identical :-)). It has a toc
and the same pagination as the
pdf file.

Julo



From owner-ips@ece.cmu.edu  Sat Mar  2 18:36:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06374
	for <ips-archive@odin.ietf.org>; Sat, 2 Mar 2002 18:36:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g22Mf0U18633
	for ips-outgoing; Sat, 2 Mar 2002 17:41:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g22MexH18629
	for <ips@ece.cmu.edu>; Sat, 2 Mar 2002 17:40:59 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <ZRAXB432>; Sat, 2 Mar 2002 17:35:16 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937536@CORPMX14>
From: Black_David@emc.com
To: roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: RE: Huntington Beach DRAFT minutes
Date: Sat, 2 Mar 2002 17:40:41 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> I cannot find in these minutes any mention of the
> presentation on the SRP Patents given by David Black.

Indeed it is missing.  Here's the summary I propose to add:

-- SRP Intellectual Property Rights (David Black)

See David's slides for details (contents have been posted to the list).
Lucent
has broken their promise to tell the IETF whether the EKE patents are
related to
SRP.  Phoenix statement on whether the SPEKE patent relates to SRP is
expected
prior to Minneapolis.  Tom Wu (inventor of SRP, author of RFC 2945) attended
the meeting and said that it is Stanford University's position (Tom invented
SRP while at Stanford) that no patent rights other than Stanford's (for
which
a free license is available on the web) are required for use of SRP.
Requirement level (MUST/SHOULD/MAY) for SRP in iSCSI will be taken up in
Minneapolis.

Thanks,
--David

 


From owner-ips@ece.cmu.edu  Sun Mar  3 14:53:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28957
	for <ips-archive@lists.ietf.org>; Sun, 3 Mar 2002 14:53:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g23J11a01044
	for ips-outgoing; Sun, 3 Mar 2002 14:01:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g23J0wH01034
	for <ips@ece.cmu.edu>; Sun, 3 Mar 2002 14:00:58 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g23J0q008586
	for <ips@ece.cmu.edu>; Sun, 3 Mar 2002 14:00:52 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g23J0pK08577;
	Sun, 3 Mar 2002 14:00:51 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g23J0mk01881;
	Sun, 3 Mar 2002 14:00:51 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15490.29411.16000.242423@gargle.gargle.HOWL>
Date: Sun, 3 Mar 2002 14:00:51 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu, pat_thaler@agilent.com
Subject: Re: iscsi: header digest issue
References: <OFF59E2F52.9E61571E-ONC2256B70.002A8485@telaviv.ibm.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 2 March 2002) by Julian Satran:
> the logit is bit more trickier - with 1 bit distance you will get to a 
> WRONG CRC - Julo

I don't see why that it so.  

If a bit error changes AHSLength from 0 to 2, the receiver will take
the header that was sent -- with its digest -- and process that PLUS
the next 8 bytes after the header through its CRC (because it thinks
the header is 8 bytes longer than what the sender intended).  That's a
64 bit error burst.  CRC-32 has the property that it will fail to
detect a 64 bit burst with probability roughly 2^-32.

Therefore, not all 1-bit errors will be detected.

I don't see what tricky logic can get you around this case, but if you
know of some, could you say what it is?

     paul



From owner-ips@ece.cmu.edu  Mon Mar  4 02:09:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13778
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 02:08:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g246Lx709165
	for ips-outgoing; Mon, 4 Mar 2002 01:21:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from osmtp1.electric.net (osmtp1.electric.net [216.129.90.28])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g246LwH09161
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 01:21:58 -0500 (EST)
Received: from [206.175.239.35] (helo=EGRodriguez)
	by osmtp1.electric.net with esmtp (Exim 3.22 #1)
	id 16hlr6-0007TR-04; Sun, 03 Mar 2002 22:21:54 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Cc: "David Black" <black_david@emc.com>, "Allison Mankin" <mankin@ISI.EDU>,
        "Scott Bradner" <sob@harvard.edu>, <t11_3@mail.t11.org>,
        "'Franco Travostino'" <travos@nortelnetworks.com>
Subject:  IPS-ALL:  WG LAST CALL -- iFCP (Deadline: 8am March 18)
Date: Mon, 4 Mar 2002 00:20:41 -0600
Message-ID: <000f01c1c344$b9fea3b0$23efafce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0010_01C1C312.6F6433B0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0010_01C1C312.6F6433B0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

All,

 

We would like to announce IPS Working Group Last call for the Fibre
Channel Frame Encapsulation Document.

 

Details:

 

Document:  iFCP - A Protocol for Internet Fibre Channel Storage
Networking

URL to TXT version:
<http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt>
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt         

URL to PDF version:
<http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf>
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf      

 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Charles Monia - cmonia@nishansystems.com

 

Please submit editorial comments directly to Charles, with copy to David
Black ( <mailto:black_david@emc.com> black_david@emc.com), Elizabeth
Rodriguez( <mailto:ElizabethRodriguez@ieee.org>
ElizabethRodriguez@ieee.org) and Franco Travostino(
<mailto:travos@nortelnetworks.com> travos@nortelnetworks.com) Submit
technical comments to the IPS mailing list ( <mailto:ips@ece.cmu.edu>
ips@ece.cmu.edu)

 

Editorial comments may be resolved directly by the editor of the
document, but any technical issues must be discussed on the IPS
reflector.

 

Thanks

 

Elizabeth Rodriguez & David Black

IPS co-chairs


------=_NextPart_000_0010_01C1C312.6F6433B0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.emailstyle17
	{font-family:Arial;
	color:windowtext;}
span.emailstyle18
	{font-family:Arial;
	color:navy;}
span.EmailStyle19
	{font-family:Arial;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>All,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We would like to announce IPS Working Group Last call =
for
the Fibre Channel Frame Encapsulation Document.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Details:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; iFCP - A Protocol for Internet Fibre =
Channel
Storage Networking</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt"><=
font
color=3Dblack><span =
style=3D'color:windowtext'>http://www.ietf.org/internet-drafts/draft-ietf=
-ips-ifcp-10.txt</span></font></a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf"><=
font
color=3Dblack><span =
style=3D'color:windowtext'>http://www.ietf.org/internet-drafts/draft-ietf=
-ips-ifcp-10.pdf</span></font></a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: Monday, March 18, =
2002, 8am
EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Charles Monia &#8211; =
cmonia@nishansystems.com</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Charles, =
with
copy to David Black (<a href=3D"mailto:black_david@emc.com"><font =
color=3Dblack><span
style=3D'color:windowtext'>black_david@emc.com</span></font></a>), =
Elizabeth
Rodriguez(<a href=3D"mailto:ElizabethRodriguez@ieee.org"><font =
color=3Dblack><span
style=3D'color:windowtext'>ElizabethRodriguez@ieee.org</span></font></a>)=
 and
Franco Travostino(<a href=3D"mailto:travos@nortelnetworks.com"><font =
color=3Dblack><span
style=3D'color:windowtext'>travos@nortelnetworks.com</span></font></a>) =
Submit
technical comments to the IPS mailing list (<a =
href=3D"mailto:ips@ece.cmu.edu"><font
color=3Dblack><span =
style=3D'color:windowtext'>ips@ece.cmu.edu</span></font></a>)</span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editorial comments may be resolved directly by the =
editor of
the document, but any technical issues must be discussed on the IPS =
reflector.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Elizabeth Rodriguez &amp; David =
Black</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chairs</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0010_01C1C312.6F6433B0--



From owner-ips@ece.cmu.edu  Mon Mar  4 02:09:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13781
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 02:08:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g246V8109642
	for ips-outgoing; Mon, 4 Mar 2002 01:31:08 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from osmtp1.electric.net (osmtp1.electric.net [216.129.90.28])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g246V6H09635
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 01:31:06 -0500 (EST)
Received: from [206.175.239.35] (helo=EGRodriguez)
	by osmtp1.electric.net with esmtp (Exim 3.22 #1)
	id 16hm00-0008Ka-04
	for ips@ece.cmu.edu; Sun, 03 Mar 2002 22:31:05 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Subject: IPS-ALL:  Last Call on documents; impact on other documents
Date: Mon, 4 Mar 2002 00:29:58 -0600
Message-ID: <001401c1c346$025a1670$23efafce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0015_01C1C313.B7BFA670"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0015_01C1C313.B7BFA670
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

All,

 

We have just announced last call on 3 documents - FC encapsulation, FCIP
and iFCP.
The deadline for all of these documents is 8am EST March 18.

This is a two week last call period, and the last call period will be
closed prior to the Minneapolis IETF meeting.

 

David and I, along with technical coordinators Murali Rajagopal (FCIP,
FC encaps) and Franco Travostino(iFCP, FC encaps) request that everyone
read the documents carefully and submit any comments against the
documents as soon as possible.

 

During the time of last call for these documents, work on other working
group documents, including security and iSCSI should continue.

As mentioned in the interim meeting, we will stagger WG last call for
the various documents.  It is anticipated that other documents will go
to working group last call shortly after this last call period is
completed.

 

Please direct any questions on the process to David or me, or to the IPS
reflector.

 

Thanks,

 

David Black & Elizabeth Rodriguez

IPS co-chairs

 

 

 


------=_NextPart_000_0015_01C1C313.B7BFA670
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>All,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We have just announced last call on 3 documents =
&#8211; FC encapsulation,
FCIP and iFCP.<br>
The deadline for all of these documents is </span></font><font
 size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>8am EST</span></font><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> March =
18.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>This is a two week last call period, and the last =
call
period will be closed prior to the Minneapolis IETF =
meeting.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>David and I, along with technical coordinators Murali
Rajagopal (FCIP, FC encaps) and Franco Travostino(iFCP, FC encaps) =
request that
everyone read the documents carefully and submit any comments against =
the
documents as soon as possible.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>During the time of last call for these documents, =
work on
other working group documents, including security and iSCSI should =
continue.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>As mentioned in the interim meeting, we will stagger =
WG last
call for the various documents.&nbsp; It is anticipated that other =
documents
will go to working group last call shortly after this last call period =
is
completed.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please direct any questions on the process to David =
or me,
or to the IPS reflector.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>David Black &amp; Elizabeth =
Rodriguez</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chairs</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0015_01C1C313.B7BFA670--



From owner-ips@ece.cmu.edu  Mon Mar  4 02:12:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA15771
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 02:11:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g246JsQ09020
	for ips-outgoing; Mon, 4 Mar 2002 01:19:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from osmtp1.electric.net (osmtp1.electric.net [216.129.90.28])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g246JrH09016
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 01:19:53 -0500 (EST)
Received: from [206.175.239.35] (helo=EGRodriguez)
	by osmtp1.electric.net with esmtp (Exim 3.22 #1)
	id 16hlp7-0007Gk-04; Sun, 03 Mar 2002 22:19:50 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Cc: "David Black" <black_david@emc.com>, "Allison Mankin" <mankin@ISI.EDU>,
        "Scott Bradner" <sob@harvard.edu>, <t11_3@mail.t11.org>,
        <muralir@cox.net>
Subject: IPS-ALL:  WG LAST CALL -- Fibre Channel Over TCP/IP (FCIP) (Deadline: 8am March 18)
Date: Mon, 4 Mar 2002 00:18:41 -0600
Message-ID: <000a01c1c344$70160bd0$23efafce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000B_01C1C312.257B9BD0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_000B_01C1C312.257B9BD0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

All,

 

We would like to announce IPS Working Group Last call for the Fibre
Channel Over TCP/IP (FCIP).

 

Details:

 

Document:  Fibre Channel Over TCP/IP (FCIP).

URL to TXT version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.txt


URL to PDF version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.pdf


 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Ralph Weber - roweber@acm.org

 

Please submit editorial comments directly to Ralph, with copy to David
Black (black_david@emc.com), Elizabeth
Rodriguez(ElizabethRodriguez@ieee.org)and Murali
Rajagopal(muralir@cox.net)

Submit technical comments to the IPS mailing list (ips@ece.cmu.edu)

 

Editorial comments may be resolved directly by the editor of the
document, but any technical issues must be discussed on the IPS
reflector.

 

Thanks

 

Elizabeth Rodriguez & David Black

IPS co-chairs


------=_NextPart_000_000B_01C1C312.257B9BD0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.emailstyle17
	{font-family:Arial;
	color:windowtext;}
span.emailstyle18
	{font-family:Arial;
	color:navy;}
span.emailstyle19
	{font-family:Arial;}
span.EmailStyle20
	{font-family:Arial;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>All,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We would like to announce IPS Working Group Last call =
for
the Fibre Channel Over TCP/IP (FCIP).</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Details:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; Fibre Channel Over TCP/IP =
(FCIP).</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <font color=3Dnavy><span =
style=3D'color:
navy'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09=
.txt">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.t=
xt</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <font color=3Dnavy><span =
style=3D'color:
navy'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09=
.pdf">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.p=
df</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: Monday, March 18, =
2002, 8am
EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Ralph Weber &#8211; <a =
href=3D"mailto:roweber@acm.org">roweber@acm.org</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Ralph, =
with
copy to David Black (<a =
href=3D"mailto:black_david@emc.com">black_david@emc.com</a>),
Elizabeth Rodriguez(<a =
href=3D"mailto:ElizabethRodriguez@ieee.org">ElizabethRodriguez@ieee.org</=
a>)and
Murali Rajagopal(muralir@cox.net)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit technical comments to the IPS mailing list (<a
href=3D"mailto:ips@ece.cmu.edu">ips@ece.cmu.edu</a>)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editorial comments may be resolved directly by the =
editor of
the document, but any technical issues must be discussed on the IPS =
reflector.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Elizabeth Rodriguez &amp; David =
Black</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chairs</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_000B_01C1C312.257B9BD0--



From owner-ips@ece.cmu.edu  Mon Mar  4 02:52:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA16626
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 02:52:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2472gV11270
	for ips-outgoing; Mon, 4 Mar 2002 02:02:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from osmtp1.electric.net (osmtp1.electric.net [216.129.90.28])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2472eH11265
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 02:02:41 -0500 (EST)
Received: from [206.175.239.35] (helo=EGRodriguez)
	by osmtp1.electric.net with esmtp (Exim 3.22 #1)
	id 16hmUY-000BPC-04; Sun, 03 Mar 2002 23:02:38 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Cc: "'David Black'" <black_david@emc.com>
Subject: IPS-ALL: Please do not resubmit documents to internet-drafts with the same document version number
Date: Mon, 4 Mar 2002 01:01:30 -0600
Message-ID: <002201c1c34a$6ae6ee80$23efafce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0023_01C1C318.204C7E80"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0023_01C1C318.204C7E80
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

All,

 

We have had a couple of incidents occur now in which someone has
submitted a draft to internet-drafts@ietf.org, and then discovered a
problem.

They have then turned around and resubmitted the draft with the same
version number.

 

Please, if you find a problem, DO NOT RESUBMIT WITH THE SAME NUMBER!

Go ahead and rev the draft and resubmit.  You can post a notice to IPS,
indicating the reason for the double jump in versions.

The Internet-drafts are processed in the order received, and they cannot
replace one version of the draft with another.

 

Thanks,

 

Elizabeth Rodriguez,

IPS co-chair


------=_NextPart_000_0023_01C1C318.204C7E80
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>All,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We have had a couple of incidents occur now in which =
someone
has submitted a draft to <a =
href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>,
and then discovered a problem.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>They have then turned around and resubmitted the =
draft with
the same version number.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please, if you find a problem, DO NOT RESUBMIT WITH =
THE SAME
NUMBER!</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Go ahead and rev the draft and resubmit.&nbsp; You =
can post
a notice to IPS, indicating the reason for the double jump in =
versions.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>The Internet-drafts are processed in the order =
received, and
they cannot replace one version of the draft with =
another.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Elizabeth Rodriguez,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chair</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0023_01C1C318.204C7E80--



From owner-ips@ece.cmu.edu  Mon Mar  4 03:07:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13779
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 02:08:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g246BMc08589
	for ips-outgoing; Mon, 4 Mar 2002 01:11:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from osmtp1.electric.net (osmtp1.electric.net [216.129.90.28])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g246BFH08577
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 01:11:20 -0500 (EST)
Received: from [206.175.239.35] (helo=EGRodriguez)
	by osmtp1.electric.net with esmtp (Exim 3.22 #1)
	id 16hlgh-0006Ne-04; Sun, 03 Mar 2002 22:11:10 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Cc: "David Black" <black_david@emc.com>, "Allison Mankin" <mankin@ISI.EDU>,
        "Scott Bradner" <sob@harvard.edu>, <t11_3@mail.t11.org>,
        "'Franco Travostino'" <travos@nortelnetworks.com>, <muralir@cox.net>
Subject: IPS-ALL:  WG LAST CALL -- FC Frame Encapsulation (Deadline: 8am March 18)
Date: Mon, 4 Mar 2002 00:09:52 -0600
Message-ID: <000501c1c343$3a4c5230$23efafce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0006_01C1C310.EFC431B0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0006_01C1C310.EFC431B0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

All,

 

We would like to announce IPS Working Group Last call for the Fibre
Channel Frame Encapsulation Document.

 

Details:

 

Document:  FC Frame Encapsulation

URL to TXT version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulation-06.tx
t

URL to PDF version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulation-06.pd
f

 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Ralph Weber - roweber@acm.org

 

Please submit editorial comments directly to Ralph, with copy to David
Black (black_david@emc.com), Elizabeth
Rodriguez(ElizabethRodriguez@ieee.org), Franco
Travostino(travos@nortelnetworks.com) and Murali
Rajagopal(muralir@cox.net)

Submit technical comments to the IPS mailing list (ips@ece.cmu.edu)

 

Editorial comments may be resolved directly by the editor of the
document, but any technical issues must be discussed on the IPS
reflector.

 

Thanks

 

Elizabeth Rodriguez & David Black

IPS co-chairs


------=_NextPart_000_0006_01C1C310.EFC431B0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>All,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We would like to announce IPS Working Group Last call =
for
the Fibre Channel Frame Encapsulation Document.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Details:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; FC Frame =
Encapsulation</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulatio=
n-06.txt">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulat=
ion-06.txt</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulatio=
n-06.pdf">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulat=
ion-06.pdf</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: </span></font><font =
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Monday, March 18,
 2002</span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>, </span></font><font size=3D2 face=3DArial><span
 style=3D'font-size:10.0pt;font-family:Arial'>8am EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Ralph Weber &#8211; <a =
href=3D"mailto:roweber@acm.org">roweber@acm.org</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Ralph, =
with
copy to David Black (<a =
href=3D"mailto:black_david@emc.com">black_david@emc.com</a>),
Elizabeth Rodriguez(<a =
href=3D"mailto:ElizabethRodriguez@ieee.org">ElizabethRodriguez@ieee.org</=
a>),
Franco Travostino(<a =
href=3D"mailto:travos@nortelnetworks.com">travos@nortelnetworks.com</a>)
and Murali Rajagopal(muralir@cox.net)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit technical comments to the IPS mailing list (<a
href=3D"mailto:ips@ece.cmu.edu">ips@ece.cmu.edu</a>)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editorial comments may be resolved directly by the =
editor of
the document, but any technical issues must be discussed on the IPS =
reflector.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Elizabeth Rodriguez &amp; David =
Black</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chairs</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_0006_01C1C310.EFC431B0--



From owner-ips@ece.cmu.edu  Mon Mar  4 09:21:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA25642
	for <ips-archive@lists.ietf.org>; Mon, 4 Mar 2002 09:21:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24DN3S11021
	for ips-outgoing; Mon, 4 Mar 2002 08:23:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24C4ZH06871
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 07:04:50 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA20237;
	Mon, 4 Mar 2002 07:04:32 -0500 (EST)
Message-Id: <200203041204.HAA20237@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-ifcp-10.txt,.pdf
Date: Mon, 04 Mar 2002 07:04:31 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: iFCP - A Protocol for Internet Fibre Channel Storage 
                          Networking
	Author(s)	: C. Monia et al.
	Filename	: draft-ietf-ips-ifcp-10.txt,.pdf
	Pages		: 98
	Date		: 01-Mar-02
	
This document specifies an architecture and gateway-to-gateway
protocol for the implementation of fibre channel fabric
functionality over an IP network. This functionality is provided
through TCP protocols for fibre channel frame transport and the
distributed fabric services specified by the fibre channel
standards. The architecture enables internetworking of fibre
channel devices through gateway-accessed regions having the fault
isolation properties of autonomous systems and the scalability of
the IP network.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-ifcp-10.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-ifcp-10.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020301134453.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-ifcp-10.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-ifcp-10.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020301134453.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Mon Mar  4 12:03:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA03210
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 12:03:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24GVVN25344
	for ips-outgoing; Mon, 4 Mar 2002 11:31:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24GVSH25333
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 11:31:28 -0500 (EST)
Received: from hq-ex-c2.brocade.com (hq-ex-c2 [192.168.126.35])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id IAA27434;
	Mon, 4 Mar 2002 08:31:06 -0800 (PST)
Received: by hq-ex-c2.brocade.com with Internet Mail Service (5.5.2653.19)
	id <FPFZYJ1Y>; Mon, 4 Mar 2002 07:29:15 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905DB00E4@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: Paul Koning <ni1d@arrl.net>, rsnively@Brocade.COM
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
Date: Mon, 4 Mar 2002 07:29:11 -0800 
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> > There has always been a feeling that it was nice to do things
> > on convenient boundaries, including memory page boundaries and
> > device physical block boundaries, but SCSI has long since 
> > elected to perform any operation on almost any boundary.  
> SCSI drives
> > and related operating systems have commonly used block sizes of 512
> > bytes and 520 bytes and less commonly of other values.  
> > 
> > The only requirement we were able to enforce in previous
> > SCSI protocols is that all but the last PDU of a transfer
> > were required to be on 4 byte boundaries.  We were also
> > able to enforce the maximum values and a requirement that
> > the transferred data count exactly match the requested byte
> > count.
> 
> I don't see that last point.  Certainly not for unsolicited data --
> and for R2T I can find no stated requirement to send exactly the
> requested count either.  Or did you mean the total for the entire
> operation as opposed to the individual bursts?
>  

I haven't reviewed all of iSCSI's rules with respect to this
particular issue.  There appears to be an assumption of 
non-congested processor-sized buffers that allow unsolicited
write data transfer.  That may be a convenient assumption for
some devices, but a problem for those that want more control
of their buffering.  In general, the requests for write data 
are part of the logical unit's write buffer management
and data striping management.  If you don't supply
exactly what is asked for, you foul up the buffer management of the
target, sometimes causing pathological performance problems.

> > I would strongly suggest that you not bother to enforce any
> > other boundary restrictions.
> > 
> > I believe Eddy was right when he asked:
> > 
> > 	Given that the TCP issues of reassembly 
> > 	are so much more complicated than
> > 	the concatenation issues necessary for 
> > 	target data alignment, is there
> > 	really a problem here?
> > 
> > My answer to him would be, no, there is not a problem.
> 
> I answered it before when Eddy said that, but I'll summarize it again:
> I'm not talking about a problem, I'm talking about an opportunity for
> simplifying the target and making it more efficient.
> 
> Given alignment, each iSCSI PDU that carries data can be sent to disk
> by itself, because it corresponds exactly to one or more disk blocks.
> Without alignment, doing writes when the data arrives is still
> possible, but it clearly adds complexity because PDU boundaries don't
> match disk block boundaries.
> 
> I made the proposal because it clearly helps the target and appears to
> add no significant burden on the initiator.  The feedback to date
> indicates that this is indeed the case.
> 
> Are you saying "I don't care one way or the other" or are you saying
> "I feel this is a bad idea because it creates problems you haven't
> thought of"?  I'm reading your comment as the former; if you meant the
> latter, could you elaborate?

I think I am saying that I care, and that it is an idea that
will trap you into limiting simplifications.  In general, the 
initiator's data flow engine has no knowledge of the logical 
unit's physical block structure.  In addition, the page structure
from which you are obtaining data in the host will usually have boundaries
that are unrelated to the logical unit's physical block structure.
While it is perfectly possible to align PDU's with blocks, it
requires SCSI ULP information to be forced in to the lower level
data transfer hardware.  This is a significant inconvenience and
will cost performance and/or complexity.  Note that the blocks
in a logical unit are not all required to be the same size, and in
tape drives and some optical devices are typically not the same size.

I still think it is best for the logical unit to ask for what it wants,
then expect to get it.  The logical unit is the only device in
the system that really knows what it needs and when it needs it.
That is one of the important SCSI principles, allowing the logical unit
to take over all the media dependent functions from the initiator
and the host programming.



From owner-ips@ece.cmu.edu  Mon Mar  4 12:04:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA03309
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 12:04:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24G6K623246
	for ips-outgoing; Mon, 4 Mar 2002 11:06:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24G1SH22823
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 11:01:28 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.us.ibm.com [9.99.140.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id KAA38490;
	Mon, 4 Mar 2002 10:57:57 -0500
Received: from d03nm041.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g24G1B5190684;
	Mon, 4 Mar 2002 09:01:11 -0700
Importance: Normal
Subject: Re: iscsi : changes involving tgt portal group tag.
To: Santosh Rao <santoshr@cup.hp.com>
Cc: ips@ece.cmu.edu, t10@t10.org
X-Mailer: Lotus Notes Release 5.0.3 (Intl) 21 March 2000
Message-ID: <OF322D6C13.61EDFAE8-ON88256B72.0056C70B@boulder.ibm.com>
From: "Jim Hafner" <hafner@almaden.ibm.com>
Date: Mon, 4 Mar 2002 08:01:00 -0800
X-MIMETrack: Serialize by Router on D03NM041/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/04/2002 08:01:11 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Santosh,

Some comments in line (the net is that I think you're right, but with a
slightly different reason in the first case).

Jim Hafner


Santosh Rao <santoshr@cup.hp.com>@t10.org on 03/01/2002 06:02:54 PM

Sent by:    owner-t10@t10.org


To:    IPS Reflector <ips@ece.cmu.edu>
cc:    T10 Reflector <t10@t10.org>
Subject:    iscsi : changes involving tgt portal group tag.



* From the T10 Reflector (t10@t10.org), posted by:
* Santosh Rao <santoshr@cup.hp.com>
*
All,

I believe iscsi needs to make 2 changes :

1) to mandate persistence of the portal group tag (and thus, persistence
of its scsi target port identifier).

2) to send the portal group tag (scsi target port identifier) as a part
of the iscsi login request.


The rationale for (1) is :
--------------------------
SAM-2 requires scsi port names to be persistent and world-wide-unique.
(SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :

"A scsi port name shall never change and may be used to persistently
identify a scsi initiator port or target port...".

iscsi defines scsi target port name as :

iscsi target name + NULL delimiter + 't' + NULL + (0 - 3) bytes of NULL
padding + 2 byte portal group tag (in big endian format).

In order for the above scsi target port name to meet SAM-2's requirement
of being persistent, the portal group tag needs to be persistent.

<JLH>
There are different ways that one can interpret this "persistent" rule. The
intent was that names shouldn't change over time when *identifying the same
object*.   What that means is that if the object changes (in any
discernable way), then the name should change.  So, the object can move to
a different piece of hardware, but it can still be named the same way.  If
the object changes, e.g., in this case, reconfigures as a different set of
network portals with different addressing elements, then I would think that
the name should change as well.   That's all the persistence one really
needs.

I'm not sure what that implies about your recommendation.  I don't see any
problem with it, either.
</JLH>

The rationale for (2) is :
--------------------------
Consider an initiator node establishing multiple sessions to a scsi tgt
port, with each session established to a subset of the network portals
within the tgt portal group.

Consider an iscsi transport event involving the re-configuration of
target portal groups on the iscsi target node. This may be preceeded by
the iscsi sessions seeing an async message "target requests logout",
followed by session logout, portal group re-configuration, and then, the
initiator re-establishes sessions.

Across a transport event that results in such session termination and
re-establishment, the initiator needs to authenticate that it is still
speaking to the same [i]scsi target port, in order to ensure that any
open/active I-T-L nexus traffic on that session is not incorrectly
routed to a wrong LUN after such a transport event.
<JLH>
Under these events, shouldn't all "open/active I_T_L traffic" have been
aborted, closed or otherwise ended?  So this shouldn't be an issue at all.

Note that the session end-points in such sessions  are individual
network portals within a portal group (tgt port) and a target
re-configuration involving the moving of network portals from 1 portal
group to another can occur.

Following such a re-configuration, if an initiator were to re-establish
a session to the same session end-points, since there is no addressing
information carried in the iscsi login request which carries the target
port identifier, the session may be established to the same network
portal, but under a different scsi target port and the I-T-L nexus
traffic incorrectly routed to a different scsi tgt port, resulting in
potential data corruption.

Other session oriented SCSI transports like FCP and SRP address this
problem by defining authentication schemes as well and/or explicitly
carrying the target port identifier in their login requests, which allow
them to identify such an authentication mis-match.

To prevent such authentication issues, iscsi can send the iscsi target
port identifier (portal group tag) explicitly in the login request, and
the login can be rejected by the target on a portal group tag mis-match.
(if the network portal does not belong to the addressed portal group
tag).
<JLH>
Did you mean for the initiator to send this TPGT?
</JLH>

Also, on any portal group re-configuration, iscsi targets MUST terminate
the session to avoid such scenarios as described above.
<JLH>
I would have thought that was implicit in the session logout.
</JLH>


Comments ?

<JLH>
Final comment:
I think you may have hit an odd corner case.  I think we need a rule that
says that (visibile) target port reconfiguration should involve new "names"
(either node or port). That such a reconfiguration should only occur after
all sessions have been dropped (with all the attendent clearing effects).
And that including the TPGT in the login with target reject if it isn't
correct should also be added.
</JLH>

Regards,
Santosh




--
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################
*
* For T10 Reflector information, send a message with
* 'info t10' (no quotes) in the message body to majordomo@t10.org




From owner-ips@ece.cmu.edu  Mon Mar  4 13:20:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA07611
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 13:20:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24HYOI00763
	for ips-outgoing; Mon, 4 Mar 2002 12:34:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas2.cos.agilent.com (msgbas2x.cos.agilent.com [192.25.240.37])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24HYMH00758
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 12:34:22 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas2.cos.agilent.com (Postfix) with ESMTP
	id BA7E41050; Mon,  4 Mar 2002 10:34:16 -0700 (MST)
Received: from axcsbh5.cos.agilent.com (axcsbh5.cos.agilent.com [130.29.152.150])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 4A159E9; Mon,  4 Mar 2002 10:34:16 -0700 (MST)
Received: from 130.29.152.150 by axcsbh5.cos.agilent.com (InterScan E-Mail VirusWall NT); Mon, 04 Mar 2002 10:34:16 -0700
Received: by axcsbh5.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <F49DVBTT>; Mon, 4 Mar 2002 10:34:15 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00A985117@axcs04.cos.agilent.com>
From: "THALER,PAT (A-Roseville,ex1)" <pat_thaler@agilent.com>
To: Robert Snively <rsnively@Brocade.COM>, Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
Date: Mon, 4 Mar 2002 10:34:07 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

All,

Putting in a requirement for sector alignment will make implementation of
bridges difficult. I've been looking through the Fibre Channel specs and I
cannot find any requirement that transfers be in block size multiples. If we
put a sector alignment requirement in, then bridges would have to buffer
data that arrived in a non-multiple until further data arrived to add to it.
They would also have to keep an accounting to know whether a transfer was
the last and therefore should be allowed to go even if it isn't a multiple
of block size. This would complicate bridging excessively.

Regards,
Pat

-----Original Message-----
From: Robert Snively [mailto:rsnively@Brocade.COM]
Sent: Monday, March 04, 2002 7:29 AM
To: Paul Koning; rsnively@Brocade.COM
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?


> > There has always been a feeling that it was nice to do things
> > on convenient boundaries, including memory page boundaries and
> > device physical block boundaries, but SCSI has long since 
> > elected to perform any operation on almost any boundary.  
> SCSI drives
> > and related operating systems have commonly used block sizes of 512
> > bytes and 520 bytes and less commonly of other values.  
> > 
> > The only requirement we were able to enforce in previous
> > SCSI protocols is that all but the last PDU of a transfer
> > were required to be on 4 byte boundaries.  We were also
> > able to enforce the maximum values and a requirement that
> > the transferred data count exactly match the requested byte
> > count.
> 
> I don't see that last point.  Certainly not for unsolicited data --
> and for R2T I can find no stated requirement to send exactly the
> requested count either.  Or did you mean the total for the entire
> operation as opposed to the individual bursts?
>  

I haven't reviewed all of iSCSI's rules with respect to this
particular issue.  There appears to be an assumption of 
non-congested processor-sized buffers that allow unsolicited
write data transfer.  That may be a convenient assumption for
some devices, but a problem for those that want more control
of their buffering.  In general, the requests for write data 
are part of the logical unit's write buffer management
and data striping management.  If you don't supply
exactly what is asked for, you foul up the buffer management of the
target, sometimes causing pathological performance problems.

> > I would strongly suggest that you not bother to enforce any
> > other boundary restrictions.
> > 
> > I believe Eddy was right when he asked:
> > 
> > 	Given that the TCP issues of reassembly 
> > 	are so much more complicated than
> > 	the concatenation issues necessary for 
> > 	target data alignment, is there
> > 	really a problem here?
> > 
> > My answer to him would be, no, there is not a problem.
> 
> I answered it before when Eddy said that, but I'll summarize it again:
> I'm not talking about a problem, I'm talking about an opportunity for
> simplifying the target and making it more efficient.
> 
> Given alignment, each iSCSI PDU that carries data can be sent to disk
> by itself, because it corresponds exactly to one or more disk blocks.
> Without alignment, doing writes when the data arrives is still
> possible, but it clearly adds complexity because PDU boundaries don't
> match disk block boundaries.
> 
> I made the proposal because it clearly helps the target and appears to
> add no significant burden on the initiator.  The feedback to date
> indicates that this is indeed the case.
> 
> Are you saying "I don't care one way or the other" or are you saying
> "I feel this is a bad idea because it creates problems you haven't
> thought of"?  I'm reading your comment as the former; if you meant the
> latter, could you elaborate?

I think I am saying that I care, and that it is an idea that
will trap you into limiting simplifications.  In general, the 
initiator's data flow engine has no knowledge of the logical 
unit's physical block structure.  In addition, the page structure
from which you are obtaining data in the host will usually have boundaries
that are unrelated to the logical unit's physical block structure.
While it is perfectly possible to align PDU's with blocks, it
requires SCSI ULP information to be forced in to the lower level
data transfer hardware.  This is a significant inconvenience and
will cost performance and/or complexity.  Note that the blocks
in a logical unit are not all required to be the same size, and in
tape drives and some optical devices are typically not the same size.

I still think it is best for the logical unit to ask for what it wants,
then expect to get it.  The logical unit is the only device in
the system that really knows what it needs and when it needs it.
That is one of the important SCSI principles, allowing the logical unit
to take over all the media dependent functions from the initiator
and the host programming.


From owner-ips@ece.cmu.edu  Mon Mar  4 14:27:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15498
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 14:27:04 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24J7T908601
	for ips-outgoing; Mon, 4 Mar 2002 14:07:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g24J7NH08586
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 14:07:23 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g24J79016230
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 14:07:09 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g24J77K16221;
	Mon, 4 Mar 2002 14:07:07 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g24J77T08353;
	Mon, 4 Mar 2002 14:07:07 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15491.50650.994657.976553@pkoning.dev.equallogic.com>
Date: Mon, 4 Mar 2002 14:07:06 -0500
From: Paul Koning <ni1d@arrl.net>
To: rsnively@Brocade.COM
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
References: <FFD40DB4943CD411876500508BAD027905DB00E4@sj5-ex2.brocade.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Robert" == Robert Snively <rsnively@brocade.com> writes:

 >> > There has always been a feeling that it was nice to do things >
 >> on convenient boundaries, including memory page boundaries and >
 >> device physical block boundaries, but SCSI has long since >
 >> elected to perform any operation on almost any boundary.  SCSI
 >> drives > and related operating systems have commonly used block
 >> sizes of 512 > bytes and 520 bytes and less commonly of other
 >> values.  > > The only requirement we were able to enforce in
 >> previous > SCSI protocols is that all but the last PDU of a
 >> transfer > were required to be on 4 byte boundaries.  We were also
 >> > able to enforce the maximum values and a requirement that > the
 >> transferred data count exactly match the requested byte > count.
 >> 
 >> I don't see that last point.  Certainly not for unsolicited data
 >> -- and for R2T I can find no stated requirement to send exactly
 >> the requested count either.  Or did you mean the total for the
 >> entire operation as opposed to the individual bursts?
 >> 

 Robert> I haven't reviewed all of iSCSI's rules with respect to this
 Robert> particular issue.  There appears to be an assumption of
 Robert> non-congested processor-sized buffers that allow unsolicited
 Robert> write data transfer.  That may be a convenient assumption for
 Robert> some devices, but a problem for those that want more control
 Robert> of their buffering.  In general, the requests for write data
 Robert> are part of the logical unit's write buffer management and
 Robert> data striping management.  If you don't supply exactly what
 Robert> is asked for, you foul up the buffer management of the
 Robert> target, sometimes causing pathological performance problems.

I agree that this is a concern.  But the iSCSI spec allows initiators
to do what you don't want them to do.

 >> ...
 >> Given alignment, each iSCSI PDU that carries data can be sent to
 >> disk by itself, because it corresponds exactly to one or more disk
 >> blocks.  Without alignment, doing writes when the data arrives is
 >> still possible, but it clearly adds complexity because PDU
 >> boundaries don't match disk block boundaries.
 >> 
 >> I made the proposal because it clearly helps the target and
 >> appears to add no significant burden on the initiator.  The
 >> feedback to date indicates that this is indeed the case.
 >> 
 >> Are you saying "I don't care one way or the other" or are you
 >> saying "I feel this is a bad idea because it creates problems you
 >> haven't thought of"?  I'm reading your comment as the former; if
 >> you meant the latter, could you elaborate?

 Robert> I think I am saying that I care, and that it is an idea that
 Robert> will trap you into limiting simplifications.  In general, the
 Robert> initiator's data flow engine has no knowledge of the logical
 Robert> unit's physical block structure.  In addition, the page
 Robert> structure from which you are obtaining data in the host will
 Robert> usually have boundaries that are unrelated to the logical
 Robert> unit's physical block structure.  While it is perfectly
 Robert> possible to align PDU's with blocks, it requires SCSI ULP
 Robert> information to be forced in to the lower level data transfer
 Robert> hardware.  This is a significant inconvenience and will cost
 Robert> performance and/or complexity.  Note that the blocks in a
 Robert> logical unit are not all required to be the same size, and in
 Robert> tape drives and some optical devices are typically not the
 Robert> same size.

 Robert> I still think it is best for the logical unit to ask for what
 Robert> it wants, then expect to get it.  The logical unit is the
 Robert> only device in the system that really knows what it needs and
 Robert> when it needs it.  That is one of the important SCSI
 Robert> principles, allowing the logical unit to take over all the
 Robert> media dependent functions from the initiator and the host
 Robert> programming.

I think we are in agreement.

As for the point about the initiator data flow engine having no
knowledge of the target LU block structure, that is true.  However, if
you want to require the initiator to send exactly the amount that the
target is asking for (for example, by changing the description of R2T
to say that the amount of data sent by the initiator "MUST be exactly
equal to the Desired Data Transfer Length specified in the R2T" rather
than "MUST not exceed the Desired Data Transfer Length specified in
the R2T" as in the current text), that too imposes a constraint on the
initiator's data flow engine by the target. 

That constraint isn't quite identical to the one needed to support the
data PDU alignment, but it's pretty similar.  Either way, the
initiator lost some of its freedom to send exactly what it wants to
send.

Also, the arguments for doing it are the same in both cases: giving
the target some control over how the initiator breaks up the outgoing
data, so the target can arrange its buffering and memory management
efficiently.

You're right that this proposal isn't particularly applicable to
tapes.  I don't want to claim that every target will want to use the
proposed alignment capability -- only that there are enough targets
that will get a significant benefit from it to make the feature worth
having. 

	paul



From owner-ips@ece.cmu.edu  Mon Mar  4 14:31:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15745
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 14:31:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24Ibrs05968
	for ips-outgoing; Mon, 4 Mar 2002 13:37:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24IbpH05964
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 13:37:51 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id F080E600747; Mon,  4 Mar 2002 10:37:41 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id KAA02397;
	Mon, 4 Mar 2002 10:37:14 -0800 (PST)
Message-ID: <3C83BFAD.DA54F1A4@cup.hp.com>
Date: Mon, 04 Mar 2002 10:40:45 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: ips@ece.cmu.edu
Cc: t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <OF322D6C13.61EDFAE8-ON88256B72.0056C70B@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Jim,

I agree that a "complete re-configuration" of a target port can result
in a new port name & port identifier. However, the tricky part is the
definition of a "complete re-configuration of an iscsi target port", due
to the concepts of portal groups involving multiple network portals.

For example, if a portal group (aka, an iscsi target port) were to be
re-configured to include a new network portal [moved from another portal
group], then, the target port itself has not changed, since it is still
accessible through its previously used network portals. What has changed
is the individual network portal that has moved from 1 target port to
another. 

Hence, it is sufficient, in this case, to maintain persistence of the
target port name/identifier, without requiring any change in port
name/identifier. By requiring initiators to send the intended TPGT (scsi
target port name/identifier) along with the login request, this allows
the target port to detect that the network portal is being accessed to
connect to a different target port and it can reject the login.

It may be helpful to call out the specific case when a port
name/identifier MUST change. How about something like :

"If a portal group is re-configured such that all its previously
advertised network portals are no longer a part of the portal group,
then, the portal group tag (and thereby, the port name/identifier)
*MUST* be changed to indicate a new target port."

This would allow access to the target port through its un-altered
network portals to continue un-disrupted. More comments inline, in
response to some of your queries.

Thanks,
Santosh

NOTE : In this discussion target port and target portal group are used
to imply the same entity, within a target node.


Jim Hafner wrote:

> SAM-2 requires scsi port names to be persistent and world-wide-unique.
> (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> 
> "A scsi port name shall never change and may be used to persistently
> identify a scsi initiator port or target port...".
> 
> <JLH>
> There are different ways that one can interpret this "persistent" rule. The
> intent was that names shouldn't change over time when *identifying the same
> object*.   What that means is that if the object changes (in any
> discernable way), then the name should change.  So, the object can move to
> a different piece of hardware, but it can still be named the same way.  If
> the object changes, e.g., in this case, reconfigures as a different set of
> network portals with different addressing elements, then I would think that
> the name should change as well.   That's all the persistence one really
> needs.
> 
> I'm not sure what that implies about your recommendation.  I don't see any
> problem with it, either.
> </JLH>

I think we may be in agreement. (See reasoning above). 


> 
> The rationale for (2) is :
> --------------------------
> Consider an initiator node establishing multiple sessions to a scsi tgt
> port, with each session established to a subset of the network portals
> within the tgt portal group.
> 
> Consider an iscsi transport event involving the re-configuration of
> target portal groups on the iscsi target node. This may be preceeded by
> the iscsi sessions seeing an async message "target requests logout",
> followed by session logout, portal group re-configuration, and then, the
> initiator re-establishes sessions.
> 
> Across a transport event that results in such session termination and
> re-establishment, the initiator needs to authenticate that it is still
> speaking to the same [i]scsi target port, in order to ensure that any
> open/active I-T-L nexus traffic on that session is not incorrectly
> routed to a wrong LUN after such a transport event.

> <JLH>
> Under these events, shouldn't all "open/active I_T_L traffic" have been
> aborted, closed or otherwise ended?  So this shouldn't be an issue at all.

On a session logout & re-login, it is not efficient/necessary to close
and re-open each LUN behind that target port, due to the fact that a
target port may have hundred's of LUNs behind it. 

All outstanding I/Os need to be aborted. Once the session is
re-established [and the target port is authenticated to be the same],
further I/O traffic can be resumed without requiring the SCSI ULP to
close and re-open each LUN. Some transport specific clearing effects may
have occurred, which may require additional LUN level activity, in some
cases. 

(There are analogies to the above model in FCP & SRP, which authenticate
port name/identifier on login, allowing I/O resumption after session
termination and re-establishment.)


> To prevent such authentication issues, iscsi can send the iscsi target
> port identifier (portal group tag) explicitly in the login request, and
> the login can be rejected by the target on a portal group tag mis-match.
> (if the network portal does not belong to the addressed portal group
> tag).
> <JLH>
> Did you mean for the initiator to send this TPGT?
> </JLH>

Yes. The initiator login request must include the target portal group
tag, thus identifying the target port to which a session is being
established. 

Login currently carries no addressing information, since the addressing
is implicit, based on the TCP connection in use. The problem with this
approach is that the login implicitly addresses a network portal, and
not the target port. As seen in the earlier example, the association of
network portal <-> target port can change, and such changes can be
detected, if the initiator were to explicitly identify the target port
being logged into.

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Mon Mar  4 16:02:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23037
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 16:02:51 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24Kc6616565
	for ips-outgoing; Mon, 4 Mar 2002 15:38:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dc-mx08.cluster1.charter.net (dc-mx08.cluster0.hsacorp.net [209.225.8.18])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24Kc5H16560
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 15:38:05 -0500 (EST)
Received: from [66.189.14.218] (HELO westboro-1.world.std.com)
  by dc-mx08.cluster1.charter.net (CommuniGate Pro SMTP 3.5.3)
  with ESMTP id 17134865; Mon, 04 Mar 2002 15:38:04 -0500
Message-Id: <5.1.0.14.0.20020304193733.04bf16b0@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 04 Mar 2002 20:42:41 -0500
To: ips@ece.cmu.edu
From: David Jablon <dpj@world.std.com>
Subject: RE: Huntington Beach DRAFT minutes
Cc: roweber@acm.org, Black_David@emc.com
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E02937536@CORPMX14>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Providing an accurate summary of an IP investigation is indeed a delicate task,
and I encourage those interested in exploring IP issues to look directly to
authoritative statements.  Otherwise, when evaluating statements like
"Alice says that Bob said that the position of Charlie on Diana's patents
is such and such", it may be difficult to discern the necessary relevant
information.

And when people find that authoritative statements (such as those listed
at http://www.ietf.org/ipr.html) are inadequate, they should demand
clarification directly from the sources.  To assist in this process, any
summary, whether or not it is supplemented with editorial comments,
should probably also point to contact information for authoritative sources.

-- David


At 05:40 PM 3/2/02 -0500, Black_David@emc.com wrote:
>> I cannot find in these minutes any mention of the
>> presentation on the SRP Patents given by David Black.
>
>Indeed it is missing.  Here's the summary I propose to add:
>
>-- SRP Intellectual Property Rights (David Black)
>
>See David's slides for details (contents have been posted to the list).
>Lucent
>has broken their promise to tell the IETF whether the EKE patents are
>related to
>SRP.  Phoenix statement on whether the SPEKE patent relates to SRP is
>expected
>prior to Minneapolis.  Tom Wu (inventor of SRP, author of RFC 2945) attended
>the meeting and said that it is Stanford University's position (Tom invented
>SRP while at Stanford) that no patent rights other than Stanford's (for
>which
>a free license is available on the web) are required for use of SRP.
>Requirement level (MUST/SHOULD/MAY) for SRP in iSCSI will be taken up in
>Minneapolis.
>
>Thanks,
>--David




From owner-ips@ece.cmu.edu  Mon Mar  4 16:03:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23082
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 16:03:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24KbVU16507
	for ips-outgoing; Mon, 4 Mar 2002 15:37:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24KbTH16498
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 15:37:29 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP id BD225600490
	for <ips@ece.cmu.edu>; Mon,  4 Mar 2002 12:37:23 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id MAA02702 for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 12:39:03 -0800 (PST)
Message-ID: <004d01c1c3bc$62e5cd60$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "ips" <ips@ece.cmu.edu>
Subject: iSCSI: state transition slides for rev11
Date: Mon, 4 Mar 2002 12:37:21 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

All:

Please find the state transition slides for the iSCSI rev11 draft 
at:

http://storage-arch.hp.com/iscsi_states_rev11.pdf

The changes are minor -
- Added Logout timeout to the event set causing T17, and removed the 
  "session close" event from the event set for T6. Changed "status class"
   to "Status-Class".
- Added a new transition N11 to target session state diagram, to address 
   the session reinstatement event. Enhancing the event set for N3(T) and 
   N6(I & T) with this event. Adding the same event to the event sets 
   for target transitions T8, T13, T15, T16, T17, T18, and M2 (I & T).
- Used the new "session closure" and "session failure" terminology defined
   in draft rev11.

The ASCII versions of the same are in rev11.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747



From owner-ips@ece.cmu.edu  Mon Mar  4 16:03:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23137
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 16:03:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24KCbK14348
	for ips-outgoing; Mon, 4 Mar 2002 15:12:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24KCaH14344
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 15:12:36 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <100R36YF>; Mon, 4 Mar 2002 15:12:19 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293754B@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: Minneapolis Times and Agenda
Date: Mon, 4 Mar 2002 15:12:14 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

The Minneapolis meeting slots for the IPS WG are now final:

MONDAY, March 18, 2002, 1930-2200 Evening Sessions
TUESDAY, March 19, 2002, 1545-1800 Afternoon Sessions III & IV

It's time to start assembling this agenda.  Authors of
WG drafts should make sure that their Technical Coordinator
knows how much time their draft(s) will need, any other
requests for agenda time should be sent directly to
Elizabeth (ElizabethRodriguez@ieee.org) and myself
(black_david@emc.com).

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar  4 17:55:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28933
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 17:55:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24Ls5a23008
	for ips-outgoing; Mon, 4 Mar 2002 16:54:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas2.cos.agilent.com (msgbas2x.cos.agilent.com [192.25.240.37])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24Ls2H22988
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 16:54:02 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas2.cos.agilent.com (Postfix) with ESMTP
	id 4718811F2; Mon,  4 Mar 2002 14:54:00 -0700 (MST)
Received: from axcsbh6.cos.agilent.com (axcsbh6.cos.agilent.com [130.29.152.171])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id D95BF10B; Mon,  4 Mar 2002 14:53:59 -0700 (MST)
Received: from 130.29.152.171 by axcsbh6.cos.agilent.com (InterScan E-Mail VirusWall NT); Mon, 04 Mar 2002 14:53:59 -0700
Received: by axcsbh6.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FBZRNMWM>; Mon, 4 Mar 2002 14:53:59 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00A98522A@axcs04.cos.agilent.com>
From: pat_thaler@agilent.com
To: rod.harrison@windriver.com, Nick.Martin@compaq.com, ni1d@arrl.net,
        ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
Date: Mon, 4 Mar 2002 14:53:57 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Rod,

I don't think a maximum PDU size would have made sense for v08 or earlier
either.

When the size was negotiated, the resulting maximum receive PDU would be the
minimum of the two offered key values. If the target wanted 512 and the
initiator was offering 493, then the target would have had to accept 493. To
let a target choose a size that makes the data convenient for its buffers,
then one would have to have a list negotiation rather than numeric.

Such a requirement would be very burdensome for bridges which can't force
the data to be delivered to them into neat sizes.

Regards,
Pat Thaler

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Tuesday, February 26, 2002 6:08 PM
To: Martin, Nick; Paul Koning; ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?


Nick,

	This makes sense for unsolicited data but it doesn't stop the
initiator sending more than one "weird" sized DATA-OUT PDU in
response to an R2T, even if the R2T is for a multiple of 512
bytes.

	Strengthening the wording to make sending "full" PDUs a
requirement is not really practical in the post v08 world where
we don't have a negotiated PDU size. It would have made sense
when the max PDU size was agreed upon but given the current
scheme of allowing the receiver to name an arbitrary sized
maximum receive PDU it would place an unreasonable burden on the
initiator.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On
Behalf Of
Martin, Nick
Sent: Wednesday, February 27, 2002 12:14 AM
To: Paul Koning; ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?


Paul,

For all data carrying PDUs except the last in a sequence, the
sender is
expected to send maximum sized PDU allowed.  When the negotiated
maximum
is a multiple of 512, this effect is what you request.

I thought this was a requirement, but I did not find it as such
in draft
10.  I did find this:

: 8.5 Unsolicited Data and Performance
: Unsolicited data on write are meant to reduce the effect of
latency on
: throughput (no R2T is needed to start sending data). In
addition,
: immediate data are meant to reduce the protocol overhead (both
bandwidth
: and execution time).
: However, negotiating an amount of unsolicited data for writes
and
: sending less than the negotiated amount when the total data
amount to
: be sent by a command is larger than the negotiated amount may
negatively
: impact performance and may not be supported by all the targets.

This is a warning that an initiator sending less than the
negotiated
maximum when the expected data transfer is greater than the
maximum a)
may reduce performance and b) may not be supported by all
targets.

IMHO, it makes more sense to include stronger wording encouraging
maximum negotiated length transfers rather than to add another
parameter
requiring PDU breaks on different boundaries.

If such initiator behavior may not be supported by all targets,
then the
initiators SHOULD NOT do it.

A disk target which can not handle such behavior is forgiven in
advance
;).

Thanks,
Nick


> -----Original Message-----
> From: Paul Koning [mailto:ni1d@arrl.net]
> Sent: Tuesday, February 26, 2002 3:51 PM
> To: ips@ece.cmu.edu
> Subject: sector alignment for DataOut PDUs?
>
>
> In the past, a number of login parameters were specified as
multiples
> of 512 bytes, which makes a lot of sense for disk targets (but
not so
> much for tape targets).  With the spec as it stands now, you
can
> negotiate pretty much arbitrary burst sizes etc.  And in any
case, the
> sender can pick "strange" PDU sizes even if the negotiated
sizes are
> multiples of 512, because after all those are limits, not
required
> sizes.
>
> It would be very attractive for disk targets to be able to
specify
> that they require DataOut PDUs to be multiples of 512 bytes in
length.
> That way, any PDU would correspond exactly to one or more
sectors,
> rather than potentially having several PDUs straddling sector
> boundaries as is currently permitted.  This could be done by a
Boolean
> key (512 byte alignment, yes or no).  (An integer key would
allow
> other values than 512, but I'm not sure that such flexibility
is a
> whole lot more useful.)
>
> Basically, the effect of this feature would be to tell the
initiator
> that it must send DataOut PDUs and immediate data whose length
is
> always a multiple of 512.  Obviously, targets can't ask for
that
> unless the devices on that target already come with such a
limitation.
>
>        paul
>
>


From owner-ips@ece.cmu.edu  Mon Mar  4 19:10:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00926
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 19:10:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g24NCQJ29098
	for ips-outgoing; Mon, 4 Mar 2002 18:12:26 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g24NCOH29093
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 18:12:25 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel13.hp.com (Postfix) with ESMTP
	id EB3C34004FD; Mon,  4 Mar 2002 15:12:18 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id PAA03152; Mon, 4 Mar 2002 15:13:58 -0800 (PST)
Message-ID: <008f01c1c3d2$06a21ac0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
Cc: <t10@t10.org>
References: <OF322D6C13.61EDFAE8-ON88256B72.0056C70B@boulder.ibm.com> <3C83BFAD.DA54F1A4@cup.hp.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Mon, 4 Mar 2002 15:12:15 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Santosh and Jim,

It appears a good idea to add in the portal group tag in the Login 
Request header for a sanity check by the receiving target portal.

I generally agree with Jim's comments that the duration of persistence
of a portal group tag is intricately linked to the extent of portal reconfiguration.
Not every target reconfiguration may result in a portal group tag reassignment.
OTOH, some reconfigurations may be so extensive as to cause even a node 
name change.

Some comments on Santosh's message -

> "If a portal group is re-configured such that all its previously
> advertised network portals are no longer a part of the portal group,
> then, the portal group tag (and thereby, the port name/identifier)
> *MUST* be changed to indicate a new target port."

I am not sure this solves the problem you're trying to get at.  If none of
the earlier IP addresses can get an initiator to the SCSI target port that it 
knew of (your scenario), it appears to me that it doesn't matter if the 
portal group tags are changed or not....A new discovery process should
update the initiator of the changed portal addresses.

I suggest the following text -

   After a portal group reconfiguration which changed the view of LUs
   for an initiator with a given set of privileges, the target MUST change
   the portal group tag that represents the reconfigured target portal group.

> > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > aborted, closed or otherwise ended?  So this shouldn't be an issue at all.
> 
> On a session logout & re-login, it is not efficient/necessary to close
> and re-open each LUN behind that target port, due to the fact that a
> target port may have hundred's of LUNs behind it. 

I agree with Jim on this one - there should be *no* open/active I_T_L nexus 
traffic after a reconfiguration, targets can enforce this via simple iSCSI means
(reject initiator advances to continue the session for DefaultTime2Wait+
DefaultTime2Retain seconds).  In fact, Async logout request requires a
clean closure that implicitly aborts I/Os.

What you're describing is typical O/S "LUN open" and "LUN close"
interactions.  I agree that they wouldn't have to be repeated, but care 
must be taken to ensure that new I/Os (on the new session after reconfiguration)
are not delivered to the incorrect LUs.  It seems that the addition of 
TPGT in the login header and the proposed new text (above) would take
care of this.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747

----- Original Message ----- 
From: "Santosh Rao" <santoshr@cup.hp.com>
To: <ips@ece.cmu.edu>
Cc: <t10@t10.org>
Sent: Monday, March 04, 2002 10:40 AM
Subject: Re: iscsi : changes involving tgt portal group tag.


> * From the T10 Reflector (t10@t10.org), posted by:
> * Santosh Rao <santoshr@cup.hp.com>
> *
> Jim,
> 
> I agree that a "complete re-configuration" of a target port can result
> in a new port name & port identifier. However, the tricky part is the
> definition of a "complete re-configuration of an iscsi target port", due
> to the concepts of portal groups involving multiple network portals.
> 
> For example, if a portal group (aka, an iscsi target port) were to be
> re-configured to include a new network portal [moved from another portal
> group], then, the target port itself has not changed, since it is still
> accessible through its previously used network portals. What has changed
> is the individual network portal that has moved from 1 target port to
> another. 
> 
> Hence, it is sufficient, in this case, to maintain persistence of the
> target port name/identifier, without requiring any change in port
> name/identifier. By requiring initiators to send the intended TPGT (scsi
> target port name/identifier) along with the login request, this allows
> the target port to detect that the network portal is being accessed to
> connect to a different target port and it can reject the login.
> 
> It may be helpful to call out the specific case when a port
> name/identifier MUST change. How about something like :
> 
> "If a portal group is re-configured such that all its previously
> advertised network portals are no longer a part of the portal group,
> then, the portal group tag (and thereby, the port name/identifier)
> *MUST* be changed to indicate a new target port."
> 
> This would allow access to the target port through its un-altered
> network portals to continue un-disrupted. More comments inline, in
> response to some of your queries.
> 
> Thanks,
> Santosh
> 
> NOTE : In this discussion target port and target portal group are used
> to imply the same entity, within a target node.
> 
> 
> Jim Hafner wrote:
> 
> > SAM-2 requires scsi port names to be persistent and world-wide-unique.
> > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > 
> > "A scsi port name shall never change and may be used to persistently
> > identify a scsi initiator port or target port...".
> > 
> > <JLH>
> > There are different ways that one can interpret this "persistent" rule. The
> > intent was that names shouldn't change over time when *identifying the same
> > object*.   What that means is that if the object changes (in any
> > discernable way), then the name should change.  So, the object can move to
> > a different piece of hardware, but it can still be named the same way.  If
> > the object changes, e.g., in this case, reconfigures as a different set of
> > network portals with different addressing elements, then I would think that
> > the name should change as well.   That's all the persistence one really
> > needs.
> > 
> > I'm not sure what that implies about your recommendation.  I don't see any
> > problem with it, either.
> > </JLH>
> 
> I think we may be in agreement. (See reasoning above). 
> 
> 
> > 
> > The rationale for (2) is :
> > --------------------------
> > Consider an initiator node establishing multiple sessions to a scsi tgt
> > port, with each session established to a subset of the network portals
> > within the tgt portal group.
> > 
> > Consider an iscsi transport event involving the re-configuration of
> > target portal groups on the iscsi target node. This may be preceeded by
> > the iscsi sessions seeing an async message "target requests logout",
> > followed by session logout, portal group re-configuration, and then, the
> > initiator re-establishes sessions.
> > 
> > Across a transport event that results in such session termination and
> > re-establishment, the initiator needs to authenticate that it is still
> > speaking to the same [i]scsi target port, in order to ensure that any
> > open/active I-T-L nexus traffic on that session is not incorrectly
> > routed to a wrong LUN after such a transport event.
> 
> > <JLH>
> > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > aborted, closed or otherwise ended?  So this shouldn't be an issue at all.
> 
> On a session logout & re-login, it is not efficient/necessary to close
> and re-open each LUN behind that target port, due to the fact that a
> target port may have hundred's of LUNs behind it. 
> 
> All outstanding I/Os need to be aborted. Once the session is
> re-established [and the target port is authenticated to be the same],
> further I/O traffic can be resumed without requiring the SCSI ULP to
> close and re-open each LUN. Some transport specific clearing effects may
> have occurred, which may require additional LUN level activity, in some
> cases. 
> 
> (There are analogies to the above model in FCP & SRP, which authenticate
> port name/identifier on login, allowing I/O resumption after session
> termination and re-establishment.)
> 
> 
> > To prevent such authentication issues, iscsi can send the iscsi target
> > port identifier (portal group tag) explicitly in the login request, and
> > the login can be rejected by the target on a portal group tag mis-match.
> > (if the network portal does not belong to the addressed portal group
> > tag).
> > <JLH>
> > Did you mean for the initiator to send this TPGT?
> > </JLH>
> 
> Yes. The initiator login request must include the target portal group
> tag, thus identifying the target port to which a session is being
> established. 
> 
> Login currently carries no addressing information, since the addressing
> is implicit, based on the TCP connection in use. The problem with this
> approach is that the login implicitly addresses a network portal, and
> not the target port. As seen in the earlier example, the association of
> network portal <-> target port can change, and such changes can be
> detected, if the initiator were to explicitly identify the target port
> being logged into.
> 
> -- 
> ##################################
> Santosh Rao
> Software Design Engineer,
> HP-UX iSCSI Driver Team,
> Hewlett Packard, Cupertino.
> email : santoshr@cup.hp.com
> Phone : 408-447-3751
> ##################################
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
> 


From owner-ips@ece.cmu.edu  Mon Mar  4 21:48:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA05847
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 21:48:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g251cRl08857
	for ips-outgoing; Mon, 4 Mar 2002 20:38:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g251cQH08853
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 20:38:26 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP
	id 3E7CB6002FF; Mon,  4 Mar 2002 17:38:20 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id RAA01480; Mon, 4 Mar 2002 17:40:00 -0800 (PST)
Message-ID: <00cd01c1c3e6$6d3d41b0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Jim Hafner" <hafner@almaden.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <OF1250BDB8.B2FA428E-ON88256B73.00007992@boulder.ibm.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Mon, 4 Mar 2002 17:38:18 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Jim,

> Much as I would like to agree with you on most things (especially after you
> agreed with me so much...)

Thanks for preparing me for what's coming, :-)  Let me attempt to paraphrase
what you're saying.

> I think connecting LU views with TPGTs is a mistake and violates layering.

I am surprised.  LU views can be a function of the transport in iSCSI, as your
bullet (b) clearly says right after this comment!  I would go so far as to say that
one reason for creating multiple iSCSI target nodes is to simply "package"
different LU views under each one.

If I understood Santosh's concern correctly, he was referring to the scenario of
initiator (incorrectly) addressing a changed LU with the same LUN after a new
session is instantiated.  Assuming for now that we introduced the "intended TPGT"
into the Login Request header, I can see two ways how his scenario can still
happen (both assume session and I/O termination, followed by a reinstantiation) -

A.  Two iSCSI portal groups (i.e. SCSI ports) with different LU views
     had their LU views swapped "underneath" them as part of reconfiguration.

B.  Certain LUNs had new LUs (with new LU identifiers) at the old address.

It wasn't clear to me from your comments that scenario A above (different views for
different ports) is expressly forbidden by SCSI architecture.  Can you please
clarify?

I agree with your reasoning for scenario B above that a UA (perhaps interlocked)
would be
adequate to deal with the changed LU.    Though it wasn't clear from SPC-3, I assume
initiators are guaranteed to see this UA even after arbitrary amount of time (after
the
change) when they re-establish the nexus.  A brief digression: if a new initiator
establishes
a nexus after the change (for the first time), is it expected to see this UA?

Lastly,
> This should be handled by LU Identifier (not just LUN) if this is a...

Agreed, I believe this Identifier is traditionally checked during the "open" time,
and as you point out (should be) on the "REPORTED LUNS DATA HAS CHANGED"
UA. [ If scenario A were legal, the checking would need to be done after the forced
discovery (due to TPGT change) process as well....]

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747


----- Original Message -----
From: "Jim Hafner" <hafner@almaden.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Monday, March 04, 2002 4:21 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


>
> Mallikarjun,
>
> Much as I would like to agree with you on most things (especially after you
> agreed with me so much...)
>
> I think connecting LU views with TPGTs is a mistake and violates layering.
> Besides, LU views are
> (a) functions of SCSI level or other access controls
> (b) functions of iSCSI target node presentations
> Within the standards that I know of, there is no defined LU view that is
> different across the different target ports of any SCSI device (BUT see the
> two notes in the P.S.)
>
> In case (b), the TPGT is already qualified by the node so there's no issue
> here.
> In case (a), the rules as defined by SCSI ACs are that the LU view is the
> same across all target ports.
>
> I don't have any good "words" to smith into the document that makes clear
> what "reconfiguration" should trigger a new name and what shouldn't (and I
> haven't had time to think much about it either).
>
> As for your final comment about IOs getting directed to the correct LU.
> This should be handled by LU Identifier (not just LUN) if this is a
> significant concern.  There's a subtle requirement in this virtual world
> we're moving towards that requires careful mapping of LUs to device objects
> within hosts so that LUN changes don't cause such problems.  But LUN
> changes can occur for many reasons, not just those raised here.  SCSI gives
> "REPORT LUNS DATA CHANGED" Unit Attentions, but if they're ignored,
> ...OOPS!.
>
> Finally, to Santosh:  there is no notion in SCSI (or iSCSI, I think) about
> LUN OPEN/CLOSE.   LUs are "discovered" by INQUIRY and REPORT LUNs.  Once
> discovered, there is no further action required.  So, a logical unit is
> either "addressible" (in the view) or not (with a slight caveat about SCSI
> ACs and AccessId registration, but that should happen before the discovery
> phase anyway).   There may be layers about SCSI which have these notions
> but they probably only manipulate internal OS datastructures and have no
> "wire" protocol associated with them.   So, there should be no need to
> think about such actions being required after re-login.
>
> Jim Hafner
>
> P.S.
> Note1:  there are vendor-specific implementations that might seem to
> violate this statement if taken literally, but because such implementations
> are "pre-node names", one can view them as falling into the model (b)
> above.
> Note2: the "asymmetric port" stuff in SCSI (recent addition) doesn't change
> the "view" (i.e., the list of LUNs) so much as the accessibility of the
> addressed LU, so even this doesn't square with the issue at hand.
>
>
>
> "Mallikarjun C." <cbm@rose.hp.com>@t10.org on 03/04/2002 03:12:15 PM
>
> Sent by:    owner-t10@t10.org
>
>
> To:    "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
> cc:    <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
>
>
>
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Mallikarjun C." <cbm@rose.hp.com>
> *
> Santosh and Jim,
>
> It appears a good idea to add in the portal group tag in the Login
> Request header for a sanity check by the receiving target portal.
>
> I generally agree with Jim's comments that the duration of persistence
> of a portal group tag is intricately linked to the extent of portal
> reconfiguration.
> Not every target reconfiguration may result in a portal group tag
> reassignment.
> OTOH, some reconfigurations may be so extensive as to cause even a node
> name change.
>
> Some comments on Santosh's message -
>
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
>
> I am not sure this solves the problem you're trying to get at.  If none of
> the earlier IP addresses can get an initiator to the SCSI target port that
> it
> knew of (your scenario), it appears to me that it doesn't matter if the
> portal group tags are changed or not....A new discovery process should
> update the initiator of the changed portal addresses.
>
> I suggest the following text -
>
>    After a portal group reconfiguration which changed the view of LUs
>    for an initiator with a given set of privileges, the target MUST change
>    the portal group tag that represents the reconfigured target portal
>    group.
>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
>
> I agree with Jim on this one - there should be *no* open/active I_T_L nexus
> traffic after a reconfiguration, targets can enforce this via simple iSCSI
> means
> (reject initiator advances to continue the session for DefaultTime2Wait+
> DefaultTime2Retain seconds).  In fact, Async logout request requires a
> clean closure that implicitly aborts I/Os.
>
> What you're describing is typical O/S "LUN open" and "LUN close"
> interactions.  I agree that they wouldn't have to be repeated, but care
> must be taken to ensure that new I/Os (on the new session after
> reconfiguration)
> are not delivered to the incorrect LUs.  It seems that the addition of
> TPGT in the login header and the proposed new text (above) would take
> care of this.
>
> Regards.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Santosh Rao" <santoshr@cup.hp.com>
> To: <ips@ece.cmu.edu>
> Cc: <t10@t10.org>
> Sent: Monday, March 04, 2002 10:40 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * Santosh Rao <santoshr@cup.hp.com>
> > *
> > Jim,
> >
> > I agree that a "complete re-configuration" of a target port can result
> > in a new port name & port identifier. However, the tricky part is the
> > definition of a "complete re-configuration of an iscsi target port", due
> > to the concepts of portal groups involving multiple network portals.
> >
> > For example, if a portal group (aka, an iscsi target port) were to be
> > re-configured to include a new network portal [moved from another portal
> > group], then, the target port itself has not changed, since it is still
> > accessible through its previously used network portals. What has changed
> > is the individual network portal that has moved from 1 target port to
> > another.
> >
> > Hence, it is sufficient, in this case, to maintain persistence of the
> > target port name/identifier, without requiring any change in port
> > name/identifier. By requiring initiators to send the intended TPGT (scsi
> > target port name/identifier) along with the login request, this allows
> > the target port to detect that the network portal is being accessed to
> > connect to a different target port and it can reject the login.
> >
> > It may be helpful to call out the specific case when a port
> > name/identifier MUST change. How about something like :
> >
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> >
> > This would allow access to the target port through its un-altered
> > network portals to continue un-disrupted. More comments inline, in
> > response to some of your queries.
> >
> > Thanks,
> > Santosh
> >
> > NOTE : In this discussion target port and target portal group are used
> > to imply the same entity, within a target node.
> >
> >
> > Jim Hafner wrote:
> >
> > > SAM-2 requires scsi port names to be persistent and world-wide-unique.
> > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > >
> > > "A scsi port name shall never change and may be used to persistently
> > > identify a scsi initiator port or target port...".
> > >
> > > <JLH>
> > > There are different ways that one can interpret this "persistent" rule.
> The
> > > intent was that names shouldn't change over time when *identifying the
> same
> > > object*.   What that means is that if the object changes (in any
> > > discernable way), then the name should change.  So, the object can move
> to
> > > a different piece of hardware, but it can still be named the same way.
> If
> > > the object changes, e.g., in this case, reconfigures as a different set
> of
> > > network portals with different addressing elements, then I would think
> that
> > > the name should change as well.   That's all the persistence one really
> > > needs.
> > >
> > > I'm not sure what that implies about your recommendation.  I don't see
> any
> > > problem with it, either.
> > > </JLH>
> >
> > I think we may be in agreement. (See reasoning above).
> >
> >
> > >
> > > The rationale for (2) is :
> > > --------------------------
> > > Consider an initiator node establishing multiple sessions to a scsi tgt
> > > port, with each session established to a subset of the network portals
> > > within the tgt portal group.
> > >
> > > Consider an iscsi transport event involving the re-configuration of
> > > target portal groups on the iscsi target node. This may be preceeded by
> > > the iscsi sessions seeing an async message "target requests logout",
> > > followed by session logout, portal group re-configuration, and then,
> the
> > > initiator re-establishes sessions.
> > >
> > > Across a transport event that results in such session termination and
> > > re-establishment, the initiator needs to authenticate that it is still
> > > speaking to the same [i]scsi target port, in order to ensure that any
> > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > routed to a wrong LUN after such a transport event.
> >
> > > <JLH>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> >
> > All outstanding I/Os need to be aborted. Once the session is
> > re-established [and the target port is authenticated to be the same],
> > further I/O traffic can be resumed without requiring the SCSI ULP to
> > close and re-open each LUN. Some transport specific clearing effects may
> > have occurred, which may require additional LUN level activity, in some
> > cases.
> >
> > (There are analogies to the above model in FCP & SRP, which authenticate
> > port name/identifier on login, allowing I/O resumption after session
> > termination and re-establishment.)
> >
> >
> > > To prevent such authentication issues, iscsi can send the iscsi target
> > > port identifier (portal group tag) explicitly in the login request, and
> > > the login can be rejected by the target on a portal group tag
> mis-match.
> > > (if the network portal does not belong to the addressed portal group
> > > tag).
> > > <JLH>
> > > Did you mean for the initiator to send this TPGT?
> > > </JLH>
> >
> > Yes. The initiator login request must include the target portal group
> > tag, thus identifying the target port to which a session is being
> > established.
> >
> > Login currently carries no addressing information, since the addressing
> > is implicit, based on the TCP connection in use. The problem with this
> > approach is that the login implicitly addresses a network portal, and
> > not the target port. As seen in the earlier example, the association of
> > network portal <-> target port can change, and such changes can be
> > detected, if the initiator were to explicitly identify the target port
> > being logged into.
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
>
>
>
>



From owner-ips@ece.cmu.edu  Mon Mar  4 21:51:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA05905
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 21:51:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g251hgO09207
	for ips-outgoing; Mon, 4 Mar 2002 20:43:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail03.ztx.compaq.com (ztxmail03.ztx.compaq.com [161.114.1.207])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g251hfH09203
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 20:43:41 -0500 (EST)
Received: from cceexg11.americas.cpqcorp.net (cceexg11.americas.cpqcorp.net [16.110.250.125])
	by ztxmail03.ztx.compaq.com (Postfix) with ESMTP
	id 4E8303D1B; Mon,  4 Mar 2002 19:43:35 -0600 (CST)
Received: from cceexc18.americas.cpqcorp.net ([16.110.250.64]) by cceexg11.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 4 Mar 2002 19:43:34 -0600
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: RE: sector alignment for DataOut PDUs?
Date: Mon, 4 Mar 2002 19:43:33 -0600
Message-ID: <31891B757C09184BBFEC5275F85D5595104E47@cceexc18.americas.cpqcorp.net>
Thread-Topic: sector alignment for DataOut PDUs?
Thread-Index: AcHDo0+bGgpiTAXcQiaCnWYR3PvccAAJnDhA
From: "Martin, Nick" <Nick.Martin@compaq.com>
To: "THALER,PAT (A-Roseville,ex1)" <pat_thaler@agilent.com>
Cc: <ips@ece.cmu.edu>
X-OriginalArrivalTime: 05 Mar 2002 01:43:34.0574 (UTC) FILETIME=[29977CE0:01C1C3E7]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g251hfH09204
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Pat,

Are you considering a bridge between iSCSI initiator and FC target, or the reverse?

For the former case, the bridge is an iSCSI target.  The buffer size reported to the iSCSI initiator as DataPDUAlignment would be one which simplifies command and memory management within the bridge.  If the bridge can conveniently manage its memory in 1 byte increments, then report 1 byte which does not restrict the initiator.  If it prefers 1024 byte increments, it can send that to the iSCSI initiator.

For the latter case, the bridge is an iSCSI initiator.  Perhaps the iSCSI target has requested DataPDUAlignment such as 1024 bytes, but the FC initiator sends unaligned data, or perhaps 512 byte data.  This is the same situation the iSCSI target is in with no data alignment in iSCSI.  Data has arrived, but nothing can be done with it until more data arrives to fill the next transfer unit.

This is perhaps acceptable for some store-and-forward "bridge" designs, but rules out some "switch" or other low latency pass-through middle device designs.  When the alignment requirement can not be enforced for the FC or other protocol device on the other side, store-and-forward buffering would be required.

So we come to, DataPDUAlignment as a requirement is good for some designs and bad for others.  I believe that most initiators, even without this parameter=value, will break data PDUs on convenient boundaries.  If an initiator does not do so, the target needs to do the bookkeeping.  When the target implements bookkeeping and the initiator sends aligned data, the target operates efficiently.  When the initiator does not send conveniently aligned data, the target must not fail.

DataPDUAlignment could be advisory in nature.  The target advises the initiator of the transfer increment which will be optimal for the target.  When the initiator can not (or does not) break its transfers on these boundaries, the target may be less efficient.  No requirement is removed from the target, so no development work is saved developing or testing it.  The target is required to accept data PDUs of any otherwise legal length.  No new requirement is imposed on the initiator, nor on a bridge excepting to accept this parameter.  However, iSCSI initiators can now be given enough information to enable them to avoid unaligned data transfers to the target.  Targets will be able to operate at maximum efficiently when the initiators utilize this information.

If it needs to be advisory in nature, therefore optional to implement, I suggest that it could be tabled so as not to interfere with progress toward iSCSI 1.0.  On the other hand, being optional to implement, only required to understand, it is a small impact to implementations currently underway.

As someone else mentioned, there are targets whose block size is not a power of two.  Without such a parameter=value, aligned transfers to these targets could be rare. 

Thanks,
Nick


> -----Original Message-----
> From: THALER,PAT (A-Roseville,ex1) [mailto:pat_thaler@agilent.com]
> Sent: Monday, March 04, 2002 11:34 AM
> To: Robert Snively; Paul Koning
> Cc: ips@ece.cmu.edu
> Subject: RE: sector alignment for DataOut PDUs?
> 
> 
> All,
> 
> Putting in a requirement for sector alignment will make 
> implementation of
> bridges difficult. I've been looking through the Fibre 
> Channel specs and I
> cannot find any requirement that transfers be in block size 
> multiples. If we
> put a sector alignment requirement in, then bridges would 
> have to buffer
> data that arrived in a non-multiple until further data 
> arrived to add to it.
> They would also have to keep an accounting to know whether a 
> transfer was
> the last and therefore should be allowed to go even if it 
> isn't a multiple
> of block size. This would complicate bridging excessively.
> 
> Regards,
> Pat
> 
> -----Original Message-----
> From: Robert Snively [mailto:rsnively@Brocade.COM]
> Sent: Monday, March 04, 2002 7:29 AM
> To: Paul Koning; rsnively@Brocade.COM
> Cc: ips@ece.cmu.edu
> Subject: RE: sector alignment for DataOut PDUs?
> 
> 
> > > There has always been a feeling that it was nice to do things
> > > on convenient boundaries, including memory page boundaries and
> > > device physical block boundaries, but SCSI has long since 
> > > elected to perform any operation on almost any boundary.  
> > SCSI drives
> > > and related operating systems have commonly used block 
> sizes of 512
> > > bytes and 520 bytes and less commonly of other values.  
> > > 
> > > The only requirement we were able to enforce in previous
> > > SCSI protocols is that all but the last PDU of a transfer
> > > were required to be on 4 byte boundaries.  We were also
> > > able to enforce the maximum values and a requirement that
> > > the transferred data count exactly match the requested byte
> > > count.
> > 
> > I don't see that last point.  Certainly not for unsolicited data --
> > and for R2T I can find no stated requirement to send exactly the
> > requested count either.  Or did you mean the total for the entire
> > operation as opposed to the individual bursts?
> >  
> 
> I haven't reviewed all of iSCSI's rules with respect to this
> particular issue.  There appears to be an assumption of 
> non-congested processor-sized buffers that allow unsolicited
> write data transfer.  That may be a convenient assumption for
> some devices, but a problem for those that want more control
> of their buffering.  In general, the requests for write data 
> are part of the logical unit's write buffer management
> and data striping management.  If you don't supply
> exactly what is asked for, you foul up the buffer management of the
> target, sometimes causing pathological performance problems.
> 
> > > I would strongly suggest that you not bother to enforce any
> > > other boundary restrictions.
> > > 
> > > I believe Eddy was right when he asked:
> > > 
> > > 	Given that the TCP issues of reassembly 
> > > 	are so much more complicated than
> > > 	the concatenation issues necessary for 
> > > 	target data alignment, is there
> > > 	really a problem here?
> > > 
> > > My answer to him would be, no, there is not a problem.
> > 
> > I answered it before when Eddy said that, but I'll 
> summarize it again:
> > I'm not talking about a problem, I'm talking about an 
> opportunity for
> > simplifying the target and making it more efficient.
> > 
> > Given alignment, each iSCSI PDU that carries data can be 
> sent to disk
> > by itself, because it corresponds exactly to one or more 
> disk blocks.
> > Without alignment, doing writes when the data arrives is still
> > possible, but it clearly adds complexity because PDU 
> boundaries don't
> > match disk block boundaries.
> > 
> > I made the proposal because it clearly helps the target and 
> appears to
> > add no significant burden on the initiator.  The feedback to date
> > indicates that this is indeed the case.
> > 
> > Are you saying "I don't care one way or the other" or are you saying
> > "I feel this is a bad idea because it creates problems you haven't
> > thought of"?  I'm reading your comment as the former; if 
> you meant the
> > latter, could you elaborate?
> 
> I think I am saying that I care, and that it is an idea that
> will trap you into limiting simplifications.  In general, the 
> initiator's data flow engine has no knowledge of the logical 
> unit's physical block structure.  In addition, the page structure
> from which you are obtaining data in the host will usually 
> have boundaries
> that are unrelated to the logical unit's physical block structure.
> While it is perfectly possible to align PDU's with blocks, it
> requires SCSI ULP information to be forced in to the lower level
> data transfer hardware.  This is a significant inconvenience and
> will cost performance and/or complexity.  Note that the blocks
> in a logical unit are not all required to be the same size, and in
> tape drives and some optical devices are typically not the same size.
> 
> I still think it is best for the logical unit to ask for what 
> it wants,
> then expect to get it.  The logical unit is the only device in
> the system that really knows what it needs and when it needs it.
> That is one of the important SCSI principles, allowing the 
> logical unit
> to take over all the media dependent functions from the initiator
> and the host programming.
> 


From owner-ips@ece.cmu.edu  Mon Mar  4 22:34:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA07414
	for <ips-archive@odin.ietf.org>; Mon, 4 Mar 2002 22:34:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g252Vlk12276
	for ips-outgoing; Mon, 4 Mar 2002 21:31:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g252VjH12271
	for <ips@ece.cmu.edu>; Mon, 4 Mar 2002 21:31:46 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP
	id 484E760079A; Mon,  4 Mar 2002 18:31:40 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id SAA27065;
	Mon, 4 Mar 2002 18:31:35 -0800 (PST)
Message-ID: <3C842EDE.F80A3DF3@cup.hp.com>
Date: Mon, 04 Mar 2002 18:35:10 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: ips@ece.cmu.edu, "Mallikarjun C." <cbm@core.rose.hp.com>,
        Jim Hafner <hafner@almaden.ibm.com>
Cc: T10 Reflector <t10@t10.org>
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <OF1250BDB8.B2FA428E-ON88256B73.00007992@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Jim & Mallikarjun,

I believe the following 3 rules should suffice to prevent any terminated
& re-established sessions from delivering I/Os to incorrect target ports
and/or LUNs :

1) The TPGT is sent as a field in the login reqest PDU. Target MUST
reject login if the wrong TPGT (target port) is being addressed. 

2) TPGTs MUST NOT be re-used when new target ports are instantiated. If
the entire 64K space has been used up for TPGTs, then, the target node
name must be changed. (May be worth considering using a 32-bit field or
a 64-bit field for the target portal group).
This rule is needed, since port names are required to be world-wide
unique, and re-use of TPGTs upon repeated target re-config will cause
them to lose world-wide unique-ness. 


3) Any time a portal group is re-configured such that the LU view behind
the portal group (target port) has changed, the target MUST generate a
"REPORTED LUNS DATA HAS CHANGED" check condition. 

Jim, in response to your comments :

I agree that the change in LUN inventory behind a target port is best
detected and reacted to on a "REPORTED LUNS DATA HAS CHANGED" check
condition.

As for using the LUN WWNs (EVPD INQUIRY to get page 83h) in order to
authenticate all the LUNs behind a target port, I think the above rules
are a more efficient way to detect this on session termination &
re-establishment, rather than stall all I/O traffic to that target port,
while going out to each LUN to authenticate them based on their LUN
WWNs. Besides, you still have to deal with the case where the LUN does
not support LUN WWNs.

Regards,
Santosh



Jim Hafner wrote:
> 
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Jim Hafner" <hafner@almaden.ibm.com>
> *
> 
> Mallikarjun,
> 
> Much as I would like to agree with you on most things (especially after you
> agreed with me so much...)
> 
> I think connecting LU views with TPGTs is a mistake and violates layering.
> Besides, LU views are
> (a) functions of SCSI level or other access controls
> (b) functions of iSCSI target node presentations
> Within the standards that I know of, there is no defined LU view that is
> different across the different target ports of any SCSI device (BUT see the
> two notes in the P.S.)
> 
> In case (b), the TPGT is already qualified by the node so there's no issue
> here.
> In case (a), the rules as defined by SCSI ACs are that the LU view is the
> same across all target ports.
> 
> I don't have any good "words" to smith into the document that makes clear
> what "reconfiguration" should trigger a new name and what shouldn't (and I
> haven't had time to think much about it either).
> 
> As for your final comment about IOs getting directed to the correct LU.
> This should be handled by LU Identifier (not just LUN) if this is a
> significant concern.  There's a subtle requirement in this virtual world
> we're moving towards that requires careful mapping of LUs to device objects
> within hosts so that LUN changes don't cause such problems.  But LUN
> changes can occur for many reasons, not just those raised here.  SCSI gives
> "REPORT LUNS DATA CHANGED" Unit Attentions, but if they're ignored,
> ...OOPS!.
> 
> Finally, to Santosh:  there is no notion in SCSI (or iSCSI, I think) about
> LUN OPEN/CLOSE.   LUs are "discovered" by INQUIRY and REPORT LUNs.  Once
> discovered, there is no further action required.  So, a logical unit is
> either "addressible" (in the view) or not (with a slight caveat about SCSI
> ACs and AccessId registration, but that should happen before the discovery
> phase anyway).   There may be layers about SCSI which have these notions
> but they probably only manipulate internal OS datastructures and have no
> "wire" protocol associated with them.   So, there should be no need to
> think about such actions being required after re-login.
> 
> Jim Hafner
> 
> P.S.
> Note1:  there are vendor-specific implementations that might seem to
> violate this statement if taken literally, but because such implementations
> are "pre-node names", one can view them as falling into the model (b)
> above.
> Note2: the "asymmetric port" stuff in SCSI (recent addition) doesn't change
> the "view" (i.e., the list of LUNs) so much as the accessibility of the
> addressed LU, so even this doesn't square with the issue at hand.
> 
> "Mallikarjun C." <cbm@rose.hp.com>@t10.org on 03/04/2002 03:12:15 PM
> 
> Sent by:    owner-t10@t10.org
> 
> To:    "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
> cc:    <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
> 
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Mallikarjun C." <cbm@rose.hp.com>
> *
> Santosh and Jim,
> 
> It appears a good idea to add in the portal group tag in the Login
> Request header for a sanity check by the receiving target portal.
> 
> I generally agree with Jim's comments that the duration of persistence
> of a portal group tag is intricately linked to the extent of portal
> reconfiguration.
> Not every target reconfiguration may result in a portal group tag
> reassignment.
> OTOH, some reconfigurations may be so extensive as to cause even a node
> name change.
> 
> Some comments on Santosh's message -
> 
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> 
> I am not sure this solves the problem you're trying to get at.  If none of
> the earlier IP addresses can get an initiator to the SCSI target port that
> it
> knew of (your scenario), it appears to me that it doesn't matter if the
> portal group tags are changed or not....A new discovery process should
> update the initiator of the changed portal addresses.
> 
> I suggest the following text -
> 
>    After a portal group reconfiguration which changed the view of LUs
>    for an initiator with a given set of privileges, the target MUST change
>    the portal group tag that represents the reconfigured target portal
>    group.
> 
> > > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> 
> I agree with Jim on this one - there should be *no* open/active I_T_L nexus
> traffic after a reconfiguration, targets can enforce this via simple iSCSI
> means
> (reject initiator advances to continue the session for DefaultTime2Wait+
> DefaultTime2Retain seconds).  In fact, Async logout request requires a
> clean closure that implicitly aborts I/Os.
> 
> What you're describing is typical O/S "LUN open" and "LUN close"
> interactions.  I agree that they wouldn't have to be repeated, but care
> must be taken to ensure that new I/Os (on the new session after
> reconfiguration)
> are not delivered to the incorrect LUs.  It seems that the addition of
> TPGT in the login header and the proposed new text (above) would take
> care of this.
> 
> Regards.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Santosh Rao" <santoshr@cup.hp.com>
> To: <ips@ece.cmu.edu>
> Cc: <t10@t10.org>
> Sent: Monday, March 04, 2002 10:40 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
> 
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * Santosh Rao <santoshr@cup.hp.com>
> > *
> > Jim,
> >
> > I agree that a "complete re-configuration" of a target port can result
> > in a new port name & port identifier. However, the tricky part is the
> > definition of a "complete re-configuration of an iscsi target port", due
> > to the concepts of portal groups involving multiple network portals.
> >
> > For example, if a portal group (aka, an iscsi target port) were to be
> > re-configured to include a new network portal [moved from another portal
> > group], then, the target port itself has not changed, since it is still
> > accessible through its previously used network portals. What has changed
> > is the individual network portal that has moved from 1 target port to
> > another.
> >
> > Hence, it is sufficient, in this case, to maintain persistence of the
> > target port name/identifier, without requiring any change in port
> > name/identifier. By requiring initiators to send the intended TPGT (scsi
> > target port name/identifier) along with the login request, this allows
> > the target port to detect that the network portal is being accessed to
> > connect to a different target port and it can reject the login.
> >
> > It may be helpful to call out the specific case when a port
> > name/identifier MUST change. How about something like :
> >
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> >
> > This would allow access to the target port through its un-altered
> > network portals to continue un-disrupted. More comments inline, in
> > response to some of your queries.
> >
> > Thanks,
> > Santosh
> >
> > NOTE : In this discussion target port and target portal group are used
> > to imply the same entity, within a target node.
> >
> >
> > Jim Hafner wrote:
> >
> > > SAM-2 requires scsi port names to be persistent and world-wide-unique.
> > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > >
> > > "A scsi port name shall never change and may be used to persistently
> > > identify a scsi initiator port or target port...".
> > >
> > > <JLH>
> > > There are different ways that one can interpret this "persistent" rule.
> The
> > > intent was that names shouldn't change over time when *identifying the
> same
> > > object*.   What that means is that if the object changes (in any
> > > discernable way), then the name should change.  So, the object can move
> to
> > > a different piece of hardware, but it can still be named the same way.
> If
> > > the object changes, e.g., in this case, reconfigures as a different set
> of
> > > network portals with different addressing elements, then I would think
> that
> > > the name should change as well.   That's all the persistence one really
> > > needs.
> > >
> > > I'm not sure what that implies about your recommendation.  I don't see
> any
> > > problem with it, either.
> > > </JLH>
> >
> > I think we may be in agreement. (See reasoning above).
> >
> >
> > >
> > > The rationale for (2) is :
> > > --------------------------
> > > Consider an initiator node establishing multiple sessions to a scsi tgt
> > > port, with each session established to a subset of the network portals
> > > within the tgt portal group.
> > >
> > > Consider an iscsi transport event involving the re-configuration of
> > > target portal groups on the iscsi target node. This may be preceeded by
> > > the iscsi sessions seeing an async message "target requests logout",
> > > followed by session logout, portal group re-configuration, and then,
> the
> > > initiator re-establishes sessions.
> > >
> > > Across a transport event that results in such session termination and
> > > re-establishment, the initiator needs to authenticate that it is still
> > > speaking to the same [i]scsi target port, in order to ensure that any
> > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > routed to a wrong LUN after such a transport event.
> >
> > > <JLH>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> >
> > All outstanding I/Os need to be aborted. Once the session is
> > re-established [and the target port is authenticated to be the same],
> > further I/O traffic can be resumed without requiring the SCSI ULP to
> > close and re-open each LUN. Some transport specific clearing effects may
> > have occurred, which may require additional LUN level activity, in some
> > cases.
> >
> > (There are analogies to the above model in FCP & SRP, which authenticate
> > port name/identifier on login, allowing I/O resumption after session
> > termination and re-establishment.)
> >
> >
> > > To prevent such authentication issues, iscsi can send the iscsi target
> > > port identifier (portal group tag) explicitly in the login request, and
> > > the login can be rejected by the target on a portal group tag
> mis-match.
> > > (if the network portal does not belong to the addressed portal group
> > > tag).
> > > <JLH>
> > > Did you mean for the initiator to send this TPGT?
> > > </JLH>
> >
> > Yes. The initiator login request must include the target portal group
> > tag, thus identifying the target port to which a session is being
> > established.
> >
> > Login currently carries no addressing information, since the addressing
> > is implicit, based on the TCP connection in use. The problem with this
> > approach is that the login implicitly addresses a network portal, and
> > not the target port. As seen in the earlier example, the association of
> > network portal <-> target port can change, and such changes can be
> > detected, if the initiator were to explicitly identify the target port
> > being logged into.
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
> 
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Tue Mar  5 02:08:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA15926
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 02:08:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g256BmU26719
	for ips-outgoing; Tue, 5 Mar 2002 01:11:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g256BhH26705;
	Tue, 5 Mar 2002 01:11:43 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id HAA18246;
	Tue, 5 Mar 2002 07:11:37 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g256DZf65344;
	Tue, 5 Mar 2002 07:13:35 +0100
To: Robert Snively <rsnively@Brocade.COM>
Cc: ips@ece.cmu.edu, Paul Koning <ni1d@arrl.net>, owner-ips@ece.cmu.edu,
        rsnively@Brocade.COM
MIME-Version: 1.0
Subject: RE: sector alignment for DataOut PDUs?
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFAEF2B9DE.2FD73832-ONC2256B73.00210BEA@telaviv.ibm.com>
Date: Tue, 5 Mar 2002 08:13:32 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 05/03/2002 08:13:36,
	Serialize complete at 05/03/2002 08:13:36
Content-Type: multipart/alternative; boundary="=_alternative 002179B7C2256B73_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002179B7C2256B73_=
Content-Type: text/plain; charset="us-ascii"

Bob,

I completely agree with your line of reasoning.  In SCSI the target is the 
master of the transfer and gets what it wants and it manages its resources 
as well as it can.  Buffer management is handled by both sides expressing 
their own requirements with the PDU length negotiation. 

I do not think that this is a thread that we would like to linger on.

Julo




Robert Snively <rsnively@Brocade.COM>
Sent by: owner-ips@ece.cmu.edu
04-03-02 17:29
Please respond to Robert Snively

 
        To:     Paul Koning <ni1d@arrl.net>, rsnively@Brocade.COM
        cc:     ips@ece.cmu.edu
        Subject:        RE: sector alignment for DataOut PDUs?

 

> > There has always been a feeling that it was nice to do things
> > on convenient boundaries, including memory page boundaries and
> > device physical block boundaries, but SCSI has long since 
> > elected to perform any operation on almost any boundary. 
> SCSI drives
> > and related operating systems have commonly used block sizes of 512
> > bytes and 520 bytes and less commonly of other values. 
> > 
> > The only requirement we were able to enforce in previous
> > SCSI protocols is that all but the last PDU of a transfer
> > were required to be on 4 byte boundaries.  We were also
> > able to enforce the maximum values and a requirement that
> > the transferred data count exactly match the requested byte
> > count.
> 
> I don't see that last point.  Certainly not for unsolicited data --
> and for R2T I can find no stated requirement to send exactly the
> requested count either.  Or did you mean the total for the entire
> operation as opposed to the individual bursts?
> 

I haven't reviewed all of iSCSI's rules with respect to this
particular issue.  There appears to be an assumption of 
non-congested processor-sized buffers that allow unsolicited
write data transfer.  That may be a convenient assumption for
some devices, but a problem for those that want more control
of their buffering.  In general, the requests for write data 
are part of the logical unit's write buffer management
and data striping management.  If you don't supply
exactly what is asked for, you foul up the buffer management of the
target, sometimes causing pathological performance problems.

> > I would strongly suggest that you not bother to enforce any
> > other boundary restrictions.
> > 
> > I believe Eddy was right when he asked:
> > 
> >              Given that the TCP issues of reassembly 
> >              are so much more complicated than
> >              the concatenation issues necessary for 
> >              target data alignment, is there
> >              really a problem here?
> > 
> > My answer to him would be, no, there is not a problem.
> 
> I answered it before when Eddy said that, but I'll summarize it again:
> I'm not talking about a problem, I'm talking about an opportunity for
> simplifying the target and making it more efficient.
> 
> Given alignment, each iSCSI PDU that carries data can be sent to disk
> by itself, because it corresponds exactly to one or more disk blocks.
> Without alignment, doing writes when the data arrives is still
> possible, but it clearly adds complexity because PDU boundaries don't
> match disk block boundaries.
> 
> I made the proposal because it clearly helps the target and appears to
> add no significant burden on the initiator.  The feedback to date
> indicates that this is indeed the case.
> 
> Are you saying "I don't care one way or the other" or are you saying
> "I feel this is a bad idea because it creates problems you haven't
> thought of"?  I'm reading your comment as the former; if you meant the
> latter, could you elaborate?

I think I am saying that I care, and that it is an idea that
will trap you into limiting simplifications.  In general, the 
initiator's data flow engine has no knowledge of the logical 
unit's physical block structure.  In addition, the page structure
from which you are obtaining data in the host will usually have boundaries
that are unrelated to the logical unit's physical block structure.
While it is perfectly possible to align PDU's with blocks, it
requires SCSI ULP information to be forced in to the lower level
data transfer hardware.  This is a significant inconvenience and
will cost performance and/or complexity.  Note that the blocks
in a logical unit are not all required to be the same size, and in
tape drives and some optical devices are typically not the same size.

I still think it is best for the logical unit to ask for what it wants,
then expect to get it.  The logical unit is the only device in
the system that really knows what it needs and when it needs it.
That is one of the important SCSI principles, allowing the logical unit
to take over all the media dependent functions from the initiator
and the host programming.




--=_alternative 002179B7C2256B73_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Bob,</font>
<br>
<br><font size=2 face="sans-serif">I completely agree with your line of reasoning. &nbsp;In SCSI the target is the master of the transfer and gets what it wants and it manages its resources as well as it can. &nbsp;Buffer management is handled by both sides expressing their own requirements with the PDU length negotiation. &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">I do not think that this is a thread that we would like to linger on.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Robert Snively &lt;rsnively@Brocade.COM&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">04-03-02 17:29</font>
<br><font size=1 face="sans-serif">Please respond to Robert Snively</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Paul Koning &lt;ni1d@arrl.net&gt;, rsnively@Brocade.COM</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: sector alignment for DataOut PDUs?</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">&gt; &gt; There has always been a feeling that it was nice to do things<br>
&gt; &gt; on convenient boundaries, including memory page boundaries and<br>
&gt; &gt; device physical block boundaries, but SCSI has long since <br>
&gt; &gt; elected to perform any operation on almost any boundary. &nbsp;<br>
&gt; SCSI drives<br>
&gt; &gt; and related operating systems have commonly used block sizes of 512<br>
&gt; &gt; bytes and 520 bytes and less commonly of other values. &nbsp;<br>
&gt; &gt; <br>
&gt; &gt; The only requirement we were able to enforce in previous<br>
&gt; &gt; SCSI protocols is that all but the last PDU of a transfer<br>
&gt; &gt; were required to be on 4 byte boundaries. &nbsp;We were also<br>
&gt; &gt; able to enforce the maximum values and a requirement that<br>
&gt; &gt; the transferred data count exactly match the requested byte<br>
&gt; &gt; count.<br>
&gt; <br>
&gt; I don't see that last point. &nbsp;Certainly not for unsolicited data --<br>
&gt; and for R2T I can find no stated requirement to send exactly the<br>
&gt; requested count either. &nbsp;Or did you mean the total for the entire<br>
&gt; operation as opposed to the individual bursts?<br>
&gt; &nbsp;<br>
<br>
I haven't reviewed all of iSCSI's rules with respect to this<br>
particular issue. &nbsp;There appears to be an assumption of <br>
non-congested processor-sized buffers that allow unsolicited<br>
write data transfer. &nbsp;That may be a convenient assumption for<br>
some devices, but a problem for those that want more control<br>
of their buffering. &nbsp;In general, the requests for write data <br>
are part of the logical unit's write buffer management<br>
and data striping management. &nbsp;If you don't supply<br>
exactly what is asked for, you foul up the buffer management of the<br>
target, sometimes causing pathological performance problems.<br>
<br>
&gt; &gt; I would strongly suggest that you not bother to enforce any<br>
&gt; &gt; other boundary restrictions.<br>
&gt; &gt; <br>
&gt; &gt; I believe Eddy was right when he asked:<br>
&gt; &gt; <br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Given that the TCP issues of reassembly <br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;are so much more complicated than<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;the concatenation issues necessary for <br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;target data alignment, is there<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;really a problem here?<br>
&gt; &gt; <br>
&gt; &gt; My answer to him would be, no, there is not a problem.<br>
&gt; <br>
&gt; I answered it before when Eddy said that, but I'll summarize it again:<br>
&gt; I'm not talking about a problem, I'm talking about an opportunity for<br>
&gt; simplifying the target and making it more efficient.<br>
&gt; <br>
&gt; Given alignment, each iSCSI PDU that carries data can be sent to disk<br>
&gt; by itself, because it corresponds exactly to one or more disk blocks.<br>
&gt; Without alignment, doing writes when the data arrives is still<br>
&gt; possible, but it clearly adds complexity because PDU boundaries don't<br>
&gt; match disk block boundaries.<br>
&gt; <br>
&gt; I made the proposal because it clearly helps the target and appears to<br>
&gt; add no significant burden on the initiator. &nbsp;The feedback to date<br>
&gt; indicates that this is indeed the case.<br>
&gt; <br>
&gt; Are you saying &quot;I don't care one way or the other&quot; or are you saying<br>
&gt; &quot;I feel this is a bad idea because it creates problems you haven't<br>
&gt; thought of&quot;? &nbsp;I'm reading your comment as the former; if you meant the<br>
&gt; latter, could you elaborate?<br>
<br>
I think I am saying that I care, and that it is an idea that<br>
will trap you into limiting simplifications. &nbsp;In general, the <br>
initiator's data flow engine has no knowledge of the logical <br>
unit's physical block structure. &nbsp;In addition, the page structure<br>
from which you are obtaining data in the host will usually have boundaries<br>
that are unrelated to the logical unit's physical block structure.<br>
While it is perfectly possible to align PDU's with blocks, it<br>
requires SCSI ULP information to be forced in to the lower level<br>
data transfer hardware. &nbsp;This is a significant inconvenience and<br>
will cost performance and/or complexity. &nbsp;Note that the blocks</font>
<br><font size=2 face="Courier New">in a logical unit are not all required to be the same size, and in<br>
tape drives and some optical devices are typically not the same size.<br>
<br>
I still think it is best for the logical unit to ask for what it wants,<br>
then expect to get it. &nbsp;The logical unit is the only device in<br>
the system that really knows what it needs and when it needs it.<br>
That is one of the important SCSI principles, allowing the logical unit<br>
to take over all the media dependent functions from the initiator<br>
and the host programming.<br>
<br>
</font>
<br>
<br>
--=_alternative 002179B7C2256B73_=--


From owner-ips@ece.cmu.edu  Tue Mar  5 02:12:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA17901
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 02:12:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g256QCY27515
	for ips-outgoing; Tue, 5 Mar 2002 01:26:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g256Q6H27508;
	Tue, 5 Mar 2002 01:26:06 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id HAA50166;
	Tue, 5 Mar 2002 07:22:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g256OhQ24202;
	Tue, 5 Mar 2002 07:24:43 +0100
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu,
        "Santosh Rao" <santoshr@cup.hp.com>, t10@t10.org
MIME-Version: 1.0
Subject: Re: iscsi : changes involving tgt portal group tag.
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF3D713C3E.CB877526-ONC2256B73.00229116@telaviv.ibm.com>
Date: Tue, 5 Mar 2002 08:24:51 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 05/03/2002 08:24:55,
	Serialize complete at 05/03/2002 08:24:55
Content-Type: multipart/alternative; boundary="=_alternative 0022B4C7C2256B73_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0022B4C7C2256B73_=
Content-Type: text/plain; charset="us-ascii"

Has a decent target implementation and easy way of checking that the TPG 
is correct?

Julo




"Mallikarjun C." <cbm@rose.hp.com>
Sent by: owner-ips@ece.cmu.edu
05-03-02 01:12
Please respond to "Mallikarjun C."

 
        To:     "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
        cc:     <t10@t10.org>
        Subject:        Re: iscsi : changes involving tgt portal group tag.

 

Santosh and Jim,

It appears a good idea to add in the portal group tag in the Login 
Request header for a sanity check by the receiving target portal.

I generally agree with Jim's comments that the duration of persistence
of a portal group tag is intricately linked to the extent of portal 
reconfiguration.
Not every target reconfiguration may result in a portal group tag 
reassignment.
OTOH, some reconfigurations may be so extensive as to cause even a node 
name change.

Some comments on Santosh's message -

> "If a portal group is re-configured such that all its previously
> advertised network portals are no longer a part of the portal group,
> then, the portal group tag (and thereby, the port name/identifier)
> *MUST* be changed to indicate a new target port."

I am not sure this solves the problem you're trying to get at.  If none of
the earlier IP addresses can get an initiator to the SCSI target port that 
it 
knew of (your scenario), it appears to me that it doesn't matter if the 
portal group tags are changed or not....A new discovery process should
update the initiator of the changed portal addresses.

I suggest the following text -

   After a portal group reconfiguration which changed the view of LUs
   for an initiator with a given set of privileges, the target MUST change
   the portal group tag that represents the reconfigured target portal 
group.

> > Under these events, shouldn't all "open/active I_T_L traffic" have 
been
> > aborted, closed or otherwise ended?  So this shouldn't be an issue at 
all.
> 
> On a session logout & re-login, it is not efficient/necessary to close
> and re-open each LUN behind that target port, due to the fact that a
> target port may have hundred's of LUNs behind it. 

I agree with Jim on this one - there should be *no* open/active I_T_L 
nexus 
traffic after a reconfiguration, targets can enforce this via simple iSCSI 
means
(reject initiator advances to continue the session for DefaultTime2Wait+
DefaultTime2Retain seconds).  In fact, Async logout request requires a
clean closure that implicitly aborts I/Os.

What you're describing is typical O/S "LUN open" and "LUN close"
interactions.  I agree that they wouldn't have to be repeated, but care 
must be taken to ensure that new I/Os (on the new session after 
reconfiguration)
are not delivered to the incorrect LUs.  It seems that the addition of 
TPGT in the login header and the proposed new text (above) would take
care of this.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747

----- Original Message ----- 
From: "Santosh Rao" <santoshr@cup.hp.com>
To: <ips@ece.cmu.edu>
Cc: <t10@t10.org>
Sent: Monday, March 04, 2002 10:40 AM
Subject: Re: iscsi : changes involving tgt portal group tag.


> * From the T10 Reflector (t10@t10.org), posted by:
> * Santosh Rao <santoshr@cup.hp.com>
> *
> Jim,
> 
> I agree that a "complete re-configuration" of a target port can result
> in a new port name & port identifier. However, the tricky part is the
> definition of a "complete re-configuration of an iscsi target port", due
> to the concepts of portal groups involving multiple network portals.
> 
> For example, if a portal group (aka, an iscsi target port) were to be
> re-configured to include a new network portal [moved from another portal
> group], then, the target port itself has not changed, since it is still
> accessible through its previously used network portals. What has changed
> is the individual network portal that has moved from 1 target port to
> another. 
> 
> Hence, it is sufficient, in this case, to maintain persistence of the
> target port name/identifier, without requiring any change in port
> name/identifier. By requiring initiators to send the intended TPGT (scsi
> target port name/identifier) along with the login request, this allows
> the target port to detect that the network portal is being accessed to
> connect to a different target port and it can reject the login.
> 
> It may be helpful to call out the specific case when a port
> name/identifier MUST change. How about something like :
> 
> "If a portal group is re-configured such that all its previously
> advertised network portals are no longer a part of the portal group,
> then, the portal group tag (and thereby, the port name/identifier)
> *MUST* be changed to indicate a new target port."
> 
> This would allow access to the target port through its un-altered
> network portals to continue un-disrupted. More comments inline, in
> response to some of your queries.
> 
> Thanks,
> Santosh
> 
> NOTE : In this discussion target port and target portal group are used
> to imply the same entity, within a target node.
> 
> 
> Jim Hafner wrote:
> 
> > SAM-2 requires scsi port names to be persistent and world-wide-unique.
> > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > 
> > "A scsi port name shall never change and may be used to persistently
> > identify a scsi initiator port or target port...".
> > 
> > <JLH>
> > There are different ways that one can interpret this "persistent" 
rule. The
> > intent was that names shouldn't change over time when *identifying the 
same
> > object*.   What that means is that if the object changes (in any
> > discernable way), then the name should change.  So, the object can 
move to
> > a different piece of hardware, but it can still be named the same way. 
 If
> > the object changes, e.g., in this case, reconfigures as a different 
set of
> > network portals with different addressing elements, then I would think 
that
> > the name should change as well.   That's all the persistence one 
really
> > needs.
> > 
> > I'm not sure what that implies about your recommendation.  I don't see 
any
> > problem with it, either.
> > </JLH>
> 
> I think we may be in agreement. (See reasoning above). 
> 
> 
> > 
> > The rationale for (2) is :
> > --------------------------
> > Consider an initiator node establishing multiple sessions to a scsi 
tgt
> > port, with each session established to a subset of the network portals
> > within the tgt portal group.
> > 
> > Consider an iscsi transport event involving the re-configuration of
> > target portal groups on the iscsi target node. This may be preceeded 
by
> > the iscsi sessions seeing an async message "target requests logout",
> > followed by session logout, portal group re-configuration, and then, 
the
> > initiator re-establishes sessions.
> > 
> > Across a transport event that results in such session termination and
> > re-establishment, the initiator needs to authenticate that it is still
> > speaking to the same [i]scsi target port, in order to ensure that any
> > open/active I-T-L nexus traffic on that session is not incorrectly
> > routed to a wrong LUN after such a transport event.
> 
> > <JLH>
> > Under these events, shouldn't all "open/active I_T_L traffic" have 
been
> > aborted, closed or otherwise ended?  So this shouldn't be an issue at 
all.
> 
> On a session logout & re-login, it is not efficient/necessary to close
> and re-open each LUN behind that target port, due to the fact that a
> target port may have hundred's of LUNs behind it. 
> 
> All outstanding I/Os need to be aborted. Once the session is
> re-established [and the target port is authenticated to be the same],
> further I/O traffic can be resumed without requiring the SCSI ULP to
> close and re-open each LUN. Some transport specific clearing effects may
> have occurred, which may require additional LUN level activity, in some
> cases. 
> 
> (There are analogies to the above model in FCP & SRP, which authenticate
> port name/identifier on login, allowing I/O resumption after session
> termination and re-establishment.)
> 
> 
> > To prevent such authentication issues, iscsi can send the iscsi target
> > port identifier (portal group tag) explicitly in the login request, 
and
> > the login can be rejected by the target on a portal group tag 
mis-match.
> > (if the network portal does not belong to the addressed portal group
> > tag).
> > <JLH>
> > Did you mean for the initiator to send this TPGT?
> > </JLH>
> 
> Yes. The initiator login request must include the target portal group
> tag, thus identifying the target port to which a session is being
> established. 
> 
> Login currently carries no addressing information, since the addressing
> is implicit, based on the TCP connection in use. The problem with this
> approach is that the login implicitly addresses a network portal, and
> not the target port. As seen in the earlier example, the association of
> network portal <-> target port can change, and such changes can be
> detected, if the initiator were to explicitly identify the target port
> being logged into.
> 
> -- 
> ##################################
> Santosh Rao
> Software Design Engineer,
> HP-UX iSCSI Driver Team,
> Hewlett Packard, Cupertino.
> email : santoshr@cup.hp.com
> Phone : 408-447-3751
> ##################################
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
> 



--=_alternative 0022B4C7C2256B73_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Has a decent target implementation and easy way of checking that the TPG is correct?</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">05-03-02 01:12</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Mallikarjun C.&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;Santosh Rao&quot; &lt;santoshr@cup.hp.com&gt;, &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&lt;t10@t10.org&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iscsi : changes involving tgt portal group tag.</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Santosh and Jim,<br>
<br>
It appears a good idea to add in the portal group tag in the Login <br>
Request header for a sanity check by the receiving target portal.<br>
<br>
I generally agree with Jim's comments that the duration of persistence<br>
of a portal group tag is intricately linked to the extent of portal reconfiguration.<br>
Not every target reconfiguration may result in a portal group tag reassignment.<br>
OTOH, some reconfigurations may be so extensive as to cause even a node <br>
name change.<br>
<br>
Some comments on Santosh's message -<br>
<br>
&gt; &quot;If a portal group is re-configured such that all its previously<br>
&gt; advertised network portals are no longer a part of the portal group,<br>
&gt; then, the portal group tag (and thereby, the port name/identifier)<br>
&gt; *MUST* be changed to indicate a new target port.&quot;<br>
<br>
I am not sure this solves the problem you're trying to get at. &nbsp;If none of<br>
the earlier IP addresses can get an initiator to the SCSI target port that it <br>
knew of (your scenario), it appears to me that it doesn't matter if the <br>
portal group tags are changed or not....A new discovery process should<br>
update the initiator of the changed portal addresses.<br>
<br>
I suggest the following text -<br>
<br>
 &nbsp; After a portal group reconfiguration which changed the view of LUs<br>
 &nbsp; for an initiator with a given set of privileges, the target MUST change<br>
 &nbsp; the portal group tag that represents the reconfigured target portal group.<br>
<br>
&gt; &gt; Under these events, shouldn't all &quot;open/active I_T_L traffic&quot; have been<br>
&gt; &gt; aborted, closed or otherwise ended? &nbsp;So this shouldn't be an issue at all.<br>
&gt; <br>
&gt; On a session logout &amp; re-login, it is not efficient/necessary to close<br>
&gt; and re-open each LUN behind that target port, due to the fact that a<br>
&gt; target port may have hundred's of LUNs behind it. <br>
<br>
I agree with Jim on this one - there should be *no* open/active I_T_L nexus <br>
traffic after a reconfiguration, targets can enforce this via simple iSCSI means<br>
(reject initiator advances to continue the session for DefaultTime2Wait+<br>
DefaultTime2Retain seconds). &nbsp;In fact, Async logout request requires a<br>
clean closure that implicitly aborts I/Os.<br>
<br>
What you're describing is typical O/S &quot;LUN open&quot; and &quot;LUN close&quot;<br>
interactions. &nbsp;I agree that they wouldn't have to be repeated, but care <br>
must be taken to ensure that new I/Os (on the new session after reconfiguration)<br>
are not delivered to the incorrect LUs. &nbsp;It seems that the addition of <br>
TPGT in the login header and the proposed new text (above) would take<br>
care of this.<br>
<br>
Regards.<br>
--<br>
Mallikarjun<br>
<br>
Mallikarjun Chadalapaka<br>
Networked Storage Architecture<br>
Network Storage Solutions Organization<br>
Hewlett-Packard MS 5668 <br>
Roseville CA 95747<br>
<br>
----- Original Message ----- <br>
From: &quot;Santosh Rao&quot; &lt;santoshr@cup.hp.com&gt;<br>
To: &lt;ips@ece.cmu.edu&gt;<br>
Cc: &lt;t10@t10.org&gt;<br>
Sent: Monday, March 04, 2002 10:40 AM<br>
Subject: Re: iscsi : changes involving tgt portal group tag.<br>
<br>
<br>
&gt; * From the T10 Reflector (t10@t10.org), posted by:<br>
&gt; * Santosh Rao &lt;santoshr@cup.hp.com&gt;<br>
&gt; *<br>
&gt; Jim,<br>
&gt; <br>
&gt; I agree that a &quot;complete re-configuration&quot; of a target port can result<br>
&gt; in a new port name &amp; port identifier. However, the tricky part is the<br>
&gt; definition of a &quot;complete re-configuration of an iscsi target port&quot;, due<br>
&gt; to the concepts of portal groups involving multiple network portals.<br>
&gt; </font>
<br><font size=2 face="Courier New">&gt; For example, if a portal group (aka, an iscsi target port) were to be<br>
&gt; re-configured to include a new network portal [moved from another portal<br>
&gt; group], then, the target port itself has not changed, since it is still<br>
&gt; accessible through its previously used network portals. What has changed<br>
&gt; is the individual network portal that has moved from 1 target port to<br>
&gt; another. <br>
&gt; <br>
&gt; Hence, it is sufficient, in this case, to maintain persistence of the<br>
&gt; target port name/identifier, without requiring any change in port<br>
&gt; name/identifier. By requiring initiators to send the intended TPGT (scsi<br>
&gt; target port name/identifier) along with the login request, this allows<br>
&gt; the target port to detect that the network portal is being accessed to<br>
&gt; connect to a different target port and it can reject the login.<br>
&gt; <br>
&gt; It may be helpful to call out the specific case when a port<br>
&gt; name/identifier MUST change. How about something like :<br>
&gt; <br>
&gt; &quot;If a portal group is re-configured such that all its previously<br>
&gt; advertised network portals are no longer a part of the portal group,<br>
&gt; then, the portal group tag (and thereby, the port name/identifier)<br>
&gt; *MUST* be changed to indicate a new target port.&quot;<br>
&gt; <br>
&gt; This would allow access to the target port through its un-altered<br>
&gt; network portals to continue un-disrupted. More comments inline, in<br>
&gt; response to some of your queries.<br>
&gt; <br>
&gt; Thanks,<br>
&gt; Santosh<br>
&gt; <br>
&gt; NOTE : In this discussion target port and target portal group are used<br>
&gt; to imply the same entity, within a target node.<br>
&gt; <br>
&gt; <br>
&gt; Jim Hafner wrote:<br>
&gt; <br>
&gt; &gt; SAM-2 requires scsi port names to be persistent and world-wide-unique.<br>
&gt; &gt; (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :<br>
&gt; &gt; <br>
&gt; &gt; &quot;A scsi port name shall never change and may be used to persistently<br>
&gt; &gt; identify a scsi initiator port or target port...&quot;.<br>
&gt; &gt; <br>
&gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; There are different ways that one can interpret this &quot;persistent&quot; rule. The<br>
&gt; &gt; intent was that names shouldn't change over time when *identifying the same<br>
&gt; &gt; object*. &nbsp; What that means is that if the object changes (in any<br>
&gt; &gt; discernable way), then the name should change. &nbsp;So, the object can move to<br>
&gt; &gt; a different piece of hardware, but it can still be named the same way. &nbsp;If<br>
&gt; &gt; the object changes, e.g., in this case, reconfigures as a different set of<br>
&gt; &gt; network portals with different addressing elements, then I would think that<br>
&gt; &gt; the name should change as well. &nbsp; That's all the persistence one really<br>
&gt; &gt; needs.<br>
&gt; &gt; <br>
&gt; &gt; I'm not sure what that implies about your recommendation. &nbsp;I don't see any<br>
&gt; &gt; problem with it, either.<br>
&gt; &gt; &lt;/JLH&gt;<br>
&gt; <br>
&gt; I think we may be in agreement. (See reasoning above). <br>
&gt; <br>
&gt; <br>
&gt; &gt; <br>
&gt; &gt; The rationale for (2) is :<br>
&gt; &gt; --------------------------<br>
&gt; &gt; Consider an initiator node establishing multiple sessions to a scsi tgt<br>
&gt; &gt; port, with each session established to a subset of the network portals<br>
&gt; &gt; within the tgt portal group.<br>
&gt; &gt; <br>
&gt; &gt; Consider an iscsi transport event involving the re-configuration of<br>
&gt; &gt; target portal groups on the iscsi target node. This may be preceeded by<br>
&gt; &gt; the iscsi sessions seeing an async message &quot;target requests logout&quot;,<br>
&gt; &gt; followed by session logout, portal group re-configuration, and then, the<br>
&gt; &gt; initiator re-establishes sessions.<br>
&gt; &gt; <br>
&gt; &gt; Across a transport event that results in such session termination and<br>
&gt; &gt; re-establishment, the initiator needs to authenticate that it is still<br>
&gt; &gt; speaking to the same [i]scsi target port, in order to ensure that any<br>
&gt; &gt; open/active I-T-L nexus traffic on that session is not incorrectly<br>
&gt; &gt; routed to a wrong LUN after such a transport event.<br>
&gt; <br>
&gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; Under these events, shouldn't all &quot;open/active I_T_L traffic&quot; have been<br>
&gt; &gt; aborted, closed or otherwise ended? &nbsp;So this shouldn't be an issue at all.<br>
&gt; <br>
&gt; On a session logout &amp; re-login, it is not efficient/necessary to close<br>
&gt; and re-open each LUN behind that target port, due to the fact that a<br>
&gt; target port may have hundred's of LUNs behind it. <br>
&gt; <br>
&gt; All outstanding I/Os need to be aborted. Once the session is<br>
&gt; re-established [and the target port is authenticated to be the same],<br>
&gt; further I/O traffic can be resumed without requiring the SCSI ULP to<br>
&gt; close and re-open each LUN. Some transport specific clearing effects may<br>
&gt; have occurred, which may require additional LUN level activity, in some<br>
&gt; cases. <br>
&gt; <br>
&gt; (There are analogies to the above model in FCP &amp; SRP, which authenticate<br>
&gt; port name/identifier on login, allowing I/O resumption after session<br>
&gt; termination and re-establishment.)<br>
&gt; <br>
&gt; <br>
&gt; &gt; To prevent such authentication issues, iscsi can send the iscsi target<br>
&gt; &gt; port identifier (portal group tag) explicitly in the login request, and<br>
&gt; &gt; the login can be rejected by the target on a portal group tag mis-match.<br>
&gt; &gt; (if the network portal does not belong to the addressed portal group<br>
&gt; &gt; tag).<br>
&gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; Did you mean for the initiator to send this TPGT?<br>
&gt; &gt; &lt;/JLH&gt;<br>
&gt; <br>
&gt; Yes. The initiator login request must include the target portal group<br>
&gt; tag, thus identifying the target port to which a session is being<br>
&gt; established. <br>
&gt; <br>
&gt; Login currently carries no addressing information, since the addressing<br>
&gt; is implicit, based on the TCP connection in use. The problem with this<br>
&gt; approach is that the login implicitly addresses a network portal, and<br>
&gt; not the target port. As seen in the earlier example, the association of<br>
&gt; network portal &lt;-&gt; target port can change, and such changes can be<br>
&gt; detected, if the initiator were to explicitly identify the target port<br>
&gt; being logged into.<br>
&gt; <br>
&gt; -- <br>
&gt; ##################################<br>
&gt; Santosh Rao<br>
&gt; Software Design Engineer,<br>
&gt; HP-UX iSCSI Driver Team,<br>
&gt; Hewlett Packard, Cupertino.<br>
&gt; email : santoshr@cup.hp.com<br>
&gt; Phone : 408-447-3751<br>
&gt; ##################################<br>
&gt; *<br>
&gt; * For T10 Reflector information, send a message with<br>
&gt; * 'info t10' (no quotes) in the message body to majordomo@t10.org<br>
&gt; <br>
</font>
<br>
<br>
--=_alternative 0022B4C7C2256B73_=--


From owner-ips@ece.cmu.edu  Tue Mar  5 09:41:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA01967
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 09:41:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25E0kv04494
	for ips-outgoing; Tue, 5 Mar 2002 09:00:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25BJcH25610
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 06:19:38 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23336;
	Tue, 5 Mar 2002 06:19:34 -0500 (EST)
Message-Id: <200203051119.GAA23336@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-scsi-mib-02.txt
Date: Tue, 05 Mar 2002 06:19:34 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Definition of Managed Objects for SCSI Entities
	Author(s)	: M. Bakke et al.
	Filename	: draft-ietf-ips-scsi-mib-02.txt
	Pages		: 55
	Date		: 04-Mar-02
	
This memo defines a Management Information Base (MIB) for Small 
Computer System Interface (SCSI) entities, independently of the 
transport layer.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-scsi-mib-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-scsi-mib-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133340.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-scsi-mib-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133340.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Tue Mar  5 09:42:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02021
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 09:42:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25E1jh04578
	for ips-outgoing; Tue, 5 Mar 2002 09:01:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25BJmH25636
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 06:19:48 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23363;
	Tue, 5 Mar 2002 06:19:44 -0500 (EST)
Message-Id: <200203051119.GAA23363@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-fcmgmt-mib-01.txt
Date: Tue, 05 Mar 2002 06:19:44 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Fibre Channel Management MIB
	Author(s)	: K. McCloghrie
	Filename	: draft-ietf-ips-fcmgmt-mib-01.txt
	Pages		: 75
	Date		: 04-Mar-02
	
This memo defines a portion of the Management Information Base (MIB) for
use with network management protocols in the Internet community.  In
particular, it describes managed objects for informantion related to
Fibre Channel.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcmgmt-mib-01.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-fcmgmt-mib-01.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-fcmgmt-mib-01.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133404.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-fcmgmt-mib-01.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-fcmgmt-mib-01.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133404.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Tue Mar  5 09:42:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02098
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 09:42:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25E1dO04567
	for ips-outgoing; Tue, 5 Mar 2002 09:01:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25BJhH25622
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 06:19:43 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23348;
	Tue, 5 Mar 2002 06:19:39 -0500 (EST)
Message-Id: <200203051119.GAA23348@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-mib-04.txt
Date: Tue, 05 Mar 2002 06:19:39 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Definitions of Managed Objects for iSCSI
	Author(s)	: M. Bakke, J. Muchow, M. Krueger, T. McSweeney
	Filename	: draft-ietf-ips-iscsi-mib-04.txt
	Pages		: 64
	Date		: 04-Mar-02
	
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in TCP/IP based internets.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-mib-04.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-mib-04.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-mib-04.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133352.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-mib-04.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-mib-04.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133352.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Tue Mar  5 09:45:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02151
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 09:45:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25E1aO04558
	for ips-outgoing; Tue, 5 Mar 2002 09:01:36 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25BJcH25610
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 06:19:38 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23336;
	Tue, 5 Mar 2002 06:19:34 -0500 (EST)
Message-Id: <200203051119.GAA23336@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-scsi-mib-02.txt
Date: Tue, 05 Mar 2002 06:19:34 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Definition of Managed Objects for SCSI Entities
	Author(s)	: M. Bakke et al.
	Filename	: draft-ietf-ips-scsi-mib-02.txt
	Pages		: 55
	Date		: 04-Mar-02
	
This memo defines a Management Information Base (MIB) for Small 
Computer System Interface (SCSI) entities, independently of the 
transport layer.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-scsi-mib-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-scsi-mib-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133340.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-scsi-mib-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133340.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Tue Mar  5 09:45:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02270
	for <ips-archive@lists.ietf.org>; Tue, 5 Mar 2002 09:45:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25E1ll04586
	for ips-outgoing; Tue, 5 Mar 2002 09:01:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25BJuH25663
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 06:19:56 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23378;
	Tue, 5 Mar 2002 06:19:52 -0500 (EST)
Message-Id: <200203051119.GAA23378@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-security-11.txt
Date: Tue, 05 Mar 2002 06:19:52 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Securing Block Storage Protocols over IP
	Author(s)	: B. Aboba et al.
	Filename	: draft-ietf-ips-security-11.txt
	Pages		: 65
	Date		: 04-Mar-02
	
This document discusses how block storage protocols running over IP,
including iSCSI, iFCP and FCIP, can utilize IPsec for security.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-security-11.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-security-11.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-security-11.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133416.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-security-11.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-security-11.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133416.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Tue Mar  5 12:40:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11255
	for <ips-archive@odin.ietf.org>; Tue, 5 Mar 2002 12:40:51 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25GQQv16083
	for ips-outgoing; Tue, 5 Mar 2002 11:26:26 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25GHhH15368
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 11:17:43 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.us.ibm.com [9.99.140.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id LAA35330;
	Tue, 5 Mar 2002 11:14:19 -0500
Received: from d03nm041.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g25GHZi191562;
	Tue, 5 Mar 2002 09:17:35 -0700
Importance: Normal
Subject: Re: iscsi : changes involving tgt portal group tag.
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
X-Mailer: Lotus Notes Release 5.0.3 (Intl) 21 March 2000
Message-ID: <OF029641D1.1944915D-ON88256B73.0056B7D3@boulder.ibm.com>
From: "Jim Hafner" <hafner@almaden.ibm.com>
Date: Tue, 5 Mar 2002 08:17:30 -0800
X-MIMETrack: Serialize by Router on D03NM041/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/05/2002 08:17:34 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Mallikarjun,

I'm confused here.  You say " LU views can be a function of the transport
in iSCSI, as your bullet (b) clearly says right after this comment!" and
then you argue that this can cause a problem.  But, if the LU view changes
by "(b) functions of iSCSI target node presentations" (my quote), then the
NODE NAME changes.  When that happens (and the host doesn't detect it, then
the host is logging in to a completely different node and the iSCSI
(re)login will fail (the iSCSI node names won't be right).  That is, it
will fail even without including the TPGT (if we add that requirement).
Adding the TPGT only gives an extra check for the initiator logging in to
the *same node*.

In other words, my case (b) should not be a problem even without the TPGT!

So again, I don't see an issue here as far as iSCSI is concerned (except
totally locallized on the TPGT issue Santosh raised).   LU views are
functions of the node configuration, as is the portal group arrangement.
Within the SCSI standards, there are no "port-specific" view associations
defined; but there is the UA mechanism to reflect changes to the view (as
might happen fully within the SCSI standards via either the Access Controls
stuff or the SCC-2 (controller command set).  Within iSCSI, if we define
some rule along the lines Santosh is suggesting (including TPGT and some
sort of rule that requires changes at the naming layer to reflect changes
to the portal group assignment), then I think all our basis are covered.

There is a responsibility on the part of the target builder to do the least
amount of reconfiguration that is disruptive to the potential data
integrity issues.  If the host doesn't pay attention, tough cookies.  If
the target doesn't provide the right hooks for the host, then that vendor
will soon out of business.  SCSI has defined its mechanisms for this issue
(the LU view changes within a given fixed device).  iSCSI can define its
mechanism (the portal group view changes within a given fixed device).
Anything that involves a change of device is already detectable by the
host.

Your scenario A can happen in my opinion (according to the standards) only
if (a) either the node name changed (which is covered already) or (b) the
TPGT changes for both portal groups (which is covered by Santosh's
recommendation).

You ask about "different views from different ports expressly forbidden by
the SCSI architecture".  As with many things, the SCSI architecture can let
you do a lot of things without violating the standard, but they can be
risky as well. If you chose to build a box with different LU views on
different ports and then you swap that around under the covers, (and you
don't UA the host to death) you've problably broken your contract with the
host.  The same thing can happen in many FC controllers that already do
this mapping by target port.  You've stretched outside the SCSI
architecture (haven't violated it, just gone outside it).  As such, you
take the risk to your customer's data.

My point here is that I think the iSCSI standard can be silent on this
specific issue of your case A.  T10 (and FCP and SRP and...) is silent
(with the exception of UA), and I don't see any obligation on the part of
iSCSI to do more.

Jim Hafner


"Mallikarjun C." <cbm@rose.hp.com> on 03/04/2002 05:38:18 PM

To:    Jim Hafner/Almaden/IBM@IBMUS
cc:    <ips@ece.cmu.edu>, <t10@t10.org>
Subject:    Re: iscsi : changes involving tgt portal group tag.



Jim,

> Much as I would like to agree with you on most things (especially after
you
> agreed with me so much...)

Thanks for preparing me for what's coming, :-)  Let me attempt to
paraphrase
what you're saying.

> I think connecting LU views with TPGTs is a mistake and violates
layering.

I am surprised.  LU views can be a function of the transport in iSCSI, as
your
bullet (b) clearly says right after this comment!  I would go so far as to
say that
one reason for creating multiple iSCSI target nodes is to simply "package"
different LU views under each one.

If I understood Santosh's concern correctly, he was referring to the
scenario of
initiator (incorrectly) addressing a changed LU with the same LUN after a
new
session is instantiated.  Assuming for now that we introduced the "intended
TPGT"
into the Login Request header, I can see two ways how his scenario can
still
happen (both assume session and I/O termination, followed by a
reinstantiation) -

A.  Two iSCSI portal groups (i.e. SCSI ports) with different LU views
     had their LU views swapped "underneath" them as part of
     reconfiguration.

B.  Certain LUNs had new LUs (with new LU identifiers) at the old address.

It wasn't clear to me from your comments that scenario A above (different
views for
different ports) is expressly forbidden by SCSI architecture.  Can you
please
clarify?

I agree with your reasoning for scenario B above that a UA (perhaps
interlocked)
would be
adequate to deal with the changed LU.    Though it wasn't clear from SPC-3,
I assume
initiators are guaranteed to see this UA even after arbitrary amount of
time (after
the
change) when they re-establish the nexus.  A brief digression: if a new
initiator
establishes
a nexus after the change (for the first time), is it expected to see this
UA?

Lastly,
> This should be handled by LU Identifier (not just LUN) if this is a...

Agreed, I believe this Identifier is traditionally checked during the
"open" time,
and as you point out (should be) on the "REPORTED LUNS DATA HAS CHANGED"
UA. [ If scenario A were legal, the checking would need to be done after
the forced
discovery (due to TPGT change) process as well....]

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747


----- Original Message -----
From: "Jim Hafner" <hafner@almaden.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Monday, March 04, 2002 4:21 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


>
> Mallikarjun,
>
> Much as I would like to agree with you on most things (especially after
you
> agreed with me so much...)
>
> I think connecting LU views with TPGTs is a mistake and violates
layering.
> Besides, LU views are
> (a) functions of SCSI level or other access controls
> (b) functions of iSCSI target node presentations
> Within the standards that I know of, there is no defined LU view that is
> different across the different target ports of any SCSI device (BUT see
the
> two notes in the P.S.)
>
> In case (b), the TPGT is already qualified by the node so there's no
issue
> here.
> In case (a), the rules as defined by SCSI ACs are that the LU view is the
> same across all target ports.
>
> I don't have any good "words" to smith into the document that makes clear
> what "reconfiguration" should trigger a new name and what shouldn't (and
I
> haven't had time to think much about it either).
>
> As for your final comment about IOs getting directed to the correct LU.
> This should be handled by LU Identifier (not just LUN) if this is a
> significant concern.  There's a subtle requirement in this virtual world
> we're moving towards that requires careful mapping of LUs to device
objects
> within hosts so that LUN changes don't cause such problems.  But LUN
> changes can occur for many reasons, not just those raised here.  SCSI
gives
> "REPORT LUNS DATA CHANGED" Unit Attentions, but if they're ignored,
> ...OOPS!.
>
> Finally, to Santosh:  there is no notion in SCSI (or iSCSI, I think)
about
> LUN OPEN/CLOSE.   LUs are "discovered" by INQUIRY and REPORT LUNs.  Once
> discovered, there is no further action required.  So, a logical unit is
> either "addressible" (in the view) or not (with a slight caveat about
SCSI
> ACs and AccessId registration, but that should happen before the
discovery
> phase anyway).   There may be layers about SCSI which have these notions
> but they probably only manipulate internal OS datastructures and have no
> "wire" protocol associated with them.   So, there should be no need to
> think about such actions being required after re-login.
>
> Jim Hafner
>
> P.S.
> Note1:  there are vendor-specific implementations that might seem to
> violate this statement if taken literally, but because such
implementations
> are "pre-node names", one can view them as falling into the model (b)
> above.
> Note2: the "asymmetric port" stuff in SCSI (recent addition) doesn't
change
> the "view" (i.e., the list of LUNs) so much as the accessibility of the
> addressed LU, so even this doesn't square with the issue at hand.
>
>
>
> "Mallikarjun C." <cbm@rose.hp.com>@t10.org on 03/04/2002 03:12:15 PM
>
> Sent by:    owner-t10@t10.org
>
>
> To:    "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
> cc:    <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
>
>
>
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Mallikarjun C." <cbm@rose.hp.com>
> *
> Santosh and Jim,
>
> It appears a good idea to add in the portal group tag in the Login
> Request header for a sanity check by the receiving target portal.
>
> I generally agree with Jim's comments that the duration of persistence
> of a portal group tag is intricately linked to the extent of portal
> reconfiguration.
> Not every target reconfiguration may result in a portal group tag
> reassignment.
> OTOH, some reconfigurations may be so extensive as to cause even a node
> name change.
>
> Some comments on Santosh's message -
>
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
>
> I am not sure this solves the problem you're trying to get at.  If none
of
> the earlier IP addresses can get an initiator to the SCSI target port
that
> it
> knew of (your scenario), it appears to me that it doesn't matter if the
> portal group tags are changed or not....A new discovery process should
> update the initiator of the changed portal addresses.
>
> I suggest the following text -
>
>    After a portal group reconfiguration which changed the view of LUs
>    for an initiator with a given set of privileges, the target MUST
change
>    the portal group tag that represents the reconfigured target portal
>    group.
>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
>
> I agree with Jim on this one - there should be *no* open/active I_T_L
nexus
> traffic after a reconfiguration, targets can enforce this via simple
iSCSI
> means
> (reject initiator advances to continue the session for DefaultTime2Wait+
> DefaultTime2Retain seconds).  In fact, Async logout request requires a
> clean closure that implicitly aborts I/Os.
>
> What you're describing is typical O/S "LUN open" and "LUN close"
> interactions.  I agree that they wouldn't have to be repeated, but care
> must be taken to ensure that new I/Os (on the new session after
> reconfiguration)
> are not delivered to the incorrect LUs.  It seems that the addition of
> TPGT in the login header and the proposed new text (above) would take
> care of this.
>
> Regards.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Santosh Rao" <santoshr@cup.hp.com>
> To: <ips@ece.cmu.edu>
> Cc: <t10@t10.org>
> Sent: Monday, March 04, 2002 10:40 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * Santosh Rao <santoshr@cup.hp.com>
> > *
> > Jim,
> >
> > I agree that a "complete re-configuration" of a target port can result
> > in a new port name & port identifier. However, the tricky part is the
> > definition of a "complete re-configuration of an iscsi target port",
due
> > to the concepts of portal groups involving multiple network portals.
> >
> > For example, if a portal group (aka, an iscsi target port) were to be
> > re-configured to include a new network portal [moved from another
portal
> > group], then, the target port itself has not changed, since it is still
> > accessible through its previously used network portals. What has
changed
> > is the individual network portal that has moved from 1 target port to
> > another.
> >
> > Hence, it is sufficient, in this case, to maintain persistence of the
> > target port name/identifier, without requiring any change in port
> > name/identifier. By requiring initiators to send the intended TPGT
(scsi
> > target port name/identifier) along with the login request, this allows
> > the target port to detect that the network portal is being accessed to
> > connect to a different target port and it can reject the login.
> >
> > It may be helpful to call out the specific case when a port
> > name/identifier MUST change. How about something like :
> >
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> >
> > This would allow access to the target port through its un-altered
> > network portals to continue un-disrupted. More comments inline, in
> > response to some of your queries.
> >
> > Thanks,
> > Santosh
> >
> > NOTE : In this discussion target port and target portal group are used
> > to imply the same entity, within a target node.
> >
> >
> > Jim Hafner wrote:
> >
> > > SAM-2 requires scsi port names to be persistent and
world-wide-unique.
> > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > >
> > > "A scsi port name shall never change and may be used to persistently
> > > identify a scsi initiator port or target port...".
> > >
> > > <JLH>
> > > There are different ways that one can interpret this "persistent"
rule.
> The
> > > intent was that names shouldn't change over time when *identifying
the
> same
> > > object*.   What that means is that if the object changes (in any
> > > discernable way), then the name should change.  So, the object can
move
> to
> > > a different piece of hardware, but it can still be named the same
way.
> If
> > > the object changes, e.g., in this case, reconfigures as a different
set
> of
> > > network portals with different addressing elements, then I would
think
> that
> > > the name should change as well.   That's all the persistence one
really
> > > needs.
> > >
> > > I'm not sure what that implies about your recommendation.  I don't
see
> any
> > > problem with it, either.
> > > </JLH>
> >
> > I think we may be in agreement. (See reasoning above).
> >
> >
> > >
> > > The rationale for (2) is :
> > > --------------------------
> > > Consider an initiator node establishing multiple sessions to a scsi
tgt
> > > port, with each session established to a subset of the network
portals
> > > within the tgt portal group.
> > >
> > > Consider an iscsi transport event involving the re-configuration of
> > > target portal groups on the iscsi target node. This may be preceeded
by
> > > the iscsi sessions seeing an async message "target requests logout",
> > > followed by session logout, portal group re-configuration, and then,
> the
> > > initiator re-establishes sessions.
> > >
> > > Across a transport event that results in such session termination and
> > > re-establishment, the initiator needs to authenticate that it is
still
> > > speaking to the same [i]scsi target port, in order to ensure that any
> > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > routed to a wrong LUN after such a transport event.
> >
> > > <JLH>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> >
> > All outstanding I/Os need to be aborted. Once the session is
> > re-established [and the target port is authenticated to be the same],
> > further I/O traffic can be resumed without requiring the SCSI ULP to
> > close and re-open each LUN. Some transport specific clearing effects
may
> > have occurred, which may require additional LUN level activity, in some
> > cases.
> >
> > (There are analogies to the above model in FCP & SRP, which
authenticate
> > port name/identifier on login, allowing I/O resumption after session
> > termination and re-establishment.)
> >
> >
> > > To prevent such authentication issues, iscsi can send the iscsi
target
> > > port identifier (portal group tag) explicitly in the login request,
and
> > > the login can be rejected by the target on a portal group tag
> mis-match.
> > > (if the network portal does not belong to the addressed portal group
> > > tag).
> > > <JLH>
> > > Did you mean for the initiator to send this TPGT?
> > > </JLH>
> >
> > Yes. The initiator login request must include the target portal group
> > tag, thus identifying the target port to which a session is being
> > established.
> >
> > Login currently carries no addressing information, since the addressing
> > is implicit, based on the TCP connection in use. The problem with this
> > approach is that the login implicitly addresses a network portal, and
> > not the target port. As seen in the earlier example, the association of
> > network portal <-> target port can change, and such changes can be
> > detected, if the initiator were to explicitly identify the target port
> > being logged into.
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
>
>
>
>





From owner-ips@ece.cmu.edu  Tue Mar  5 13:54:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA01362
	for <ips-archive@odin.ietf.org>; Tue, 5 Mar 2002 13:54:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25Hl0223055
	for ips-outgoing; Tue, 5 Mar 2002 12:47:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel7.hp.com (atlrel7.hp.com [156.153.255.213])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25HkxH23051
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 12:46:59 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel7.hp.com (Postfix) with ESMTP
	id 447AC805086; Tue,  5 Mar 2002 12:46:53 -0500 (EST)
Received: from rose.hp.com (hpsil34.rose.hp.com [15.43.211.225]) by core.rose.hp.com with ESMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id JAA21747; Tue, 5 Mar 2002 09:48:33 -0800 (PST)
Message-Id: <200203051748.JAA21747@core.rose.hp.com>
Date: Tue, 05 Mar 2002 10:01:36 -0800
From: "Mallikarjun C." <cbm@rose.hp.com>
Reply-To: cbm@rose.hp.com
Organization: Hewlett-Packard, Roseville
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.10.20 9000/715)
X-Accept-Language: en
MIME-Version: 1.0
To: Jim Hafner <hafner@almaden.ibm.com>
Cc: ips@ece.cmu.edu, t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <OF029641D1.1944915D-ON88256B73.0056B7D3@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Jim,

> I'm confused here.  You say " LU views can be a function of the transport
> in iSCSI, as your bullet (b) clearly says right after this comment!" and
> then you argue that this can cause a problem.

I was merely objecting to your comment on layering violation.
It is allowed to associate LU views to a transport construct -
a (possibly virtual) iSCSI target node.  

My attempt was to understand the issues in associating TPGT with 
the LU views (the next level), but not to say that there are no
issues.  

> In other words, my case (b) should not be a problem even without the TPGT!

Agreed, I didn't think it was.

>If you chose to build a box with different LU views on
> different ports and then you swap that around under the covers, (and you
> don't UA the host to death)...

I wasn't convinced that the UA could be used for changes brought
about by iSCSI-level reconfiguration - which was my scenario A.  
But after further thought, I agree with your suggestion that UA
is usable even for scenario A - since the associated SCSI Port Name
is changing as well with the reconfiguration.

To summarize, relying on UA seems like a decent solution even 
when LU views are associated with TPGTs, in addition to node 
names.

Regards.
-- 
Mallikarjun 


Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
MS 5668	Hewlett-Packard, Roseville.
cbm@rose.hp.com


Jim Hafner wrote:
> 
> Mallikarjun,
> 
> I'm confused here.  You say " LU views can be a function of the transport
> in iSCSI, as your bullet (b) clearly says right after this comment!" and
> then you argue that this can cause a problem.  But, if the LU view changes
> by "(b) functions of iSCSI target node presentations" (my quote), then the
> NODE NAME changes.  When that happens (and the host doesn't detect it, then
> the host is logging in to a completely different node and the iSCSI
> (re)login will fail (the iSCSI node names won't be right).  That is, it
> will fail even without including the TPGT (if we add that requirement).
> Adding the TPGT only gives an extra check for the initiator logging in to
> the *same node*.
> 
> In other words, my case (b) should not be a problem even without the TPGT!
> 
> So again, I don't see an issue here as far as iSCSI is concerned (except
> totally locallized on the TPGT issue Santosh raised).   LU views are
> functions of the node configuration, as is the portal group arrangement.
> Within the SCSI standards, there are no "port-specific" view associations
> defined; but there is the UA mechanism to reflect changes to the view (as
> might happen fully within the SCSI standards via either the Access Controls
> stuff or the SCC-2 (controller command set).  Within iSCSI, if we define
> some rule along the lines Santosh is suggesting (including TPGT and some
> sort of rule that requires changes at the naming layer to reflect changes
> to the portal group assignment), then I think all our basis are covered.
> 
> There is a responsibility on the part of the target builder to do the least
> amount of reconfiguration that is disruptive to the potential data
> integrity issues.  If the host doesn't pay attention, tough cookies.  If
> the target doesn't provide the right hooks for the host, then that vendor
> will soon out of business.  SCSI has defined its mechanisms for this issue
> (the LU view changes within a given fixed device).  iSCSI can define its
> mechanism (the portal group view changes within a given fixed device).
> Anything that involves a change of device is already detectable by the
> host.
> 
> Your scenario A can happen in my opinion (according to the standards) only
> if (a) either the node name changed (which is covered already) or (b) the
> TPGT changes for both portal groups (which is covered by Santosh's
> recommendation).
> 
> You ask about "different views from different ports expressly forbidden by
> the SCSI architecture".  As with many things, the SCSI architecture can let
> you do a lot of things without violating the standard, but they can be
> risky as well. If you chose to build a box with different LU views on
> different ports and then you swap that around under the covers, (and you
> don't UA the host to death) you've problably broken your contract with the
> host.  The same thing can happen in many FC controllers that already do
> this mapping by target port.  You've stretched outside the SCSI
> architecture (haven't violated it, just gone outside it).  As such, you
> take the risk to your customer's data.
> 
> My point here is that I think the iSCSI standard can be silent on this
> specific issue of your case A.  T10 (and FCP and SRP and...) is silent
> (with the exception of UA), and I don't see any obligation on the part of
> iSCSI to do more.
> 
> Jim Hafner
> 
> "Mallikarjun C." <cbm@rose.hp.com> on 03/04/2002 05:38:18 PM
> 
> To:    Jim Hafner/Almaden/IBM@IBMUS
> cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
> 
> Jim,
> 
> > Much as I would like to agree with you on most things (especially after
> you
> > agreed with me so much...)
> 
> Thanks for preparing me for what's coming, :-)  Let me attempt to
> paraphrase
> what you're saying.
> 
> > I think connecting LU views with TPGTs is a mistake and violates
> layering.
> 
> I am surprised.  LU views can be a function of the transport in iSCSI, as
> your
> bullet (b) clearly says right after this comment!  I would go so far as to
> say that
> one reason for creating multiple iSCSI target nodes is to simply "package"
> different LU views under each one.
> 
> If I understood Santosh's concern correctly, he was referring to the
> scenario of
> initiator (incorrectly) addressing a changed LU with the same LUN after a
> new
> session is instantiated.  Assuming for now that we introduced the "intended
> TPGT"
> into the Login Request header, I can see two ways how his scenario can
> still
> happen (both assume session and I/O termination, followed by a
> reinstantiation) -
> 
> A.  Two iSCSI portal groups (i.e. SCSI ports) with different LU views
>      had their LU views swapped "underneath" them as part of
>      reconfiguration.
> 
> B.  Certain LUNs had new LUs (with new LU identifiers) at the old address.
> 
> It wasn't clear to me from your comments that scenario A above (different
> views for
> different ports) is expressly forbidden by SCSI architecture.  Can you
> please
> clarify?
> 
> I agree with your reasoning for scenario B above that a UA (perhaps
> interlocked)
> would be
> adequate to deal with the changed LU.    Though it wasn't clear from SPC-3,
> I assume
> initiators are guaranteed to see this UA even after arbitrary amount of
> time (after
> the
> change) when they re-establish the nexus.  A brief digression: if a new
> initiator
> establishes
> a nexus after the change (for the first time), is it expected to see this
> UA?
> 
> Lastly,
> > This should be handled by LU Identifier (not just LUN) if this is a...
> 
> Agreed, I believe this Identifier is traditionally checked during the
> "open" time,
> and as you point out (should be) on the "REPORTED LUNS DATA HAS CHANGED"
> UA. [ If scenario A were legal, the checking would need to be done after
> the forced
> discovery (due to TPGT change) process as well....]
> 
> Regards.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Jim Hafner" <hafner@almaden.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Monday, March 04, 2002 4:21 PM
> Subject: Re: iscsi : changes involving tgt portal group tag.
> 
> >
> > Mallikarjun,
> >
> > Much as I would like to agree with you on most things (especially after
> you
> > agreed with me so much...)
> >
> > I think connecting LU views with TPGTs is a mistake and violates
> layering.
> > Besides, LU views are
> > (a) functions of SCSI level or other access controls
> > (b) functions of iSCSI target node presentations
> > Within the standards that I know of, there is no defined LU view that is
> > different across the different target ports of any SCSI device (BUT see
> the
> > two notes in the P.S.)
> >
> > In case (b), the TPGT is already qualified by the node so there's no
> issue
> > here.
> > In case (a), the rules as defined by SCSI ACs are that the LU view is the
> > same across all target ports.
> >
> > I don't have any good "words" to smith into the document that makes clear
> > what "reconfiguration" should trigger a new name and what shouldn't (and
> I
> > haven't had time to think much about it either).
> >
> > As for your final comment about IOs getting directed to the correct LU.
> > This should be handled by LU Identifier (not just LUN) if this is a
> > significant concern.  There's a subtle requirement in this virtual world
> > we're moving towards that requires careful mapping of LUs to device
> objects
> > within hosts so that LUN changes don't cause such problems.  But LUN
> > changes can occur for many reasons, not just those raised here.  SCSI
> gives
> > "REPORT LUNS DATA CHANGED" Unit Attentions, but if they're ignored,
> > ...OOPS!.
> >
> > Finally, to Santosh:  there is no notion in SCSI (or iSCSI, I think)
> about
> > LUN OPEN/CLOSE.   LUs are "discovered" by INQUIRY and REPORT LUNs.  Once
> > discovered, there is no further action required.  So, a logical unit is
> > either "addressible" (in the view) or not (with a slight caveat about
> SCSI
> > ACs and AccessId registration, but that should happen before the
> discovery
> > phase anyway).   There may be layers about SCSI which have these notions
> > but they probably only manipulate internal OS datastructures and have no
> > "wire" protocol associated with them.   So, there should be no need to
> > think about such actions being required after re-login.
> >
> > Jim Hafner
> >
> > P.S.
> > Note1:  there are vendor-specific implementations that might seem to
> > violate this statement if taken literally, but because such
> implementations
> > are "pre-node names", one can view them as falling into the model (b)
> > above.
> > Note2: the "asymmetric port" stuff in SCSI (recent addition) doesn't
> change
> > the "view" (i.e., the list of LUNs) so much as the accessibility of the
> > addressed LU, so even this doesn't square with the issue at hand.
> >
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>@t10.org on 03/04/2002 03:12:15 PM
> >
> > Sent by:    owner-t10@t10.org
> >
> >
> > To:    "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
> > cc:    <t10@t10.org>
> > Subject:    Re: iscsi : changes involving tgt portal group tag.
> >
> >
> >
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * "Mallikarjun C." <cbm@rose.hp.com>
> > *
> > Santosh and Jim,
> >
> > It appears a good idea to add in the portal group tag in the Login
> > Request header for a sanity check by the receiving target portal.
> >
> > I generally agree with Jim's comments that the duration of persistence
> > of a portal group tag is intricately linked to the extent of portal
> > reconfiguration.
> > Not every target reconfiguration may result in a portal group tag
> > reassignment.
> > OTOH, some reconfigurations may be so extensive as to cause even a node
> > name change.
> >
> > Some comments on Santosh's message -
> >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> >
> > I am not sure this solves the problem you're trying to get at.  If none
> of
> > the earlier IP addresses can get an initiator to the SCSI target port
> that
> > it
> > knew of (your scenario), it appears to me that it doesn't matter if the
> > portal group tags are changed or not....A new discovery process should
> > update the initiator of the changed portal addresses.
> >
> > I suggest the following text -
> >
> >    After a portal group reconfiguration which changed the view of LUs
> >    for an initiator with a given set of privileges, the target MUST
> change
> >    the portal group tag that represents the reconfigured target portal
> >    group.
> >
> > > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to close
> > > and re-open each LUN behind that target port, due to the fact that a
> > > target port may have hundred's of LUNs behind it.
> >
> > I agree with Jim on this one - there should be *no* open/active I_T_L
> nexus
> > traffic after a reconfiguration, targets can enforce this via simple
> iSCSI
> > means
> > (reject initiator advances to continue the session for DefaultTime2Wait+
> > DefaultTime2Retain seconds).  In fact, Async logout request requires a
> > clean closure that implicitly aborts I/Os.
> >
> > What you're describing is typical O/S "LUN open" and "LUN close"
> > interactions.  I agree that they wouldn't have to be repeated, but care
> > must be taken to ensure that new I/Os (on the new session after
> > reconfiguration)
> > are not delivered to the incorrect LUs.  It seems that the addition of
> > TPGT in the login header and the proposed new text (above) would take
> > care of this.
> >
> > Regards.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Santosh Rao" <santoshr@cup.hp.com>
> > To: <ips@ece.cmu.edu>
> > Cc: <t10@t10.org>
> > Sent: Monday, March 04, 2002 10:40 AM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > * From the T10 Reflector (t10@t10.org), posted by:
> > > * Santosh Rao <santoshr@cup.hp.com>
> > > *
> > > Jim,
> > >
> > > I agree that a "complete re-configuration" of a target port can result
> > > in a new port name & port identifier. However, the tricky part is the
> > > definition of a "complete re-configuration of an iscsi target port",
> due
> > > to the concepts of portal groups involving multiple network portals.
> > >
> > > For example, if a portal group (aka, an iscsi target port) were to be
> > > re-configured to include a new network portal [moved from another
> portal
> > > group], then, the target port itself has not changed, since it is still
> > > accessible through its previously used network portals. What has
> changed
> > > is the individual network portal that has moved from 1 target port to
> > > another.
> > >
> > > Hence, it is sufficient, in this case, to maintain persistence of the
> > > target port name/identifier, without requiring any change in port
> > > name/identifier. By requiring initiators to send the intended TPGT
> (scsi
> > > target port name/identifier) along with the login request, this allows
> > > the target port to detect that the network portal is being accessed to
> > > connect to a different target port and it can reject the login.
> > >
> > > It may be helpful to call out the specific case when a port
> > > name/identifier MUST change. How about something like :
> > >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> > >
> > > This would allow access to the target port through its un-altered
> > > network portals to continue un-disrupted. More comments inline, in
> > > response to some of your queries.
> > >
> > > Thanks,
> > > Santosh
> > >
> > > NOTE : In this discussion target port and target portal group are used
> > > to imply the same entity, within a target node.
> > >
> > >
> > > Jim Hafner wrote:
> > >
> > > > SAM-2 requires scsi port names to be persistent and
> world-wide-unique.
> > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > >
> > > > "A scsi port name shall never change and may be used to persistently
> > > > identify a scsi initiator port or target port...".
> > > >
> > > > <JLH>
> > > > There are different ways that one can interpret this "persistent"
> rule.
> > The
> > > > intent was that names shouldn't change over time when *identifying
> the
> > same
> > > > object*.   What that means is that if the object changes (in any
> > > > discernable way), then the name should change.  So, the object can
> move
> > to
> > > > a different piece of hardware, but it can still be named the same
> way.
> > If
> > > > the object changes, e.g., in this case, reconfigures as a different
> set
> > of
> > > > network portals with different addressing elements, then I would
> think
> > that
> > > > the name should change as well.   That's all the persistence one
> really
> > > > needs.
> > > >
> > > > I'm not sure what that implies about your recommendation.  I don't
> see
> > any
> > > > problem with it, either.
> > > > </JLH>
> > >
> > > I think we may be in agreement. (See reasoning above).
> > >
> > >
> > > >
> > > > The rationale for (2) is :
> > > > --------------------------
> > > > Consider an initiator node establishing multiple sessions to a scsi
> tgt
> > > > port, with each session established to a subset of the network
> portals
> > > > within the tgt portal group.
> > > >
> > > > Consider an iscsi transport event involving the re-configuration of
> > > > target portal groups on the iscsi target node. This may be preceeded
> by
> > > > the iscsi sessions seeing an async message "target requests logout",
> > > > followed by session logout, portal group re-configuration, and then,
> > the
> > > > initiator re-establishes sessions.
> > > >
> > > > Across a transport event that results in such session termination and
> > > > re-establishment, the initiator needs to authenticate that it is
> still
> > > > speaking to the same [i]scsi target port, in order to ensure that any
> > > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > > routed to a wrong LUN after such a transport event.
> > >
> > > > <JLH>
> > > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to close
> > > and re-open each LUN behind that target port, due to the fact that a
> > > target port may have hundred's of LUNs behind it.
> > >
> > > All outstanding I/Os need to be aborted. Once the session is
> > > re-established [and the target port is authenticated to be the same],
> > > further I/O traffic can be resumed without requiring the SCSI ULP to
> > > close and re-open each LUN. Some transport specific clearing effects
> may
> > > have occurred, which may require additional LUN level activity, in some
> > > cases.
> > >
> > > (There are analogies to the above model in FCP & SRP, which
> authenticate
> > > port name/identifier on login, allowing I/O resumption after session
> > > termination and re-establishment.)
> > >
> > >
> > > > To prevent such authentication issues, iscsi can send the iscsi
> target
> > > > port identifier (portal group tag) explicitly in the login request,
> and
> > > > the login can be rejected by the target on a portal group tag
> > mis-match.
> > > > (if the network portal does not belong to the addressed portal group
> > > > tag).
> > > > <JLH>
> > > > Did you mean for the initiator to send this TPGT?
> > > > </JLH>
> > >
> > > Yes. The initiator login request must include the target portal group
> > > tag, thus identifying the target port to which a session is being
> > > established.
> > >
> > > Login currently carries no addressing information, since the addressing
> > > is implicit, based on the TCP connection in use. The problem with this
> > > approach is that the login implicitly addresses a network portal, and
> > > not the target port. As seen in the earlier example, the association of
> > > network portal <-> target port can change, and such changes can be
> > > detected, if the initiator were to explicitly identify the target port
> > > being logged into.
> > >
> > > --
> > > ##################################
> > > Santosh Rao
> > > Software Design Engineer,
> > > HP-UX iSCSI Driver Team,
> > > Hewlett Packard, Cupertino.
> > > email : santoshr@cup.hp.com
> > > Phone : 408-447-3751
> > > ##################################
> > > *
> > > * For T10 Reflector information, send a message with
> > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > >
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> >
> >
> >


From owner-ips@ece.cmu.edu  Tue Mar  5 16:56:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA01846
	for <ips-archive@odin.ietf.org>; Tue, 5 Mar 2002 16:56:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25KYOF09000
	for ips-outgoing; Tue, 5 Mar 2002 15:34:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel6.hp.com (atlrel6.hp.com [156.153.255.205])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25KYMH08996
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 15:34:22 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel6.hp.com (Postfix) with ESMTP
	id 3621A917; Tue,  5 Mar 2002 15:34:13 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id MAA26022; Tue, 5 Mar 2002 12:35:53 -0800 (PST)
Message-ID: <002101c1c485$1bfd15b0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <OF3D713C3E.CB877526-ONC2256B73.00229116@telaviv.ibm.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Tue, 5 Mar 2002 12:34:11 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Julian,

Whatever methods a target is expected to use today to derive the implicit
TPGT to preclude a duplicate I-T nexus would work after the change as well,
except the derived value needs to be compared against the (proposed)
TPGT in the Login Request payload.

Please comment if we're missing something.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao" <santoshr@cup.hp.com>;
<t10@t10.org>
Sent: Monday, March 04, 2002 10:24 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


> Has a decent target implementation and easy way of checking that the TPG
> is correct?
>
> Julo
>
>
>
>
> "Mallikarjun C." <cbm@rose.hp.com>
> Sent by: owner-ips@ece.cmu.edu
> 05-03-02 01:12
> Please respond to "Mallikarjun C."
>
>
>         To:     "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
>         cc:     <t10@t10.org>
>         Subject:        Re: iscsi : changes involving tgt portal group tag.
>
>
>
> Santosh and Jim,
>
> It appears a good idea to add in the portal group tag in the Login
> Request header for a sanity check by the receiving target portal.
>
> I generally agree with Jim's comments that the duration of persistence
> of a portal group tag is intricately linked to the extent of portal
> reconfiguration.
> Not every target reconfiguration may result in a portal group tag
> reassignment.
> OTOH, some reconfigurations may be so extensive as to cause even a node
> name change.
>
> Some comments on Santosh's message -
>
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
>
> I am not sure this solves the problem you're trying to get at.  If none of
> the earlier IP addresses can get an initiator to the SCSI target port that
> it
> knew of (your scenario), it appears to me that it doesn't matter if the
> portal group tags are changed or not....A new discovery process should
> update the initiator of the changed portal addresses.
>
> I suggest the following text -
>
>    After a portal group reconfiguration which changed the view of LUs
>    for an initiator with a given set of privileges, the target MUST change
>    the portal group tag that represents the reconfigured target portal
> group.
>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
>
> I agree with Jim on this one - there should be *no* open/active I_T_L
> nexus
> traffic after a reconfiguration, targets can enforce this via simple iSCSI
> means
> (reject initiator advances to continue the session for DefaultTime2Wait+
> DefaultTime2Retain seconds).  In fact, Async logout request requires a
> clean closure that implicitly aborts I/Os.
>
> What you're describing is typical O/S "LUN open" and "LUN close"
> interactions.  I agree that they wouldn't have to be repeated, but care
> must be taken to ensure that new I/Os (on the new session after
> reconfiguration)
> are not delivered to the incorrect LUs.  It seems that the addition of
> TPGT in the login header and the proposed new text (above) would take
> care of this.
>
> Regards.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Santosh Rao" <santoshr@cup.hp.com>
> To: <ips@ece.cmu.edu>
> Cc: <t10@t10.org>
> Sent: Monday, March 04, 2002 10:40 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * Santosh Rao <santoshr@cup.hp.com>
> > *
> > Jim,
> >
> > I agree that a "complete re-configuration" of a target port can result
> > in a new port name & port identifier. However, the tricky part is the
> > definition of a "complete re-configuration of an iscsi target port", due
> > to the concepts of portal groups involving multiple network portals.
> >
> > For example, if a portal group (aka, an iscsi target port) were to be
> > re-configured to include a new network portal [moved from another portal
> > group], then, the target port itself has not changed, since it is still
> > accessible through its previously used network portals. What has changed
> > is the individual network portal that has moved from 1 target port to
> > another.
> >
> > Hence, it is sufficient, in this case, to maintain persistence of the
> > target port name/identifier, without requiring any change in port
> > name/identifier. By requiring initiators to send the intended TPGT (scsi
> > target port name/identifier) along with the login request, this allows
> > the target port to detect that the network portal is being accessed to
> > connect to a different target port and it can reject the login.
> >
> > It may be helpful to call out the specific case when a port
> > name/identifier MUST change. How about something like :
> >
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> >
> > This would allow access to the target port through its un-altered
> > network portals to continue un-disrupted. More comments inline, in
> > response to some of your queries.
> >
> > Thanks,
> > Santosh
> >
> > NOTE : In this discussion target port and target portal group are used
> > to imply the same entity, within a target node.
> >
> >
> > Jim Hafner wrote:
> >
> > > SAM-2 requires scsi port names to be persistent and world-wide-unique.
> > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > >
> > > "A scsi port name shall never change and may be used to persistently
> > > identify a scsi initiator port or target port...".
> > >
> > > <JLH>
> > > There are different ways that one can interpret this "persistent"
> rule. The
> > > intent was that names shouldn't change over time when *identifying the
> same
> > > object*.   What that means is that if the object changes (in any
> > > discernable way), then the name should change.  So, the object can
> move to
> > > a different piece of hardware, but it can still be named the same way.
>  If
> > > the object changes, e.g., in this case, reconfigures as a different
> set of
> > > network portals with different addressing elements, then I would think
> that
> > > the name should change as well.   That's all the persistence one
> really
> > > needs.
> > >
> > > I'm not sure what that implies about your recommendation.  I don't see
> any
> > > problem with it, either.
> > > </JLH>
> >
> > I think we may be in agreement. (See reasoning above).
> >
> >
> > >
> > > The rationale for (2) is :
> > > --------------------------
> > > Consider an initiator node establishing multiple sessions to a scsi
> tgt
> > > port, with each session established to a subset of the network portals
> > > within the tgt portal group.
> > >
> > > Consider an iscsi transport event involving the re-configuration of
> > > target portal groups on the iscsi target node. This may be preceeded
> by
> > > the iscsi sessions seeing an async message "target requests logout",
> > > followed by session logout, portal group re-configuration, and then,
> the
> > > initiator re-establishes sessions.
> > >
> > > Across a transport event that results in such session termination and
> > > re-establishment, the initiator needs to authenticate that it is still
> > > speaking to the same [i]scsi target port, in order to ensure that any
> > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > routed to a wrong LUN after such a transport event.
> >
> > > <JLH>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> >
> > All outstanding I/Os need to be aborted. Once the session is
> > re-established [and the target port is authenticated to be the same],
> > further I/O traffic can be resumed without requiring the SCSI ULP to
> > close and re-open each LUN. Some transport specific clearing effects may
> > have occurred, which may require additional LUN level activity, in some
> > cases.
> >
> > (There are analogies to the above model in FCP & SRP, which authenticate
> > port name/identifier on login, allowing I/O resumption after session
> > termination and re-establishment.)
> >
> >
> > > To prevent such authentication issues, iscsi can send the iscsi target
> > > port identifier (portal group tag) explicitly in the login request,
> and
> > > the login can be rejected by the target on a portal group tag
> mis-match.
> > > (if the network portal does not belong to the addressed portal group
> > > tag).
> > > <JLH>
> > > Did you mean for the initiator to send this TPGT?
> > > </JLH>
> >
> > Yes. The initiator login request must include the target portal group
> > tag, thus identifying the target port to which a session is being
> > established.
> >
> > Login currently carries no addressing information, since the addressing
> > is implicit, based on the TCP connection in use. The problem with this
> > approach is that the login implicitly addresses a network portal, and
> > not the target port. As seen in the earlier example, the association of
> > network portal <-> target port can change, and such changes can be
> > detected, if the initiator were to explicitly identify the target port
> > being logged into.
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
>
>
>



From owner-ips@ece.cmu.edu  Tue Mar  5 19:54:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA08136
	for <ips-archive@odin.ietf.org>; Tue, 5 Mar 2002 19:54:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g25NvJm24871
	for ips-outgoing; Tue, 5 Mar 2002 18:57:19 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g25NvHH24867
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 18:57:17 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 66D8140F8; Tue,  5 Mar 2002 16:57:16 -0700 (MST)
Received: from axcsbh2.cos.agilent.com (axcsbh2.cos.agilent.com [130.29.152.144])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 1DD944F6; Tue,  5 Mar 2002 16:57:16 -0700 (MST)
Received: from 130.29.152.144 by axcsbh2.cos.agilent.com (InterScan E-Mail VirusWall NT); Tue, 05 Mar 2002 16:57:15 -0700
Received: by axcsbh2.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FQHCATC2>; Tue, 5 Mar 2002 16:57:15 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F268DB@axcs09.cos.agilent.com>
From: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
To: ips@ece.cmu.edu, "'Satran, Julian'" <julian_satran@hotmail.com>
Subject: iSCSI - Range of values can be negotiated for integers?
Date: Tue, 5 Mar 2002 16:57:12 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On page 60 of iSCSI v11 says that:
 
"The value can be an integer, a range defined by a lower and upper
value...."
 
I must assume that any numeric key may use this feature?
 
I don't see any reference to this new capabilty anywhere else in the
document. I am sure that we are going to have problems at plugfest if this
is not cleared up now.
 
Thanks,
 
Kevin Lemay
Agilent Technologies 


From owner-ips@ece.cmu.edu  Tue Mar  5 23:00:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA14923
	for <ips-archive@odin.ietf.org>; Tue, 5 Mar 2002 23:00:51 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2631wg07014
	for ips-outgoing; Tue, 5 Mar 2002 22:01:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2631vH07010
	for <ips@ece.cmu.edu>; Tue, 5 Mar 2002 22:01:57 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 70DEAC004C6; Tue,  5 Mar 2002 19:01:51 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id TAA27156;
	Tue, 5 Mar 2002 19:01:41 -0800 (PST)
Message-ID: <3C85876F.B5237043@cup.hp.com>
Date: Tue, 05 Mar 2002 19:05:19 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: ips@ece.cmu.edu
Cc: t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <OF029641D1.1944915D-ON88256B73.0056B7D3@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Jim Hafner wrote:

>  Within iSCSI, if we define
> some rule along the lines Santosh is suggesting (including TPGT and some
> sort of rule that requires changes at the naming layer to reflect changes
> to the portal group assignment), then I think all our basis are covered.

Jim & All,

In addition to the above, I believe the wording on portal group tag and
ISIDs needs to be tightened to require persistence of these properties
across power cycles of the iscsi node, in order to guarantee persistence
of the port identifier/name.

Section 2.4.3 could do with some updating to indicate that SCSI port
names are required to be persistent and world-wide unique. In order to
ensure persistence of an initiator port name, the ISID MUST be
persistent across clearing events that can occur at an initiator.
(including power cycle).

Similarly, in order to ensure persistence of the target port
name/identifer, the portal group tag MUST be persistent across clearing
events that can occur at a target. (including power cycle).

Comments ?

Regards,
Santosh

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Wed Mar  6 02:04:56 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA20532
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 02:04:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g266Dvj19476
	for ips-outgoing; Wed, 6 Mar 2002 01:13:57 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TYO202.gate.nec.co.jp (TYO202.gate.nec.co.jp [202.247.6.41])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g266DsH19472
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 01:13:54 -0500 (EST)
Received: from mailgate4.nec.co.jp ([10.7.69.193])
	by TYO202.gate.nec.co.jp (8.11.6/3.7W01080315) with ESMTP id g266Dqe16596
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 15:13:52 +0900 (JST)
Received: from mailsv.nec.co.jp (mailgate51.nec.co.jp [10.7.69.190]) by mailgate4.nec.co.jp (8.11.6/3.7W-MAILGATE-NEC) with ESMTP
	id g266Dpd25629 for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 15:13:51 +0900 (JST)
Received: from saigo.jp.nec.com (saigo.jp.nec.com [10.26.220.6]) by mailsv.nec.co.jp (8.11.6/3.7W-MAILSV-NEC) with ESMTP
	id g266Dp805520 for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 15:13:51 +0900 (JST)
Received: from [10.34.82.82] by mail.jp.nec.com; Wed, 6 Mar 2002 15:13:50 +0900
To: ips@ece.cmu.edu
Subject: iSCSI Draft 11 Comments and MaxCmdSN rule
From: y-hasebe@ah.jp.nec.com
Reply-To: y-hasebe@ah.jp.nec.com
Date: Wed, 06 Mar 2002 15:12:05 +0900
Message-Id: <20020306151252y-hasebe@ah.jp.nec.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
X-Mailer: WeMail32[1.91] ID:1P0308
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


Julian & All,

I have two comments on the draft 11 file.
(http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.pdf)

(1) Editional Comment
  On page 31, This sentence appers twice in this page.
  (Line 3 and Line 20)
  
   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN. For non-immediate commands, the CmdSN field can take any
   value from ExpCmdSN to MaxCmdSN. The target MUST silently ignore any
   non-immediate command outside of this range or non-immediate duplicates
   within the range."

(2)MaxCmdSN rule
  I think that this sentence should change as Ayman says.
  This sentence is a confusing expression.

  On Page 31, Line 3
   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN. "

                         change to

   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN-1. "


-------------------
Yoshihiro Hasebe
NEC Corporation
-------------------

-------------------- Attached Mail -------------------------------

Please consider also carefully the Serial Arithmetic rules with regard to
"lower/higher" and the bounds on the ExpComdSN and MaxCmdSN difference.

Julo
----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----
                                                                                             
                    "Ayman Ghanem"                                                           
                    <aghanem@cisco       To:     <ips@ece.cmu.edu>                           
                    .com>                cc:                                                 
                    Sent by:             Subject:     RE: iSCSI: MaxCmdSN rule               
                    owner-ips@ece.                                                           
                    cmu.edu                                                                  
                                                                                             
                                                                                             
                    08-02-02 00:53                                                           
                                                                                             
                                                                                             



This sentence should be changed to:

"The target MUST NOT transmit a MaxCmdSN that is less than the last
ExpCmdSN-1"

The paragraph above this states:

"If the PDU MaxCmdSN is less than the PDU ExpCmdSN-1 (in Serial Arithmetic
Sense), they are both ignored."

which allows MaxCmdSN = ExpCmdSN-1,valid, for the case when the target's
command window is closed.

-Ayman

 -----Original Message-----
 From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
 Buck Landry
 Sent: Thursday, February 07, 2002 2:40 PM
 To: ips@ece.cmu.edu
 Subject: iSCSI: MaxCmdSN rule

 Hi all, I'm struggling over how to interpret this rule in section 1.2.2 of
 draft v10:

 >>> The target MUST NOT transmit a MaxCmdSN that is less than
         the last ExpCmdSN.
 <<<

 This confuses me because it says to me (in some cases) that a target must
 be able to handle an unlimited number of commands.  For example, let's say
 the target has just about reached the limit of the commands it can handle:

 T=>(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)

 I=>(Scsi Read Cmd) (CmdSN = 1)

 T=>(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd
 */)

 Now the target may have many more data-ins to transmit.  But according to
 the rule, since the last ExpCmdSN the target transmitted was 2, the target
 is now forced to send a MaxCmdSN of 2:

 T=>(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)

 But this allows the initiator to send another command, even though the
 target can't handle it!

 Obviously something is wrong with my reasoning here (perhaps my
 interpretation of 'last ExpCmdSN', or when I"m supposed to acknowledge the
 scsi cmd); can anybody clarify?

 --buck




----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----
                                                                                             
                    "Buck Landry"                                                            
                    <blandry@cross       To:     <ips@ece.cmu.edu>                           
                    roads.com>           cc:                                                 
                    Sent by:             Subject:     iSCSI: MaxCmdSN rule                   
                    owner-ips@ece.                                                           
                    cmu.edu                                                                  
                                                                                             
                                                                                             
                    07-02-02 22:40                                                           
                                                                                             
                                                                                             



Hi all, I'm struggling over how to interpret this rule in section 1.2.2 of
draft v10:

>>> The target MUST NOT transmit a MaxCmdSN that is less than
        the last ExpCmdSN.
<<<

This confuses me because it says to me (in some cases) that a target must
be able to handle an unlimited number of commands.  For example, let's say
the target has just about reached the limit of the commands it can handle:

T=>(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)

I=>(Scsi Read Cmd) (CmdSN = 1)

T=>(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd */)

Now the target may have many more data-ins to transmit.  But according to
the rule, since the last ExpCmdSN the target transmitted was 2, the target
is now forced to send a MaxCmdSN of 2:

T=>(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)

But this allows the initiator to send another command, even though the
target can't handle it!

Obviously something is wrong with my reasoning here (perhaps my
interpretation of 'last ExpCmdSN', or when I"m supposed to acknowledge the
scsi cmd); can anybody clarify?

--buck



From owner-ips@ece.cmu.edu  Wed Mar  6 03:23:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA27268
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 03:23:49 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2677fc22730
	for ips-outgoing; Wed, 6 Mar 2002 02:07:41 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2677bH22717;
	Wed, 6 Mar 2002 02:07:37 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA24918;
	Wed, 6 Mar 2002 08:07:21 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2679IX47602;
	Wed, 6 Mar 2002 08:09:19 +0100
To: y-hasebe@ah.jp.nec.com
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI Draft 11 Comments and MaxCmdSN rule
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF9E32CA4B.CCD45DE6-ONC2256B74.0024FA05@telaviv.ibm.com>
Date: Wed, 6 Mar 2002 09:09:16 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 06/03/2002 09:09:22,
	Serialize complete at 06/03/2002 09:09:22
Content-Type: multipart/alternative; boundary="=_alternative 00264354C2256B74_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00264354C2256B74_=
Content-Type: text/plain; charset="us-ascii"

Hasebe-San,

I am looking at the text and I am sorry - I am using Framemaker and the 
paragraph you quoted as appearing twice
does not appear on my text. 

I looked again at the published chapter 2 - and some how the whole chapter 
contains both the INSERTED and DELETED text from versions 10 and 11 
(evidence on page 33 chapter7 and chapter 8).

I will correct the pdf at my site.

As for the second comment - I will fix it in the next text.

Thanks for catching this.
Julo






y-hasebe@ah.jp.nec.com
Sent by: owner-ips@ece.cmu.edu
06-03-02 08:12
Please respond to y-hasebe

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        iSCSI Draft 11 Comments and MaxCmdSN rule

 


Julian & All,

I have two comments on the draft 11 file.
(http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.pdf)

(1) Editional Comment
  On page 31, This sentence appers twice in this page.
  (Line 3 and Line 20)
 
   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN. For non-immediate commands, the CmdSN field can take any
   value from ExpCmdSN to MaxCmdSN. The target MUST silently ignore any
   non-immediate command outside of this range or non-immediate duplicates
   within the range."

(2)MaxCmdSN rule
  I think that this sentence should change as Ayman says.
  This sentence is a confusing expression.

  On Page 31, Line 3
   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN. "

                         change to

   "The target MUST NOT transmit a MaxCmdSN that is less than the last
   ExpCmdSN-1. "


-------------------
Yoshihiro Hasebe
NEC Corporation
-------------------

-------------------- Attached Mail -------------------------------

Please consider also carefully the Serial Arithmetic rules with regard to
"lower/higher" and the bounds on the ExpComdSN and MaxCmdSN difference.

Julo
----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----
  
                    "Ayman Ghanem"  
                    <aghanem@cisco       To:     <ips@ece.cmu.edu>    
                    .com>                cc:  
                    Sent by:             Subject:     RE: iSCSI: MaxCmdSN 
rule 
                    owner-ips@ece.  
                    cmu.edu  
  
  
                    08-02-02 00:53  
  
  



This sentence should be changed to:

"The target MUST NOT transmit a MaxCmdSN that is less than the last
ExpCmdSN-1"

The paragraph above this states:

"If the PDU MaxCmdSN is less than the PDU ExpCmdSN-1 (in Serial Arithmetic
Sense), they are both ignored."

which allows MaxCmdSN = ExpCmdSN-1,valid, for the case when the target's
command window is closed.

-Ayman

 -----Original Message-----
 From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
 Buck Landry
 Sent: Thursday, February 07, 2002 2:40 PM
 To: ips@ece.cmu.edu
 Subject: iSCSI: MaxCmdSN rule

 Hi all, I'm struggling over how to interpret this rule in section 1.2.2 
of
 draft v10:

 >>> The target MUST NOT transmit a MaxCmdSN that is less than
         the last ExpCmdSN.
 <<<

 This confuses me because it says to me (in some cases) that a target must
 be able to handle an unlimited number of commands.  For example, let's 
say
 the target has just about reached the limit of the commands it can 
handle:

 T=>(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)

 I=>(Scsi Read Cmd) (CmdSN = 1)

 T=>(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd
 */)

 Now the target may have many more data-ins to transmit.  But according to
 the rule, since the last ExpCmdSN the target transmitted was 2, the 
target
 is now forced to send a MaxCmdSN of 2:

 T=>(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)

 But this allows the initiator to send another command, even though the
 target can't handle it!

 Obviously something is wrong with my reasoning here (perhaps my
 interpretation of 'last ExpCmdSN', or when I"m supposed to acknowledge 
the
 scsi cmd); can anybody clarify?

 --buck




----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----
  
                    "Buck Landry"  
                    <blandry@cross       To:     <ips@ece.cmu.edu>    
                    roads.com>           cc:  
                    Sent by:             Subject:     iSCSI: MaxCmdSN rule 
 
                    owner-ips@ece.  
                    cmu.edu  
  
  
                    07-02-02 22:40  
  
  



Hi all, I'm struggling over how to interpret this rule in section 1.2.2 of
draft v10:

>>> The target MUST NOT transmit a MaxCmdSN that is less than
        the last ExpCmdSN.
<<<

This confuses me because it says to me (in some cases) that a target must
be able to handle an unlimited number of commands.  For example, let's say
the target has just about reached the limit of the commands it can handle:

T=>(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)

I=>(Scsi Read Cmd) (CmdSN = 1)

T=>(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd 
*/)

Now the target may have many more data-ins to transmit.  But according to
the rule, since the last ExpCmdSN the target transmitted was 2, the target
is now forced to send a MaxCmdSN of 2:

T=>(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)

But this allows the initiator to send another command, even though the
target can't handle it!

Obviously something is wrong with my reasoning here (perhaps my
interpretation of 'last ExpCmdSN', or when I"m supposed to acknowledge the
scsi cmd); can anybody clarify?

--buck




--=_alternative 00264354C2256B74_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Hasebe-San,</font>
<br>
<br><font size=2 face="sans-serif">I am looking at the text and I am sorry - I am using Framemaker and the paragraph you quoted as appearing twice</font>
<br><font size=2 face="sans-serif">does not appear on my text. </font>
<br>
<br><font size=2 face="sans-serif">I looked again at the published chapter 2 - and some how the whole chapter contains both the INSERTED and DELETED text from versions 10 and 11 (evidence on page 33 chapter7 and chapter 8).</font>
<br>
<br><font size=2 face="sans-serif">I will correct the pdf at my site.</font>
<br>
<br><font size=2 face="sans-serif">As for the second comment - I will fix it in the next text.</font>
<br>
<br><font size=2 face="sans-serif">Thanks for catching this.</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>y-hasebe@ah.jp.nec.com</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">06-03-02 08:12</font>
<br><font size=1 face="sans-serif">Please respond to y-hasebe</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI Draft 11 Comments and MaxCmdSN rule</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
Julian &amp; All,<br>
<br>
I have two comments on the draft 11 file.<br>
(http://www.haifa.il.ibm.com/satran/ips/draft-ietf-ips-iscsi-11.pdf)<br>
<br>
(1) Editional Comment<br>
 &nbsp;On page 31, This sentence appers twice in this page.<br>
 &nbsp;(Line 3 and Line 20)<br>
 &nbsp;<br>
 &nbsp; &quot;The target MUST NOT transmit a MaxCmdSN that is less than the last<br>
 &nbsp; ExpCmdSN. For non-immediate commands, the CmdSN field can take any<br>
 &nbsp; value from ExpCmdSN to MaxCmdSN. The target MUST silently ignore any<br>
 &nbsp; non-immediate command outside of this range or non-immediate duplicates<br>
 &nbsp; within the range.&quot;<br>
<br>
(2)MaxCmdSN rule<br>
 &nbsp;I think that this sentence should change as Ayman says.<br>
 &nbsp;This sentence is a confusing expression.<br>
<br>
 &nbsp;On Page 31, Line 3<br>
 &nbsp; &quot;The target MUST NOT transmit a MaxCmdSN that is less than the last<br>
 &nbsp; ExpCmdSN. &quot;<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; change to<br>
<br>
 &nbsp; &quot;The target MUST NOT transmit a MaxCmdSN that is less than the last<br>
 &nbsp; ExpCmdSN-1. &quot;<br>
<br>
<br>
-------------------<br>
Yoshihiro Hasebe<br>
NEC Corporation<br>
-------------------<br>
<br>
-------------------- Attached Mail -------------------------------<br>
<br>
Please consider also carefully the Serial Arithmetic rules with regard to<br>
&quot;lower/higher&quot; and the bounds on the ExpComdSN and MaxCmdSN difference.<br>
<br>
Julo<br>
----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&quot;Ayman Ghanem&quot; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&lt;aghanem@cisco &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &lt;ips@ece.cmu.edu&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;.com&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;cc: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Sent by: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; RE: iSCSI: MaxCmdSN rule &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;owner-ips@ece. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;cmu.edu &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;08-02-02 00:53 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
<br>
<br>
<br>
This sentence should be changed to:<br>
<br>
&quot;The target MUST NOT transmit a MaxCmdSN that is less than the last<br>
ExpCmdSN-1&quot;<br>
<br>
The paragraph above this states:<br>
<br>
&quot;If the PDU MaxCmdSN is less than the PDU ExpCmdSN-1 (in Serial Arithmetic<br>
Sense), they are both ignored.&quot;<br>
<br>
which allows MaxCmdSN = ExpCmdSN-1,valid, for the case when the target's<br>
command window is closed.<br>
<br>
-Ayman<br>
<br>
 -----Original Message-----<br>
 From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of<br>
 Buck Landry<br>
 Sent: Thursday, February 07, 2002 2:40 PM<br>
 To: ips@ece.cmu.edu<br>
 Subject: iSCSI: MaxCmdSN rule<br>
</font>
<br><font size=2 face="Courier New">&nbsp;Hi all, I'm struggling over how to interpret this rule in section 1.2.2 of<br>
 draft v10:<br>
<br>
 &gt;&gt;&gt; The target MUST NOT transmit a MaxCmdSN that is less than<br>
 &nbsp; &nbsp; &nbsp; &nbsp; the last ExpCmdSN.<br>
 &lt;&lt;&lt;<br>
<br>
 This confuses me because it says to me (in some cases) that a target must<br>
 be able to handle an unlimited number of commands. &nbsp;For example, let's say<br>
 the target has just about reached the limit of the commands it can handle:<br>
<br>
 T=&gt;(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)<br>
<br>
 I=&gt;(Scsi Read Cmd) (CmdSN = 1)<br>
<br>
 T=&gt;(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd<br>
 */)<br>
<br>
 Now the target may have many more data-ins to transmit. &nbsp;But according to<br>
 the rule, since the last ExpCmdSN the target transmitted was 2, the target<br>
 is now forced to send a MaxCmdSN of 2:<br>
<br>
 T=&gt;(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)<br>
<br>
 But this allows the initiator to send another command, even though the<br>
 target can't handle it!<br>
<br>
 Obviously something is wrong with my reasoning here (perhaps my<br>
 interpretation of 'last ExpCmdSN', or when I&quot;m supposed to acknowledge the<br>
 scsi cmd); can anybody clarify?<br>
<br>
 --buck<br>
<br>
<br>
<br>
<br>
----- Forwarded by Julian Satran/Haifa/IBM on 08-02-02 02:26 -----<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&quot;Buck Landry&quot; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&lt;blandry@cross &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &lt;ips@ece.cmu.edu&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;roads.com&gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Sent by: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; iSCSI: MaxCmdSN rule &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;owner-ips@ece. &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;cmu.edu &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;07-02-02 22:40 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <br>
<br>
<br>
<br>
Hi all, I'm struggling over how to interpret this rule in section 1.2.2 of<br>
draft v10:<br>
<br>
&gt;&gt;&gt; The target MUST NOT transmit a MaxCmdSN that is less than<br>
 &nbsp; &nbsp; &nbsp; &nbsp;the last ExpCmdSN.<br>
&lt;&lt;&lt;<br>
<br>
This confuses me because it says to me (in some cases) that a target must<br>
be able to handle an unlimited number of commands. &nbsp;For example, let's say<br>
the target has just about reached the limit of the commands it can handle:<br>
<br>
T=&gt;(Nop-In) (MaxCmdSN = 1, ExpCmdSN = 1)<br>
<br>
I=&gt;(Scsi Read Cmd) (CmdSN = 1)<br>
<br>
T=&gt;(Data-in) (MaxCmdSN = 1, ExpCmdSN = 2 /* acknowledging scsi read cmd */)<br>
<br>
Now the target may have many more data-ins to transmit. &nbsp;But according to<br>
the rule, since the last ExpCmdSN the target transmitted was 2, the target<br>
is now forced to send a MaxCmdSN of 2:<br>
<br>
T=&gt;(Data-in) (MaxCmdSN = 2, ExpCmdSN = 2)<br>
<br>
But this allows the initiator to send another command, even though the<br>
target can't handle it!<br>
<br>
Obviously something is wrong with my reasoning here (perhaps my<br>
interpretation of 'last ExpCmdSN', or when I&quot;m supposed to acknowledge the<br>
scsi cmd); can anybody clarify?<br>
<br>
--buck<br>
<br>
</font>
<br>
<br>
--=_alternative 00264354C2256B74_=--


From owner-ips@ece.cmu.edu  Wed Mar  6 04:11:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA28023
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 04:11:06 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g267sd625362
	for ips-outgoing; Wed, 6 Mar 2002 02:54:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g267sbH25355
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 02:54:37 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id IAA129852;
	Wed, 6 Mar 2002 08:54:26 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g267tua120994;
	Wed, 6 Mar 2002 08:56:15 +0100
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu, t10@t10.org
MIME-Version: 1.0
Subject: Re: iscsi : changes involving tgt portal group tag.
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF5BD0C817.D66D3F61-ONC2256B74.0029D367@telaviv.ibm.com>
Date: Wed, 6 Mar 2002 09:56:04 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 06/03/2002 09:56:27,
	Serialize complete at 06/03/2002 09:56:27
Content-Type: multipart/alternative; boundary="=_alternative 002A58C8C2256B74_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002A58C8C2256B74_=
Content-Type: text/plain; charset="us-ascii"

The issue is that I am not sure that a target is checking today anything - 
(adapter drivers may check oif in their realm they can give out a TSID). 
Nothing else is needed. Does SCSI have to be aware of it? Perhaps but 
iSCSI certainly not. Does a "front-end" have to be - again probably not 
the name identifies the node.

Julo




"Mallikarjun C." <cbm@rose.hp.com>
05-03-02 22:34
Please respond to "Mallikarjun C."

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     <ips@ece.cmu.edu>, <t10@t10.org>
        Subject:        Re: iscsi : changes involving tgt portal group tag.

 

Julian,

Whatever methods a target is expected to use today to derive the implicit
TPGT to preclude a duplicate I-T nexus would work after the change as 
well,
except the derived value needs to be compared against the (proposed)
TPGT in the Login Request payload.

Please comment if we're missing something.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao" 
<santoshr@cup.hp.com>;
<t10@t10.org>
Sent: Monday, March 04, 2002 10:24 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


> Has a decent target implementation and easy way of checking that the TPG
> is correct?
>
> Julo
>
>
>
>
> "Mallikarjun C." <cbm@rose.hp.com>
> Sent by: owner-ips@ece.cmu.edu
> 05-03-02 01:12
> Please respond to "Mallikarjun C."
>
>
>         To:     "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
>         cc:     <t10@t10.org>
>         Subject:        Re: iscsi : changes involving tgt portal group 
tag.
>
>
>
> Santosh and Jim,
>
> It appears a good idea to add in the portal group tag in the Login
> Request header for a sanity check by the receiving target portal.
>
> I generally agree with Jim's comments that the duration of persistence
> of a portal group tag is intricately linked to the extent of portal
> reconfiguration.
> Not every target reconfiguration may result in a portal group tag
> reassignment.
> OTOH, some reconfigurations may be so extensive as to cause even a node
> name change.
>
> Some comments on Santosh's message -
>
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
>
> I am not sure this solves the problem you're trying to get at.  If none 
of
> the earlier IP addresses can get an initiator to the SCSI target port 
that
> it
> knew of (your scenario), it appears to me that it doesn't matter if the
> portal group tags are changed or not....A new discovery process should
> update the initiator of the changed portal addresses.
>
> I suggest the following text -
>
>    After a portal group reconfiguration which changed the view of LUs
>    for an initiator with a given set of privileges, the target MUST 
change
>    the portal group tag that represents the reconfigured target portal
> group.
>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue 
at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
>
> I agree with Jim on this one - there should be *no* open/active I_T_L
> nexus
> traffic after a reconfiguration, targets can enforce this via simple 
iSCSI
> means
> (reject initiator advances to continue the session for DefaultTime2Wait+
> DefaultTime2Retain seconds).  In fact, Async logout request requires a
> clean closure that implicitly aborts I/Os.
>
> What you're describing is typical O/S "LUN open" and "LUN close"
> interactions.  I agree that they wouldn't have to be repeated, but care
> must be taken to ensure that new I/Os (on the new session after
> reconfiguration)
> are not delivered to the incorrect LUs.  It seems that the addition of
> TPGT in the login header and the proposed new text (above) would take
> care of this.
>
> Regards.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Santosh Rao" <santoshr@cup.hp.com>
> To: <ips@ece.cmu.edu>
> Cc: <t10@t10.org>
> Sent: Monday, March 04, 2002 10:40 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * Santosh Rao <santoshr@cup.hp.com>
> > *
> > Jim,
> >
> > I agree that a "complete re-configuration" of a target port can result
> > in a new port name & port identifier. However, the tricky part is the
> > definition of a "complete re-configuration of an iscsi target port", 
due
> > to the concepts of portal groups involving multiple network portals.
> >
> > For example, if a portal group (aka, an iscsi target port) were to be
> > re-configured to include a new network portal [moved from another 
portal
> > group], then, the target port itself has not changed, since it is 
still
> > accessible through its previously used network portals. What has 
changed
> > is the individual network portal that has moved from 1 target port to
> > another.
> >
> > Hence, it is sufficient, in this case, to maintain persistence of the
> > target port name/identifier, without requiring any change in port
> > name/identifier. By requiring initiators to send the intended TPGT 
(scsi
> > target port name/identifier) along with the login request, this allows
> > the target port to detect that the network portal is being accessed to
> > connect to a different target port and it can reject the login.
> >
> > It may be helpful to call out the specific case when a port
> > name/identifier MUST change. How about something like :
> >
> > "If a portal group is re-configured such that all its previously
> > advertised network portals are no longer a part of the portal group,
> > then, the portal group tag (and thereby, the port name/identifier)
> > *MUST* be changed to indicate a new target port."
> >
> > This would allow access to the target port through its un-altered
> > network portals to continue un-disrupted. More comments inline, in
> > response to some of your queries.
> >
> > Thanks,
> > Santosh
> >
> > NOTE : In this discussion target port and target portal group are used
> > to imply the same entity, within a target node.
> >
> >
> > Jim Hafner wrote:
> >
> > > SAM-2 requires scsi port names to be persistent and 
world-wide-unique.
> > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > >
> > > "A scsi port name shall never change and may be used to persistently
> > > identify a scsi initiator port or target port...".
> > >
> > > <JLH>
> > > There are different ways that one can interpret this "persistent"
> rule. The
> > > intent was that names shouldn't change over time when *identifying 
the
> same
> > > object*.   What that means is that if the object changes (in any
> > > discernable way), then the name should change.  So, the object can
> move to
> > > a different piece of hardware, but it can still be named the same 
way.
>  If
> > > the object changes, e.g., in this case, reconfigures as a different
> set of
> > > network portals with different addressing elements, then I would 
think
> that
> > > the name should change as well.   That's all the persistence one
> really
> > > needs.
> > >
> > > I'm not sure what that implies about your recommendation.  I don't 
see
> any
> > > problem with it, either.
> > > </JLH>
> >
> > I think we may be in agreement. (See reasoning above).
> >
> >
> > >
> > > The rationale for (2) is :
> > > --------------------------
> > > Consider an initiator node establishing multiple sessions to a scsi
> tgt
> > > port, with each session established to a subset of the network 
portals
> > > within the tgt portal group.
> > >
> > > Consider an iscsi transport event involving the re-configuration of
> > > target portal groups on the iscsi target node. This may be preceeded
> by
> > > the iscsi sessions seeing an async message "target requests logout",
> > > followed by session logout, portal group re-configuration, and then,
> the
> > > initiator re-establishes sessions.
> > >
> > > Across a transport event that results in such session termination 
and
> > > re-establishment, the initiator needs to authenticate that it is 
still
> > > speaking to the same [i]scsi target port, in order to ensure that 
any
> > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > routed to a wrong LUN after such a transport event.
> >
> > > <JLH>
> > > Under these events, shouldn't all "open/active I_T_L traffic" have
> been
> > > aborted, closed or otherwise ended?  So this shouldn't be an issue 
at
> all.
> >
> > On a session logout & re-login, it is not efficient/necessary to close
> > and re-open each LUN behind that target port, due to the fact that a
> > target port may have hundred's of LUNs behind it.
> >
> > All outstanding I/Os need to be aborted. Once the session is
> > re-established [and the target port is authenticated to be the same],
> > further I/O traffic can be resumed without requiring the SCSI ULP to
> > close and re-open each LUN. Some transport specific clearing effects 
may
> > have occurred, which may require additional LUN level activity, in 
some
> > cases.
> >
> > (There are analogies to the above model in FCP & SRP, which 
authenticate
> > port name/identifier on login, allowing I/O resumption after session
> > termination and re-establishment.)
> >
> >
> > > To prevent such authentication issues, iscsi can send the iscsi 
target
> > > port identifier (portal group tag) explicitly in the login request,
> and
> > > the login can be rejected by the target on a portal group tag
> mis-match.
> > > (if the network portal does not belong to the addressed portal group
> > > tag).
> > > <JLH>
> > > Did you mean for the initiator to send this TPGT?
> > > </JLH>
> >
> > Yes. The initiator login request must include the target portal group
> > tag, thus identifying the target port to which a session is being
> > established.
> >
> > Login currently carries no addressing information, since the 
addressing
> > is implicit, based on the TCP connection in use. The problem with this
> > approach is that the login implicitly addresses a network portal, and
> > not the target port. As seen in the earlier example, the association 
of
> > network portal <-> target port can change, and such changes can be
> > detected, if the initiator were to explicitly identify the target port
> > being logged into.
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
>
>
>




--=_alternative 002A58C8C2256B74_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">The issue is that I am not sure that a target is checking today anything - (adapter drivers may check oif in their realm they can give out a TSID). &nbsp;Nothing else is needed. Does SCSI have to be aware of it? Perhaps but iSCSI certainly not. Does a &quot;front-end&quot; have to be - again probably not the name identifies the node.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</b></font>
<p><font size=1 face="sans-serif">05-03-02 22:34</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Mallikarjun C.&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&lt;ips@ece.cmu.edu&gt;, &lt;t10@t10.org&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iscsi : changes involving tgt portal group tag.</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Julian,<br>
<br>
Whatever methods a target is expected to use today to derive the implicit<br>
TPGT to preclude a duplicate I-T nexus would work after the change as well,<br>
except the derived value needs to be compared against the (proposed)<br>
TPGT in the Login Request payload.<br>
<br>
Please comment if we're missing something.<br>
<br>
Regards.<br>
--<br>
Mallikarjun<br>
<br>
Mallikarjun Chadalapaka<br>
Networked Storage Architecture<br>
Network Storage Solutions Organization<br>
Hewlett-Packard MS 5668<br>
Roseville CA 95747<br>
<br>
----- Original Message -----<br>
From: &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;<br>
To: &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
Cc: &lt;ips@ece.cmu.edu&gt;; &lt;owner-ips@ece.cmu.edu&gt;; &quot;Santosh Rao&quot; &lt;santoshr@cup.hp.com&gt;;<br>
&lt;t10@t10.org&gt;<br>
Sent: Monday, March 04, 2002 10:24 PM<br>
Subject: Re: iscsi : changes involving tgt portal group tag.<br>
<br>
<br>
&gt; Has a decent target implementation and easy way of checking that the TPG<br>
&gt; is correct?<br>
&gt;<br>
&gt; Julo<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
&gt; Sent by: owner-ips@ece.cmu.edu<br>
&gt; 05-03-02 01:12<br>
&gt; Please respond to &quot;Mallikarjun C.&quot;<br>
&gt;<br>
&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &quot;Santosh Rao&quot; &lt;santoshr@cup.hp.com&gt;, &lt;ips@ece.cmu.edu&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &lt;t10@t10.org&gt;<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iscsi : changes involving tgt portal group tag.<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; Santosh and Jim,<br>
&gt;<br>
&gt; It appears a good idea to add in the portal group tag in the Login<br>
&gt; Request header for a sanity check by the receiving target portal.<br>
&gt;<br>
&gt; I generally agree with Jim's comments that the duration of persistence<br>
&gt; of a portal group tag is intricately linked to the extent of portal<br>
&gt; reconfiguration.<br>
&gt; Not every target reconfiguration may result in a portal group tag<br>
&gt; reassignment.<br>
&gt; OTOH, some reconfigurations may be so extensive as to cause even a node<br>
&gt; name change.<br>
&gt;<br>
&gt; Some comments on Santosh's message -<br>
&gt;<br>
&gt; &gt; &quot;If a portal group is re-configured such that all its previously<br>
&gt; &gt; advertised network portals are no longer a part of the portal group,<br>
&gt; &gt; then, the portal group tag (and thereby, the port name/identifier)<br>
&gt; &gt; *MUST* be changed to indicate a new target port.&quot;<br>
&gt;<br>
&gt; I am not sure this solves the problem you're trying to get at. &nbsp;If none of<br>
&gt; the earlier IP addresses can get an initiator to the SCSI target port that<br>
&gt; it<br>
&gt; knew of (your scenario), it appears to me that it doesn't matter if the<br>
&gt; portal group tags are changed or not....A new discovery process should<br>
&gt; update the initiator of the changed portal addresses.<br>
&gt;<br>
&gt; I suggest the following text -<br>
&gt;<br>
&gt; &nbsp; &nbsp;After a portal group reconfiguration which changed the view of LUs<br>
&gt; &nbsp; &nbsp;for an initiator with a given set of privileges, the target MUST change<br>
&gt; &nbsp; &nbsp;the portal group tag that represents the reconfigured target portal<br>
&gt; group.<br>
&gt;<br>
&gt; &gt; &gt; Under these events, shouldn't all &quot;open/active I_T_L traffic&quot; have<br>
&gt; been<br>
&gt; &gt; &gt; aborted, closed or otherwise ended? &nbsp;So this shouldn't be an issue at<br>
&gt; all.</font>
<br><font size=2 face="Courier New">&gt; &gt;<br>
&gt; &gt; On a session logout &amp; re-login, it is not efficient/necessary to close<br>
&gt; &gt; and re-open each LUN behind that target port, due to the fact that a<br>
&gt; &gt; target port may have hundred's of LUNs behind it.<br>
&gt;<br>
&gt; I agree with Jim on this one - there should be *no* open/active I_T_L<br>
&gt; nexus<br>
&gt; traffic after a reconfiguration, targets can enforce this via simple iSCSI<br>
&gt; means<br>
&gt; (reject initiator advances to continue the session for DefaultTime2Wait+<br>
&gt; DefaultTime2Retain seconds). &nbsp;In fact, Async logout request requires a<br>
&gt; clean closure that implicitly aborts I/Os.<br>
&gt;<br>
&gt; What you're describing is typical O/S &quot;LUN open&quot; and &quot;LUN close&quot;<br>
&gt; interactions. &nbsp;I agree that they wouldn't have to be repeated, but care<br>
&gt; must be taken to ensure that new I/Os (on the new session after<br>
&gt; reconfiguration)<br>
&gt; are not delivered to the incorrect LUs. &nbsp;It seems that the addition of<br>
&gt; TPGT in the login header and the proposed new text (above) would take<br>
&gt; care of this.<br>
&gt;<br>
&gt; Regards.<br>
&gt; --<br>
&gt; Mallikarjun<br>
&gt;<br>
&gt; Mallikarjun Chadalapaka<br>
&gt; Networked Storage Architecture<br>
&gt; Network Storage Solutions Organization<br>
&gt; Hewlett-Packard MS 5668<br>
&gt; Roseville CA 95747<br>
&gt;<br>
&gt; ----- Original Message -----<br>
&gt; From: &quot;Santosh Rao&quot; &lt;santoshr@cup.hp.com&gt;<br>
&gt; To: &lt;ips@ece.cmu.edu&gt;<br>
&gt; Cc: &lt;t10@t10.org&gt;<br>
&gt; Sent: Monday, March 04, 2002 10:40 AM<br>
&gt; Subject: Re: iscsi : changes involving tgt portal group tag.<br>
&gt;<br>
&gt;<br>
&gt; &gt; * From the T10 Reflector (t10@t10.org), posted by:<br>
&gt; &gt; * Santosh Rao &lt;santoshr@cup.hp.com&gt;<br>
&gt; &gt; *<br>
&gt; &gt; Jim,<br>
&gt; &gt;<br>
&gt; &gt; I agree that a &quot;complete re-configuration&quot; of a target port can result<br>
&gt; &gt; in a new port name &amp; port identifier. However, the tricky part is the<br>
&gt; &gt; definition of a &quot;complete re-configuration of an iscsi target port&quot;, due<br>
&gt; &gt; to the concepts of portal groups involving multiple network portals.<br>
&gt; &gt;<br>
&gt; &gt; For example, if a portal group (aka, an iscsi target port) were to be<br>
&gt; &gt; re-configured to include a new network portal [moved from another portal<br>
&gt; &gt; group], then, the target port itself has not changed, since it is still<br>
&gt; &gt; accessible through its previously used network portals. What has changed<br>
&gt; &gt; is the individual network portal that has moved from 1 target port to<br>
&gt; &gt; another.<br>
&gt; &gt;<br>
&gt; &gt; Hence, it is sufficient, in this case, to maintain persistence of the<br>
&gt; &gt; target port name/identifier, without requiring any change in port<br>
&gt; &gt; name/identifier. By requiring initiators to send the intended TPGT (scsi<br>
&gt; &gt; target port name/identifier) along with the login request, this allows<br>
&gt; &gt; the target port to detect that the network portal is being accessed to<br>
&gt; &gt; connect to a different target port and it can reject the login.<br>
&gt; &gt;<br>
&gt; &gt; It may be helpful to call out the specific case when a port<br>
&gt; &gt; name/identifier MUST change. How about something like :<br>
&gt; &gt;<br>
&gt; &gt; &quot;If a portal group is re-configured such that all its previously<br>
&gt; &gt; advertised network portals are no longer a part of the portal group,<br>
&gt; &gt; then, the portal group tag (and thereby, the port name/identifier)<br>
&gt; &gt; *MUST* be changed to indicate a new target port.&quot;<br>
&gt; &gt;<br>
&gt; &gt; This would allow access to the target port through its un-altered<br>
&gt; &gt; network portals to continue un-disrupted. More comments inline, in<br>
&gt; &gt; response to some of your queries.<br>
&gt; &gt;<br>
&gt; &gt; Thanks,<br>
&gt; &gt; Santosh<br>
&gt; &gt;<br>
&gt; &gt; NOTE : In this discussion target port and target portal group are used<br>
&gt; &gt; to imply the same entity, within a target node.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Jim Hafner wrote:<br>
&gt; &gt;<br>
&gt; &gt; &gt; SAM-2 requires scsi port names to be persistent and world-wide-unique.<br>
&gt; &gt; &gt; (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &quot;A scsi port name shall never change and may be used to persistently<br>
&gt; &gt; &gt; identify a scsi initiator port or target port...&quot;.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; &gt; There are different ways that one can interpret this &quot;persistent&quot;<br>
&gt; rule. The<br>
&gt; &gt; &gt; intent was that names shouldn't change over time when *identifying the<br>
&gt; same<br>
&gt; &gt; &gt; object*. &nbsp; What that means is that if the object changes (in any<br>
&gt; &gt; &gt; discernable way), then the name should change. &nbsp;So, the object can<br>
&gt; move to<br>
&gt; &gt; &gt; a different piece of hardware, but it can still be named the same way.<br>
&gt; &nbsp;If<br>
&gt; &gt; &gt; the object changes, e.g., in this case, reconfigures as a different<br>
&gt; set of<br>
&gt; &gt; &gt; network portals with different addressing elements, then I would think<br>
&gt; that<br>
&gt; &gt; &gt; the name should change as well. &nbsp; That's all the persistence one<br>
&gt; really<br>
&gt; &gt; &gt; needs.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; I'm not sure what that implies about your recommendation. &nbsp;I don't see<br>
&gt; any<br>
&gt; &gt; &gt; problem with it, either.<br>
&gt; &gt; &gt; &lt;/JLH&gt;<br>
&gt; &gt;<br>
&gt; &gt; I think we may be in agreement. (See reasoning above).<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; The rationale for (2) is :<br>
&gt; &gt; &gt; --------------------------<br>
&gt; &gt; &gt; Consider an initiator node establishing multiple sessions to a scsi<br>
&gt; tgt<br>
&gt; &gt; &gt; port, with each session established to a subset of the network portals<br>
&gt; &gt; &gt; within the tgt portal group.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Consider an iscsi transport event involving the re-configuration of<br>
&gt; &gt; &gt; target portal groups on the iscsi target node. This may be preceeded<br>
&gt; by<br>
&gt; &gt; &gt; the iscsi sessions seeing an async message &quot;target requests logout&quot;,<br>
&gt; &gt; &gt; followed by session logout, portal group re-configuration, and then,<br>
&gt; the<br>
&gt; &gt; &gt; initiator re-establishes sessions.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Across a transport event that results in such session termination and<br>
&gt; &gt; &gt; re-establishment, the initiator needs to authenticate that it is still<br>
&gt; &gt; &gt; speaking to the same [i]scsi target port, in order to ensure that any<br>
&gt; &gt; &gt; open/active I-T-L nexus traffic on that session is not incorrectly<br>
&gt; &gt; &gt; routed to a wrong LUN after such a transport event.<br>
&gt; &gt;<br>
&gt; &gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; &gt; Under these events, shouldn't all &quot;open/active I_T_L traffic&quot; have<br>
&gt; been<br>
&gt; &gt; &gt; aborted, closed or otherwise ended? &nbsp;So this shouldn't be an issue at<br>
&gt; all.<br>
&gt; &gt;<br>
&gt; &gt; On a session logout &amp; re-login, it is not efficient/necessary to close<br>
&gt; &gt; and re-open each LUN behind that target port, due to the fact that a<br>
&gt; &gt; target port may have hundred's of LUNs behind it.<br>
&gt; &gt;<br>
&gt; &gt; All outstanding I/Os need to be aborted. Once the session is<br>
&gt; &gt; re-established [and the target port is authenticated to be the same],<br>
&gt; &gt; further I/O traffic can be resumed without requiring the SCSI ULP to<br>
&gt; &gt; close and re-open each LUN. Some transport specific clearing effects may<br>
&gt; &gt; have occurred, which may require additional LUN level activity, in some<br>
&gt; &gt; cases.<br>
&gt; &gt;<br>
&gt; &gt; (There are analogies to the above model in FCP &amp; SRP, which authenticate<br>
&gt; &gt; port name/identifier on login, allowing I/O resumption after session<br>
&gt; &gt; termination and re-establishment.)<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; &gt; To prevent such authentication issues, iscsi can send the iscsi target<br>
&gt; &gt; &gt; port identifier (portal group tag) explicitly in the login request,<br>
&gt; and<br>
&gt; &gt; &gt; the login can be rejected by the target on a portal group tag<br>
&gt; mis-match.<br>
&gt; &gt; &gt; (if the network portal does not belong to the addressed portal group<br>
&gt; &gt; &gt; tag).<br>
&gt; &gt; &gt; &lt;JLH&gt;<br>
&gt; &gt; &gt; Did you mean for the initiator to send this TPGT?<br>
&gt; &gt; &gt; &lt;/JLH&gt;<br>
&gt; &gt;<br>
&gt; &gt; Yes. The initiator login request must include the target portal group<br>
&gt; &gt; tag, thus identifying the target port to which a session is being<br>
&gt; &gt; established.<br>
&gt; &gt;<br>
&gt; &gt; Login currently carries no addressing information, since the addressing<br>
&gt; &gt; is implicit, based on the TCP connection in use. The problem with this<br>
&gt; &gt; approach is that the login implicitly addresses a network portal, and<br>
&gt; &gt; not the target port. As seen in the earlier example, the association of<br>
&gt; &gt; network portal &lt;-&gt; target port can change, and such changes can be<br>
&gt; &gt; detected, if the initiator were to explicitly identify the target port<br>
&gt; &gt; being logged into.<br>
&gt; &gt;<br>
&gt; &gt; --<br>
&gt; &gt; ##################################<br>
&gt; &gt; Santosh Rao<br>
&gt; &gt; Software Design Engineer,<br>
&gt; &gt; HP-UX iSCSI Driver Team,<br>
&gt; &gt; Hewlett Packard, Cupertino.<br>
&gt; &gt; email : santoshr@cup.hp.com<br>
&gt; &gt; Phone : 408-447-3751<br>
&gt; &gt; ##################################<br>
&gt; &gt; *<br>
&gt; &gt; * For T10 Reflector information, send a message with<br>
&gt; &gt; * 'info t10' (no quotes) in the message body to majordomo@t10.org<br>
&gt; &gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
<br>
</font>
<br>
<br>
--=_alternative 002A58C8C2256B74_=--


From owner-ips@ece.cmu.edu  Wed Mar  6 05:46:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA00034
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 05:46:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g269rPQ01806
	for ips-outgoing; Wed, 6 Mar 2002 04:53:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g269rOH01801
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 04:53:24 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id KAA66062
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 10:53:17 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g269swa91644
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 10:54:59 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI Draft 11 Comments
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF23559CE0.C8B288EC-ONC2256B74.003559F2@telaviv.ibm.com>
Date: Wed, 6 Mar 2002 11:55:04 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 06/03/2002 11:55:12,
	Serialize complete at 06/03/2002 11:55:12
Content-Type: multipart/alternative; boundary="=_alternative 0035E23EC2256B74_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0035E23EC2256B74_=
Content-Type: text/plain; charset="us-ascii"

Bob,

I had a "mechanical failure" in chapter 2 (both the inserts and deletes 
appear in the pdf and text).
Take the file from my site for the "intended" version.

? has been dropped.

I will fix the MUSTs in 11.4 and 5.

Julo





"Robert D. Russell" <rdr@io.iol.unh.edu>
06-03-02 11:36
Please respond to "Robert D. Russell"

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     ips@ece.cmu.edu
        Subject:        Re: iSCSI Draft 11 Comments

 

Julian:

3 small editorial corrections that I believe should be made to draft 11.


1)  In section 2.2.4, the fourth paragraph from the end, on page 36,
    should be removed:

    The value "?" with any key has the meaning of enquiry and should be
    answered with the current value or "NotUnderstood". The value "?" MUST
    be used ONLY in Full Feature Phase.  Whenever the responder has 2 two
    values for a key - one for the offering-to-responding-party direction
    and a second one for the responding-to-offering-party direction it
    will answer with the two values separated by a comma starting with the
    requesting-to-offering-party direction.


2)  In section 11.4, on page 186, the word "must" should be "MUST":

    The initiator of the TCP connection MUST provide this key to the
                                        ^^^^
    remote endpoint in the first login request if the initiator is not


3)  In section 11.5, on page 187, the word "must" should be "MUST":

    The initiator of the TCP connection MUST provide this key to the
                                        ^^^^
    remote endpoint at the first Login of the login phase for every con-
    nection. The Initiator key enables the initiator to identify itself to
    the remote endpoint.

Thanks,

Bob Russell
InterOperability Lab
University of New Hampshire
rdr@iol.unh.edu
603-862-3774




--=_alternative 0035E23EC2256B74_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Bob,</font>
<br>
<br><font size=2 face="sans-serif">I had a &quot;mechanical failure&quot; in chapter 2 (both the inserts and deletes appear in the pdf and text).</font>
<br><font size=2 face="sans-serif">Take the file from my site for the &quot;intended&quot; version.</font>
<br>
<br><font size=2 face="sans-serif">? has been dropped.</font>
<br>
<br><font size=2 face="sans-serif">I will fix the MUSTs in 11.4 and 5.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Robert D. Russell&quot; &lt;rdr@io.iol.unh.edu&gt;</b></font>
<p><font size=1 face="sans-serif">06-03-02 11:36</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Robert D. Russell&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI Draft 11 Comments</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Julian:<br>
<br>
3 small editorial corrections that I believe should be made to draft 11.<br>
<br>
<br>
1) &nbsp;In section 2.2.4, the fourth paragraph from the end, on page 36,<br>
 &nbsp; &nbsp;should be removed:<br>
<br>
 &nbsp; &nbsp;The value &quot;?&quot; with any key has the meaning of enquiry and should be<br>
 &nbsp; &nbsp;answered with the current value or &quot;NotUnderstood&quot;. The value &quot;?&quot; MUST<br>
 &nbsp; &nbsp;be used ONLY in Full Feature Phase. &nbsp;Whenever the responder has 2 two<br>
 &nbsp; &nbsp;values for a key - one for the offering-to-responding-party direction<br>
 &nbsp; &nbsp;and a second one for the responding-to-offering-party direction it<br>
 &nbsp; &nbsp;will answer with the two values separated by a comma starting with the<br>
 &nbsp; &nbsp;requesting-to-offering-party direction.<br>
<br>
<br>
2) &nbsp;In section 11.4, on page 186, the word &quot;must&quot; should be &quot;MUST&quot;:<br>
<br>
 &nbsp; &nbsp;The initiator of the TCP connection MUST provide this key to the<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;^^^^<br>
 &nbsp; &nbsp;remote endpoint in the first login request if the initiator is not<br>
<br>
<br>
3) &nbsp;In section 11.5, on page 187, the word &quot;must&quot; should be &quot;MUST&quot;:<br>
<br>
 &nbsp; &nbsp;The initiator of the TCP connection MUST provide this key to the<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;^^^^<br>
 &nbsp; &nbsp;remote endpoint at the first Login of the login phase for every con-<br>
 &nbsp; &nbsp;nection. The Initiator key enables the initiator to identify itself to<br>
 &nbsp; &nbsp;the remote endpoint.<br>
<br>
Thanks,<br>
<br>
Bob Russell<br>
InterOperability Lab<br>
University of New Hampshire<br>
rdr@iol.unh.edu<br>
603-862-3774<br>
<br>
</font>
<br>
<br>
--=_alternative 0035E23EC2256B74_=--


From owner-ips@ece.cmu.edu  Wed Mar  6 10:04:49 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA11712
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 10:04:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26ENVl00517
	for ips-outgoing; Wed, 6 Mar 2002 09:23:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26DG0H25947
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 08:16:00 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA06230;
	Wed, 6 Mar 2002 08:15:56 -0500 (EST)
Message-Id: <200203061315.IAA06230@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-11.txt,.pdf
Date: Wed, 06 Mar 2002 08:15:56 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: iSCSI
	Author(s)	: J. Satran et al.
	Filename	: draft-ietf-ips-iscsi-11.txt,.pdf
	Pages		: 
	Date		: 05-Mar-02
	
The Small Computer Systems Interface (SCSI) is a popular family of 
protocols for communicating with I/O devices, especially storage 
devices. This memo describes a transport protocol for SCSI that oper-
ates on top of TCP. The iSCSI protocol aims to be fully compliant with 
the requirements laid out in the SCSI Architecture Model - 2 [SAM2] 
document.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-11.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-11.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-11.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020305134311.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-11.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-11.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020305134311.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Wed Mar  6 10:05:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA11739
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 10:05:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26ENL700491
	for ips-outgoing; Wed, 6 Mar 2002 09:23:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26DFsH25932
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 08:15:54 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA06218;
	Wed, 6 Mar 2002 08:15:51 -0500 (EST)
Message-Id: <200203061315.IAA06218@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-slp-03.txt
Date: Wed, 06 Mar 2002 08:15:50 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Finding iSCSI Targets and Name Servers Using SLP
	Author(s)	: M. Bakke et al.
	Filename	: draft-ietf-ips-iscsi-slp-03.txt
	Pages		: 21
	Date		: 05-Mar-02
	
The iSCSI protocol provides a way for hosts to access SCSI devices
over an IP network.  This document defines the use of the Service
Location Protocol (SLP) by iSCSI hosts, devices, and name services,
along with the SLP service type templates that describe the services   they provide.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-slp-03.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-slp-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-slp-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020305134251.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-slp-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-slp-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020305134251.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Wed Mar  6 10:13:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12064
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 10:13:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26EMuV00449
	for ips-outgoing; Wed, 6 Mar 2002 09:22:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from iol.unh.edu (io.iol.unh.edu [132.177.123.82])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g269aIH00943
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 04:36:18 -0500 (EST)
Received: from io.iol.unh.edu (IDENT:rdr@localhost.localdomain [127.0.0.1])
	by iol.unh.edu (8.12.2/8.12.2) with ESMTP id g269aCc6004953;
	Wed, 6 Mar 2002 04:36:12 -0500
Received: from localhost (rdr@localhost)
	by io.iol.unh.edu (8.12.2/8.12.1/Submit) with ESMTP id g269aCkx004950;
	Wed, 6 Mar 2002 04:36:12 -0500
Date: Wed, 6 Mar 2002 04:36:12 -0500 (EST)
From: "Robert D. Russell" <rdr@io.iol.unh.edu>
To: Julian Satran <Julian_Satran@il.ibm.com>
cc: ips@ece.cmu.edu
Subject: Re: iSCSI Draft 11 Comments
In-Reply-To: <OF9E32CA4B.CCD45DE6-ONC2256B74.0024FA05@telaviv.ibm.com>
Message-ID: <Pine.LNX.4.43.0203060434380.4942-100000@io.iol.unh.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Julian:

3 small editorial corrections that I believe should be made to draft 11.


1)  In section 2.2.4, the fourth paragraph from the end, on page 36,
    should be removed:

    The value "?" with any key has the meaning of enquiry and should be
    answered with the current value or "NotUnderstood". The value "?" MUST
    be used ONLY in Full Feature Phase.  Whenever the responder has 2 two
    values for a key - one for the offering-to-responding-party direction
    and a second one for the responding-to-offering-party direction it
    will answer with the two values separated by a comma starting with the
    requesting-to-offering-party direction.


2)  In section 11.4, on page 186, the word "must" should be "MUST":

    The initiator of the TCP connection MUST provide this key to the
                                        ^^^^
    remote endpoint in the first login request if the initiator is not


3)  In section 11.5, on page 187, the word "must" should be "MUST":

    The initiator of the TCP connection MUST provide this key to the
                                        ^^^^
    remote endpoint at the first Login of the login phase for every con-
    nection. The Initiator key enables the initiator to identify itself to
    the remote endpoint.

Thanks,

Bob Russell
InterOperability Lab
University of New Hampshire
rdr@iol.unh.edu
603-862-3774


From owner-ips@ece.cmu.edu  Wed Mar  6 11:55:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17907
	for <ips-archive@lists.ietf.org>; Wed, 6 Mar 2002 11:55:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26GAMl09698
	for ips-outgoing; Wed, 6 Mar 2002 11:10:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26GAJH09686
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 11:10:19 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id B6C53566B; Wed,  6 Mar 2002 09:10:18 -0700 (MST)
Received: from axcsbh1.cos.agilent.com (axcsbh1.cos.agilent.com [130.29.152.143])
	by msgrel1.cos.agilent.com (Postfix) with ESMTP
	id 905273E2; Wed,  6 Mar 2002 09:10:18 -0700 (MST)
Received: by axcsbh1.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FQHB5FRM>; Wed, 6 Mar 2002 09:10:18 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F268DD@axcs09.cos.agilent.com>
From: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>
Cc: ips@ece.cmu.edu, "'Satran, Julian'" <julian_satran@hotmail.com>
Subject: RE: iSCSI - Range of values can be negotiated for integers?
Date: Wed, 6 Mar 2002 09:10:17 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

One could take the most liberal interpretation and offer:

MaxConnections=1,15
MaxBurstSize=8192,64456
FirstBurstSize=8192,64456
....

Where in the spec does it say which integer keys are allowed to use ranges
in the negotiation?

Kevin Lemay

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Wednesday, March 06, 2002 8:02 AM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: ips@ece.cmu.edu; 'Satran, Julian'
Subject: Re: iSCSI - Range of values can be negotiated for integers?


Kevin:

I believe that the sentence you quote should be prefaced as
follows:

"Depending on the key, the value offered can be an integer,
a range defined by a lower and upper value, ..."

This makes it clear that it does NOT apply to all numeric keys.

Julian, if you agree would you please add the "Depending on the key,"
prefix to the sentence in question?

Thanks,
Bob Russell


On Tue, 5 Mar 2002, LEMAY,KEVIN (A-Roseville,ex1) wrote:

> On page 60 of iSCSI v11 says that:
>
> "The value can be an integer, a range defined by a lower and upper
> value...."
>
> I must assume that any numeric key may use this feature?
>
> I don't see any reference to this new capabilty anywhere else in the
> document. I am sure that we are going to have problems at plugfest if this
> is not cleared up now.
>
> Thanks,
>
> Kevin Lemay
> Agilent Technologies
>


From owner-ips@ece.cmu.edu  Wed Mar  6 13:00:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA22732
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:00:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26H2dp14408
	for ips-outgoing; Wed, 6 Mar 2002 12:02:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26H2aH14400
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 12:02:36 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id SAA139050
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 18:02:28 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g26H2va23220
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 18:02:57 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: iSCSI - Range of values can be negotiated for integers?
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFA58F6352.D96871AA-ONC2256B74.005D4C04@telaviv.ibm.com>
Date: Wed, 6 Mar 2002 19:02:59 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 06/03/2002 19:03:10,
	Serialize complete at 06/03/2002 19:03:10
Content-Type: multipart/alternative; boundary="=_alternative 005D50F5C2256B74_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 005D50F5C2256B74_=
Content-Type: text/plain; charset="us-ascii"

Kevin,

You have a good point. I have observed myself that I created this problem 
when introducing ranges and I fixed it - but too late (yesterday :-)) The 
section 4 text will read:

The value offered can be an integer, a range defined by lower and upper 
value - both integers separated by a comma, a single literal constant a 
Boolean value (Yes or No), or a list of comma separated, literal constant 
values. A range MAY ONLY be offered only if it is explicitly allowed for a 
key. A selected value can be an integer, a single literal constant or a 
Boolean value.

Regards,
Julo




"LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
Sent by: owner-ips@ece.cmu.edu
06-03-02 18:10
Please respond to "LEMAY,KEVIN (A-Roseville,ex1)"

 
        To:     "'Robert D. Russell'" <rdr@io.iol.unh.edu>
        cc:     ips@ece.cmu.edu, "'Satran, Julian'" <julian_satran@hotmail.com>
        Subject:        RE: iSCSI - Range of values can be negotiated for integers?

 

One could take the most liberal interpretation and offer:

MaxConnections=1,15
MaxBurstSize=8192,64456
FirstBurstSize=8192,64456
....

Where in the spec does it say which integer keys are allowed to use ranges
in the negotiation?

Kevin Lemay

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Wednesday, March 06, 2002 8:02 AM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: ips@ece.cmu.edu; 'Satran, Julian'
Subject: Re: iSCSI - Range of values can be negotiated for integers?


Kevin:

I believe that the sentence you quote should be prefaced as
follows:

"Depending on the key, the value offered can be an integer,
a range defined by a lower and upper value, ..."

This makes it clear that it does NOT apply to all numeric keys.

Julian, if you agree would you please add the "Depending on the key,"
prefix to the sentence in question?

Thanks,
Bob Russell


On Tue, 5 Mar 2002, LEMAY,KEVIN (A-Roseville,ex1) wrote:

> On page 60 of iSCSI v11 says that:
>
> "The value can be an integer, a range defined by a lower and upper
> value...."
>
> I must assume that any numeric key may use this feature?
>
> I don't see any reference to this new capabilty anywhere else in the
> document. I am sure that we are going to have problems at plugfest if 
this
> is not cleared up now.
>
> Thanks,
>
> Kevin Lemay
> Agilent Technologies
>





--=_alternative 005D50F5C2256B74_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Kevin,</font>
<br>
<br><font size=2 face="sans-serif">You have a good point. I have observed myself that I created this problem when introducing ranges and I fixed it - but too late (yesterday :-)) The section 4 text will read:</font>
<br>
<br><font size=3 face="Courier New">The value offered can be an integer, a range defined by lower and upper value - both integers separated by a comma, a single literal constant a Boolean value (Yes or No), or a list of comma separated, literal constant values. A range MAY ONLY be offered only if it is explicitly allowed for a key. A selected value can be an integer, a single literal constant or a Boolean value.</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;LEMAY,KEVIN (A-Roseville,ex1)&quot; &lt;kevin_lemay@agilent.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">06-03-02 18:10</font>
<br><font size=1 face="sans-serif">Please respond to &quot;LEMAY,KEVIN (A-Roseville,ex1)&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;'Robert D. Russell'&quot; &lt;rdr@io.iol.unh.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu, &quot;'Satran, Julian'&quot; &lt;julian_satran@hotmail.com&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI - Range of values can be negotiated for integers?</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">One could take the most liberal interpretation and offer:<br>
<br>
MaxConnections=1,15<br>
MaxBurstSize=8192,64456<br>
FirstBurstSize=8192,64456<br>
....<br>
<br>
Where in the spec does it say which integer keys are allowed to use ranges<br>
in the negotiation?<br>
<br>
Kevin Lemay<br>
<br>
-----Original Message-----<br>
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]<br>
Sent: Wednesday, March 06, 2002 8:02 AM<br>
To: LEMAY,KEVIN (A-Roseville,ex1)<br>
Cc: ips@ece.cmu.edu; 'Satran, Julian'<br>
Subject: Re: iSCSI - Range of values can be negotiated for integers?<br>
<br>
<br>
Kevin:<br>
<br>
I believe that the sentence you quote should be prefaced as<br>
follows:<br>
<br>
&quot;Depending on the key, the value offered can be an integer,<br>
a range defined by a lower and upper value, ...&quot;<br>
<br>
This makes it clear that it does NOT apply to all numeric keys.<br>
<br>
Julian, if you agree would you please add the &quot;Depending on the key,&quot;<br>
prefix to the sentence in question?<br>
<br>
Thanks,<br>
Bob Russell<br>
<br>
<br>
On Tue, 5 Mar 2002, LEMAY,KEVIN (A-Roseville,ex1) wrote:<br>
<br>
&gt; On page 60 of iSCSI v11 says that:<br>
&gt;<br>
&gt; &quot;The value can be an integer, a range defined by a lower and upper<br>
&gt; value....&quot;<br>
&gt;<br>
&gt; I must assume that any numeric key may use this feature?<br>
&gt;<br>
&gt; I don't see any reference to this new capabilty anywhere else in the<br>
&gt; document. I am sure that we are going to have problems at plugfest if this<br>
&gt; is not cleared up now.<br>
&gt;<br>
&gt; Thanks,<br>
&gt;<br>
&gt; Kevin Lemay<br>
&gt; Agilent Technologies<br>
&gt;<br>
</font>
<br>
<br>
<br>
<br>
--=_alternative 005D50F5C2256B74_=--


From owner-ips@ece.cmu.edu  Wed Mar  6 13:07:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23291
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:07:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26HcCt17562
	for ips-outgoing; Wed, 6 Mar 2002 12:38:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas2.cos.agilent.com (msgbas2x.cos.agilent.com [192.25.240.37])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26HcAH17558
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 12:38:10 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas2.cos.agilent.com (Postfix) with ESMTP
	id 55667EF4; Wed,  6 Mar 2002 10:38:09 -0700 (MST)
Received: from axcsbh4.cos.agilent.com (axcsbh4.cos.agilent.com [130.29.152.145])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 198233F0; Wed,  6 Mar 2002 10:38:09 -0700 (MST)
Received: from 130.29.152.145 by axcsbh4.cos.agilent.com (InterScan E-Mail VirusWall NT); Wed, 06 Mar 2002 10:38:08 -0700
Received: by axcsbh4.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FBZXQRT7>; Wed, 6 Mar 2002 10:38:08 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F268E0@axcs09.cos.agilent.com>
From: kevin_lemay@agilent.com
To: rdr@io.iol.unh.edu, kevin_lemay@agilent.com
Cc: ips@ece.cmu.edu, julian_satran@hotmail.com
Subject: RE: iSCSI - Range of values can be negotiated for integers?
Date: Wed, 6 Mar 2002 10:38:06 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I don't want to change it. I missed the the OFMarkInt and IFMarkInt keys and
no operational keys seemed to reference the ranges. I didn't see where it
was used.

Now it is clear.

I still need to change my login code to handle the ranges for OFMarkInt and
IFMarkInt.

Kevin

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Wednesday, March 06, 2002 9:05 AM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: ips@ece.cmu.edu; 'Satran, Julian'
Subject: RE: iSCSI - Range of values can be negotiated for integers?


Kevin:

In section 11 of Draft 11, when each key is defined, the form of
the value side is indicated explicitly.  For example, section 11.2
defines the MaxConnections key and shows its form as:

  MaxConnections=<number-from-1-to-65535>

This clearly shows that the value on the right of the = can only
be a single number, not a range of numbers.  The only keys which can
take a range of numbers are those in section A.3.2 of draft 11 for
markers (the OFMarkInt and IFMarkInt keys).

Not that your idea is a bad one, but do we want the complication
of these ranges on all the keys that have been just single numbers
up to now?  What significant advantage would there be that would make
it worthwhile for everyone to change the way it works now?

Bob Russell


> One could take the most liberal interpretation and offer:
>
> MaxConnections=1,15
> MaxBurstSize=8192,64456
> FirstBurstSize=8192,64456
> ....
>
> Where in the spec does it say which integer keys are allowed to use ranges
> in the negotiation?
>
> Kevin Lemay
>


From owner-ips@ece.cmu.edu  Wed Mar  6 13:27:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA24784
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:27:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26Hn6518477
	for ips-outgoing; Wed, 6 Mar 2002 12:49:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26G9OH09603
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 11:09:24 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA14886;
	Wed, 6 Mar 2002 11:09:20 -0500 (EST)
Message-Id: <200203061609.LAA14886@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-name-disc-05.txt
Date: Wed, 06 Mar 2002 11:09:19 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: iSCSI Naming and Discovery
	Author(s)	: M. Bakke et al.
	Filename	: draft-ietf-ips-iscsi-name-disc-05.txt
	Pages		: 22
	Date		: 05-Mar-02
	
This document describes iSCSI [7] naming and discovery details. This 
document complements the iSCSI Protocol draft. Flexibility is the key 
guiding principle behind this document. That is, an effort has been  
made to satisfy the needs of both small isolated environments, as well 
as large environments requiring secure/scalable solutions

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-name-disc-05.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-name-disc-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-name-disc-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020305134324.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-name-disc-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-name-disc-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020305134324.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Wed Mar  6 13:28:17 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA24843
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:28:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26HnD818496
	for ips-outgoing; Wed, 6 Mar 2002 12:49:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from iol.unh.edu (io.iol.unh.edu [132.177.123.82])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26H58H14709
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 12:05:08 -0500 (EST)
Received: from io.iol.unh.edu (IDENT:rdr@localhost.localdomain [127.0.0.1])
	by iol.unh.edu (8.12.2/8.12.2) with ESMTP id g26H50HY014648;
	Wed, 6 Mar 2002 12:05:01 -0500
Received: from localhost (rdr@localhost)
	by io.iol.unh.edu (8.12.2/8.12.1/Submit) with ESMTP id g26H50Iw014645;
	Wed, 6 Mar 2002 12:05:00 -0500
Date: Wed, 6 Mar 2002 12:05:00 -0500 (EST)
From: "Robert D. Russell" <rdr@io.iol.unh.edu>
To: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
cc: ips@ece.cmu.edu, "'Satran, Julian'" <julian_satran@hotmail.com>
Subject: RE: iSCSI - Range of values can be negotiated for integers?
In-Reply-To: <9F8400020EC5D311AF62009027C3961605F268DD@axcs09.cos.agilent.com>
Message-ID: <Pine.LNX.4.43.0203061155450.14031-100000@io.iol.unh.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Kevin:

In section 11 of Draft 11, when each key is defined, the form of
the value side is indicated explicitly.  For example, section 11.2
defines the MaxConnections key and shows its form as:

  MaxConnections=<number-from-1-to-65535>

This clearly shows that the value on the right of the = can only
be a single number, not a range of numbers.  The only keys which can
take a range of numbers are those in section A.3.2 of draft 11 for
markers (the OFMarkInt and IFMarkInt keys).

Not that your idea is a bad one, but do we want the complication
of these ranges on all the keys that have been just single numbers
up to now?  What significant advantage would there be that would make
it worthwhile for everyone to change the way it works now?

Bob Russell


> One could take the most liberal interpretation and offer:
>
> MaxConnections=1,15
> MaxBurstSize=8192,64456
> FirstBurstSize=8192,64456
> ....
>
> Where in the spec does it say which integer keys are allowed to use ranges
> in the negotiation?
>
> Kevin Lemay
>


From owner-ips@ece.cmu.edu  Wed Mar  6 13:28:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA24860
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:28:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26HmxA18452
	for ips-outgoing; Wed, 6 Mar 2002 12:48:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from iol.unh.edu (io.iol.unh.edu [132.177.123.82])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26G2AH08950
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 11:02:10 -0500 (EST)
Received: from io.iol.unh.edu (IDENT:rdr@localhost.localdomain [127.0.0.1])
	by iol.unh.edu (8.12.2/8.12.2) with ESMTP id g26G23HY012119;
	Wed, 6 Mar 2002 11:02:03 -0500
Received: from localhost (rdr@localhost)
	by io.iol.unh.edu (8.12.2/8.12.1/Submit) with ESMTP id g26G23qq012116;
	Wed, 6 Mar 2002 11:02:03 -0500
Date: Wed, 6 Mar 2002 11:02:03 -0500 (EST)
From: "Robert D. Russell" <rdr@io.iol.unh.edu>
To: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
cc: ips@ece.cmu.edu, "'Satran, Julian'" <julian_satran@hotmail.com>
Subject: Re: iSCSI - Range of values can be negotiated for integers?
In-Reply-To: <9F8400020EC5D311AF62009027C3961605F268DB@axcs09.cos.agilent.com>
Message-ID: <Pine.LNX.4.43.0203061059220.11978-100000@io.iol.unh.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Kevin:

I believe that the sentence you quote should be prefaced as
follows:

"Depending on the key, the value offered can be an integer,
a range defined by a lower and upper value, ..."

This makes it clear that it does NOT apply to all numeric keys.

Julian, if you agree would you please add the "Depending on the key,"
prefix to the sentence in question?

Thanks,
Bob Russell


On Tue, 5 Mar 2002, LEMAY,KEVIN (A-Roseville,ex1) wrote:

> On page 60 of iSCSI v11 says that:
>
> "The value can be an integer, a range defined by a lower and upper
> value...."
>
> I must assume that any numeric key may use this feature?
>
> I don't see any reference to this new capabilty anywhere else in the
> document. I am sure that we are going to have problems at plugfest if this
> is not cleared up now.
>
> Thanks,
>
> Kevin Lemay
> Agilent Technologies
>


From owner-ips@ece.cmu.edu  Wed Mar  6 13:35:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25392
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 13:35:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26IHXg20805
	for ips-outgoing; Wed, 6 Mar 2002 13:17:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26IHTH20791
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 13:17:29 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP
	id 0B2C5600492; Wed,  6 Mar 2002 10:17:23 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA28535; Wed, 6 Mar 2002 10:19:03 -0800 (PST)
Message-ID: <001501c1c53b$28725b50$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <OF5BD0C817.D66D3F61-ONC2256B74.0029D367@telaviv.ibm.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Wed, 6 Mar 2002 10:17:21 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> The issue is that I am not sure that a target is checking today anything - 
> (adapter drivers may check oif in their realm they can give out a TSID). 
> Nothing else is needed.

Target is required to derive the TPGT and use it in both cases of Login -
     a) when TSID = 0, to ascertain if a session reinstatement needs to
         be effected for that TPGT.
     b) when TSID != 0, to ascertain the validity of TSID and add in
          the new connection to an existing session if it is valid for that TPGT.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747

----- Original Message ----- 
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 05, 2002 11:56 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


> The issue is that I am not sure that a target is checking today anything - 
> (adapter drivers may check oif in their realm they can give out a TSID). 
> Nothing else is needed. Does SCSI have to be aware of it? Perhaps but 
> iSCSI certainly not. Does a "front-end" have to be - again probably not 
> the name identifies the node.
> 
> Julo
> 
> 
> 
> 
> "Mallikarjun C." <cbm@rose.hp.com>
> 05-03-02 22:34
> Please respond to "Mallikarjun C."
> 
>  
>         To:     Julian Satran/Haifa/IBM@IBMIL
>         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
>         Subject:        Re: iscsi : changes involving tgt portal group tag.
> 
>  
> 
> Julian,
> 
> Whatever methods a target is expected to use today to derive the implicit
> TPGT to preclude a duplicate I-T nexus would work after the change as 
> well,
> except the derived value needs to be compared against the (proposed)
> TPGT in the Login Request payload.
> 
> Please comment if we're missing something.
> 
> Regards.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Julian Satran" <Julian_Satran@il.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao" 
> <santoshr@cup.hp.com>;
> <t10@t10.org>
> Sent: Monday, March 04, 2002 10:24 PM
> Subject: Re: iscsi : changes involving tgt portal group tag.
> 
> 
> > Has a decent target implementation and easy way of checking that the TPG
> > is correct?
> >
> > Julo
> >
> >
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>
> > Sent by: owner-ips@ece.cmu.edu
> > 05-03-02 01:12
> > Please respond to "Mallikarjun C."
> >
> >
> >         To:     "Santosh Rao" <santoshr@cup.hp.com>, <ips@ece.cmu.edu>
> >         cc:     <t10@t10.org>
> >         Subject:        Re: iscsi : changes involving tgt portal group 
> tag.
> >
> >
> >
> > Santosh and Jim,
> >
> > It appears a good idea to add in the portal group tag in the Login
> > Request header for a sanity check by the receiving target portal.
> >
> > I generally agree with Jim's comments that the duration of persistence
> > of a portal group tag is intricately linked to the extent of portal
> > reconfiguration.
> > Not every target reconfiguration may result in a portal group tag
> > reassignment.
> > OTOH, some reconfigurations may be so extensive as to cause even a node
> > name change.
> >
> > Some comments on Santosh's message -
> >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> >
> > I am not sure this solves the problem you're trying to get at.  If none 
> of
> > the earlier IP addresses can get an initiator to the SCSI target port 
> that
> > it
> > knew of (your scenario), it appears to me that it doesn't matter if the
> > portal group tags are changed or not....A new discovery process should
> > update the initiator of the changed portal addresses.
> >
> > I suggest the following text -
> >
> >    After a portal group reconfiguration which changed the view of LUs
> >    for an initiator with a given set of privileges, the target MUST 
> change
> >    the portal group tag that represents the reconfigured target portal
> > group.
> >
> > > > Under these events, shouldn't all "open/active I_T_L traffic" have
> > been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an issue 
> at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to close
> > > and re-open each LUN behind that target port, due to the fact that a
> > > target port may have hundred's of LUNs behind it.
> >
> > I agree with Jim on this one - there should be *no* open/active I_T_L
> > nexus
> > traffic after a reconfiguration, targets can enforce this via simple 
> iSCSI
> > means
> > (reject initiator advances to continue the session for DefaultTime2Wait+
> > DefaultTime2Retain seconds).  In fact, Async logout request requires a
> > clean closure that implicitly aborts I/Os.
> >
> > What you're describing is typical O/S "LUN open" and "LUN close"
> > interactions.  I agree that they wouldn't have to be repeated, but care
> > must be taken to ensure that new I/Os (on the new session after
> > reconfiguration)
> > are not delivered to the incorrect LUs.  It seems that the addition of
> > TPGT in the login header and the proposed new text (above) would take
> > care of this.
> >
> > Regards.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Santosh Rao" <santoshr@cup.hp.com>
> > To: <ips@ece.cmu.edu>
> > Cc: <t10@t10.org>
> > Sent: Monday, March 04, 2002 10:40 AM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > * From the T10 Reflector (t10@t10.org), posted by:
> > > * Santosh Rao <santoshr@cup.hp.com>
> > > *
> > > Jim,
> > >
> > > I agree that a "complete re-configuration" of a target port can result
> > > in a new port name & port identifier. However, the tricky part is the
> > > definition of a "complete re-configuration of an iscsi target port", 
> due
> > > to the concepts of portal groups involving multiple network portals.
> > >
> > > For example, if a portal group (aka, an iscsi target port) were to be
> > > re-configured to include a new network portal [moved from another 
> portal
> > > group], then, the target port itself has not changed, since it is 
> still
> > > accessible through its previously used network portals. What has 
> changed
> > > is the individual network portal that has moved from 1 target port to
> > > another.
> > >
> > > Hence, it is sufficient, in this case, to maintain persistence of the
> > > target port name/identifier, without requiring any change in port
> > > name/identifier. By requiring initiators to send the intended TPGT 
> (scsi
> > > target port name/identifier) along with the login request, this allows
> > > the target port to detect that the network portal is being accessed to
> > > connect to a different target port and it can reject the login.
> > >
> > > It may be helpful to call out the specific case when a port
> > > name/identifier MUST change. How about something like :
> > >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> > >
> > > This would allow access to the target port through its un-altered
> > > network portals to continue un-disrupted. More comments inline, in
> > > response to some of your queries.
> > >
> > > Thanks,
> > > Santosh
> > >
> > > NOTE : In this discussion target port and target portal group are used
> > > to imply the same entity, within a target node.
> > >
> > >
> > > Jim Hafner wrote:
> > >
> > > > SAM-2 requires scsi port names to be persistent and 
> world-wide-unique.
> > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > >
> > > > "A scsi port name shall never change and may be used to persistently
> > > > identify a scsi initiator port or target port...".
> > > >
> > > > <JLH>
> > > > There are different ways that one can interpret this "persistent"
> > rule. The
> > > > intent was that names shouldn't change over time when *identifying 
> the
> > same
> > > > object*.   What that means is that if the object changes (in any
> > > > discernable way), then the name should change.  So, the object can
> > move to
> > > > a different piece of hardware, but it can still be named the same 
> way.
> >  If
> > > > the object changes, e.g., in this case, reconfigures as a different
> > set of
> > > > network portals with different addressing elements, then I would 
> think
> > that
> > > > the name should change as well.   That's all the persistence one
> > really
> > > > needs.
> > > >
> > > > I'm not sure what that implies about your recommendation.  I don't 
> see
> > any
> > > > problem with it, either.
> > > > </JLH>
> > >
> > > I think we may be in agreement. (See reasoning above).
> > >
> > >
> > > >
> > > > The rationale for (2) is :
> > > > --------------------------
> > > > Consider an initiator node establishing multiple sessions to a scsi
> > tgt
> > > > port, with each session established to a subset of the network 
> portals
> > > > within the tgt portal group.
> > > >
> > > > Consider an iscsi transport event involving the re-configuration of
> > > > target portal groups on the iscsi target node. This may be preceeded
> > by
> > > > the iscsi sessions seeing an async message "target requests logout",
> > > > followed by session logout, portal group re-configuration, and then,
> > the
> > > > initiator re-establishes sessions.
> > > >
> > > > Across a transport event that results in such session termination 
> and
> > > > re-establishment, the initiator needs to authenticate that it is 
> still
> > > > speaking to the same [i]scsi target port, in order to ensure that 
> any
> > > > open/active I-T-L nexus traffic on that session is not incorrectly
> > > > routed to a wrong LUN after such a transport event.
> > >
> > > > <JLH>
> > > > Under these events, shouldn't all "open/active I_T_L traffic" have
> > been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an issue 
> at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to close
> > > and re-open each LUN behind that target port, due to the fact that a
> > > target port may have hundred's of LUNs behind it.
> > >
> > > All outstanding I/Os need to be aborted. Once the session is
> > > re-established [and the target port is authenticated to be the same],
> > > further I/O traffic can be resumed without requiring the SCSI ULP to
> > > close and re-open each LUN. Some transport specific clearing effects 
> may
> > > have occurred, which may require additional LUN level activity, in 
> some
> > > cases.
> > >
> > > (There are analogies to the above model in FCP & SRP, which 
> authenticate
> > > port name/identifier on login, allowing I/O resumption after session
> > > termination and re-establishment.)
> > >
> > >
> > > > To prevent such authentication issues, iscsi can send the iscsi 
> target
> > > > port identifier (portal group tag) explicitly in the login request,
> > and
> > > > the login can be rejected by the target on a portal group tag
> > mis-match.
> > > > (if the network portal does not belong to the addressed portal group
> > > > tag).
> > > > <JLH>
> > > > Did you mean for the initiator to send this TPGT?
> > > > </JLH>
> > >
> > > Yes. The initiator login request must include the target portal group
> > > tag, thus identifying the target port to which a session is being
> > > established.
> > >
> > > Login currently carries no addressing information, since the 
> addressing
> > > is implicit, based on the TCP connection in use. The problem with this
> > > approach is that the login implicitly addresses a network portal, and
> > > not the target port. As seen in the earlier example, the association 
> of
> > > network portal <-> target port can change, and such changes can be
> > > detected, if the initiator were to explicitly identify the target port
> > > being logged into.
> > >
> > > --
> > > ##################################
> > > Santosh Rao
> > > Software Design Engineer,
> > > HP-UX iSCSI Driver Team,
> > > Hewlett Packard, Cupertino.
> > > email : santoshr@cup.hp.com
> > > Phone : 408-447-3751
> > > ##################################
> > > *
> > > * For T10 Reflector information, send a message with
> > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > >
> >
> >
> >
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Wed Mar  6 15:31:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA03854
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 15:31:51 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26JOXa26625
	for ips-outgoing; Wed, 6 Mar 2002 14:24:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ariel.nishansystems.com (gortex.nishansystems.com [65.113.142.135] (may be forged))
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26JOVH26621
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 14:24:31 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <1LYT2NSH>; Wed, 6 Mar 2002 11:24:20 -0800
Received: from ece.cmu.edu (192.168.20.5 [192.168.20.5]) by ariel.nishansystems.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 1LYT21YS; Wed, 27 Feb 2002 15:06:02 -0800
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g1RMdQF18053
	for ips-outgoing; Wed, 27 Feb 2002 17:39:26 -0500 (EST)
Received: from ariel.nishansystems.com ([65.113.142.135])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g1RMdOH18048
	for <ips@ece.cmu.edu>; Wed, 27 Feb 2002 17:39:24 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <1LYT21WM>; Wed, 27 Feb 2002 14:39:12 -0800
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Message-ID: <B300BD9620BCD411A366009027C21D9B5521D4@ariel.nishansystems.com>
From: Charles Monia <cmonia@NishanSystems.com>
To: "Ips (E-mail)" <ips@ece.cmu.edu>
Subject: iFCP: Revision 10 published
Date: Wed, 27 Feb 2002 14:39:11 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi:

For the convenience of reviewers, the PDF version of iFCP revision 10 has been rebuilt with PDF bookmarks.  The reformatted version is available from the T11 archive at:

ftp://ftp.t11.org/t11/member/incoming/02-023v3.pdf.

For consistency, a version of the text file with the same file name is available from:

ftp://ftp.t11.org/t11/member/incoming/02-023v2.txt

The textual content is identical to the versions available from the IETF archive.

On or after 3/7/2002, the files will be moved to:

ftp://t11member@ftp.t11.org/t11/docs/02-023v3.txt and
ftp://t11member@ftp.t11.org/t11/docs/02-023v3.pdf


Thanks,
Charles


From owner-ips@ece.cmu.edu  Wed Mar  6 18:29:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA14891
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 18:29:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26MiZs14510
	for ips-outgoing; Wed, 6 Mar 2002 17:44:35 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g26MiUH14494
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 17:44:30 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g26MiO015114
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 17:44:24 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g26MiNK15105;
	Wed, 6 Mar 2002 17:44:23 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g26MiNh08470;
	Wed, 6 Mar 2002 17:44:23 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15494.39880.284000.99477@gargle.gargle.HOWL>
Date: Wed, 6 Mar 2002 17:44:24 -0500
From: Paul Koning <ni1d@arrl.net>
To: rdr@io.iol.unh.edu
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI - Range of values can be negotiated for integers?
References: <9F8400020EC5D311AF62009027C3961605F268DD@axcs09.cos.agilent.com>
	<Pine.LNX.4.43.0203061155450.14031-100000@io.iol.unh.edu>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 6 March 2002) by Robert D. Russell:
> Kevin:
> 
> In section 11 of Draft 11, when each key is defined, the form of
> the value side is indicated explicitly.  For example, section 11.2
> defines the MaxConnections key and shows its form as:
> 
>   MaxConnections=<number-from-1-to-65535>
> 
> This clearly shows that the value on the right of the = can only
> be a single number, not a range of numbers.  The only keys which can
> take a range of numbers are those in section A.3.2 of draft 11 for
> markers (the OFMarkInt and IFMarkInt keys).
> 
> Not that your idea is a bad one, but do we want the complication
> of these ranges on all the keys that have been just single numbers
> up to now?  What significant advantage would there be that would make
> it worthwhile for everyone to change the way it works now?

I was wondering the same thing.  Did I miss the discussion on the
list, or in the meeting, where this was covered?

I'm assuming that we're not making any changes to the spec at this
stage unless they are explicitly discussed on the list and agreed to
by the usual "rough consensus" criterion.

   paul




From owner-ips@ece.cmu.edu  Wed Mar  6 18:36:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA15236
	for <ips-archive@odin.ietf.org>; Wed, 6 Mar 2002 18:36:16 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g26NC5w16611
	for ips-outgoing; Wed, 6 Mar 2002 18:12:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g26NC3H16607
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 18:12:04 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 6EAC5667F; Wed,  6 Mar 2002 16:12:02 -0700 (MST)
Received: from axcsbh1.cos.agilent.com (axcsbh1.cos.agilent.com [130.29.152.143])
	by msgrel1.cos.agilent.com (Postfix) with ESMTP
	id 1E68D241; Wed,  6 Mar 2002 16:12:01 -0700 (MST)
Received: by axcsbh1.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FQHB505B>; Wed, 6 Mar 2002 16:12:01 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00A9858DE@axcs04.cos.agilent.com>
From: "THALER,PAT (A-Roseville,ex1)" <pat_thaler@agilent.com>
To: Paul Koning <ni1d@arrl.net>, rdr@io.iol.unh.edu
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI - Range of values can be negotiated for integers?
Date: Wed, 6 Mar 2002 16:11:59 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Paul,

Most of the numeric negotiations are resolved by choosing the lesser of the
values that the initiator and target are willing to offer. Sending 

MaxConnections = 50

means one will support max connections anywhere from 1 to 50. It is not
clear to me that making it an explicit range provides any significant value
and it does add some complexity. Therefore, I do not think we should change
it.

Regards,
Pat Thaler

-----Original Message-----
From: Paul Koning [mailto:ni1d@arrl.net]
Sent: Wednesday, March 06, 2002 2:44 PM
To: rdr@io.iol.unh.edu
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI - Range of values can be negotiated for integers?


Excerpt of message (sent 6 March 2002) by Robert D. Russell:
> Kevin:
> 
> In section 11 of Draft 11, when each key is defined, the form of
> the value side is indicated explicitly.  For example, section 11.2
> defines the MaxConnections key and shows its form as:
> 
>   MaxConnections=<number-from-1-to-65535>
> 
> This clearly shows that the value on the right of the = can only
> be a single number, not a range of numbers.  The only keys which can
> take a range of numbers are those in section A.3.2 of draft 11 for
> markers (the OFMarkInt and IFMarkInt keys).
> 
> Not that your idea is a bad one, but do we want the complication
> of these ranges on all the keys that have been just single numbers
> up to now?  What significant advantage would there be that would make
> it worthwhile for everyone to change the way it works now?

I was wondering the same thing.  Did I miss the discussion on the
list, or in the meeting, where this was covered?

I'm assuming that we're not making any changes to the spec at this
stage unless they are explicitly discussed on the list and agreed to
by the usual "rough consensus" criterion.

   paul



From owner-ips@ece.cmu.edu  Thu Mar  7 00:09:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA01143
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 00:09:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g274A3s05955
	for ips-outgoing; Wed, 6 Mar 2002 23:10:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from magic.adaptec.com (magic.adaptec.com [208.236.45.80])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g274A0H05950
	for <ips@ece.cmu.edu>; Wed, 6 Mar 2002 23:10:01 -0500 (EST)
Received: from redfish.adaptec.com (redfish.adaptec.com [162.62.50.11])
	by magic.adaptec.com (8.10.2+Sun/8.10.2) with ESMTP id g2749sj02719;
	Wed, 6 Mar 2002 20:09:54 -0800 (PST)
Received: from yahoo.com (ws192-168-1-77.hyd.adaptec.com [192.168.1.77] (may be forged))
	by redfish.adaptec.com (8.8.8+Sun/8.8.8) with ESMTP id TAA19339;
	Wed, 6 Mar 2002 19:52:11 -0800 (PST)
Message-ID: <3C86E871.9070605@yahoo.com>
Date: Thu, 07 Mar 2002 09:41:29 +0530
From: Ajit Aryan <digital_aryan@yahoo.com>
Reply-To: digital_aryan@yahoo.com
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.4) Gecko/20011126 Netscape6/6.2.1
X-Accept-Language: en-us
MIME-Version: 1.0
To: "Robert D. Russell" <rdr@io.iol.unh.edu>
CC: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>, ips@ece.cmu.edu,
        "'Satran, Julian'" <julian_satran@hotmail.com>
Subject: Re: iSCSI - Range of values can be negotiated for integers?
References: <Pine.LNX.4.43.0203061155450.14031-100000@io.iol.unh.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Yes,
Even I would like to hear about the advantages.

Aryan

Robert D. Russell wrote:

>Kevin:
>
>In section 11 of Draft 11, when each key is defined, the form of
>the value side is indicated explicitly.  For example, section 11.2
>defines the MaxConnections key and shows its form as:
>
>  MaxConnections=<number-from-1-to-65535>
>
>This clearly shows that the value on the right of the = can only
>be a single number, not a range of numbers.  The only keys which can
>take a range of numbers are those in section A.3.2 of draft 11 for
>markers (the OFMarkInt and IFMarkInt keys).
>
>Not that your idea is a bad one, but do we want the complication
>of these ranges on all the keys that have been just single numbers
>up to now?  What significant advantage would there be that would make
>it worthwhile for everyone to change the way it works now?
>
>Bob Russell
>
>
>>One could take the most liberal interpretation and offer:
>>
>>MaxConnections=1,15
>>MaxBurstSize=8192,64456
>>FirstBurstSize=8192,64456
>>....
>>
>>Where in the spec does it say which integer keys are allowed to use ranges
>>in the negotiation?
>>
>>Kevin Lemay
>>
>

-- 


Ajit Khaparde
Storage Networking Group
Adaptec India Design Center

Phone Daytime : +91-40-6661555 (237)
Phone Nighttime : +91-40-4456206
======================================================
This email and any files transmitted are confidential
and are intended solely for the use of the individual
or entity to which they are addressed. Access to this
e-mail by anyone else is unauthorized. If you are not
the intended recipient, any disclosure, copying,
distribution or any action taken or omitted to be taken
in reliance on it, is prohibited.






From owner-ips@ece.cmu.edu  Thu Mar  7 02:48:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13172
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 02:48:55 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g276xqE16027
	for ips-outgoing; Thu, 7 Mar 2002 01:59:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g276xoH16023
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 01:59:50 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id HAA19944
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 07:59:43 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2771jZ81024
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 08:01:45 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: iSCSI - Range of values can be negotiated for integers?
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF1582559A.98E55180-ONC2256B75.002600F4@telaviv.ibm.com>
Date: Thu, 7 Mar 2002 09:01:44 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 07/03/2002 09:01:45,
	Serialize complete at 07/03/2002 09:01:45
Content-Type: multipart/alternative; boundary="=_alternative 002605C3C2256B75_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002605C3C2256B75_=
Content-Type: text/plain; charset="us-ascii"

There was a discussion on the "irregularity" of the marker negotiation.
Ranges are now covered as a "regular" negotiation - and have to be used 
only when allowed explicitly (see my earlier note).

Julo




Paul Koning <ni1d@arrl.net>
Sent by: owner-ips@ece.cmu.edu
07-03-02 00:44
Please respond to Paul Koning

 
        To:     rdr@io.iol.unh.edu
        cc:     ips@ece.cmu.edu
        Subject:        RE: iSCSI - Range of values can be negotiated for integers?

 

Excerpt of message (sent 6 March 2002) by Robert D. Russell:
> Kevin:
> 
> In section 11 of Draft 11, when each key is defined, the form of
> the value side is indicated explicitly.  For example, section 11.2
> defines the MaxConnections key and shows its form as:
> 
>   MaxConnections=<number-from-1-to-65535>
> 
> This clearly shows that the value on the right of the = can only
> be a single number, not a range of numbers.  The only keys which can
> take a range of numbers are those in section A.3.2 of draft 11 for
> markers (the OFMarkInt and IFMarkInt keys).
> 
> Not that your idea is a bad one, but do we want the complication
> of these ranges on all the keys that have been just single numbers
> up to now?  What significant advantage would there be that would make
> it worthwhile for everyone to change the way it works now?

I was wondering the same thing.  Did I miss the discussion on the
list, or in the meeting, where this was covered?

I'm assuming that we're not making any changes to the spec at this
stage unless they are explicitly discussed on the list and agreed to
by the usual "rough consensus" criterion.

   paul







--=_alternative 002605C3C2256B75_=
Content-Type: text/html; charset="us-ascii"


<br>
<br><font size=2 face="sans-serif">There was a discussion on the &quot;irregularity&quot; of the marker negotiation.</font>
<br><font size=2 face="sans-serif">Ranges are now covered as a &quot;regular&quot; negotiation - and have to be used only when allowed explicitly (see my earlier note).</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Paul Koning &lt;ni1d@arrl.net&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">07-03-02 00:44</font>
<br><font size=1 face="sans-serif">Please respond to Paul Koning</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;rdr@io.iol.unh.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI - Range of values can be negotiated for integers?</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Excerpt of message (sent 6 March 2002) by Robert D. Russell:<br>
&gt; Kevin:<br>
&gt; <br>
&gt; In section 11 of Draft 11, when each key is defined, the form of<br>
&gt; the value side is indicated explicitly. &nbsp;For example, section 11.2<br>
&gt; defines the MaxConnections key and shows its form as:<br>
&gt; <br>
&gt; &nbsp; MaxConnections=&lt;number-from-1-to-65535&gt;<br>
&gt; <br>
&gt; This clearly shows that the value on the right of the = can only<br>
&gt; be a single number, not a range of numbers. &nbsp;The only keys which can<br>
&gt; take a range of numbers are those in section A.3.2 of draft 11 for<br>
&gt; markers (the OFMarkInt and IFMarkInt keys).<br>
&gt; <br>
&gt; Not that your idea is a bad one, but do we want the complication<br>
&gt; of these ranges on all the keys that have been just single numbers<br>
&gt; up to now? &nbsp;What significant advantage would there be that would make<br>
&gt; it worthwhile for everyone to change the way it works now?<br>
<br>
I was wondering the same thing. &nbsp;Did I miss the discussion on the<br>
list, or in the meeting, where this was covered?<br>
<br>
I'm assuming that we're not making any changes to the spec at this<br>
stage unless they are explicitly discussed on the list and agreed to<br>
by the usual &quot;rough consensus&quot; criterion.<br>
<br>
 &nbsp; paul<br>
<br>
<br>
</font>
<br>
<br>
<br>
<br>
--=_alternative 002605C3C2256B75_=--


From owner-ips@ece.cmu.edu  Thu Mar  7 08:55:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24453
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 08:55:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27D0im18800
	for ips-outgoing; Thu, 7 Mar 2002 08:00:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27BxXH15366
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 06:59:33 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA18604;
	Thu, 7 Mar 2002 06:59:30 -0500 (EST)
Message-Id: <200203071159.GAA18604@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-scsi-mib-02.txt
Date: Thu, 07 Mar 2002 06:59:30 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Definition of Managed Objects for SCSI Entities
	Author(s)	: M. Hallak-Stamler et al.
	Filename	: draft-ietf-ips-scsi-mib-02.txt
	Pages		: 55
	Date		: 04-Mar-02
	
This memo defines a Management Information Base (MIB) for Small 
Computer System Interface (SCSI) entities, independently of the 
transport layer.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-scsi-mib-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-scsi-mib-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020306063241.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-scsi-mib-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-scsi-mib-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020306063241.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Thu Mar  7 13:29:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13096
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 13:29:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27HPmf09674
	for ips-outgoing; Thu, 7 Mar 2002 12:25:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27HPiH09663
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 12:25:44 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g27HPd207080
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 12:25:39 -0500
Message-ID: <3C87A293.8355BE0F@splentec.com>
Date: Thu, 07 Mar 2002 12:25:39 -0500
From: Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI - Range of values can be negotiated for integers?
References: <1BEBA5E8600DD4119A50009027AF54A00A9858DE@axcs04.cos.agilent.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> Sending
> 
> MaxConnections = 50
> 
> means one will support max connections anywhere from 1 to 50. 

Yes, and this is implicit because of the _nature_ of the key (_maximum_ connections), that is it is
a range key in and of itself.

Allowing a range in numerical key offers is good since you can check your resources at that time and
choose a suitable value... 
No added complexity.

It's just string and atoi() manipuation, checking the next char for comma or dash (my own
extension), checking your own resources at that point in time and choosing a suitable value.

BTW, does anyone have a state transition diagram for processing the (contents of the) first login
PDU?

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar  7 13:31:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13249
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 13:31:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27Hmbd11577
	for ips-outgoing; Thu, 7 Mar 2002 12:48:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from public.szptt.net.cn ([202.96.136.222])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g27Hl2H11421
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 12:47:03 -0500 (EST)
Received: from public.szptt.net.cn([202.96.136.225]) by public.szptt.net.cn(JetMail 2.5.3.0)
	with SMTP id jm43c87c1da; Thu,  7 Mar 2002 17:46:37 -0000
Received: from loki.ietf.org([132.151.1.177]) by public.szptt.net.cn(JetMail 2.5.3.0)
	with SMTP id jm13c84f866; Tue,  5 Mar 2002 14:18:34 -0000
Received: (from adm@localhost)
	by loki.ietf.org (8.9.1b+Sun/8.9.1) id IAA05398
	for ietf-123-outbound.01@ietf.org; Tue, 5 Mar 2002 08:25:00 -0500 (EST)
Received: from ietf.org (odin.ietf.org [10.27.2.28])
	by loki.ietf.org (8.9.1b+Sun/8.9.1) with ESMTP id GAA03990
	for <all-ietf@loki.ietf.org>; Tue, 5 Mar 2002 06:19:55 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA23378;
	Tue, 5 Mar 2002 06:19:52 -0500 (EST)
Message-Id: <200203051119.GAA23378@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-security-11.txt
Date: Tue, 05 Mar 2002 06:19:52 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Securing Block Storage Protocols over IP
	Author(s)	: B. Aboba et al.
	Filename	: draft-ietf-ips-security-11.txt
	Pages		: 65
	Date		: 04-Mar-02
	
This document discusses how block storage protocols running over IP,
including iSCSI, iFCP and FCIP, can utilize IPsec for security.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-security-11.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-security-11.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-security-11.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020304133416.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-security-11.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-security-11.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020304133416.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Thu Mar  7 15:17:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20817
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 15:17:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27JWuJ21024
	for ips-outgoing; Thu, 7 Mar 2002 14:32:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27JWrH21015
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 14:32:53 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g27JWq207691
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 14:32:52 -0500
Message-ID: <3C87C065.FDDF8705@splentec.com>
Date: Thu, 07 Mar 2002 14:32:53 -0500
From: Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: iSCSI: Question: ISID Rule?
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Could someone clarify a) and b) in 2.4.3 (pg. 51) of draft 11.

More specifically in a): what makes two of ``iSCSI initiator'' or two of ``iSCSI Target'' the same
so that I can check they are the same and impose uniqueness of SSID.

Is it ISID/TSID or Network Portals or both, or the Name or...?

Thanks,
-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar  7 16:53:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27240
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 16:53:16 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27L0bT28805
	for ips-outgoing; Thu, 7 Mar 2002 16:00:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27L0aH28800
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 16:00:36 -0500 (EST)
Received: from xparelay2.corp.hp.com (xparelay2.corp.hp.com [15.58.137.112])
	by palrel12.hp.com (Postfix) with ESMTP
	id 25BF26009BB; Thu,  7 Mar 2002 13:00:26 -0800 (PST)
Received: from xpabh2.corp.hp.com (xpabh2.corp.hp.com [15.58.136.192])
	by xparelay2.corp.hp.com (Postfix) with ESMTP
	id 9EDE5B3; Thu,  7 Mar 2002 13:00:12 -0800 (PST)
Received: by xpabh2.corp.hp.com with Internet Mail Service (5.5.2653.19)
	id <1FZKGLB3>; Thu, 7 Mar 2002 13:00:07 -0800
Message-ID: <6BD67FFB937FD411A04F00D0B74FE87805CCF437@xrose06.rose.hp.com>
From: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>
To: "'Luben Tuikov'" <luben@splentec.com>, iSCSI <ips@ece.cmu.edu>
Subject: RE: iSCSI: Question: ISID Rule?
Date: Thu, 7 Mar 2002 13:00:05 -0800 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

It's the SCSI device that is the comparison point, so you are comparing the
iSCSI node name of the two entities to determine if they are "the same".

Marjorie Krueger
Networked Storage Architecture
Networked Storage Solutions Org.
Hewlett-Packard
tel: +1 916 785 2656
fax: +1 916 785 0391
email: marjorie_krueger@hp.com 

> -----Original Message-----
> From: Luben Tuikov [mailto:luben@splentec.com]
> Sent: Thursday, March 07, 2002 11:33 AM
> To: iSCSI
> Subject: iSCSI: Question: ISID Rule?
> 
> 
> Could someone clarify a) and b) in 2.4.3 (pg. 51) of draft 11.
> 
> More specifically in a): what makes two of ``iSCSI 
> initiator'' or two of ``iSCSI Target'' the same
> so that I can check they are the same and impose uniqueness of SSID.
> 
> Is it ISID/TSID or Network Portals or both, or the Name or...?
> 
> Thanks,
> -- 
> Luben
> 


From owner-ips@ece.cmu.edu  Thu Mar  7 16:53:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27253
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 16:53:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27Ks0M28202
	for ips-outgoing; Thu, 7 Mar 2002 15:54:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls1.std.com [199.172.62.103])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27KrvH28196
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 15:53:57 -0500 (EST)
Received: from westboro-1.world.std.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id PAA07143
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 15:53:56 -0500
Message-Id: <5.1.0.14.0.20020307203102.00a246a0@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 07 Mar 2002 21:00:56 -0500
To: ips@ece.cmu.edu
From: David Jablon <dpj@world.std.com>
Subject: New draft relevant to SRP
In-Reply-To: <200203051119.GAA23378@ietf.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

A new draft that is relevant to the SRP authentication protocol
is available at:
http://search.ietf.org/internet-drafts/draft-jablon-speke-00.txt

SRP, as defined in RFC2945, and referenced in draft-ietf-ips-security-11.txt,
has technical and IP issues, that are addressed in this draft.

    Title       : The SPEKE Password-Based Key Agreement Methods
    Author(s)   : D. Jablon
    Filename    : draft-jablon-speke-00.txt
    Pages       : 25
    Date        : 13-Feb-02
        
This document describes SPEKE, B-SPEKE, and SRP-4, three methods for
password-based key agreement and authentication. In the same class of
techniques as SRP-3 [RFC 2945], these methods provide a zero-knowledge
proof of a password and authenticate session keys over an unprotected
channel, with minimal dependency on infrastructure and proper user
behavior. These methods are compatible with IEEE 1363 and ANSI X9
standards, and are closely aligned with RFC 2945 from an application
perspective. They are also based on different fundamental techniques than
earlier patented alternatives, providing an expanded set of choices for
convenient and secure personal authentication over the Internet. 

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-jablon-speke-00.txt

-- David

---------------------------------------------------
David Jablon
dpj@world.std.com
tel: 508 898 9024



From owner-ips@ece.cmu.edu  Thu Mar  7 18:31:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA02407
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 18:31:04 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27MWnV07084
	for ips-outgoing; Thu, 7 Mar 2002 17:32:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27MWkH07078
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 17:32:46 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g27MWf209081
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 17:32:41 -0500
Message-ID: <3C87EA8A.FDEE446B@splentec.com>
Date: Thu, 07 Mar 2002 17:32:42 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Question: ISID Rule?
References: <6BD67FFB937FD411A04F00D0B74FE87805CCF437@xrose06.rose.hp.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"KRUEGER,MARJORIE (HP-Roseville,ex1)" wrote:
> 
> It's the SCSI device that is the comparison point, so you are comparing the
> iSCSI node name of the two entities to determine if they are 
"the same".

Then this implies that a session is uniquely identified by (InitiatorName, TargetName).

Then for a new connection at the target:

 i) TSID!=0 provides implicit uniqueness,
    since a new connection will be added,
    if the session already exists.

ii) TSID=0, implies that there does NOT exist
    a session with the given TargetName, InitatorName
    and ISID given in the Login Request PDU, else close the
    connection.

Is this true?

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar  7 19:15:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA03962
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 19:15:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27NRsY11312
	for ips-outgoing; Thu, 7 Mar 2002 18:27:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from anchorage.arcot.com (anchorage.arcot.com [206.14.221.34])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27NRqH11307
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 18:27:52 -0500 (EST)
Received: from arcot.com (172.16.50.219 [172.16.50.219]) by anchorage.arcot.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 1MT649VP; Thu, 7 Mar 2002 15:24:12 -0800
Message-ID: <3C87F83B.343502C8@arcot.com>
Date: Thu, 07 Mar 2002 15:31:07 -0800
From: Tom Wu <tom@arcot.com>
Organization: Arcot Systems
X-Mailer: Mozilla 4.75 [en] (X11; U; Linux 2.2.14-5.0 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: David Jablon <dpj@world.std.com>, ips@ece.cmu.edu
Subject: Re: New draft relevant to SRP
References: <5.1.0.14.0.20020307203102.00a246a0@pop.theworld.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

David Jablon wrote:
> 
> A new draft that is relevant to the SRP authentication protocol
> is available at:
> http://search.ietf.org/internet-drafts/draft-jablon-speke-00.txt
> 
> SRP, as defined in RFC2945, and referenced in draft-ietf-ips-security-11.txt,
> has technical and IP issues, that are addressed in this draft.

The SPEKE techniques are, to my knowledge, patent-encumbered and
non-free, whereas SRP has a free patent license from Stanford and IP
issues that are nearing resolution.  It seems that presenting these
techniques as fixes to "issues" with SRP (instead of as a supplement) is
misleading in this context.

Unless SPEKE, or some variant thereof, is made available under a license
as liberal as the SRP license, it seems that it would be more
appropriate to consider it for a future optional authentication method,
as opposed to a mandatory one.

>     Title       : The SPEKE Password-Based Key Agreement Methods
>     Author(s)   : D. Jablon
>     Filename    : draft-jablon-speke-00.txt
>     Pages       : 25
>     Date        : 13-Feb-02
> 
> This document describes SPEKE, B-SPEKE, and SRP-4, three methods for
> password-based key agreement and authentication. In the same class of
> techniques as SRP-3 [RFC 2945], these methods provide a zero-knowledge
> proof of a password and authenticate session keys over an unprotected
> channel, with minimal dependency on infrastructure and proper user
> behavior. These methods are compatible with IEEE 1363 and ANSI X9
> standards, and are closely aligned with RFC 2945 from an application
> perspective. They are also based on different fundamental techniques than
> earlier patented alternatives, providing an expanded set of choices for
> convenient and secure personal authentication over the Internet.
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-jablon-speke-00.txt
> 
> -- David
> 
> ---------------------------------------------------
> David Jablon
> dpj@world.std.com
> tel: 508 898 9024

Tom
-- 
Tom Wu
Principal Software Engineer
Arcot Systems
(408) 969-6124
"The Borg?  Sounds Swedish..."


From owner-ips@ece.cmu.edu  Thu Mar  7 19:17:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA04085
	for <ips-archive@odin.ietf.org>; Thu, 7 Mar 2002 19:17:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g27NuR713706
	for ips-outgoing; Thu, 7 Mar 2002 18:56:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g27NuPH13702
	for <ips@ece.cmu.edu>; Thu, 7 Mar 2002 18:56:25 -0500 (EST)
Received: from xparelay2.corp.hp.com (xparelay2.corp.hp.com [15.58.137.112])
	by palrel11.hp.com (Postfix) with ESMTP id E945660071D
	for <ips@ece.cmu.edu>; Thu,  7 Mar 2002 15:56:19 -0800 (PST)
Received: from xpabh1.corp.hp.com (xpabh1.corp.hp.com [15.58.136.191])
	by xparelay2.corp.hp.com (Postfix) with ESMTP id CE69117B
	for <ips@ece.cmu.edu>; Thu,  7 Mar 2002 15:56:14 -0800 (PST)
Received: by xpabh1.corp.hp.com with Internet Mail Service (5.5.2653.19)
	id <17ZCL4VP>; Thu, 7 Mar 2002 15:56:09 -0800
Message-ID: <6BD67FFB937FD411A04F00D0B74FE87805CCF43D@xrose06.rose.hp.com>
From: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>
To: "'iSCSI'" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Question: ISID Rule?
Date: Thu, 7 Mar 2002 15:56:04 -0800 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> > It's the SCSI device that is the comparison point, so you 
> > are comparing the iSCSI node name of the two entities to 
> > determine if they are "the same".
> 
> Then this implies that a session is uniquely identified by 
> (InitiatorName, TargetName).

No, a session is uniquely identified by the combination of initiator name,
target name, and SSID.  It is also uniquely identified by the combination of
initiator port name (initiator node name+ISID) and target port name (target
node name+PGT), since there can be only one session between a given pair of
ports.  There can be multiple sessions between an initiator and a target
node, but only via different port combinations.

> 
> Then for a new connection at the target:

I think you mean "when a login request is received at the target", since a
login request can be either a "new connection", or an attempt to recover an
existing connection?

> 
>  i) TSID!=0 provides implicit uniqueness,
>     since a new connection will be added,
>     if the session already exists.

I don't know what you're driving at?  I can't see where TSID!=0 provides
uniqueness, implicit or otherwise.

If an initiator sends a login request w/TSID!=0 on a new connection pair, it
must be trying to add a connection to a session, assuming all other points
of comparison are equal (initiator name, target name, ISID, TSID, target
portal group).

> 
> ii) TSID=0, implies that there does NOT exist
>     a session with the given TargetName, InitatorName
>     and ISID given in the Login Request PDU, else close the
>     connection.

It implies that the initiator does not think a session currently exists
between the initiator and target ports identified by the login request.  If
a session does exist (from the targets viewpoint), the target should
terminate that session as the initiator has lost all state information for
that "old" session, and create a new session.  

See section 4.3.5 Session Reinstatement in draft 11 for further explanation.



From owner-ips@ece.cmu.edu  Fri Mar  8 11:08:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA12399
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 11:08:42 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g28FEdS21241
	for ips-outgoing; Fri, 8 Mar 2002 10:14:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls2.std.com [199.172.62.104])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g28FEbH21234
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 10:14:37 -0500 (EST)
Received: from westboro-1.world.std.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id KAA27478;
	Fri, 8 Mar 2002 10:14:28 -0500
Message-Id: <5.1.0.14.0.20020308132726.00a51050@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 08 Mar 2002 15:04:01 -0500
To: Tom Wu <tom@arcot.com>
From: David Jablon <dpj@world.std.com>
Subject: Re: New draft relevant to SRP
Cc: ips@ece.cmu.edu
In-Reply-To: <3C87F83B.343502C8@arcot.com>
References: <5.1.0.14.0.20020307203102.00a246a0@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Regarding the proposed alternatives to SRP-3 ...
(http://search.ietf.org/internet-drafts/draft-jablon-speke-00.txt)

At 03:31 PM 3/7/02 -0800, Tom Wu wrote:
>The SPEKE techniques are, to my knowledge, patent-encumbered and
>non-free, whereas SRP has a free patent license from Stanford and IP
>issues that are nearing resolution. [...]

First, your phrasing may suggest to some that the existence of the patent
is or was hidden.  The commercial intentions for the SPEKE protocols and
their patent status have been public knowledge since the first published
paper in 1996, and the draft is clear on this too.

>[...] It seems that presenting these 
>techniques as fixes to "issues" with SRP (instead of as a supplement) is
>misleading in this context.

Stanford's generosity notwithstanding, today, there is an outstanding
working group issue with SRP-3 and other patents.  David Black has
urged me to try to get Phoenix to clarify its position on SRP-3, and I'm
in the process of doing just that.  If you find specific text in the draft that
is "misleading" in this context, or any other context, show me and I'll try to
improve it promptly.  I also see no problem with the supplement approach.

The draft is intended to facilitate public analysis of both patent issues
and the technical merits of SRP-3 and the SPEKE, B-SPEKE and SRP-4
alternatives.  For some people, the relative technical merits of SRP-3 and these
alternatives may be minor -- they may shop around, first, based on price, and
only then based on these differences.

The bigger concern is when people don't shop around at all and leave
major technical issues unaddressed.

>Unless SPEKE, or some variant thereof, is made available under a license
>as liberal as the SRP license, it seems that it would be more
>appropriate to consider it for a future optional authentication method,
>as opposed to a mandatory one.

There's also a lot of room between MUST and MAY, and between 
free and affordable.  The only thing that I find really annoying, and kind of scary,
is when standards preclude or actively discourage strong options.

-- David




From owner-ips@ece.cmu.edu  Fri Mar  8 12:49:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA20262
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 12:49:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g28GZ9c28002
	for ips-outgoing; Fri, 8 Mar 2002 11:35:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g28GZ7H27994
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 11:35:07 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.us.ibm.com [9.99.140.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id LAA22504
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 11:31:48 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g28GZ5n200268
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 09:35:05 -0700
Importance: Normal
Subject: Re: iSCSI: Question: ISID Rule?
To: iSCSI <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF73E620E9.5EEB0953-ON88256B76.002FB61D@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Fri, 8 Mar 2002 02:09:04 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/08/2002 09:35:04 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Not exactly.

There is a CID in the equation also.  if TSID is not 0, and assuming other
things match, the CID will be used to determine if this is an implicit
logout and re-login for that connection.  If the CID is unique within the
session, then it will start a new session, else, it will log out the old
connection and create a new one.  Then of course, you need to use the Task
Management Request PDU, on the new connection to move the allegiance of the
existing tasks (one at a time) from the old connection to the new
connection.



.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Luben Tuikov <luben@splentec.com>@ece.cmu.edu on 03/07/2002 02:32:42 PM

Please respond to iSCSI <ips@ece.cmu.edu>

Sent by:    owner-ips@ece.cmu.edu


To:    iSCSI <ips@ece.cmu.edu>
cc:
Subject:    Re: iSCSI: Question: ISID Rule?



"KRUEGER,MARJORIE (HP-Roseville,ex1)" wrote:
>
> It's the SCSI device that is the comparison point, so you are comparing
the
> iSCSI node name of the two entities to determine if they are
"the same".

Then this implies that a session is uniquely identified by (InitiatorName,
TargetName).

Then for a new connection at the target:

 i) TSID!=0 provides implicit uniqueness,
    since a new connection will be added,
    if the session already exists.

ii) TSID=0, implies that there does NOT exist
    a session with the given TargetName, InitatorName
    and ISID given in the Login Request PDU, else close the
    connection.

Is this true?

--
Luben





From owner-ips@ece.cmu.edu  Fri Mar  8 17:39:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA08699
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 17:39:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g28Li8N22299
	for ips-outgoing; Fri, 8 Mar 2002 16:44:08 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g28Li6H22295
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 16:44:06 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g28Li2214130
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 16:44:02 -0500
Message-ID: <3C8930A5.90762188@splentec.com>
Date: Fri, 08 Mar 2002 16:44:05 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Question: ISID Rule?
References: <OF73E620E9.5EEB0953-ON88256B76.002FB61D@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John Hufferd wrote:
> 
> Not exactly.
> 
> There is a CID in the equation also.  if TSID is not 0, and assuming other
> things match, the CID will be used to determine if this is an implicit
> logout and re-login for that connection.  If the CID is unique within the
> session, then it will start a new session, else, it will log out the old
> connection and create a new one.  Then of course, you need to use the Task
> Management Request PDU, on the new connection to move the allegiance of the
> existing tasks (one at a time) from the old connection to the new
> connection.

I see. Then would you say that this is correct:

ISID TSID CID       Action
---------------------------------
 V    0    U      New Session.
 P    0    0      Session Reinstatement.
 P    P    U      Add a connection to a session.
 P    P    P      Connection reinstatement.

Legend:
0    NULL, i.e. 0.
V        Valid.
P        Present.
U        Unique at target.

Table 1: iSCSI Target with just a single Portal Group.

-- 
Luben Tuikov, Senior Software Engineer, Splentec Ltd.
Bus: +1-905-707-1954x112, 9-5 EST. Fax: +1-905-707-1974.


From owner-ips@ece.cmu.edu  Fri Mar  8 21:10:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA15775
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 21:10:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g291Qx907868
	for ips-outgoing; Fri, 8 Mar 2002 20:26:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.us.dg.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g291QvH07860
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 20:26:58 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GNRNFMZT>; Fri, 8 Mar 2002 20:21:11 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375A6@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: Attention, draft authors ...
Date: Fri, 8 Mar 2002 20:26:37 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

We have a number of drafts getting close to WG Last Call
and submission to the IESG.  All draft authors should
make sure that their drafts comply with the instructions
at the following two URLs:

	http://www.rfc-editor.org/policy.html
	http://www.ietf.org/ID-nits.html

Yes, the IESG is serious about these - drafts that don't
comply will get returned by the IESG, and one can figure on
at least a month of delay (quite possibly more) if that
happens.  Please don't let your draft get caught by
this.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Fri Mar  8 21:14:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA15892
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 21:14:16 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g291K1a07450
	for ips-outgoing; Fri, 8 Mar 2002 20:20:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mailhub.lss.emc.com ([168.159.1.79])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g291JxH07445
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 20:19:59 -0500 (EST)
Received: from emc.com (emcmail.lss.emc.com [168.159.48.78])
	by mailhub.lss.emc.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g291JnG04258
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 20:19:49 -0500 (EST)
Received: from mxic1.isus.emc.com ([168.159.129.100])
	by emc.com (8.10.1/8.10.1) with ESMTP id g291JpA16439
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 20:19:51 -0500 (EST)
Received: by mxic1.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <GNZAJHMQ>; Fri, 8 Mar 2002 20:19:56 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375A5@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: IPS: Status of drafts
Date: Fri, 8 Mar 2002 20:19:36 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Here's what the chairs believe the current status of all
drafts in the IPS WG.  This is also the reading list for
the Minneapolis meetings.  Agenda should be out sometime
early next week.  Thanks, --David

IETF IP Storage (ips) Working Group
WG Internet-Draft Status: March 2002
------------------------------------

NOTE: PDF versions for some drafts are for ease of review only.  The
	definitive format for RFCs is text, and it is the text versions
	that will be forwarded to the IESG for their consideration to
	be published as RFCs.

-- Security for all IPS protocols

draft-ietf-ips-security-11.txt
	To be a proposed standard RFC.  Getting close to done - no major
	open issues known, expect WG Last Call shortly after Minneapolis
	meeting.

-- iSCSI

draft-ietf-ips-iscsi-11.txt
draft-ietf-ips-iscsi-11.pdf
	To become a proposed standard RFC.
	Almost done, no major technical issues outstanding, aside from
	SRP MUST/SHOULD/MAY requirement level (intellectual property
	rights issues).  	Draft needs at least one more editorial and
	cleanup pass, and then should be ready for WG Last Call.

draft-ietf-ips-iscsi-boot-05.txt
	To become an informational RFC, after the main iSCSI document.
	draft-sarkar-dhc-iscsi-boot-00.txt, describing the use of DHCP
		to distribute iSCSI root volume location has been folded
		back into this draft after consultation with the DHC WG.
	Basically done.

draft-ietf-ips-iscsi-reqmts-05.txt
	To become an informational RFC.  The IESG has requested minor
	changes.  Resulting -06 version will go to IETF Last Call.

draft-ietf-ips-iscsi-name-disc-05.txt
	To become a proposed standard RFC - this is a CHANGE, it was
	previously to become informational.  Would be reorganized to
	separate normative and non-normative text and then should be
	ready for WG Last Call shortly after Minneapolis meeting.  The
	alternative of moving the normative text to the main iSCSI draft
	so that this draft can remain informational will be discussed
	in Minneapolis.

draft-ietf-ips-iscsi-slp-03.txt
	To become a proposed standard RFC.
	Close to done.  Issues in this general area seem to come up in
		the context of the iSCSI naming and discovery draft
		(draft-ietf-ips-iscsi-name-disc-05) rather than this draft.
	WG Last Call will be after the naming and discovery draft.

draft-ietf-ips-iscsi-string-prep-00.txt
	To become a proposed standard RFC.  Not controversial - will go to
	WG Last Call shortly if there are no delays to the base stringprep
	draft that it depends on (draft-hoffman-stringprep in the IDN WG).

draft-ietf-ips-iscsi-mib-04.txt
	To be a proposed standard RFC.  Close to done.
	WG Last Call will follow main iSCSI draft.
	Structure diagram available at:
ftp://ftpeng.cisco.com/mbakke/ips/iscsi-mib/working/Visio-ietf-iscsi-uml-mod
el-04.pdf

draft-ietf-ips-auth-mib-00.txt
	To be a proposed standard RFC. User identity information MIB split
	out from basic iSCSI MIB for more general use, but currently only
	being used for iSCSI.  Will go to WG Last Call with the iSCSI MIB.
	Structure diagram available at:
ftp://ftpeng.cisco.com/mbakke/ips/auth-mib/Visio-ietf-ips-auth-mib-00.pdf

draft-sheinwald-iscsi-crc-01.txt
	The authors would like the IPS WG to recommend publication of this
	draft (or a revised version) as an informational RFC, based on the
	useful information it contains that helped the WG decide which CRC
	to use for iSCSI.

-- FC Common Encapsulation

draft-ietf-ips-fcencapsulation-06.txt
draft-ietf-ips-fcencapsulation-06.pdf
	To be a proposed standard RFC.  In WG Last Call, which will end on
	March 18.

-- FCIP

draft-ietf-ips-fcovertcpip-09.txt
draft-ietf-ips-fcovertcpip-09.pdf
	To be a proposed standard RFC.  In WG Last Call, which will end on
	March 18.

draft-ietf-ips-fcip-slp-01.txt
	To be a proposed standard RFC.  May need security text update, but
	is basically done and stable.

draft-ietf-ips-fcip-mib-01.txt
	To be a proposed standard RFC.  Has been restructured to align with
	new structure of FC Management MIB.

-- iFCP

draft-ietf-ips-ifcp-10.txt
draft-ietf-ips-ifcp-10.pdf
	To be a proposed standard RFC.  In WG Last Call, which will end on
	March 18.

draft-ietf-ips-ifcp-mib-00.txt
	To be a proposed standard RFC.  Basically done.
	
-- iSNS

draft-ietf-ips-isns-08.txt
	To be a proposed standard RFC.  Basically done.
		WG Last Call to follow iSCSI and iFCP drafts.
	The related draft-tseng-dhc-isnsoption-00.txt requests allocation
		of a DHC option code for iSNS, and will be discussed in the
		DHC WG.

draft-ietf-ips-isns-mib-01.txt
	To be a proposed standard RFC.  Basically done.  
	
-- SCSI MIB

draft-ietf-ips-scsi-mib-02.txt
	To be a proposed standard RFC.  Work in progress.  Structure diagram
		available at:
ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-uml-model-01.pdf
	Diagram showing relationships among SCSI family of MIBS available
at:
ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-mib-family-01.pdf

-- Fibre Channel Management MIB

draft-ietf-ips-fcmgmt-mib-01.txt
	To be a proposed standard RFC.  This work has been transferred
	to the IPS WG from the IPFC WG, and the scope has been expanded
	to include replacement of the FC Fabric Element MIB (RFC 2837).
	Work in progress.

----- Document Completion Guesstimates ------

A rough guess is 3 waves of documents:

(1) Main protocol standards.  WG Last Call is in progress (completes
	on March 18) for:
		- FC Encapsulation
		- FCIP
		- iFCP
	WG Last Call expected shortly after Minneapolis meeting for
		- iSCSI
		- iSCSI Naming/Discovery
		- iSCSI stringprep
		- IPS Security

(2) Supporting Protocol Documents.  WG Last Call expected shortly after
	the iSCSI and IPS Security Last Calls for:
		- iSCSI Boot
		- iSCSI SLP
		- FCIP SLP
		- iSNS

(3) MIBs To follow supporting documents, probably in multiple groups over
	time, as the MIB maturities vary from the iSCSI MIB (close to done)
	to the SCSI and FC Management MIBs (work in progress).
		- iSCSI MIB
		- FCIP MIB
		- iFCP MIB
		- iSNS MIB
		- SCSI MIB
		- FC Management MIB
	Expect multiple Last Call periods, rather than putting all the MIBs
	through WG Last Call at once.  Some of these WG Last Calls are very
	likely to take place prior to the Yokohama meeting.

-- Potential Additional Work

Additional drafts may be forthcoming in the future on:
	- Issues involving embedding MACs and the like in iSCSI names
		and identifiers (informational)
	- Issues that arise in gateways and bridges between iSCSI and other
		SCSI protocols (informational)
	- Additional MIB(s) that extend the FC Management MIB to cover
		additional aspects of Fibre Channel (standards track)


From owner-ips@ece.cmu.edu  Fri Mar  8 21:49:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA17372
	for <ips-archive@odin.ietf.org>; Fri, 8 Mar 2002 21:49:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2924q810111
	for ips-outgoing; Fri, 8 Mar 2002 21:04:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel8.hp.com (atlrel8.hp.com [156.153.255.206])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2924oH10107
	for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 21:04:50 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel8.hp.com (Postfix) with ESMTP id D5864A007C1
	for <ips@ece.cmu.edu>; Fri,  8 Mar 2002 21:04:39 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id SAA06067 for <ips@ece.cmu.edu>; Fri, 8 Mar 2002 18:06:20 -0800 (PST)
Message-ID: <007301c1c70e$c3fc3580$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "iSCSI" <ips@ece.cmu.edu>
References: <OF73E620E9.5EEB0953-ON88256B76.002FB61D@boulder.ibm.com> <3C8930A5.90762188@splentec.com>
Subject: Re: iSCSI: Question: ISID Rule?
Date: Fri, 8 Mar 2002 18:04:37 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> I see. Then would you say that this is correct:

That's pretty close.  I would describe it as  -

ISID          TSID              CID                  Target action
new           non-zero           X                    fail the login ("session does
not exist")
new           zero                  X                    instantiate a new session
existing      zero                  X                    do session reinstatement
existing      valid                 new                 add a new connection to the
session
existing      valid                 existing            do connection reinstatement
existing      invalid                X                   fail the login ("session
does not exist")

(X: don't care)
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747

----- Original Message -----
From: "Luben Tuikov" <luben@splentec.com>
To: "iSCSI" <ips@ece.cmu.edu>
Sent: Friday, March 08, 2002 1:44 PM
Subject: Re: iSCSI: Question: ISID Rule?


> John Hufferd wrote:
> >
> > Not exactly.
> >
> > There is a CID in the equation also.  if TSID is not 0, and assuming other
> > things match, the CID will be used to determine if this is an implicit
> > logout and re-login for that connection.  If the CID is unique within the
> > session, then it will start a new session, else, it will log out the old
> > connection and create a new one.  Then of course, you need to use the Task
> > Management Request PDU, on the new connection to move the allegiance of the
> > existing tasks (one at a time) from the old connection to the new
> > connection.
>
> I see. Then would you say that this is correct:
>
> ISID TSID CID       Action
> ---------------------------------
>  V    0    U      New Session.
>  P    0    0      Session Reinstatement.
>  P    P    U      Add a connection to a session.
>  P    P    P      Connection reinstatement.
>
> Legend:
> 0    NULL, i.e. 0.
> V        Valid.
> P        Present.
> U        Unique at target.
>
> Table 1: iSCSI Target with just a single Portal Group.
>
> --
> Luben Tuikov, Senior Software Engineer, Splentec Ltd.
> Bus: +1-905-707-1954x112, 9-5 EST. Fax: +1-905-707-1974.
>



From owner-ips@ece.cmu.edu  Sat Mar  9 01:59:30 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA27830
	for <ips-archive@odin.ietf.org>; Sat, 9 Mar 2002 01:59:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g296KTA20908
	for ips-outgoing; Sat, 9 Mar 2002 01:20:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from fep01-mail.bloor.is.net.cable.rogers.com (fep01-mail.bloor.is.net.cable.rogers.com [66.185.86.71])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g296KQH20902
	for <ips@ece.cmu.edu>; Sat, 9 Mar 2002 01:20:26 -0500 (EST)
Received: from splentec.com ([24.43.3.134])
          by fep01-mail.bloor.is.net.cable.rogers.com
          (InterMail vM.5.01.04.06 201-253-122-122-106-20020109) with ESMTP
          id <20020309062020.EYDU5488.fep01-mail.bloor.is.net.cable.rogers.com@splentec.com>
          for <ips@ece.cmu.edu>; Sat, 9 Mar 2002 01:20:20 -0500
Message-ID: <3C89A9A4.C6049B3@splentec.com>
Date: Sat, 09 Mar 2002 01:20:20 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Question: ISID Rule?
References: <OF73E620E9.5EEB0953-ON88256B76.002FB61D@boulder.ibm.com> <3C8930A5.90762188@splentec.com> <007301c1c70e$c3fc3580$edd52b0f@rose.hp.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep01-mail.bloor.is.net.cable.rogers.com from [24.43.3.134] using ID <tluben@rogers.com> at Sat, 9 Mar 2002 01:20:20 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"Mallikarjun C." wrote:
> 
> > I see. Then would you say that this is correct:
> 
> That's pretty close.  I would describe it as  -
> 
> ISID          TSID              CID                  Target action
> new           non-zero           X                    fail the login ("session does
> not exist")
> new           zero                  X                    instantiate a new session
> existing      zero                  X                    do session reinstatement
> existing      valid                 new                 add a new connection to the
> session
> existing      valid                 existing            do connection reinstatement
> existing      invalid                X                   fail the login ("session
> does not exist")
> 
> (X: don't care)

Yep, I had a "X: don't care" but removed it as I wasn't sure.

Would it be so much trouble if this table is included into
the iSCSI draft? It makes things a lot clearer.

-- 
Luben


From owner-ips@ece.cmu.edu  Mon Mar 11 17:23:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27659
	for <ips-archive@lists.ietf.org>; Mon, 11 Mar 2002 17:23:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2BLLYs15542
	for ips-outgoing; Mon, 11 Mar 2002 16:21:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail04.ztx.compaq.com (ztxmail04.ztx.compaq.com [161.114.1.208])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2BLLWH15535
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 16:21:32 -0500 (EST)
Received: from cceexg12.americas.cpqcorp.net (cceexg12.americas.cpqcorp.net [16.110.250.124])
	by ztxmail04.ztx.compaq.com (Postfix) with ESMTP id 2CA20386D
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 15:21:26 -0600 (CST)
Received: from cceexc18.americas.cpqcorp.net ([16.110.250.64]) by cceexg12.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 11 Mar 2002 15:21:25 -0600
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Subject: iSCSI:  Initiator Task Tag Question
Date: Mon, 11 Mar 2002 15:21:25 -0600
Message-ID: <1D801E36EF09514A9A745B13A9F598EE1161D6@cceexc18.americas.cpqcorp.net>
Thread-Topic: iSCSI:  Initiator Task Tag Question
Thread-Index: AcHJQpxxAJ53UC84TDGeFSIy144P9w==
From: "McGowen, Mike" <Mike.Mcgowen@compaq.com>
To: <ips@ece.cmu.edu>
X-OriginalArrivalTime: 11 Mar 2002 21:21:25.0652 (UTC) FILETIME=[B350B540:01C1C942]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2BLLWH15536
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Section 9.2.1.7 of the iSCSI spec states that SCSI may use the initiator
task tag as part of the SCSI task identifier.  Both SAM (Object
Definition 7: Task) and SAM-2 (subclause 4.9.2) state that a task tag
may be up to 64 bits.  Yet the iSCSI initiator task tag is only 32-bits.
Is there a disconnect between iSCSI and SAM-2?

Mike



From owner-ips@ece.cmu.edu  Mon Mar 11 18:10:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27660
	for <ips-archive@lists.ietf.org>; Mon, 11 Mar 2002 17:23:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2BLpmA18220
	for ips-outgoing; Mon, 11 Mar 2002 16:51:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ariel.nishansystems.com (gortex.nishansystems.com [65.113.142.135] (may be forged))
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2BLpkH18214
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 16:51:46 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <1LYT2TZX>; Mon, 11 Mar 2002 13:51:40 -0800
Received: from ece.cmu.edu (192.168.20.5 [192.168.20.5]) by ariel.nishansystems.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 1LYT21YS; Wed, 27 Feb 2002 15:06:02 -0800
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g1RMdQF18053
	for ips-outgoing; Wed, 27 Feb 2002 17:39:26 -0500 (EST)
Received: from ariel.nishansystems.com ([65.113.142.135])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g1RMdOH18048
	for <ips@ece.cmu.edu>; Wed, 27 Feb 2002 17:39:24 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <1LYT21WM>; Wed, 27 Feb 2002 14:39:12 -0800
Message-ID: <B300BD9620BCD411A366009027C21D9BE86A89@ariel.nishansystems.com>
From: Charles Monia <cmonia@NishanSystems.com>
To: "'Ips (E-mail)'" <ips@ece.cmu.edu>
Subject: iFCP: Revision 10 available with PDF bookmarks
Date: Mon, 11 Mar 2002 13:51:39 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi:

Since I did not receive a copy of the following message from the IPS
reflector, I assume it got lost enroute. Therefore, I am sending an updated
version.  Apologies to anyone receiving multiple copies.

Charles
============================================================
Hi:

For the convenience of reviewers, the PDF version of iFCP revision 10 has
been rebuilt with PDF bookmarks.  The reformatted version is available from
the T11 archive at:

ftp://ftp.t11.org/t11/docs/02-023v3.pdf

For consistency, a version of the text file with the same file name is
available from:

ftp://ftp.t11.org/t11/docs/02-023v3.txt

The official versions are those available from the IETF archive at:

http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf and
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt


Thanks,
Charles


From owner-ips@ece.cmu.edu  Mon Mar 11 19:04:46 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA29974
	for <ips-archive@odin.ietf.org>; Mon, 11 Mar 2002 19:04:46 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2BN7ed24377
	for ips-outgoing; Mon, 11 Mar 2002 18:07:40 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2BN7cH24370
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 18:07:38 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2BN7H227784;
	Mon, 11 Mar 2002 18:07:21 -0500
Message-ID: <3C8D38B1.1F986A41@splentec.com>
Date: Mon, 11 Mar 2002 18:07:29 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>, Julian Satran <Julian_Satran@il.ibm.com>
Subject: iSCSI: Text/Operational keys: booleans and ranges
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

1. Is it possible to make all Boolean Text/Operational keys's
value range be ``0'' and ``1'', rather than the current
``Yes'', ``No''.

Since those are _Boolean_ values, what will be the objection to
this? 

A user interface will probably display ``Yes'' and ``No'', but
in the protocol, why burden implementations with string
comparison, case-sensitive on top of this, rather than use
strtol(), this making content check easier (strtol() will detect
range errors, e.g. ``OFMarker=hello'').

2. Why not make integer ranges, like OFMarkInt, use dash,
``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in the interval.

The reason is that in the future there may be a text/operational key which can take only a set of
distinct integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That is ``SomeBit'' is still an
integer variable but in negotiation it can choose between certain disctinct values. Furthermore the
standard text/operational code which many of you already have written will work in this situation,
only add atoi()/strtol() at the end...

Comments?

-- 
Luben


From owner-ips@ece.cmu.edu  Mon Mar 11 20:01:56 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA01201
	for <ips-archive@odin.ietf.org>; Mon, 11 Mar 2002 20:01:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2C07ld28745
	for ips-outgoing; Mon, 11 Mar 2002 19:07:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mailhub1.almaden.ibm.com (mailhub1.almaden.ibm.com [198.4.83.44])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2C07jH28740
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 19:07:45 -0500 (EST)
Received: from porter.almaden.ibm.com (porter.almaden.ibm.com [9.1.25.138])
	by mailhub1.almaden.ibm.com (8.8.8/8.8.8) with ESMTP id QAA41922
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 16:07:37 -0800
Received: (from dfsmith@localhost)
	by porter.almaden.ibm.com (8.11.6/8.11.0) id g2C07dH32722
	for ips@ece.cmu.edu; Mon, 11 Mar 2002 16:07:39 -0800
From: "Daniel F. Smith" <dfsmith@almaden.ibm.com>
Message-Id: <200203120007.g2C07dH32722@porter.almaden.ibm.com>
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
To: ips@ece.cmu.edu
Date: Mon, 11 Mar 2002 16:07:39 -0800 (PST)
Reply-To: dfsmith@almaden.ibm.com
In-Reply-To: <3C8D38B1.1F986A41@splentec.com> from "Luben Tuikov" at Mar 11, 2002 06:07:29 PM
X-Mailer: ELM [version 2.5 PL3]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Luben Tuikov wrote:
> 
> 1. Is it possible to make all Boolean Text/Operational keys's
> value range be ``0'' and ``1'', rather than the current
> ``Yes'', ``No''.

An old trick is to use bit 0 of the first (UTF-8) character.
This gets:
	1 for "1", "Yes", "yes", "oui", "si" (but not "ja", "da" or "hai")
	0 for "0", "No", "non" (but not "ei")
Of course, it also allows great opportunity for obfuscation ("maybe" is
yes), and must therefore be a good thing.  B-)

Daniel Smith
--
IBM Almaden Research Center, 650 Harry Road, San Jose, CA 95120-6099, USA
K65B/C2 Phone: +1(408)927-2072 Fax: +1(408)927-3010


From owner-ips@ece.cmu.edu  Mon Mar 11 23:56:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA06972
	for <ips-archive@odin.ietf.org>; Mon, 11 Mar 2002 23:56:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2C3qLf12980
	for ips-outgoing; Mon, 11 Mar 2002 22:52:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail1.aarohicommunications.com (cpe-66-87-94-158.ca.sprintbbd.net [66.87.94.158])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2C3q4H12958
	for <ips@ece.cmu.edu>; Mon, 11 Mar 2002 22:52:06 -0500 (EST)
Received: from LINUX15 (linux15.aarohicommunications.com [192.168.1.234])
	by mail1.aarohicommunications.com (Mirapoint)
	with ESMTP id AAL11702 (AUTH shaileshm);
	Mon, 11 Mar 2002 20:07:40 -0800 (PST)
From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
To: "'Mallikarjun C.'" <cbm@rose.hp.com>,
        "'Julian Satran'" <Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
Subject: RE: iscsi : changes involving tgt portal group tag.
Date: Mon, 11 Mar 2002 19:51:36 -0800
Message-ID: <000001c1c979$3e95b930$ea01a8c0@aarohicommunications.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2627
Importance: Normal
In-Reply-To: <001501c1c53b$28725b50$edd52b0f@rose.hp.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hi,

On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
discovery followed by SCSI Inquiry and Report_LUNS which would make the
Initiator aware of this change? Can the  Async message - iscsi Event
Data notify the Initiator of the change, which would force an discovery.
This would be similar to an ADISC for FCP. Because including the TPGT in
the login would prevent inadvertent logins but would still not notify
the initiator of the changed configuration?

Thanks,
Shailesh.
Aarohi Communications.
-----Original Message-----
From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
Mallikarjun C.
Sent: Wednesday, March 06, 2002 10:17 AM
To: Julian Satran
Cc: ips@ece.cmu.edu; t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.

* From the T10 Reflector (t10@t10.org), posted by:
* "Mallikarjun C." <cbm@rose.hp.com>
*
> The issue is that I am not sure that a target is checking today
anything - 
> (adapter drivers may check oif in their realm they can give out a
TSID). 
> Nothing else is needed.

Target is required to derive the TPGT and use it in both cases of Login
-
     a) when TSID = 0, to ascertain if a session reinstatement needs to
         be effected for that TPGT.
     b) when TSID != 0, to ascertain the validity of TSID and add in
          the new connection to an existing session if it is valid for
that TPGT.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747

----- Original Message ----- 
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 05, 2002 11:56 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


> The issue is that I am not sure that a target is checking today
anything - 
> (adapter drivers may check oif in their realm they can give out a
TSID). 
> Nothing else is needed. Does SCSI have to be aware of it? Perhaps but 
> iSCSI certainly not. Does a "front-end" have to be - again probably
not 
> the name identifies the node.
> 
> Julo
> 
> 
> 
> 
> "Mallikarjun C." <cbm@rose.hp.com>
> 05-03-02 22:34
> Please respond to "Mallikarjun C."
> 
>  
>         To:     Julian Satran/Haifa/IBM@IBMIL
>         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
>         Subject:        Re: iscsi : changes involving tgt portal group
tag.
> 
>  
> 
> Julian,
> 
> Whatever methods a target is expected to use today to derive the
implicit
> TPGT to preclude a duplicate I-T nexus would work after the change as 
> well,
> except the derived value needs to be compared against the (proposed)
> TPGT in the Login Request payload.
> 
> Please comment if we're missing something.
> 
> Regards.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> 
> ----- Original Message -----
> From: "Julian Satran" <Julian_Satran@il.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao" 
> <santoshr@cup.hp.com>;
> <t10@t10.org>
> Sent: Monday, March 04, 2002 10:24 PM
> Subject: Re: iscsi : changes involving tgt portal group tag.
> 
> 
> > Has a decent target implementation and easy way of checking that the
TPG
> > is correct?
> >
> > Julo
> >
> >
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>
> > Sent by: owner-ips@ece.cmu.edu
> > 05-03-02 01:12
> > Please respond to "Mallikarjun C."
> >
> >
> >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
<ips@ece.cmu.edu>
> >         cc:     <t10@t10.org>
> >         Subject:        Re: iscsi : changes involving tgt portal
group 
> tag.
> >
> >
> >
> > Santosh and Jim,
> >
> > It appears a good idea to add in the portal group tag in the Login
> > Request header for a sanity check by the receiving target portal.
> >
> > I generally agree with Jim's comments that the duration of
persistence
> > of a portal group tag is intricately linked to the extent of portal
> > reconfiguration.
> > Not every target reconfiguration may result in a portal group tag
> > reassignment.
> > OTOH, some reconfigurations may be so extensive as to cause even a
node
> > name change.
> >
> > Some comments on Santosh's message -
> >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal
group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> >
> > I am not sure this solves the problem you're trying to get at.  If
none 
> of
> > the earlier IP addresses can get an initiator to the SCSI target
port 
> that
> > it
> > knew of (your scenario), it appears to me that it doesn't matter if
the
> > portal group tags are changed or not....A new discovery process
should
> > update the initiator of the changed portal addresses.
> >
> > I suggest the following text -
> >
> >    After a portal group reconfiguration which changed the view of
LUs
> >    for an initiator with a given set of privileges, the target MUST 
> change
> >    the portal group tag that represents the reconfigured target
portal
> > group.
> >
> > > > Under these events, shouldn't all "open/active I_T_L traffic"
have
> > been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an
issue 
> at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to
close
> > > and re-open each LUN behind that target port, due to the fact that
a
> > > target port may have hundred's of LUNs behind it.
> >
> > I agree with Jim on this one - there should be *no* open/active
I_T_L
> > nexus
> > traffic after a reconfiguration, targets can enforce this via simple

> iSCSI
> > means
> > (reject initiator advances to continue the session for
DefaultTime2Wait+
> > DefaultTime2Retain seconds).  In fact, Async logout request requires
a
> > clean closure that implicitly aborts I/Os.
> >
> > What you're describing is typical O/S "LUN open" and "LUN close"
> > interactions.  I agree that they wouldn't have to be repeated, but
care
> > must be taken to ensure that new I/Os (on the new session after
> > reconfiguration)
> > are not delivered to the incorrect LUs.  It seems that the addition
of
> > TPGT in the login header and the proposed new text (above) would
take
> > care of this.
> >
> > Regards.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Santosh Rao" <santoshr@cup.hp.com>
> > To: <ips@ece.cmu.edu>
> > Cc: <t10@t10.org>
> > Sent: Monday, March 04, 2002 10:40 AM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > * From the T10 Reflector (t10@t10.org), posted by:
> > > * Santosh Rao <santoshr@cup.hp.com>
> > > *
> > > Jim,
> > >
> > > I agree that a "complete re-configuration" of a target port can
result
> > > in a new port name & port identifier. However, the tricky part is
the
> > > definition of a "complete re-configuration of an iscsi target
port", 
> due
> > > to the concepts of portal groups involving multiple network
portals.
> > >
> > > For example, if a portal group (aka, an iscsi target port) were to
be
> > > re-configured to include a new network portal [moved from another 
> portal
> > > group], then, the target port itself has not changed, since it is 
> still
> > > accessible through its previously used network portals. What has 
> changed
> > > is the individual network portal that has moved from 1 target port
to
> > > another.
> > >
> > > Hence, it is sufficient, in this case, to maintain persistence of
the
> > > target port name/identifier, without requiring any change in port
> > > name/identifier. By requiring initiators to send the intended TPGT

> (scsi
> > > target port name/identifier) along with the login request, this
allows
> > > the target port to detect that the network portal is being
accessed to
> > > connect to a different target port and it can reject the login.
> > >
> > > It may be helpful to call out the specific case when a port
> > > name/identifier MUST change. How about something like :
> > >
> > > "If a portal group is re-configured such that all its previously
> > > advertised network portals are no longer a part of the portal
group,
> > > then, the portal group tag (and thereby, the port name/identifier)
> > > *MUST* be changed to indicate a new target port."
> > >
> > > This would allow access to the target port through its un-altered
> > > network portals to continue un-disrupted. More comments inline, in
> > > response to some of your queries.
> > >
> > > Thanks,
> > > Santosh
> > >
> > > NOTE : In this discussion target port and target portal group are
used
> > > to imply the same entity, within a target node.
> > >
> > >
> > > Jim Hafner wrote:
> > >
> > > > SAM-2 requires scsi port names to be persistent and 
> world-wide-unique.
> > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > >
> > > > "A scsi port name shall never change and may be used to
persistently
> > > > identify a scsi initiator port or target port...".
> > > >
> > > > <JLH>
> > > > There are different ways that one can interpret this
"persistent"
> > rule. The
> > > > intent was that names shouldn't change over time when
*identifying 
> the
> > same
> > > > object*.   What that means is that if the object changes (in any
> > > > discernable way), then the name should change.  So, the object
can
> > move to
> > > > a different piece of hardware, but it can still be named the
same 
> way.
> >  If
> > > > the object changes, e.g., in this case, reconfigures as a
different
> > set of
> > > > network portals with different addressing elements, then I would

> think
> > that
> > > > the name should change as well.   That's all the persistence one
> > really
> > > > needs.
> > > >
> > > > I'm not sure what that implies about your recommendation.  I
don't 
> see
> > any
> > > > problem with it, either.
> > > > </JLH>
> > >
> > > I think we may be in agreement. (See reasoning above).
> > >
> > >
> > > >
> > > > The rationale for (2) is :
> > > > --------------------------
> > > > Consider an initiator node establishing multiple sessions to a
scsi
> > tgt
> > > > port, with each session established to a subset of the network 
> portals
> > > > within the tgt portal group.
> > > >
> > > > Consider an iscsi transport event involving the re-configuration
of
> > > > target portal groups on the iscsi target node. This may be
preceeded
> > by
> > > > the iscsi sessions seeing an async message "target requests
logout",
> > > > followed by session logout, portal group re-configuration, and
then,
> > the
> > > > initiator re-establishes sessions.
> > > >
> > > > Across a transport event that results in such session
termination 
> and
> > > > re-establishment, the initiator needs to authenticate that it is

> still
> > > > speaking to the same [i]scsi target port, in order to ensure
that 
> any
> > > > open/active I-T-L nexus traffic on that session is not
incorrectly
> > > > routed to a wrong LUN after such a transport event.
> > >
> > > > <JLH>
> > > > Under these events, shouldn't all "open/active I_T_L traffic"
have
> > been
> > > > aborted, closed or otherwise ended?  So this shouldn't be an
issue 
> at
> > all.
> > >
> > > On a session logout & re-login, it is not efficient/necessary to
close
> > > and re-open each LUN behind that target port, due to the fact that
a
> > > target port may have hundred's of LUNs behind it.
> > >
> > > All outstanding I/Os need to be aborted. Once the session is
> > > re-established [and the target port is authenticated to be the
same],
> > > further I/O traffic can be resumed without requiring the SCSI ULP
to
> > > close and re-open each LUN. Some transport specific clearing
effects 
> may
> > > have occurred, which may require additional LUN level activity, in

> some
> > > cases.
> > >
> > > (There are analogies to the above model in FCP & SRP, which 
> authenticate
> > > port name/identifier on login, allowing I/O resumption after
session
> > > termination and re-establishment.)
> > >
> > >
> > > > To prevent such authentication issues, iscsi can send the iscsi 
> target
> > > > port identifier (portal group tag) explicitly in the login
request,
> > and
> > > > the login can be rejected by the target on a portal group tag
> > mis-match.
> > > > (if the network portal does not belong to the addressed portal
group
> > > > tag).
> > > > <JLH>
> > > > Did you mean for the initiator to send this TPGT?
> > > > </JLH>
> > >
> > > Yes. The initiator login request must include the target portal
group
> > > tag, thus identifying the target port to which a session is being
> > > established.
> > >
> > > Login currently carries no addressing information, since the 
> addressing
> > > is implicit, based on the TCP connection in use. The problem with
this
> > > approach is that the login implicitly addresses a network portal,
and
> > > not the target port. As seen in the earlier example, the
association 
> of
> > > network portal <-> target port can change, and such changes can be
> > > detected, if the initiator were to explicitly identify the target
port
> > > being logged into.
> > >
> > > --
> > > ##################################
> > > Santosh Rao
> > > Software Design Engineer,
> > > HP-UX iSCSI Driver Team,
> > > Hewlett Packard, Cupertino.
> > > email : santoshr@cup.hp.com
> > > Phone : 408-447-3751
> > > ##################################
> > > *
> > > * For T10 Reflector information, send a message with
> > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > >
> >
> >
> >
> 
> 
> 
> 
*
* For T10 Reflector information, send a message with
* 'info t10' (no quotes) in the message body to majordomo@t10.org


From owner-ips@ece.cmu.edu  Tue Mar 12 02:58:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA17349
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 02:58:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2C74rL26932
	for ips-outgoing; Tue, 12 Mar 2002 02:04:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2C74oH26915;
	Tue, 12 Mar 2002 02:04:50 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA97830;
	Tue, 12 Mar 2002 08:04:43 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2C76ow18314;
	Tue, 12 Mar 2002 08:06:50 +0100
To: "McGowen, Mike" <Mike.Mcgowen@compaq.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI:  Initiator Task Tag Question
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF4129963C.F182DDE5-ONC2256B7A.00261AEA@telaviv.ibm.com>
Date: Tue, 12 Mar 2002 09:06:48 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 12/03/2002 09:06:51,
	Serialize complete at 12/03/2002 09:06:51
Content-Type: multipart/alternative; boundary="=_alternative 0026AE97C2256B7A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0026AE97C2256B7A_=
Content-Type: text/plain; charset="us-ascii"

No there is no diconnect. The statement you quote says "as part of" - i.e. 
you may use it is or fill it
with some other identifying pieces. SCSI is also stating "up to 64 bits". 
For the iSCSI part 32 bits are all that is needed.  The only limitation we 
impose is that SCSI initiators will not be able to convey task tags larger 
that 32 bits - and we share this limitation with several other transports.

Julo




"McGowen, Mike" <Mike.Mcgowen@compaq.com>
Sent by: owner-ips@ece.cmu.edu
11-03-02 23:21
Please respond to "McGowen, Mike"

 
        To:     <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI:  Initiator Task Tag Question

 

Section 9.2.1.7 of the iSCSI spec states that SCSI may use the initiator
task tag as part of the SCSI task identifier.  Both SAM (Object
Definition 7: Task) and SAM-2 (subclause 4.9.2) state that a task tag
may be up to 64 bits.  Yet the iSCSI initiator task tag is only 32-bits.
Is there a disconnect between iSCSI and SAM-2?

Mike




--=_alternative 0026AE97C2256B7A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">No there is no diconnect. The statement you quote says &quot;as part of&quot; - i.e. you may use it is or fill it</font>
<br><font size=2 face="sans-serif">with some other identifying pieces. SCSI is also stating &quot;up to 64 bits&quot;. For the iSCSI part 32 bits are all that is needed. &nbsp;The only limitation we impose is that SCSI initiators will not be able to convey task tags larger that 32 bits - and we share this limitation with several other transports.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;McGowen, Mike&quot; &lt;Mike.Mcgowen@compaq.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">11-03-02 23:21</font>
<br><font size=1 face="sans-serif">Please respond to &quot;McGowen, Mike&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: &nbsp;Initiator Task Tag Question</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Section 9.2.1.7 of the iSCSI spec states that SCSI may use the initiator<br>
task tag as part of the SCSI task identifier. &nbsp;Both SAM (Object<br>
Definition 7: Task) and SAM-2 (subclause 4.9.2) state that a task tag<br>
may be up to 64 bits. &nbsp;Yet the iSCSI initiator task tag is only 32-bits.<br>
Is there a disconnect between iSCSI and SAM-2?<br>
<br>
Mike<br>
<br>
</font>
<br>
<br>
--=_alternative 0026AE97C2256B7A_=--


From owner-ips@ece.cmu.edu  Tue Mar 12 02:59:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA17361
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 02:59:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2C7G2D27562
	for ips-outgoing; Tue, 12 Mar 2002 02:16:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2C7G0H27557
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 02:16:00 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA167172
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 08:15:54 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2C7I1w69796
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 08:18:01 +0100
To: iSCSI <ips@ece.cmu.edu>
MIME-Version: 1.0
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF4E59C5F2.A777916C-ONC2256B7A.002713AC@telaviv.ibm.com>
Date: Tue, 12 Mar 2002 09:17:59 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 12/03/2002 09:18:03,
	Serialize complete at 12/03/2002 09:18:03
Content-Type: multipart/alternative; boundary="=_alternative 00278F48C2256B7A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00278F48C2256B7A_=
Content-Type: text/plain; charset="us-ascii"

Luben,

For the booleans - 1 and 0 are also integers. The parsing of strings is 
already mandated (for keys and string values) so no harm in letting them 
be text.

For ranges - I think you have a good point and if I don't hear anything 
against it I will introduce it in 12 (I would suggest a colon or a 
double-colon instead of dash).

Regards,
Julo




Luben Tuikov <luben@splentec.com>
Sent by: luben@ns.splentec.com
12-03-02 01:07
Please respond to iSCSI

 
        To:     iSCSI <ips@ece.cmu.edu>, Julian Satran/Haifa/IBM@IBMIL
        cc: 
        Subject:        iSCSI: Text/Operational keys: booleans and ranges

 

1. Is it possible to make all Boolean Text/Operational keys's
value range be ``0'' and ``1'', rather than the current
``Yes'', ``No''.

Since those are _Boolean_ values, what will be the objection to
this? 

A user interface will probably display ``Yes'' and ``No'', but
in the protocol, why burden implementations with string
comparison, case-sensitive on top of this, rather than use
strtol(), this making content check easier (strtol() will detect
range errors, e.g. ``OFMarker=hello'').

2. Why not make integer ranges, like OFMarkInt, use dash,
``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in the 
interval.

The reason is that in the future there may be a text/operational key which 
can take only a set of
distinct integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That is 
``SomeBit'' is still an
integer variable but in negotiation it can choose between certain 
disctinct values. Furthermore the
standard text/operational code which many of you already have written will 
work in this situation,
only add atoi()/strtol() at the end...

Comments?

-- 
Luben



--=_alternative 00278F48C2256B7A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Luben,</font>
<br>
<br><font size=2 face="sans-serif">For the booleans - 1 and 0 are also integers. The parsing of strings is already mandated (for keys and string values) so no harm in letting them be text.</font>
<br>
<br><font size=2 face="sans-serif">For ranges - I think you have a good point and if I don't hear anything against it I will introduce it in 12 (I would suggest a colon or a double-colon instead of dash).</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Luben Tuikov &lt;luben@splentec.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: luben@ns.splentec.com</font>
<p><font size=1 face="sans-serif">12-03-02 01:07</font>
<br><font size=1 face="sans-serif">Please respond to iSCSI</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI &lt;ips@ece.cmu.edu&gt;, Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Text/Operational keys: booleans and ranges</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">1. Is it possible to make all Boolean Text/Operational keys's<br>
value range be ``0'' and ``1'', rather than the current<br>
``Yes'', ``No''.<br>
<br>
Since those are _Boolean_ values, what will be the objection to<br>
this? <br>
<br>
A user interface will probably display ``Yes'' and ``No'', but<br>
in the protocol, why burden implementations with string<br>
comparison, case-sensitive on top of this, rather than use<br>
strtol(), this making content check easier (strtol() will detect<br>
range errors, e.g. ``OFMarker=hello'').<br>
<br>
2. Why not make integer ranges, like OFMarkInt, use dash,<br>
``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in the interval.<br>
<br>
The reason is that in the future there may be a text/operational key which can take only a set of<br>
distinct integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That is ``SomeBit'' is still an<br>
integer variable but in negotiation it can choose between certain disctinct values. Furthermore the<br>
standard text/operational code which many of you already have written will work in this situation,<br>
only add atoi()/strtol() at the end...<br>
<br>
Comments?<br>
<br>
-- <br>
Luben<br>
</font>
<br>
<br>
--=_alternative 00278F48C2256B7A_=--


From owner-ips@ece.cmu.edu  Tue Mar 12 13:03:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA29472
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 13:03:55 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CHDVC16504
	for ips-outgoing; Tue, 12 Mar 2002 12:13:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CHDPH16491
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:13:26 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CHDC010758
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:13:12 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CHDBK10752
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:13:11 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2CHD8M14470
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:13:10 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15502.14114.894802.914665@pkoning.dev.equallogic.com>
Date: Tue, 12 Mar 2002 12:13:06 -0500
From: Paul Koning <ni1d@arrl.net>
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <3C8D38B1.1F986A41@splentec.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:

 Luben> 1. Is it possible to make all Boolean Text/Operational keys's
 Luben> value range be ``0'' and ``1'', rather than the current
 Luben> ``Yes'', ``No''.

 Luben> Since those are _Boolean_ values, what will be the objection
 Luben> to this?

 Luben> A user interface will probably display ``Yes'' and ``No'', but
 Luben> in the protocol, why burden implementations with string
 Luben> comparison, case-sensitive on top of this, rather than use
 Luben> strtol(), this making content check easier (strtol() will
 Luben> detect range errors, e.g. ``OFMarker=hello'').

That's a reasonable enough proposal, but I'm not convinced it's worth
changing at this time.

 Luben> 2. Why not make integer ranges, like OFMarkInt, use dash,
 Luben> ``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in
 Luben> the interval.

Same comment -- a bit less strongly since this is a last minute
addition.  A dash, or a colon, would be ok.  (Double colon?  No
thanks.)

 Luben> The reason is that in the future there may be a
 Luben> text/operational key which can take only a set of distinct
 Luben> integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That
 Luben> is ``SomeBit'' is still an integer variable but in negotiation
 Luben> it can choose between certain disctinct values. Furthermore
 Luben> the standard text/operational code which many of you already
 Luben> have written will work in this situation, only add
 Luben> atoi()/strtol() at the end...

I'm assuming you're not proposing the addition of "sets of distinct
values" as a negotiation option in V1, right?

It's time to stop making changes, even small changes, and freeze the
spec.  If it's not broken, let it stand.

	paul



From owner-ips@ece.cmu.edu  Tue Mar 12 13:04:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA29496
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 13:04:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CHiXj18873
	for ips-outgoing; Tue, 12 Mar 2002 12:44:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CHiVH18868
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:44:31 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2CHiH232094;
	Tue, 12 Mar 2002 12:44:17 -0500
Message-ID: <3C8E3E7E.E4A0F9CE@splentec.com>
Date: Tue, 12 Mar 2002 12:44:30 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
CC: Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <200203120007.g2C07dH32722@porter.almaden.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"Daniel F. Smith" wrote:
>
> An old trick is to use bit 0 of the first (UTF-8) character.
> This gets:	
>         1 for "1", "Yes", "yes", "oui", "si" (but not "ja", "da" or "hai")
>         0 for "0", "No", "non" (but not "ei")

But this makes things worse as one would rely on low level
representation to figure out the value, so we are better off
comparing case sensitive strings... in the low level protocol
implementation...

How about ranges using the dash?

True, one could _count_ the commas to fugure out if it is a
list (number of commas > 1) or a range (number of commas = 1), but you have to add code to _count_
the commas.

Using a dash for ranges, the list of numerical values is
handled by default by the already existing code in your
implementation to intesect two strings of comma separated
objects.

Anyone?

-- 
Luben


From owner-ips@ece.cmu.edu  Tue Mar 12 13:07:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA29553
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 13:07:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CHG3Z16672
	for ips-outgoing; Tue, 12 Mar 2002 12:16:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CHG1H16663
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 12:16:01 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLDPX7>; Tue, 12 Mar 2002 11:15:55 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631D7@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Marker negotiation - draft 11
Date: Tue, 12 Mar 2002 11:11:52 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1C9E9.0133A7D0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1C9E9.0133A7D0
Content-Type: text/plain;
	charset="iso-8859-1"


   A.2  Initial Marker-less Interval
 
           To enable the connection setup including the login phase
negotiation, 
           marking (if any) is started only at the first marker interval
after 
           the end of the login phase. However, in order to enable the
marker 
           inclusion and exclusion mechanism to work without knowledge of
the 
           length of the login phase, the first marker will be placed in the
TCP 
           stream as if the Marker-less interval had included markers.
 
           Thus all markers appear in the stream at locations conforming to
the 
           formula: [(MI + 8) * n - 8] where MI = Marker Interval, n =
integer 
           number.
 
           As an example if the marker interval is 512 and the login ended
at 
           byte 1003 (first iSCSI placed byte is 0) the first marker will be

           inserted after byte 1031 in the stream. 
 
 
The formula doesn't make sense to me.  An interval of 512 = 2048 bytes.
Wouldn't the first marker would be placed around byte 2048 instead of 1032?
 

A.3.2   OFMarkInt, IFMarkInt
 
           Use: IO
           Senders: Initiator and Target
           Scope: CO
 
           Offering:
 
           OFMarkInt=<integer-from-1-to-65535>[,<integer-from-1-to-65535>] 
           IFMarkInt=<integer-from-1-to-65535>[,<integer-from-1-to-65535>]
 
           Responding:
 
           OFMarkInt=<integer-from-1-to-65535>|Reject
           IFMarkInt=<integer-from-1-to-65535>|Reject
 
           OFMarkInt is used to set the interval for the initiator to target

           markers on the connection.  IFMarkInt is used to set the interval
for 
           the target to initiator markers on the connection.
 
           For the offering the initiator or target indicates the minimum to
max-
           imum interval (in 4-byte words) it wants the markers for one or
both
           directions. In case it only wants a specific value, only a single

           value has to be specified. The responder selects a value within
the 
           minimum and maximum offered or the only value offered or
indicates 
           through the xFMarker key=value its inability to set and/or
receive 
           markers. When the interval is unacceptable the responder answers
with 
           "Reject".  Reject is resetting the marker function in the
specified 
           direction (Output or Input) to No.
 
           The interval is measured from the end of a marker to the
beginning of 
           the next marker. For example, a value of 1024 means 1024 words
(4096 
           bytes of iSCSI payload between markers). 
 
           The default is 2048.
 

Why allow for intervals as small as 4-bytes on markers?  Is a range of
values really necessary?
 
I: OFMarker=yes | IFMarker=yes | OFMarkInt=1,512 | IFMarkInt=1,512
T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 | IFMarkInt=1
 
(BTW: Why was the above naming chosen over: ITMarker, TIMarker, ITMarkInt,
TIMarkInt.  OF & IF prefixes don't seem intuitively perspective-obvious.)
 
Instead of offering a range (which seems kind of unnecessary), how about
offering only the value the entity wishes to receive?  Example:
 
I: TIMarker=yes | TIMarkInt=512 | ITMarker=yes | ITMarkInt=0
T: TIMarker=yes | TIMarkInt=512 | ITMarker=yes | ITMarkInt=2048

The draft says "Default is 2048", how does that get negotiated?
 
I: OFMarker=yes | IFMarker=yes
T: OFMarker=yes | IFMarker=yes
 
Will the above negotiate the default OF & IF Marker Intervals?
 
Also, section 9.10.4 does not explicitly say that only a parameter
negotiated by the initiator may be returned in a target's response.  So
would this be possible?
 
I: OFMarker=yes | IFMarker=yes | OFMarkInt=1,512
T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 | IFMarkInt=1

 


------_=_NextPart_001_01C1C9E9.0133A7D0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE></TITLE>

<META content="MSHTML 5.50.4611.1300" name=GENERATOR></HEAD>
<BODY><FONT face=Arial size=2>
<DIV><BR><FONT face="Times New Roman">&nbsp;&nbsp; A.2&nbsp; Initial Marker-less 
Interval</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
To enable the connection setup including the login phase negotiation, 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; marking (if 
any) is started only at the first marker interval after 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the end of the 
login phase. However, in order to enable the marker 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; inclusion and 
exclusion mechanism to work without knowledge of the 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; length of the 
login phase, the first marker will be placed in the TCP 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; stream as if 
the Marker-less interval had included markers.</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Thus all markers appear in the stream at locations conforming to the 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; formula: [(MI + 
8) * n - 8] where MI = Marker Interval, n = integer 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
number.</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
As an example if the marker interval is 512 and the login ended at 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; byte 1003 
(first iSCSI placed byte is 0) the first marker will be 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; inserted after 
byte 1031 in the stream.</FONT> </DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">The formula doesn't make sense to me.&nbsp; An 
interval of 512 = 2048 bytes.&nbsp; Wouldn't the first marker would be placed 
around byte 2048 instead of 1032?</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><BR><FONT face="Times New Roman">A.3.2&nbsp;&nbsp; OFMarkInt, 
IFMarkInt</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Use: IO<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Senders: 
Initiator and 
Target<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Scope: 
CO</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Offering:</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
OFMarkInt=&lt;integer-from-1-to-65535&gt;[,&lt;integer-from-1-to-65535&gt;] 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
IFMarkInt=&lt;integer-from-1-to-65535&gt;[,&lt;integer-from-1-to-65535&gt;]</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Responding:</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
OFMarkInt=&lt;integer-from-1-to-65535&gt;|Reject<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
IFMarkInt=&lt;integer-from-1-to-65535&gt;|Reject</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
OFMarkInt is used to set the interval for the initiator to target 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; markers on the 
connection.&nbsp; IFMarkInt is used to set the interval for 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the target to 
initiator markers on the connection.</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
For the offering the initiator or target indicates the minimum to 
max-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; imum 
interval (in 4-byte words) it wants the markers for one or 
both<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; directions. 
In case it only wants a specific value, only a single 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; value has to be 
specified. The responder selects a value within the 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; minimum and 
maximum offered or the only value offered or indicates 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; through the 
xFMarker key=value its inability to set and/or receive 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; markers. When 
the interval is unacceptable the responder answers with 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Reject".&nbsp; 
Reject is resetting the marker function in the specified 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; direction 
(Output or Input) to No.</FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
The interval is measured from the end of a marker to the beginning of 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the next 
marker. For example, a value of 1024 means 1024 words (4096 
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; bytes of iSCSI 
payload between markers). </FONT></DIV>
<DIV><FONT face="Times New Roman"></FONT>&nbsp;</DIV>
<DIV><FONT 
face="Times New Roman">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
The default is 2048.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><BR><FONT face="Comic Sans MS">Why allow for intervals as small as 4-bytes 
on markers?&nbsp; Is a range of values really&nbsp;necessary?</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">I: OFMarker=yes | IFMarker=yes | OFMarkInt=1,512 
| IFMarkInt=1,512<BR>T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 | 
IFMarkInt=1</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">(BTW: Why was the above naming chosen over: 
ITMarker, TIMarker, ITMarkInt, TIMarkInt.&nbsp; OF &amp; IF prefixes don't seem 
intuitively perspective-obvious.)</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">Instead of offering a range (which seems kind of 
unnecessary), how about offering only the value the entity wishes to 
receive?&nbsp; Example:</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT><FONT 
face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">I: TIMarker=yes | TIMarkInt=512 | ITMarker=yes | 
ITMarkInt=0<BR>T: TIMarker=yes | TIMarkInt=512 | ITMarker=yes | 
ITMarkInt=2048</FONT></DIV>
<DIV><BR><FONT face="Comic Sans MS">The draft says "Default is 2048", how does 
that get negotiated?</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">I: OFMarker=yes | IFMarker=yes<BR>T: 
OFMarker=yes | IFMarker=yes</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">Will the above negotiate the default OF &amp; IF 
Marker Intervals?</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">Also, section 9.10.4 does not explicitly say 
that <U>only </U>a parameter negotiated by the initiator may be returned in a 
target's response.&nbsp; So would this be possible?</FONT></DIV>
<DIV><FONT face="Comic Sans MS"></FONT>&nbsp;</DIV>
<DIV><FONT face="Comic Sans MS">I: OFMarker=yes | IFMarker=yes | 
OFMarkInt=1,512<BR>T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 | 
IFMarkInt=1</FONT></FONT></DIV>
<P><FONT face="Comic Sans MS" size=2></FONT>&nbsp;</P></BODY></HTML>

------_=_NextPart_001_01C1C9E9.0133A7D0--


From owner-ips@ece.cmu.edu  Tue Mar 12 14:21:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02518
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:21:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CIoCo24560
	for ips-outgoing; Tue, 12 Mar 2002 13:50:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CIo9H24546
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:50:09 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id NAA12148;
	Tue, 12 Mar 2002 13:46:43 -0500
Received: from d03nm014.boulder.ibm.com (d03nm014.boulder.ibm.com [9.17.194.13])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2CInrH92868;
	Tue, 12 Mar 2002 11:49:53 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF40CBCA64.1F74E2D7-ON88256B7A.00660A9E@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Tue, 12 Mar 2002 10:37:37 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/12/2002 11:49:52 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


I agree with Paul, leave good enough alone for now.  We are trying to get
to last call, and changes which not absolutely needed are causing time to
elapse which is not worth the change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Paul Koning <ni1d@arrl.net>@ece.cmu.edu on 03/12/2002 09:13:06 AM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    Re: iSCSI: Text/Operational keys: booleans and ranges



>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:

 Luben> 1. Is it possible to make all Boolean Text/Operational keys's
 Luben> value range be ``0'' and ``1'', rather than the current
 Luben> ``Yes'', ``No''.

 Luben> Since those are _Boolean_ values, what will be the objection
 Luben> to this?

 Luben> A user interface will probably display ``Yes'' and ``No'', but
 Luben> in the protocol, why burden implementations with string
 Luben> comparison, case-sensitive on top of this, rather than use
 Luben> strtol(), this making content check easier (strtol() will
 Luben> detect range errors, e.g. ``OFMarker=hello'').

That's a reasonable enough proposal, but I'm not convinced it's worth
changing at this time.

 Luben> 2. Why not make integer ranges, like OFMarkInt, use dash,
 Luben> ``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in
 Luben> the interval.

Same comment -- a bit less strongly since this is a last minute
addition.  A dash, or a colon, would be ok.  (Double colon?  No
thanks.)

 Luben> The reason is that in the future there may be a
 Luben> text/operational key which can take only a set of distinct
 Luben> integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That
 Luben> is ``SomeBit'' is still an integer variable but in negotiation
 Luben> it can choose between certain disctinct values. Furthermore
 Luben> the standard text/operational code which many of you already
 Luben> have written will work in this situation, only add
 Luben> atoi()/strtol() at the end...

I'm assuming you're not proposing the addition of "sets of distinct
values" as a negotiation option in V1, right?

It's time to stop making changes, even small changes, and freeze the
spec.  If it's not broken, let it stand.

 paul






From owner-ips@ece.cmu.edu  Tue Mar 12 14:21:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02566
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:21:55 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CIoBO24556
	for ips-outgoing; Tue, 12 Mar 2002 13:50:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CIo6H24540
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:50:06 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id NAA52966;
	Tue, 12 Mar 2002 13:46:46 -0500
Received: from d03nm014.boulder.ibm.com (d03nm014.boulder.ibm.com [9.17.194.13])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2CInwH92870;
	Tue, 12 Mar 2002 11:49:59 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iSCSI: Marker negotiation - draft 11
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF20EDBB96.0CB102E2-ON88256B7A.0066ADA4@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Tue, 12 Mar 2002 10:44:35 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/12/2002 11:49:58 AM
MIME-Version: 1.0
Content-type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2CIo6H24541
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit


512+8+512=1032 (-1 since it starts at 0) = 1031.

...the first marker will be placed in the TCP stream as if  the Marker-less
interval had included markers.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Michael Schoberg <michael_schoberg@cnt.com>@ece.cmu.edu on 03/12/2002
09:11:52 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    iSCSI: Marker negotiation - draft 11





   A.2  Initial Marker-less  Interval

            To enable the connection setup including the login phase
negotiation,
           marking (if  any) is started only at the first marker interval
after
           the end of the  login phase. However, in order to enable the
marker
           inclusion and  exclusion mechanism to work without knowledge of
the
           length of the  login phase, the first marker will be placed in
the TCP
           stream as if  the Marker-less interval had included markers.

            Thus all markers appear in the stream at locations conforming
to the
           formula: [(MI +  8) * n - 8] where MI = Marker Interval, n =
integer
            number.

            As an example if the marker interval is 512 and the login ended
at
           byte 1003  (first iSCSI placed byte is 0) the first marker will
be
           inserted after  byte 1031 in the stream.


The formula doesn't make sense to me.  An  interval of 512 = 2048 bytes.
Wouldn't the first marker would be placed  around byte 2048 instead of
1032?


A.3.2   OFMarkInt,  IFMarkInt

            Use: IO
           Senders:  Initiator and  Target
           Scope:  CO

            Offering:

            OFMarkInt=<integer-from-1-to-65535>[,<integer-from-1-to-65535>]
            IFMarkInt=<integer-from-1-to-65535>[,<integer-from-1-to-65535>]

            Responding:

            OFMarkInt=<integer-from-1-to-65535>|Reject
            IFMarkInt=<integer-from-1-to-65535>|Reject

            OFMarkInt is used to set the interval for the initiator to
target
           markers on the  connection.  IFMarkInt is used to set the
interval for
           the target to  initiator markers on the connection.

            For the offering the initiator or target indicates the minimum
to  max-
           imum  interval (in 4-byte words) it wants the markers for one or
both
           directions.  In case it only wants a specific value, only a
single
           value has to be  specified. The responder selects a value within
the
           minimum and  maximum offered or the only value offered or
indicates
           through the  xFMarker key=value its inability to set and/or
receive
           markers. When  the interval is unacceptable the responder
answers with
           "Reject".   Reject is resetting the marker function in the
specified
           direction  (Output or Input) to No.

            The interval is measured from the end of a marker to the
beginning of
           the next  marker. For example, a value of 1024 means 1024 words
(4096
           bytes of iSCSI  payload between markers).

            The default is 2048.


Why allow for intervals as small as 4-bytes  on markers?  Is a range of
values really necessary?

I: OFMarker=yes | IFMarker=yes | OFMarkInt=1,512  | IFMarkInt=1,512
T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 |  IFMarkInt=1

(BTW: Why was the above naming chosen over:  ITMarker, TIMarker, ITMarkInt,
TIMarkInt.  OF & IF prefixes don't seem  intuitively perspective-obvious.)

Instead of offering a range (which seems kind of  unnecessary), how about
offering only the value the entity wishes to  receive?  Example:

I: TIMarker=yes | TIMarkInt=512 | ITMarker=yes |  ITMarkInt=0
T: TIMarker=yes | TIMarkInt=512 | ITMarker=yes |  ITMarkInt=2048

The draft says "Default is 2048", how does  that get negotiated?

I: OFMarker=yes | IFMarker=yes
T:  OFMarker=yes | IFMarker=yes

Will the above negotiate the default OF & IF  Marker Intervals?

Also, section 9.10.4 does not explicitly say  that only a parameter
negotiated by the initiator may be returned in a  target's response.  So
would this be possible?

I: OFMarker=yes | IFMarker=yes |  OFMarkInt=1,512
T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 |  IFMarkInt=1








From owner-ips@ece.cmu.edu  Tue Mar 12 14:23:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02659
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:23:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CIpGL24662
	for ips-outgoing; Tue, 12 Mar 2002 13:51:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CIp8H24633
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:51:09 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CIow011930
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:50:58 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CIowK11924
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:50:58 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2CIowp19660
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:50:58 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15502.19986.233998.292778@pkoning.dev.equallogic.com>
Date: Tue, 12 Mar 2002 13:50:58 -0500
From: Paul Koning <ni1d@arrl.net>
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <200203120007.g2C07dH32722@porter.almaden.ibm.com>
	<3C8E3E7E.E4A0F9CE@splentec.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:
 Luben> How about ranges using the dash?

 Luben> True, one could _count_ the commas to fugure out if it is a
 Luben> list (number of commas > 1) or a range (number of commas = 1),
 Luben> but you have to add code to _count_ the commas.

That doesn't work, because sets can have two members.  So yes, a
separator different from comma makes sense for ranges.

 Luben> Using a dash for ranges, the list of numerical values is
 Luben> handled by default by the already existing code in your
 Luben> implementation to intesect two strings of comma separated
 Luben> objects.

Not true.  Integers and strings are different data types.  Sets of
strings are in the spec now, sets of integers are not.

I am opposed to changes that do not come with strong justifications
(such as "this change is needed to fix bug XYZ").  I don't see any
justification for sets of integers, so they should not be added until
and unless they are needed.

    paul



From owner-ips@ece.cmu.edu  Tue Mar 12 14:24:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02693
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:24:04 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJ0gY25525
	for ips-outgoing; Tue, 12 Mar 2002 14:00:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CJ0dH25518
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:00:39 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id F091D40086E; Tue, 12 Mar 2002 11:00:33 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id LAA12292;
	Tue, 12 Mar 2002 11:00:15 -0800 (PST)
Message-ID: <3C8E512C.801F0CD5@cup.hp.com>
Date: Tue, 12 Mar 2002 11:04:12 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: Julian Satran <julian_satran@il.ibm.com>
Cc: IPS Reflector <ips@ece.cmu.edu>
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <000001c1c979$3e95b930$ea01a8c0@aarohicommunications.com> <002301c1c9f3$fcc30640$edd52b0f@rose.hp.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


What is the closure on this issue ? Will the Target Portal Group Tag be
a part of the login request ? 

- Santosh


> (assuming we have the TPGT in the Login Request PDU), 

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Tue Mar 12 14:24:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02744
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:24:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJ8NF26204
	for ips-outgoing; Tue, 12 Mar 2002 14:08:23 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e32.co.us.ibm.com (e32.co.us.ibm.com [32.97.110.130])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CJ8KH26197
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:08:20 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e32.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id OAA72822;
	Tue, 12 Mar 2002 14:04:57 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2CJ8Fn107212;
	Tue, 12 Mar 2002 12:08:15 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iscsi : changes involving tgt portal group tag.
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF4591A8D0.92070A01-ON88256B7A.006898D3@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Tue, 12 Mar 2002 11:07:35 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/12/2002 12:08:15 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Mallikarjun,
I do not see the absolute requirement for this TPGT in the Login.  I think
it would be approprate to say that if the time for the Reconnect has been
more then the "...Time2Wait" that the Initiator, if it cares about the
TPGT,  SHOULD perform a rediscovery.

That would address the issue with out any protocol changes.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Mallikarjun C." <cbm@rose.hp.com>@ece.cmu.edu on 03/12/2002 10:30:29 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
cc:    <ips@ece.cmu.edu>, <t10@t10.org>
Subject:    Re: iscsi : changes involving tgt portal group tag.



Shailesh,

The failure resulting out of a TPGT mismatch (assuming we have the TPGT in
the Login Request PDU), would have to trigger a discovery
(SendTargets/SLP/...)
updating the initiator of the latest configuration.  This discovery process
is
similar
to the FCP ADISC process you refer to.

Alternatively, if there has been a change in the LU view of  a given target
portal
group tag (meaning that the TPGT would match correctly), the LUs in the
view
should have established UA with an ASC of REPORTED LUNS DATA HAS
CHANGED since the SCSI port association has changed for the LUs.  This
again
should trigger a discovery process from the initiator.

It seems to be that we are now sufficiently covered either way.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com


----- Original Message -----
From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
<Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Monday, March 11, 2002 7:51 PM
Subject: RE: iscsi : changes involving tgt portal group tag.


> Hi,
>
> On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> discovery followed by SCSI Inquiry and Report_LUNS which would make the
> Initiator aware of this change? Can the  Async message - iscsi Event
> Data notify the Initiator of the change, which would force an discovery.
> This would be similar to an ADISC for FCP. Because including the TPGT in
> the login would prevent inadvertent logins but would still not notify
> the initiator of the changed configuration?
>
> Thanks,
> Shailesh.
> Aarohi Communications.
> -----Original Message-----
> From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> Mallikarjun C.
> Sent: Wednesday, March 06, 2002 10:17 AM
> To: Julian Satran
> Cc: ips@ece.cmu.edu; t10@t10.org
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Mallikarjun C." <cbm@rose.hp.com>
> *
> > The issue is that I am not sure that a target is checking today
> anything -
> > (adapter drivers may check oif in their realm they can give out a
> TSID).
> > Nothing else is needed.
>
> Target is required to derive the TPGT and use it in both cases of Login
> -
>      a) when TSID = 0, to ascertain if a session reinstatement needs to
>          be effected for that TPGT.
>      b) when TSID != 0, to ascertain the validity of TSID and add in
>           the new connection to an existing session if it is valid for
> that TPGT.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Julian Satran" <Julian_Satran@il.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Tuesday, March 05, 2002 11:56 PM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > The issue is that I am not sure that a target is checking today
> anything -
> > (adapter drivers may check oif in their realm they can give out a
> TSID).
> > Nothing else is needed. Does SCSI have to be aware of it? Perhaps but
> > iSCSI certainly not. Does a "front-end" have to be - again probably
> not
> > the name identifies the node.
> >
> > Julo
> >
> >
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>
> > 05-03-02 22:34
> > Please respond to "Mallikarjun C."
> >
> >
> >         To:     Julian Satran/Haifa/IBM@IBMIL
> >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> >         Subject:        Re: iscsi : changes involving tgt portal group
> tag.
> >
> >
> >
> > Julian,
> >
> > Whatever methods a target is expected to use today to derive the
> implicit
> > TPGT to preclude a duplicate I-T nexus would work after the change as
> > well,
> > except the derived value needs to be compared against the (proposed)
> > TPGT in the Login Request payload.
> >
> > Please comment if we're missing something.
> >
> > Regards.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > <santoshr@cup.hp.com>;
> > <t10@t10.org>
> > Sent: Monday, March 04, 2002 10:24 PM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > Has a decent target implementation and easy way of checking that the
> TPG
> > > is correct?
> > >
> > > Julo
> > >
> > >
> > >
> > >
> > > "Mallikarjun C." <cbm@rose.hp.com>
> > > Sent by: owner-ips@ece.cmu.edu
> > > 05-03-02 01:12
> > > Please respond to "Mallikarjun C."
> > >
> > >
> > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> <ips@ece.cmu.edu>
> > >         cc:     <t10@t10.org>
> > >         Subject:        Re: iscsi : changes involving tgt portal
> group
> > tag.
> > >
> > >
> > >
> > > Santosh and Jim,
> > >
> > > It appears a good idea to add in the portal group tag in the Login
> > > Request header for a sanity check by the receiving target portal.
> > >
> > > I generally agree with Jim's comments that the duration of
> persistence
> > > of a portal group tag is intricately linked to the extent of portal
> > > reconfiguration.
> > > Not every target reconfiguration may result in a portal group tag
> > > reassignment.
> > > OTOH, some reconfigurations may be so extensive as to cause even a
> node
> > > name change.
> > >
> > > Some comments on Santosh's message -
> > >
> > > > "If a portal group is re-configured such that all its previously
> > > > advertised network portals are no longer a part of the portal
> group,
> > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > *MUST* be changed to indicate a new target port."
> > >
> > > I am not sure this solves the problem you're trying to get at.  If
> none
> > of
> > > the earlier IP addresses can get an initiator to the SCSI target
> port
> > that
> > > it
> > > knew of (your scenario), it appears to me that it doesn't matter if
> the
> > > portal group tags are changed or not....A new discovery process
> should
> > > update the initiator of the changed portal addresses.
> > >
> > > I suggest the following text -
> > >
> > >    After a portal group reconfiguration which changed the view of
> LUs
> > >    for an initiator with a given set of privileges, the target MUST
> > change
> > >    the portal group tag that represents the reconfigured target
> portal
> > > group.
> > >
> > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> have
> > > been
> > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> issue
> > at
> > > all.
> > > >
> > > > On a session logout & re-login, it is not efficient/necessary to
> close
> > > > and re-open each LUN behind that target port, due to the fact that
> a
> > > > target port may have hundred's of LUNs behind it.
> > >
> > > I agree with Jim on this one - there should be *no* open/active
> I_T_L
> > > nexus
> > > traffic after a reconfiguration, targets can enforce this via simple
>
> > iSCSI
> > > means
> > > (reject initiator advances to continue the session for
> DefaultTime2Wait+
> > > DefaultTime2Retain seconds).  In fact, Async logout request requires
> a
> > > clean closure that implicitly aborts I/Os.
> > >
> > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > interactions.  I agree that they wouldn't have to be repeated, but
> care
> > > must be taken to ensure that new I/Os (on the new session after
> > > reconfiguration)
> > > are not delivered to the incorrect LUs.  It seems that the addition
> of
> > > TPGT in the login header and the proposed new text (above) would
> take
> > > care of this.
> > >
> > > Regards.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > To: <ips@ece.cmu.edu>
> > > Cc: <t10@t10.org>
> > > Sent: Monday, March 04, 2002 10:40 AM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > *
> > > > Jim,
> > > >
> > > > I agree that a "complete re-configuration" of a target port can
> result
> > > > in a new port name & port identifier. However, the tricky part is
> the
> > > > definition of a "complete re-configuration of an iscsi target
> port",
> > due
> > > > to the concepts of portal groups involving multiple network
> portals.
> > > >
> > > > For example, if a portal group (aka, an iscsi target port) were to
> be
> > > > re-configured to include a new network portal [moved from another
> > portal
> > > > group], then, the target port itself has not changed, since it is
> > still
> > > > accessible through its previously used network portals. What has
> > changed
> > > > is the individual network portal that has moved from 1 target port
> to
> > > > another.
> > > >
> > > > Hence, it is sufficient, in this case, to maintain persistence of
> the
> > > > target port name/identifier, without requiring any change in port
> > > > name/identifier. By requiring initiators to send the intended TPGT
>
> > (scsi
> > > > target port name/identifier) along with the login request, this
> allows
> > > > the target port to detect that the network portal is being
> accessed to
> > > > connect to a different target port and it can reject the login.
> > > >
> > > > It may be helpful to call out the specific case when a port
> > > > name/identifier MUST change. How about something like :
> > > >
> > > > "If a portal group is re-configured such that all its previously
> > > > advertised network portals are no longer a part of the portal
> group,
> > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > *MUST* be changed to indicate a new target port."
> > > >
> > > > This would allow access to the target port through its un-altered
> > > > network portals to continue un-disrupted. More comments inline, in
> > > > response to some of your queries.
> > > >
> > > > Thanks,
> > > > Santosh
> > > >
> > > > NOTE : In this discussion target port and target portal group are
> used
> > > > to imply the same entity, within a target node.
> > > >
> > > >
> > > > Jim Hafner wrote:
> > > >
> > > > > SAM-2 requires scsi port names to be persistent and
> > world-wide-unique.
> > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > >
> > > > > "A scsi port name shall never change and may be used to
> persistently
> > > > > identify a scsi initiator port or target port...".
> > > > >
> > > > > <JLH>
> > > > > There are different ways that one can interpret this
> "persistent"
> > > rule. The
> > > > > intent was that names shouldn't change over time when
> *identifying
> > the
> > > same
> > > > > object*.   What that means is that if the object changes (in any
> > > > > discernable way), then the name should change.  So, the object
> can
> > > move to
> > > > > a different piece of hardware, but it can still be named the
> same
> > way.
> > >  If
> > > > > the object changes, e.g., in this case, reconfigures as a
> different
> > > set of
> > > > > network portals with different addressing elements, then I would
>
> > think
> > > that
> > > > > the name should change as well.   That's all the persistence one
> > > really
> > > > > needs.
> > > > >
> > > > > I'm not sure what that implies about your recommendation.  I
> don't
> > see
> > > any
> > > > > problem with it, either.
> > > > > </JLH>
> > > >
> > > > I think we may be in agreement. (See reasoning above).
> > > >
> > > >
> > > > >
> > > > > The rationale for (2) is :
> > > > > --------------------------
> > > > > Consider an initiator node establishing multiple sessions to a
> scsi
> > > tgt
> > > > > port, with each session established to a subset of the network
> > portals
> > > > > within the tgt portal group.
> > > > >
> > > > > Consider an iscsi transport event involving the re-configuration
> of
> > > > > target portal groups on the iscsi target node. This may be
> preceeded
> > > by
> > > > > the iscsi sessions seeing an async message "target requests
> logout",
> > > > > followed by session logout, portal group re-configuration, and
> then,
> > > the
> > > > > initiator re-establishes sessions.
> > > > >
> > > > > Across a transport event that results in such session
> termination
> > and
> > > > > re-establishment, the initiator needs to authenticate that it is
>
> > still
> > > > > speaking to the same [i]scsi target port, in order to ensure
> that
> > any
> > > > > open/active I-T-L nexus traffic on that session is not
> incorrectly
> > > > > routed to a wrong LUN after such a transport event.
> > > >
> > > > > <JLH>
> > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> have
> > > been
> > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> issue
> > at
> > > all.
> > > >
> > > > On a session logout & re-login, it is not efficient/necessary to
> close
> > > > and re-open each LUN behind that target port, due to the fact that
> a
> > > > target port may have hundred's of LUNs behind it.
> > > >
> > > > All outstanding I/Os need to be aborted. Once the session is
> > > > re-established [and the target port is authenticated to be the
> same],
> > > > further I/O traffic can be resumed without requiring the SCSI ULP
> to
> > > > close and re-open each LUN. Some transport specific clearing
> effects
> > may
> > > > have occurred, which may require additional LUN level activity, in
>
> > some
> > > > cases.
> > > >
> > > > (There are analogies to the above model in FCP & SRP, which
> > authenticate
> > > > port name/identifier on login, allowing I/O resumption after
> session
> > > > termination and re-establishment.)
> > > >
> > > >
> > > > > To prevent such authentication issues, iscsi can send the iscsi
> > target
> > > > > port identifier (portal group tag) explicitly in the login
> request,
> > > and
> > > > > the login can be rejected by the target on a portal group tag
> > > mis-match.
> > > > > (if the network portal does not belong to the addressed portal
> group
> > > > > tag).
> > > > > <JLH>
> > > > > Did you mean for the initiator to send this TPGT?
> > > > > </JLH>
> > > >
> > > > Yes. The initiator login request must include the target portal
> group
> > > > tag, thus identifying the target port to which a session is being
> > > > established.
> > > >
> > > > Login currently carries no addressing information, since the
> > addressing
> > > > is implicit, based on the TCP connection in use. The problem with
> this
> > > > approach is that the login implicitly addresses a network portal,
> and
> > > > not the target port. As seen in the earlier example, the
> association
> > of
> > > > network portal <-> target port can change, and such changes can be
> > > > detected, if the initiator were to explicitly identify the target
> port
> > > > being logged into.
> > > >
> > > > --
> > > > ##################################
> > > > Santosh Rao
> > > > Software Design Engineer,
> > > > HP-UX iSCSI Driver Team,
> > > > Hewlett Packard, Cupertino.
> > > > email : santoshr@cup.hp.com
> > > > Phone : 408-447-3751
> > > > ##################################
> > > > *
> > > > * For T10 Reflector information, send a message with
> > > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > > >
> > >
> > >
> > >
> >
> >
> >
> >
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
>
>






From owner-ips@ece.cmu.edu  Tue Mar 12 15:10:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA04867
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 15:10:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJDFu26706
	for ips-outgoing; Tue, 12 Mar 2002 14:13:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CJDCH26700
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:13:12 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLDRZV>; Tue, 12 Mar 2002 13:13:06 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631D8@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Marker negotiation - draft 11
Date: Tue, 12 Mar 2002 13:09:02 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

[(MI +  8) * n - 8] 

This is the formula in the draft.  I'm just wondering how a 2048 byte
interval results in a marker at location 1032.  Using the above formula for
n = 0 .. X:

n = 0, 		-8
n = 1,		512
n = 2, 		1032
n = 3,		1552
...

That doesn't look like a 2048 byte interval to me.  Perhaps someone could
explain the math. 

You may want to describe the formula a little clearer:

	Start of marker (byte location) = ((MI + 8) * n) - 8 

	[n] is an incrementing integer describing the n'th 
	  marker inserted into the TCP output stream.  n > 0
	[MI] is the negotiated marker interval value in bytes.



Where does this come from?

	"512+8+512=1032 (-1 since it starts at 0) = 1031" 

What formula are you using?



:-----Original Message-----
:From: John Hufferd [mailto:hufferd@us.ibm.com]
:Sent: Tuesday, March 12, 2002 12:45 PM
:To: Michael Schoberg
:Cc: IPS Reflector (E-mail)
:Subject: Re: iSCSI: Marker negotiation - draft 11
:
:
:
:512+8+512=1032 (-1 since it starts at 0) = 1031.
:
:...the first marker will be placed in the TCP stream as if  
:the Marker-less
:interval had included markers.
:
:.
:.
:.
:John L. Hufferd
:Senior Technical Staff Member (STSM)
:IBM/SSG San Jose Ca
:Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
:Home Office (408) 997-6136, Cell: (408) 499-9702
:Internet address: hufferd@us.ibm.com
:


From owner-ips@ece.cmu.edu  Tue Mar 12 15:10:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA04904
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 15:10:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJmKw29843
	for ips-outgoing; Tue, 12 Mar 2002 14:48:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CJmHH29832
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:48:17 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id UAA274062;
	Tue, 12 Mar 2002 20:40:11 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2CJg5o84000;
	Tue, 12 Mar 2002 20:42:06 +0100
To: Santosh Rao <santoshr@cup.hp.com>
Cc: IPS Reflector <ips@ece.cmu.edu>, santoshr@hpcuhe.cup.hp.com
MIME-Version: 1.0
Subject: Re: iscsi : changes involving tgt portal group tag.
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF63940E89.16121859-ONC2256B7A.006A33F3@telaviv.ibm.com>
Date: Tue, 12 Mar 2002 21:42:18 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 12/03/2002 21:42:20,
	Serialize complete at 12/03/2002 21:42:20
Content-Type: multipart/alternative; boundary="=_alternative 006A4DDEC2256B7A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 006A4DDEC2256B7A_=
Content-Type: text/plain; charset="us-ascii"

I did not hear compelling arguments for it and it drags us even more into 
discovery teritory - Julo




Santosh Rao <santoshr@cup.hp.com>
Sent by: santoshr@hpcuhe.cup.hp.com
12-03-02 21:04
Please respond to Santosh Rao

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     IPS Reflector <ips@ece.cmu.edu>
        Subject:        Re: iscsi : changes involving tgt portal group tag.

 


What is the closure on this issue ? Will the Target Portal Group Tag be
a part of the login request ? 

- Santosh


> (assuming we have the TPGT in the Login Request PDU), 

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################



--=_alternative 006A4DDEC2256B7A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">I did not hear compelling arguments for it and it drags us even more into discovery teritory - Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Santosh Rao &lt;santoshr@cup.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: santoshr@hpcuhe.cup.hp.com</font>
<p><font size=1 face="sans-serif">12-03-02 21:04</font>
<br><font size=1 face="sans-serif">Please respond to Santosh Rao</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iscsi : changes involving tgt portal group tag.</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
What is the closure on this issue ? Will the Target Portal Group Tag be<br>
a part of the login request ? <br>
<br>
- Santosh<br>
<br>
<br>
&gt; (assuming we have the TPGT in the Login Request PDU), <br>
<br>
-- <br>
##################################<br>
Santosh Rao<br>
Software Design Engineer,<br>
HP-UX iSCSI Driver Team,<br>
Hewlett Packard, Cupertino.<br>
email : santoshr@cup.hp.com<br>
Phone : 408-447-3751<br>
##################################<br>
</font>
<br>
<br>
--=_alternative 006A4DDEC2256B7A_=--


From owner-ips@ece.cmu.edu  Tue Mar 12 15:11:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA02520
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 14:21:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CIV3g22843
	for ips-outgoing; Tue, 12 Mar 2002 13:31:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel8.hp.com (atlrel8.hp.com [156.153.255.206])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CIV2H22839
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 13:31:02 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel8.hp.com (Postfix) with ESMTP
	id CF83EA00236; Tue, 12 Mar 2002 13:30:40 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA10414; Tue, 12 Mar 2002 10:32:11 -0800 (PST)
Message-ID: <002301c1c9f3$fcc30640$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <000001c1c979$3e95b930$ea01a8c0@aarohicommunications.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Tue, 12 Mar 2002 10:30:29 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Shailesh,

The failure resulting out of a TPGT mismatch (assuming we have the TPGT in
the Login Request PDU), would have to trigger a discovery (SendTargets/SLP/...)
updating the initiator of the latest configuration.  This discovery process is
similar
to the FCP ADISC process you refer to.

Alternatively, if there has been a change in the LU view of  a given target portal
group tag (meaning that the TPGT would match correctly), the LUs in the view
should have established UA with an ASC of REPORTED LUNS DATA HAS
CHANGED since the SCSI port association has changed for the LUs.  This again
should trigger a discovery process from the initiator.

It seems to be that we are now sufficiently covered either way.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com


----- Original Message -----
From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
<Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Monday, March 11, 2002 7:51 PM
Subject: RE: iscsi : changes involving tgt portal group tag.


> Hi,
>
> On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> discovery followed by SCSI Inquiry and Report_LUNS which would make the
> Initiator aware of this change? Can the  Async message - iscsi Event
> Data notify the Initiator of the change, which would force an discovery.
> This would be similar to an ADISC for FCP. Because including the TPGT in
> the login would prevent inadvertent logins but would still not notify
> the initiator of the changed configuration?
>
> Thanks,
> Shailesh.
> Aarohi Communications.
> -----Original Message-----
> From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> Mallikarjun C.
> Sent: Wednesday, March 06, 2002 10:17 AM
> To: Julian Satran
> Cc: ips@ece.cmu.edu; t10@t10.org
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
> * From the T10 Reflector (t10@t10.org), posted by:
> * "Mallikarjun C." <cbm@rose.hp.com>
> *
> > The issue is that I am not sure that a target is checking today
> anything -
> > (adapter drivers may check oif in their realm they can give out a
> TSID).
> > Nothing else is needed.
>
> Target is required to derive the TPGT and use it in both cases of Login
> -
>      a) when TSID = 0, to ascertain if a session reinstatement needs to
>          be effected for that TPGT.
>      b) when TSID != 0, to ascertain the validity of TSID and add in
>           the new connection to an existing session if it is valid for
> that TPGT.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
>
> ----- Original Message -----
> From: "Julian Satran" <Julian_Satran@il.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Tuesday, March 05, 2002 11:56 PM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> > The issue is that I am not sure that a target is checking today
> anything -
> > (adapter drivers may check oif in their realm they can give out a
> TSID).
> > Nothing else is needed. Does SCSI have to be aware of it? Perhaps but
> > iSCSI certainly not. Does a "front-end" have to be - again probably
> not
> > the name identifies the node.
> >
> > Julo
> >
> >
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>
> > 05-03-02 22:34
> > Please respond to "Mallikarjun C."
> >
> >
> >         To:     Julian Satran/Haifa/IBM@IBMIL
> >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> >         Subject:        Re: iscsi : changes involving tgt portal group
> tag.
> >
> >
> >
> > Julian,
> >
> > Whatever methods a target is expected to use today to derive the
> implicit
> > TPGT to preclude a duplicate I-T nexus would work after the change as
> > well,
> > except the derived value needs to be compared against the (proposed)
> > TPGT in the Login Request payload.
> >
> > Please comment if we're missing something.
> >
> > Regards.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > <santoshr@cup.hp.com>;
> > <t10@t10.org>
> > Sent: Monday, March 04, 2002 10:24 PM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > Has a decent target implementation and easy way of checking that the
> TPG
> > > is correct?
> > >
> > > Julo
> > >
> > >
> > >
> > >
> > > "Mallikarjun C." <cbm@rose.hp.com>
> > > Sent by: owner-ips@ece.cmu.edu
> > > 05-03-02 01:12
> > > Please respond to "Mallikarjun C."
> > >
> > >
> > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> <ips@ece.cmu.edu>
> > >         cc:     <t10@t10.org>
> > >         Subject:        Re: iscsi : changes involving tgt portal
> group
> > tag.
> > >
> > >
> > >
> > > Santosh and Jim,
> > >
> > > It appears a good idea to add in the portal group tag in the Login
> > > Request header for a sanity check by the receiving target portal.
> > >
> > > I generally agree with Jim's comments that the duration of
> persistence
> > > of a portal group tag is intricately linked to the extent of portal
> > > reconfiguration.
> > > Not every target reconfiguration may result in a portal group tag
> > > reassignment.
> > > OTOH, some reconfigurations may be so extensive as to cause even a
> node
> > > name change.
> > >
> > > Some comments on Santosh's message -
> > >
> > > > "If a portal group is re-configured such that all its previously
> > > > advertised network portals are no longer a part of the portal
> group,
> > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > *MUST* be changed to indicate a new target port."
> > >
> > > I am not sure this solves the problem you're trying to get at.  If
> none
> > of
> > > the earlier IP addresses can get an initiator to the SCSI target
> port
> > that
> > > it
> > > knew of (your scenario), it appears to me that it doesn't matter if
> the
> > > portal group tags are changed or not....A new discovery process
> should
> > > update the initiator of the changed portal addresses.
> > >
> > > I suggest the following text -
> > >
> > >    After a portal group reconfiguration which changed the view of
> LUs
> > >    for an initiator with a given set of privileges, the target MUST
> > change
> > >    the portal group tag that represents the reconfigured target
> portal
> > > group.
> > >
> > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> have
> > > been
> > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> issue
> > at
> > > all.
> > > >
> > > > On a session logout & re-login, it is not efficient/necessary to
> close
> > > > and re-open each LUN behind that target port, due to the fact that
> a
> > > > target port may have hundred's of LUNs behind it.
> > >
> > > I agree with Jim on this one - there should be *no* open/active
> I_T_L
> > > nexus
> > > traffic after a reconfiguration, targets can enforce this via simple
>
> > iSCSI
> > > means
> > > (reject initiator advances to continue the session for
> DefaultTime2Wait+
> > > DefaultTime2Retain seconds).  In fact, Async logout request requires
> a
> > > clean closure that implicitly aborts I/Os.
> > >
> > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > interactions.  I agree that they wouldn't have to be repeated, but
> care
> > > must be taken to ensure that new I/Os (on the new session after
> > > reconfiguration)
> > > are not delivered to the incorrect LUs.  It seems that the addition
> of
> > > TPGT in the login header and the proposed new text (above) would
> take
> > > care of this.
> > >
> > > Regards.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > To: <ips@ece.cmu.edu>
> > > Cc: <t10@t10.org>
> > > Sent: Monday, March 04, 2002 10:40 AM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > *
> > > > Jim,
> > > >
> > > > I agree that a "complete re-configuration" of a target port can
> result
> > > > in a new port name & port identifier. However, the tricky part is
> the
> > > > definition of a "complete re-configuration of an iscsi target
> port",
> > due
> > > > to the concepts of portal groups involving multiple network
> portals.
> > > >
> > > > For example, if a portal group (aka, an iscsi target port) were to
> be
> > > > re-configured to include a new network portal [moved from another
> > portal
> > > > group], then, the target port itself has not changed, since it is
> > still
> > > > accessible through its previously used network portals. What has
> > changed
> > > > is the individual network portal that has moved from 1 target port
> to
> > > > another.
> > > >
> > > > Hence, it is sufficient, in this case, to maintain persistence of
> the
> > > > target port name/identifier, without requiring any change in port
> > > > name/identifier. By requiring initiators to send the intended TPGT
>
> > (scsi
> > > > target port name/identifier) along with the login request, this
> allows
> > > > the target port to detect that the network portal is being
> accessed to
> > > > connect to a different target port and it can reject the login.
> > > >
> > > > It may be helpful to call out the specific case when a port
> > > > name/identifier MUST change. How about something like :
> > > >
> > > > "If a portal group is re-configured such that all its previously
> > > > advertised network portals are no longer a part of the portal
> group,
> > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > *MUST* be changed to indicate a new target port."
> > > >
> > > > This would allow access to the target port through its un-altered
> > > > network portals to continue un-disrupted. More comments inline, in
> > > > response to some of your queries.
> > > >
> > > > Thanks,
> > > > Santosh
> > > >
> > > > NOTE : In this discussion target port and target portal group are
> used
> > > > to imply the same entity, within a target node.
> > > >
> > > >
> > > > Jim Hafner wrote:
> > > >
> > > > > SAM-2 requires scsi port names to be persistent and
> > world-wide-unique.
> > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > >
> > > > > "A scsi port name shall never change and may be used to
> persistently
> > > > > identify a scsi initiator port or target port...".
> > > > >
> > > > > <JLH>
> > > > > There are different ways that one can interpret this
> "persistent"
> > > rule. The
> > > > > intent was that names shouldn't change over time when
> *identifying
> > the
> > > same
> > > > > object*.   What that means is that if the object changes (in any
> > > > > discernable way), then the name should change.  So, the object
> can
> > > move to
> > > > > a different piece of hardware, but it can still be named the
> same
> > way.
> > >  If
> > > > > the object changes, e.g., in this case, reconfigures as a
> different
> > > set of
> > > > > network portals with different addressing elements, then I would
>
> > think
> > > that
> > > > > the name should change as well.   That's all the persistence one
> > > really
> > > > > needs.
> > > > >
> > > > > I'm not sure what that implies about your recommendation.  I
> don't
> > see
> > > any
> > > > > problem with it, either.
> > > > > </JLH>
> > > >
> > > > I think we may be in agreement. (See reasoning above).
> > > >
> > > >
> > > > >
> > > > > The rationale for (2) is :
> > > > > --------------------------
> > > > > Consider an initiator node establishing multiple sessions to a
> scsi
> > > tgt
> > > > > port, with each session established to a subset of the network
> > portals
> > > > > within the tgt portal group.
> > > > >
> > > > > Consider an iscsi transport event involving the re-configuration
> of
> > > > > target portal groups on the iscsi target node. This may be
> preceeded
> > > by
> > > > > the iscsi sessions seeing an async message "target requests
> logout",
> > > > > followed by session logout, portal group re-configuration, and
> then,
> > > the
> > > > > initiator re-establishes sessions.
> > > > >
> > > > > Across a transport event that results in such session
> termination
> > and
> > > > > re-establishment, the initiator needs to authenticate that it is
>
> > still
> > > > > speaking to the same [i]scsi target port, in order to ensure
> that
> > any
> > > > > open/active I-T-L nexus traffic on that session is not
> incorrectly
> > > > > routed to a wrong LUN after such a transport event.
> > > >
> > > > > <JLH>
> > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> have
> > > been
> > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> issue
> > at
> > > all.
> > > >
> > > > On a session logout & re-login, it is not efficient/necessary to
> close
> > > > and re-open each LUN behind that target port, due to the fact that
> a
> > > > target port may have hundred's of LUNs behind it.
> > > >
> > > > All outstanding I/Os need to be aborted. Once the session is
> > > > re-established [and the target port is authenticated to be the
> same],
> > > > further I/O traffic can be resumed without requiring the SCSI ULP
> to
> > > > close and re-open each LUN. Some transport specific clearing
> effects
> > may
> > > > have occurred, which may require additional LUN level activity, in
>
> > some
> > > > cases.
> > > >
> > > > (There are analogies to the above model in FCP & SRP, which
> > authenticate
> > > > port name/identifier on login, allowing I/O resumption after
> session
> > > > termination and re-establishment.)
> > > >
> > > >
> > > > > To prevent such authentication issues, iscsi can send the iscsi
> > target
> > > > > port identifier (portal group tag) explicitly in the login
> request,
> > > and
> > > > > the login can be rejected by the target on a portal group tag
> > > mis-match.
> > > > > (if the network portal does not belong to the addressed portal
> group
> > > > > tag).
> > > > > <JLH>
> > > > > Did you mean for the initiator to send this TPGT?
> > > > > </JLH>
> > > >
> > > > Yes. The initiator login request must include the target portal
> group
> > > > tag, thus identifying the target port to which a session is being
> > > > established.
> > > >
> > > > Login currently carries no addressing information, since the
> > addressing
> > > > is implicit, based on the TCP connection in use. The problem with
> this
> > > > approach is that the login implicitly addresses a network portal,
> and
> > > > not the target port. As seen in the earlier example, the
> association
> > of
> > > > network portal <-> target port can change, and such changes can be
> > > > detected, if the initiator were to explicitly identify the target
> port
> > > > being logged into.
> > > >
> > > > --
> > > > ##################################
> > > > Santosh Rao
> > > > Software Design Engineer,
> > > > HP-UX iSCSI Driver Team,
> > > > Hewlett Packard, Cupertino.
> > > > email : santoshr@cup.hp.com
> > > > Phone : 408-447-3751
> > > > ##################################
> > > > *
> > > > * For T10 Reflector information, send a message with
> > > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > > >
> > >
> > >
> > >
> >
> >
> >
> >
> *
> * For T10 Reflector information, send a message with
> * 'info t10' (no quotes) in the message body to majordomo@t10.org
>
>



From owner-ips@ece.cmu.edu  Tue Mar 12 15:12:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05022
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 15:12:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJoxW00072
	for ips-outgoing; Tue, 12 Mar 2002 14:50:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CJosH00064
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:50:55 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CJoi012703
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 14:50:44 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CJoiK12694;
	Tue, 12 Mar 2002 14:50:44 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2CJoi022221;
	Tue, 12 Mar 2002 14:50:44 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15502.23572.43046.327343@pkoning.dev.equallogic.com>
Date: Tue, 12 Mar 2002 14:50:44 -0500
From: Paul Koning <ni1d@arrl.net>
To: santoshr@cup.hp.com
Cc: ips@ece.cmu.edu, t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <3C8032CE.8BACF77C@cup.hp.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Apologies for the late followup, but this discussion has me puzzled.

Part of the concern appears to be around the worry that an initiator
might reconnect to "the wrong" port and as a result end up talking to
the wrong LU when it issues additional commands to a LUN it knows.

I don't understand how that's possible.  SAM-2 section 4.7.3 shows
that an LU is a component of a Device (not of a Port).  And 4.8 says
that a LUN "identifies the logical unit within a SCSI target device".

In other words, no matter what port you use to access a device, a
given LUN identifies the same LU in that device.

As for the rule in SAM-2 section 4.7.7 that a "port name shall never
change" and the conclusion that therefore a TPGT must be persistent, I
would ask "across what scope?" and "how would you tell"?

If I have an iSCSI device that at time T has a port named X, and at
time T+1 has a port named Y, how would I test whether the proposed
requirement has been implemented?  I think the answer is: if you can
see state you created, such as reservation state, but it's now
attached to a different port name, then that requirement has been
violated.  Conversely, whenever a target port has no state it needs to
remember (no reservations, no initiator-specific mode pages (iSCSI
section 2.4.3.1)) then it can disappear and a new target port can
appear in its place -- or equivalently, the port can simply change
its name, you can't tell the difference.

I guess what I'm getting at is this: a requirement for something to be
persistent has meaning only if there's state attached to that
persistent thing, state that you can observe.  What exactly is that
state and long must it be kept?  iSCSI 2.4.3.1 lists some (but it says
"e.g." so there might be other state?).  Without a complete list of
that state it's hard to figure out what the correct rule should be.

       paul



From owner-ips@ece.cmu.edu  Tue Mar 12 15:14:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05104
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 15:14:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CJeTI29138
	for ips-outgoing; Tue, 12 Mar 2002 14:40:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CJeQH29132;
	Tue, 12 Mar 2002 14:40:26 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id UAA22788;
	Tue, 12 Mar 2002 20:40:19 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2CJgCo58776;
	Tue, 12 Mar 2002 20:42:12 +0100
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: ips@ece.cmu.edu, Paul Koning <ni1d@arrl.net>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF7F4AB404.5F2588E1-ONC2256B7A.006B6BF8@telaviv.ibm.com>
Date: Tue, 12 Mar 2002 21:42:24 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.8 |June 18, 2001) at
 12/03/2002 21:42:28,
	Serialize complete at 12/03/2002 21:42:28
Content-Type: multipart/alternative; boundary="=_alternative 006B8D5BC2256B7A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 006B8D5BC2256B7A_=
Content-Type: text/plain; charset="us-ascii"

Luben has a good point about range notation. Julo




John Hufferd/San Jose/IBM@IBMUS
Sent by: owner-ips@ece.cmu.edu
12-03-02 20:37
Please respond to John Hufferd

 
        To:     Paul Koning <ni1d@arrl.net>
        cc:     ips@ece.cmu.edu
        Subject:        Re: iSCSI: Text/Operational keys: booleans and ranges

 


I agree with Paul, leave good enough alone for now.  We are trying to get
to last call, and changes which not absolutely needed are causing time to
elapse which is not worth the change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Paul Koning <ni1d@arrl.net>@ece.cmu.edu on 03/12/2002 09:13:06 AM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    Re: iSCSI: Text/Operational keys: booleans and ranges



>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:

 Luben> 1. Is it possible to make all Boolean Text/Operational keys's
 Luben> value range be ``0'' and ``1'', rather than the current
 Luben> ``Yes'', ``No''.

 Luben> Since those are _Boolean_ values, what will be the objection
 Luben> to this?

 Luben> A user interface will probably display ``Yes'' and ``No'', but
 Luben> in the protocol, why burden implementations with string
 Luben> comparison, case-sensitive on top of this, rather than use
 Luben> strtol(), this making content check easier (strtol() will
 Luben> detect range errors, e.g. ``OFMarker=hello'').

That's a reasonable enough proposal, but I'm not convinced it's worth
changing at this time.

 Luben> 2. Why not make integer ranges, like OFMarkInt, use dash,
 Luben> ``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in
 Luben> the interval.

Same comment -- a bit less strongly since this is a last minute
addition.  A dash, or a colon, would be ok.  (Double colon?  No
thanks.)

 Luben> The reason is that in the future there may be a
 Luben> text/operational key which can take only a set of distinct
 Luben> integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That
 Luben> is ``SomeBit'' is still an integer variable but in negotiation
 Luben> it can choose between certain disctinct values. Furthermore
 Luben> the standard text/operational code which many of you already
 Luben> have written will work in this situation, only add
 Luben> atoi()/strtol() at the end...

I'm assuming you're not proposing the addition of "sets of distinct
values" as a negotiation option in V1, right?

It's time to stop making changes, even small changes, and freeze the
spec.  If it's not broken, let it stand.

 paul







--=_alternative 006B8D5BC2256B7A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Luben has a good point about range notation. Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>John Hufferd/San Jose/IBM@IBMUS</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">12-03-02 20:37</font>
<br><font size=1 face="sans-serif">Please respond to John Hufferd</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Paul Koning &lt;ni1d@arrl.net&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: Text/Operational keys: booleans and ranges</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
I agree with Paul, leave good enough alone for now. &nbsp;We are trying to get<br>
to last call, and changes which not absolutely needed are causing time to<br>
elapse which is not worth the change.<br>
<br>
.<br>
.<br>
.<br>
John L. Hufferd<br>
Senior Technical Staff Member (STSM)<br>
IBM/SSG San Jose Ca<br>
Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
Home Office (408) 997-6136, Cell: (408) 499-9702<br>
Internet address: hufferd@us.ibm.com<br>
<br>
<br>
Paul Koning &lt;ni1d@arrl.net&gt;@ece.cmu.edu on 03/12/2002 09:13:06 AM<br>
<br>
Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
<br>
<br>
To: &nbsp; &nbsp;ips@ece.cmu.edu<br>
cc:<br>
Subject: &nbsp; &nbsp;Re: iSCSI: Text/Operational keys: booleans and ranges<br>
<br>
<br>
<br>
&gt;&gt;&gt;&gt;&gt; &quot;Luben&quot; == Luben Tuikov &lt;luben@splentec.com&gt; writes:<br>
<br>
 Luben&gt; 1. Is it possible to make all Boolean Text/Operational keys's<br>
 Luben&gt; value range be ``0'' and ``1'', rather than the current<br>
 Luben&gt; ``Yes'', ``No''.<br>
<br>
 Luben&gt; Since those are _Boolean_ values, what will be the objection<br>
 Luben&gt; to this?<br>
<br>
 Luben&gt; A user interface will probably display ``Yes'' and ``No'', but<br>
 Luben&gt; in the protocol, why burden implementations with string<br>
 Luben&gt; comparison, case-sensitive on top of this, rather than use<br>
 Luben&gt; strtol(), this making content check easier (strtol() will<br>
 Luben&gt; detect range errors, e.g. ``OFMarker=hello'').<br>
<br>
That's a reasonable enough proposal, but I'm not convinced it's worth<br>
changing at this time.<br>
<br>
 Luben&gt; 2. Why not make integer ranges, like OFMarkInt, use dash,<br>
 Luben&gt; ``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in<br>
 Luben&gt; the interval.<br>
<br>
Same comment -- a bit less strongly since this is a last minute<br>
addition. &nbsp;A dash, or a colon, would be ok. &nbsp;(Double colon? &nbsp;No<br>
thanks.)<br>
<br>
 Luben&gt; The reason is that in the future there may be a<br>
 Luben&gt; text/operational key which can take only a set of distinct<br>
 Luben&gt; integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That<br>
 Luben&gt; is ``SomeBit'' is still an integer variable but in negotiation<br>
 Luben&gt; it can choose between certain disctinct values. Furthermore<br>
 Luben&gt; the standard text/operational code which many of you already<br>
 Luben&gt; have written will work in this situation, only add<br>
 Luben&gt; atoi()/strtol() at the end...<br>
<br>
I'm assuming you're not proposing the addition of &quot;sets of distinct<br>
values&quot; as a negotiation option in V1, right?<br>
<br>
It's time to stop making changes, even small changes, and freeze the<br>
spec. &nbsp;If it's not broken, let it stand.<br>
<br>
 paul<br>
<br>
<br>
<br>
<br>
</font>
<br>
<br>
--=_alternative 006B8D5BC2256B7A_=--


From owner-ips@ece.cmu.edu  Tue Mar 12 17:20:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10255
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 17:20:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CLh9R09841
	for ips-outgoing; Tue, 12 Mar 2002 16:43:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web13709.mail.yahoo.com (web13709.mail.yahoo.com [216.136.175.251])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CLh5H09831
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:43:06 -0500 (EST)
Message-ID: <20020312214303.8330.qmail@web13709.mail.yahoo.com>
Received: from [192.52.58.4] by web13709.mail.yahoo.com via HTTP; Tue, 12 Mar 2002 13:43:03 PST
Date: Tue, 12 Mar 2002 13:43:03 -0800 (PST)
From: Martins Krikis <mkrikis@yahoo.com>
Subject: CmdSN, StatSN initial value?
To: ips@ece.cmu.edu
In-Reply-To: <15502.23572.43046.327343@pkoning.dev.equallogic.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear list members,

This must be a stupid question, but I can't find the
intial values of CmdSN and StatSN specified in
draft 11. I only see a requirement to start DataSN
at 0.

Are CmdSN and StatSN also supposed to start with 0,
or is the starting value completely arbitrary?

(I followed an old discussion about CmdSN, but this
issue is still unclear to me.)

Any help is much appreciated.

  Martins Krikis, Intel Corp.


__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/


From owner-ips@ece.cmu.edu  Tue Mar 12 17:20:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10276
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 17:20:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CLbEH09288
	for ips-outgoing; Tue, 12 Mar 2002 16:37:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web13707.mail.yahoo.com (web13707.mail.yahoo.com [216.136.175.140])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CLbAH09284
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:37:11 -0500 (EST)
Message-ID: <20020312213708.6787.qmail@web13707.mail.yahoo.com>
Received: from [192.52.58.4] by web13707.mail.yahoo.com via HTTP; Tue, 12 Mar 2002 13:37:08 PST
Date: Tue, 12 Mar 2002 13:37:08 -0800 (PST)
From: Martins Krikis <mkrikis@yahoo.com>
Subject: RE: iSCSI: Marker negotiation - draft 11
To: ips@ece.cmu.edu
In-Reply-To: <3C7122FAF06DD5118ED60050047336482631D8@esply01.cnt.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--- Michael Schoberg <michael_schoberg@cnt.com> wrote:
> [(MI +  8) * n - 8] 
> 
> This is the formula in the draft.  I'm just
> wondering how a 2048 byte
> interval results in a marker at location 1032. 
> Using the above formula for
> n = 0 .. X:
> 
> n = 0, 		-8
> n = 1,		512
> n = 2, 		1032
> n = 3,		1552
> ...
> 
> That doesn't look like a 2048 byte interval to me. 
> Perhaps someone could
> explain the math. 

It clearly says in the 3rd paragraph of A.2: "As an
example, if the marker interval is 512...". So
there is no need to mention 2048 when discussing
this _example_. That's all it is.

Oh, I think I get where the confusion is coming
from...
Bytes vs. words, right? Well, I understand that the
intervals are discussed in bytes, MI is in bytes.
However, negotiation is in 4-byte words. I.e.,
sending IFMarkInt = 512 results in MI for T to I
direction being 2048.


> You may want to describe the formula a little
> clearer:
> 
> 	Start of marker (byte location) = ((MI + 8) * n) -
> 8 
> 
> 	[n] is an incrementing integer describing the n'th 
> 	  marker inserted into the TCP output stream.  n >
> 0
> 	[MI] is the negotiated marker interval value in
> bytes.

I'm afraid it didn't become clearer. I like what's
in draft 11. The problem with your "definition" of n 
is that it makes it look like the number of the
marker,
which it is not, unless the login consumed MI bytes
or less.

Adding "in bytes" to MI might clarify things just a
bit, however, and I don't oppose it.

> Where does this come from?
> 
> 	"512+8+512=1032 (-1 since it starts at 0) = 1031" 
> 
> What formula are you using?

The same one, n = 2, MI = 512.


> (BTW: Why was the above naming chosen over:
ITMarker, 
> TIMarker, ITMarkInt, TIMarkInt.  
> OF & IF prefixes don't seem intuitively
> perspective-obvious.)
 
Most everything in iSCSI is defined w.r.t. the
initiator. "Out" and "In" is used for Data PDUs
and other things. Now the same philosophy is aplied
to markers as well. It doesn't much matter what the
names are as long as they describe the direction
by themselves. I'm happy.


> Instead of offering a range (which seems kind of 
> unnecessary), how about offering only the value the 
> entity wishes to receive?  Example:

You may already do that. Offering a range is more
general. I assume there must have been a reason 
for introducing ranges. Replacing comma by : or -
would be nice, however.

> The draft says "Default is 2048", how does that get 
> negotiated?
> 
> I: OFMarker=yes | IFMarker=yes
> T: OFMarker=yes | IFMarker=yes

Correct, IMHO.

 
> Will the above negotiate the default 
> OF & IF Marker Intervals?
 
I think so. 8192 _bytes_.

> Also, section 9.10.4 does not explicitly say that 
> only a parameter negotiated by the initiator may be 
> returned in a target's response.  So would this be 
> possible?
> 
> I: OFMarker=yes | IFMarker=yes | OFMarkInt=1,512
> T: OFMarker=yes | IFMarker=yes | OFMarkInt=1 | 
>    IFMarkInt=1

Yes, but the way I understand it, it would require
a followup of:

I: IFMarkInt=1
T: (nothing)

  Martins Krikis, Intel Corp.


__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/


From owner-ips@ece.cmu.edu  Tue Mar 12 17:21:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10296
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 17:21:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CLVDf08796
	for ips-outgoing; Tue, 12 Mar 2002 16:31:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2CLV9H08781
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:31:09 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2CLUs201050
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:30:54 -0500
Message-ID: <3C8E739C.804B10D5@splentec.com>
Date: Tue, 12 Mar 2002 16:31:08 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <200203120007.g2C07dH32722@porter.almaden.ibm.com>
		<3C8E3E7E.E4A0F9CE@splentec.com> <15502.19986.233998.292778@pkoning.dev.equallogic.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul Koning wrote:
Paul Koning> 
Paul Koning> >>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:
Paul Koning>  Luben> How about ranges using the dash?
Paul Koning> 
Paul Koning>  Luben> True, one could _count_ the commas to fugure out if it is a
Paul Koning>  Luben> list (number of commas > 1) or a range (number of commas = 1),
Paul Koning>  Luben> but you have to add code to _count_ the commas.
Paul Koning> 
Paul Koning> That doesn't work, because sets can have two members.

Implied in my original post:

I was merely pointing this out _considering_ the variable
which is currently processed. (i.e. is it a range or integer or string
by it's nature)

E.g. OFMarkInt cf. MaxRecvPDULength cf. TargetName (resp.)!

By the way, it is also my point that it doesn't work quite so well,
and this is why I started this thread.

Paul Koning>  Luben> Using a dash for ranges, the list of numerical values is
Paul Koning>  Luben> handled by default by the already existing code in your
Paul Koning>  Luben> implementation to intesect two strings of comma separated
Paul Koning>  Luben> objects.
Paul Koning> 
Paul Koning> Not true.  Integers and strings are different data types.  Sets of
Paul Koning> strings are in the spec now, sets of integers are not.

Paul, what is the intersection of ``hello,world'' and ``hello''?
How about ``1,20'' and ``1''? Anyway this is not important.

Anyway, back to the main issue: Paul, you agree that using a
different than comma character to denote ranges of integers is
a good thing?

-- 
Luben

``Beauty [Perfection] is achieved not when there is nothing to add,
  but when there is nothing to take away.''
     Antoine de Saint-Exupery


From owner-ips@ece.cmu.edu  Tue Mar 12 18:34:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA12154
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 18:34:16 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CMinI15120
	for ips-outgoing; Tue, 12 Mar 2002 17:44:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CMiiH15113
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 17:44:45 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CMiZ014641
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 17:44:35 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2CMiZK14635
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 17:44:35 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2CMiZ231184
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 17:44:35 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15502.34002.956938.350467@pkoning.dev.equallogic.com>
Date: Tue, 12 Mar 2002 17:44:34 -0500
From: Paul Koning <ni1d@arrl.net>
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <200203120007.g2C07dH32722@porter.almaden.ibm.com>
	<3C8E3E7E.E4A0F9CE@splentec.com>
	<15502.19986.233998.292778@pkoning.dev.equallogic.com>
	<3C8E739C.804B10D5@splentec.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:

 Luben> Anyway, back to the main issue: Paul, you agree that using a
 Luben> different than comma character to denote ranges of integers is
 Luben> a good thing?

Yes, I think that's a reasonable thing to do.

     paul



From owner-ips@ece.cmu.edu  Tue Mar 12 19:23:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA13137
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 19:23:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2CNbCn19127
	for ips-outgoing; Tue, 12 Mar 2002 18:37:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web13701.mail.yahoo.com (web13701.mail.yahoo.com [216.136.175.134])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2CNb8H19120
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 18:37:09 -0500 (EST)
Message-ID: <20020312233705.58629.qmail@web13701.mail.yahoo.com>
Received: from [192.52.58.4] by web13701.mail.yahoo.com via HTTP; Tue, 12 Mar 2002 15:37:05 PST
Date: Tue, 12 Mar 2002 15:37:05 -0800 (PST)
From: Martins Krikis <mkrikis@yahoo.com>
Subject: ExpDataSN overload
To: ips@ece.cmu.edu
In-Reply-To: <15502.23572.43046.327343@pkoning.dev.equallogic.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear list members,

I've just noticed that ExpDataSN is used to denote
a lot of different things (all references w.r.t.
to draft 11):

1) the total number of Data-In PDUs that a target
   has sent to complete a SCSI (read-like) command
   (2.5.1.2, 9.4.7, 6.6, E.9.2);

2) next concecutive input DataSN number expected by
   the initiator for the referenced command in
previous
   execution, used in TASK REASSIGN
   (6.1.2, 9.5.4);

3) internal target variable used to track the next
   DataSN Expected from the initator or something
   like that
   (6.2).

Regarding use 1: this is the most widespread, and
there is nothing to object, except perhaps that the
name ExpDataSN doesn't convey the exact meaning---
"TotalDataPDUs" or "NumDataPDUs" or something like
that. Anyway, I can live with this.

Regarding use 2: the name conveys the meaning, but
I don't like the wording of this spot in 6.1.2:
"... for example taking advantage of ExpDataSN in 
the iSCSI command PDU for read commands...". The
problem is that "read commands" don't have ExpDataSN
in the PDU, it's the "Task Management Function
Request"
PDUs that do. Task Management Function Request PDUs
are, of course, "iSCSI command PDUs", but the whole
thing makes it too easy to make the mistake of
remembering (the ill-named) ExpDataSN field in 
SCSI Response PDU, at which point nothing makes sense
anymore, because that's the other meaning of
ExpDataSN.
I would appreciate if somebody could rephrase the
sentence. I'll even volunteer:

"In reassigning connection allegiance for a command,
the targets SHOULD continue the command from its
current state. For example, when reassigning read
commands, the targets SHOULD take advantage of the
ExpDataSN field provided by the Task Management
Function Request PDU (which must be set to zero
if there was no data transfer) and bring the command
to completion by sending (or resending) the status."

Regarding use 3: I don't understand this. The last
two sentences of 6.2 seem to be talking about
Data-Out PDUs, therefore uses 1 and 2 of ExpDataSN
(that are both Data-In PDU related) don't apply
here. I'm concluding that these sentences are 
making some (unwelcome) assumptions about target
implementation details (e.g., ExpDataSN in the role
of a variable used to track the DataSN of the next
Data-Out PDU that a target expects to receive for
this command). If so, I would like such assumptions
dropped and no MUSTs (and MAYs) imposed on a target
implementation. If I'm wrong, somebody please explain
to me what was meant here.

"Bonus" :-) problem:

While we're at 6.1.2, the start of the 3rd paragraph
also got me thinking and browsing the draft for 
quite a while. I don't like the "This is true even
when the CmdSN can be reliably ascertained..."
phrase. The problem is, I don't see how it could not
be reliably determined for rejected PDUs. My thinking
is that the only way to not be able to reliably
determine CmdSN is in the case of header digest
errors.
But in this case, the PDU must be silently dropped,
and not be answered with a Reject PDU. Am I wrong
somewhere? If not, can we change the sentence I
mentioned to something that explains that for rejected
PDUs, the target will necessarily have a good CmdSN,
but still must not use it"? 

Help on these issues will be much appreciated.

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine only and
            may not reflect those of my employer.





__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/


From owner-ips@ece.cmu.edu  Tue Mar 12 19:24:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA13149
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 19:24:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D00qB20882
	for ips-outgoing; Tue, 12 Mar 2002 19:00:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail03.ztx.compaq.com (ztxmail03.ztx.compaq.com [161.114.1.207])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D00lH20874
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:00:51 -0500 (EST)
Received: from cceexg11.americas.cpqcorp.net (cceexg11.americas.cpqcorp.net [16.110.250.125])
	by ztxmail03.ztx.compaq.com (Postfix) with ESMTP
	id 407FD3E03; Tue, 12 Mar 2002 18:00:32 -0600 (CST)
Received: from cceexc18.americas.cpqcorp.net ([16.110.250.64]) by cceexg11.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Tue, 12 Mar 2002 18:00:31 -0600
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Subject: RE: CmdSN, StatSN initial value?
Date: Tue, 12 Mar 2002 18:00:31 -0600
Message-ID: <31891B757C09184BBFEC5275F85D5595104E4F@cceexc18.americas.cpqcorp.net>
Thread-Topic: CmdSN, StatSN initial value?
Thread-Index: AcHKD0TdNzEZywKuRS+AfA7+bO21jgADwQpg
From: "Martin, Nick" <Nick.Martin@compaq.com>
To: "Martins Krikis" <mkrikis@yahoo.com>
Cc: <ips@ece.cmu.edu>
X-OriginalArrivalTime: 13 Mar 2002 00:00:31.0979 (UTC) FILETIME=[17C85BB0:01C1CA22]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2D00pH20876
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Martins,

The initial CmdSN to be used in a session is selected by the initiator
and transmitted in the first login PDU of the first connection.

The initial StatSN is selected by the target and transmitted in the
login response PDU for the initial login request of the connection.

The starting number for each is arbitrary.  Zero is not an unusual
choice.  The recipient of the PDU is required to extract the value and
begin using it.  There is no validation of the contents on an initial
login.

Note that CmdSN is session wide, while StatSN is per connection.

These are described in the Login Request and Login Response sections at
9.12.8 and 9.13.4 in draft 11.

Thanks,
Nick

-- You'll have to work hard to ask more "stupid questions" than I do.

> -----Original Message-----
> From: Martins Krikis [mailto:mkrikis@yahoo.com]
> Sent: Tuesday, March 12, 2002 3:43 PM
> To: ips@ece.cmu.edu
> Subject: CmdSN, StatSN initial value?
> 
> 
> Dear list members,
> 
> This must be a stupid question, but I can't find the
> intial values of CmdSN and StatSN specified in
> draft 11. I only see a requirement to start DataSN
> at 0.
> 
> Are CmdSN and StatSN also supposed to start with 0,
> or is the starting value completely arbitrary?
> 
> (I followed an old discussion about CmdSN, but this
> issue is still unclear to me.)
> 
> Any help is much appreciated.
> 
>   Martins Krikis, Intel Corp.
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Try FREE Yahoo! Mail - the world's greatest free email!
> http://mail.yahoo.com/
> 


From owner-ips@ece.cmu.edu  Tue Mar 12 19:32:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA13344
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 19:32:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D09gG21489
	for ips-outgoing; Tue, 12 Mar 2002 19:09:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel6.hp.com (atlrel6.hp.com [156.153.255.205])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D09fH21485
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:09:41 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel6.hp.com (Postfix) with ESMTP
	id 1B658469; Tue, 12 Mar 2002 19:09:35 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id QAA29724; Tue, 12 Mar 2002 16:11:16 -0800 (PST)
Message-ID: <00d201c1ca23$5ac7bc70$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <OF4591A8D0.92070A01-ON88256B7A.006898D3@boulder.ibm.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Tue, 12 Mar 2002 16:09:33 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John,

> I do not see the absolute requirement for this TPGT in the Login.  

That was my initial inclination as well, but now I believe there's value
in adding the TPGT to the Login Request PDU.

> it would be approprate to say that if the time for the Reconnect has been
> more then the "...Time2Wait" that the Initiator, if it cares about the

If I understand you correctly, you are suggesting that the DefaultTimeWait
value negotiated *for a session* should be used for decisions after the 
end of that session.  I am afraid that it's a slippery slope...

OTOH, regardless of the proposed change, it would be reasonable to add text 
that generally expresses this idea of potential volatility of portal<->portal group 
association in the iSCSI (or perhaps NDT) draft.

On to reasons that convinced me....

- An iSCSI session is an I_T nexus, and it is between an initiator *port*
   and a target *port*.  Login as a mechanism to instantiate/add to an
   iSCSI session should identify the target port in question, not just the 
   target node.  The initiator port is currently identified in the Login dialogue 
  (the InitiatorName text key and the ISID field), but not the target port.

- When there has been a portal group change for an IP address (portal) -
   meaning its TPGT had changed - it would be much more quicker to 
   identify the fact and prevent an I_T nexus establishment by way of 
   the TPGT in Login Request PDU.  The other option of having each 
   LU assert its UA (REPORTED LUNS DATA HAS CHANGED) on 
    the first command is prone to errors (see next bullet), and simply ineffcient.

- A target cold reset or a powercycle (possibly done after the portal group 
   reconfiguration) would clear the aforementioned UA (but would assert
   a different UA for the power-on reset, but this generic UA gives no 
   clue to initiators on the need to re-discover the target ports).

- At the moment, it is unclear to me if SPC-3 is mandating an "interlocked"
   style UA for the REPORTED LUNS DATA HAS CHANGED condition
   (though it seems like it... I will raise it only on t10 reflector under a different 
    cover).  If that isn't the case, the UA interlock capability (T10/00-359) would 
    need to deployed as well to realibly deal with this portal group reconfiguration.
  
> That would address the issue with out any protocol changes.

It is certainly a PDU change, but one can argue (successfully, I think) that 
it is not a "protocol" change per se -  since the implicit usage of TPGT so far
(see my message to Julian earlier on this thread) is merely being turned into 
an explicit usage.

To summarize, I realize the sensitivity of changes this late but I believe there 
are reasonable grounds here.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 12, 2002 11:07 AM
Subject: Re: iscsi : changes involving tgt portal group tag.


> 
> Mallikarjun,
> I do not see the absolute requirement for this TPGT in the Login.  I think
> it would be approprate to say that if the time for the Reconnect has been
> more then the "...Time2Wait" that the Initiator, if it cares about the
> TPGT,  SHOULD perform a rediscovery.
> 
> That would address the issue with out any protocol changes.
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Mallikarjun C." <cbm@rose.hp.com>@ece.cmu.edu on 03/12/2002 10:30:29 AM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
> 
> 
> 
> Shailesh,
> 
> The failure resulting out of a TPGT mismatch (assuming we have the TPGT in
> the Login Request PDU), would have to trigger a discovery
> (SendTargets/SLP/...)
> updating the initiator of the latest configuration.  This discovery process
> is
> similar
> to the FCP ADISC process you refer to.
> 
> Alternatively, if there has been a change in the LU view of  a given target
> portal
> group tag (meaning that the TPGT would match correctly), the LUs in the
> view
> should have established UA with an ASC of REPORTED LUNS DATA HAS
> CHANGED since the SCSI port association has changed for the LUs.  This
> again
> should trigger a discovery process from the initiator.
> 
> It seems to be that we are now sufficiently covered either way.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> cbm@rose.hp.com
> 
> 
> ----- Original Message -----
> From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
> <Julian_Satran@il.ibm.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Monday, March 11, 2002 7:51 PM
> Subject: RE: iscsi : changes involving tgt portal group tag.
> 
> 
> > Hi,
> >
> > On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> > discovery followed by SCSI Inquiry and Report_LUNS which would make the
> > Initiator aware of this change? Can the  Async message - iscsi Event
> > Data notify the Initiator of the change, which would force an discovery.
> > This would be similar to an ADISC for FCP. Because including the TPGT in
> > the login would prevent inadvertent logins but would still not notify
> > the initiator of the changed configuration?
> >
> > Thanks,
> > Shailesh.
> > Aarohi Communications.
> > -----Original Message-----
> > From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> > Mallikarjun C.
> > Sent: Wednesday, March 06, 2002 10:17 AM
> > To: Julian Satran
> > Cc: ips@ece.cmu.edu; t10@t10.org
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * "Mallikarjun C." <cbm@rose.hp.com>
> > *
> > > The issue is that I am not sure that a target is checking today
> > anything -
> > > (adapter drivers may check oif in their realm they can give out a
> > TSID).
> > > Nothing else is needed.
> >
> > Target is required to derive the TPGT and use it in both cases of Login
> > -
> >      a) when TSID = 0, to ascertain if a session reinstatement needs to
> >          be effected for that TPGT.
> >      b) when TSID != 0, to ascertain the validity of TSID and add in
> >           the new connection to an existing session if it is valid for
> > that TPGT.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > Sent: Tuesday, March 05, 2002 11:56 PM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > The issue is that I am not sure that a target is checking today
> > anything -
> > > (adapter drivers may check oif in their realm they can give out a
> > TSID).
> > > Nothing else is needed. Does SCSI have to be aware of it? Perhaps but
> > > iSCSI certainly not. Does a "front-end" have to be - again probably
> > not
> > > the name identifies the node.
> > >
> > > Julo
> > >
> > >
> > >
> > >
> > > "Mallikarjun C." <cbm@rose.hp.com>
> > > 05-03-02 22:34
> > > Please respond to "Mallikarjun C."
> > >
> > >
> > >         To:     Julian Satran/Haifa/IBM@IBMIL
> > >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> > >         Subject:        Re: iscsi : changes involving tgt portal group
> > tag.
> > >
> > >
> > >
> > > Julian,
> > >
> > > Whatever methods a target is expected to use today to derive the
> > implicit
> > > TPGT to preclude a duplicate I-T nexus would work after the change as
> > > well,
> > > except the derived value needs to be compared against the (proposed)
> > > TPGT in the Login Request payload.
> > >
> > > Please comment if we're missing something.
> > >
> > > Regards.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > > <santoshr@cup.hp.com>;
> > > <t10@t10.org>
> > > Sent: Monday, March 04, 2002 10:24 PM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > Has a decent target implementation and easy way of checking that the
> > TPG
> > > > is correct?
> > > >
> > > > Julo
> > > >
> > > >
> > > >
> > > >
> > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > Sent by: owner-ips@ece.cmu.edu
> > > > 05-03-02 01:12
> > > > Please respond to "Mallikarjun C."
> > > >
> > > >
> > > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> > <ips@ece.cmu.edu>
> > > >         cc:     <t10@t10.org>
> > > >         Subject:        Re: iscsi : changes involving tgt portal
> > group
> > > tag.
> > > >
> > > >
> > > >
> > > > Santosh and Jim,
> > > >
> > > > It appears a good idea to add in the portal group tag in the Login
> > > > Request header for a sanity check by the receiving target portal.
> > > >
> > > > I generally agree with Jim's comments that the duration of
> > persistence
> > > > of a portal group tag is intricately linked to the extent of portal
> > > > reconfiguration.
> > > > Not every target reconfiguration may result in a portal group tag
> > > > reassignment.
> > > > OTOH, some reconfigurations may be so extensive as to cause even a
> > node
> > > > name change.
> > > >
> > > > Some comments on Santosh's message -
> > > >
> > > > > "If a portal group is re-configured such that all its previously
> > > > > advertised network portals are no longer a part of the portal
> > group,
> > > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > > *MUST* be changed to indicate a new target port."
> > > >
> > > > I am not sure this solves the problem you're trying to get at.  If
> > none
> > > of
> > > > the earlier IP addresses can get an initiator to the SCSI target
> > port
> > > that
> > > > it
> > > > knew of (your scenario), it appears to me that it doesn't matter if
> > the
> > > > portal group tags are changed or not....A new discovery process
> > should
> > > > update the initiator of the changed portal addresses.
> > > >
> > > > I suggest the following text -
> > > >
> > > >    After a portal group reconfiguration which changed the view of
> > LUs
> > > >    for an initiator with a given set of privileges, the target MUST
> > > change
> > > >    the portal group tag that represents the reconfigured target
> > portal
> > > > group.
> > > >
> > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > have
> > > > been
> > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > issue
> > > at
> > > > all.
> > > > >
> > > > > On a session logout & re-login, it is not efficient/necessary to
> > close
> > > > > and re-open each LUN behind that target port, due to the fact that
> > a
> > > > > target port may have hundred's of LUNs behind it.
> > > >
> > > > I agree with Jim on this one - there should be *no* open/active
> > I_T_L
> > > > nexus
> > > > traffic after a reconfiguration, targets can enforce this via simple
> >
> > > iSCSI
> > > > means
> > > > (reject initiator advances to continue the session for
> > DefaultTime2Wait+
> > > > DefaultTime2Retain seconds).  In fact, Async logout request requires
> > a
> > > > clean closure that implicitly aborts I/Os.
> > > >
> > > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > > interactions.  I agree that they wouldn't have to be repeated, but
> > care
> > > > must be taken to ensure that new I/Os (on the new session after
> > > > reconfiguration)
> > > > are not delivered to the incorrect LUs.  It seems that the addition
> > of
> > > > TPGT in the login header and the proposed new text (above) would
> > take
> > > > care of this.
> > > >
> > > > Regards.
> > > > --
> > > > Mallikarjun
> > > >
> > > > Mallikarjun Chadalapaka
> > > > Networked Storage Architecture
> > > > Network Storage Solutions Organization
> > > > Hewlett-Packard MS 5668
> > > > Roseville CA 95747
> > > >
> > > > ----- Original Message -----
> > > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > > To: <ips@ece.cmu.edu>
> > > > Cc: <t10@t10.org>
> > > > Sent: Monday, March 04, 2002 10:40 AM
> > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > >
> > > >
> > > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > > *
> > > > > Jim,
> > > > >
> > > > > I agree that a "complete re-configuration" of a target port can
> > result
> > > > > in a new port name & port identifier. However, the tricky part is
> > the
> > > > > definition of a "complete re-configuration of an iscsi target
> > port",
> > > due
> > > > > to the concepts of portal groups involving multiple network
> > portals.
> > > > >
> > > > > For example, if a portal group (aka, an iscsi target port) were to
> > be
> > > > > re-configured to include a new network portal [moved from another
> > > portal
> > > > > group], then, the target port itself has not changed, since it is
> > > still
> > > > > accessible through its previously used network portals. What has
> > > changed
> > > > > is the individual network portal that has moved from 1 target port
> > to
> > > > > another.
> > > > >
> > > > > Hence, it is sufficient, in this case, to maintain persistence of
> > the
> > > > > target port name/identifier, without requiring any change in port
> > > > > name/identifier. By requiring initiators to send the intended TPGT
> >
> > > (scsi
> > > > > target port name/identifier) along with the login request, this
> > allows
> > > > > the target port to detect that the network portal is being
> > accessed to
> > > > > connect to a different target port and it can reject the login.
> > > > >
> > > > > It may be helpful to call out the specific case when a port
> > > > > name/identifier MUST change. How about something like :
> > > > >
> > > > > "If a portal group is re-configured such that all its previously
> > > > > advertised network portals are no longer a part of the portal
> > group,
> > > > > then, the portal group tag (and thereby, the port name/identifier)
> > > > > *MUST* be changed to indicate a new target port."
> > > > >
> > > > > This would allow access to the target port through its un-altered
> > > > > network portals to continue un-disrupted. More comments inline, in
> > > > > response to some of your queries.
> > > > >
> > > > > Thanks,
> > > > > Santosh
> > > > >
> > > > > NOTE : In this discussion target port and target portal group are
> > used
> > > > > to imply the same entity, within a target node.
> > > > >
> > > > >
> > > > > Jim Hafner wrote:
> > > > >
> > > > > > SAM-2 requires scsi port names to be persistent and
> > > world-wide-unique.
> > > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > > >
> > > > > > "A scsi port name shall never change and may be used to
> > persistently
> > > > > > identify a scsi initiator port or target port...".
> > > > > >
> > > > > > <JLH>
> > > > > > There are different ways that one can interpret this
> > "persistent"
> > > > rule. The
> > > > > > intent was that names shouldn't change over time when
> > *identifying
> > > the
> > > > same
> > > > > > object*.   What that means is that if the object changes (in any
> > > > > > discernable way), then the name should change.  So, the object
> > can
> > > > move to
> > > > > > a different piece of hardware, but it can still be named the
> > same
> > > way.
> > > >  If
> > > > > > the object changes, e.g., in this case, reconfigures as a
> > different
> > > > set of
> > > > > > network portals with different addressing elements, then I would
> >
> > > think
> > > > that
> > > > > > the name should change as well.   That's all the persistence one
> > > > really
> > > > > > needs.
> > > > > >
> > > > > > I'm not sure what that implies about your recommendation.  I
> > don't
> > > see
> > > > any
> > > > > > problem with it, either.
> > > > > > </JLH>
> > > > >
> > > > > I think we may be in agreement. (See reasoning above).
> > > > >
> > > > >
> > > > > >
> > > > > > The rationale for (2) is :
> > > > > > --------------------------
> > > > > > Consider an initiator node establishing multiple sessions to a
> > scsi
> > > > tgt
> > > > > > port, with each session established to a subset of the network
> > > portals
> > > > > > within the tgt portal group.
> > > > > >
> > > > > > Consider an iscsi transport event involving the re-configuration
> > of
> > > > > > target portal groups on the iscsi target node. This may be
> > preceeded
> > > > by
> > > > > > the iscsi sessions seeing an async message "target requests
> > logout",
> > > > > > followed by session logout, portal group re-configuration, and
> > then,
> > > > the
> > > > > > initiator re-establishes sessions.
> > > > > >
> > > > > > Across a transport event that results in such session
> > termination
> > > and
> > > > > > re-establishment, the initiator needs to authenticate that it is
> >
> > > still
> > > > > > speaking to the same [i]scsi target port, in order to ensure
> > that
> > > any
> > > > > > open/active I-T-L nexus traffic on that session is not
> > incorrectly
> > > > > > routed to a wrong LUN after such a transport event.
> > > > >
> > > > > > <JLH>
> > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > have
> > > > been
> > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > issue
> > > at
> > > > all.
> > > > >
> > > > > On a session logout & re-login, it is not efficient/necessary to
> > close
> > > > > and re-open each LUN behind that target port, due to the fact that
> > a
> > > > > target port may have hundred's of LUNs behind it.
> > > > >
> > > > > All outstanding I/Os need to be aborted. Once the session is
> > > > > re-established [and the target port is authenticated to be the
> > same],
> > > > > further I/O traffic can be resumed without requiring the SCSI ULP
> > to
> > > > > close and re-open each LUN. Some transport specific clearing
> > effects
> > > may
> > > > > have occurred, which may require additional LUN level activity, in
> >
> > > some
> > > > > cases.
> > > > >
> > > > > (There are analogies to the above model in FCP & SRP, which
> > > authenticate
> > > > > port name/identifier on login, allowing I/O resumption after
> > session
> > > > > termination and re-establishment.)
> > > > >
> > > > >
> > > > > > To prevent such authentication issues, iscsi can send the iscsi
> > > target
> > > > > > port identifier (portal group tag) explicitly in the login
> > request,
> > > > and
> > > > > > the login can be rejected by the target on a portal group tag
> > > > mis-match.
> > > > > > (if the network portal does not belong to the addressed portal
> > group
> > > > > > tag).
> > > > > > <JLH>
> > > > > > Did you mean for the initiator to send this TPGT?
> > > > > > </JLH>
> > > > >
> > > > > Yes. The initiator login request must include the target portal
> > group
> > > > > tag, thus identifying the target port to which a session is being
> > > > > established.
> > > > >
> > > > > Login currently carries no addressing information, since the
> > > addressing
> > > > > is implicit, based on the TCP connection in use. The problem with
> > this
> > > > > approach is that the login implicitly addresses a network portal,
> > and
> > > > > not the target port. As seen in the earlier example, the
> > association
> > > of
> > > > > network portal <-> target port can change, and such changes can be
> > > > > detected, if the initiator were to explicitly identify the target
> > port
> > > > > being logged into.
> > > > >
> > > > > --
> > > > > ##################################
> > > > > Santosh Rao
> > > > > Software Design Engineer,
> > > > > HP-UX iSCSI Driver Team,
> > > > > Hewlett Packard, Cupertino.
> > > > > email : santoshr@cup.hp.com
> > > > > Phone : 408-447-3751
> > > > > ##################################
> > > > > *
> > > > > * For T10 Reflector information, send a message with
> > > > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > > > >
> > > >
> > > >
> > > >
> > >
> > >
> > >
> > >
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> >
> 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 12 19:36:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA13428
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 19:36:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D0D2g21771
	for ips-outgoing; Tue, 12 Mar 2002 19:13:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel7.hp.com (atlrel7.hp.com [156.153.255.213])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D0CsH21752
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:12:55 -0500 (EST)
Received: from xatlrelay2.atl.hp.com (xatlrelay2.atl.hp.com [15.45.89.191])
	by atlrel7.hp.com (Postfix) with ESMTP id 29A60805534
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:12:49 -0500 (EST)
Received: from xatlbh2.atl.hp.com (xatlbh2.atl.hp.com [15.45.89.187])
	by xatlrelay2.atl.hp.com (Postfix) with ESMTP id 241F84000A8
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:12:49 -0500 (EST)
Received: by xatlbh2.atl.hp.com with Internet Mail Service (5.5.2653.19)
	id <G4D4Z51M>; Tue, 12 Mar 2002 19:12:49 -0500
Message-ID: <6BD67FFB937FD411A04F00D0B74FE87805CCF45A@xrose06.rose.hp.com>
From: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>
To: IPS Reflector <ips@ece.cmu.edu>
Subject: RE: iscsi : changes involving tgt portal group tag.
Date: Tue, 12 Mar 2002 19:12:47 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CA23.CE538250"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CA23.CE538250
Content-Type: text/plain;
	charset="iso-8859-1"

Perhaps we should discuss this in Minneapolis.  I agree with Santosh, TPG
should be added to the login message to verify that this is the intended
target port.  I don't see how that is interpreted as "discovery territory",
since it's just the initiator explicitly identifying the intended target
port.  Currently a login contains initiator and target names, and initiator
port number (ISID), so adding target port number is consistent.  There's
still room in the login header, and this wouldn't break any current
implementations.  Why is this a problem?
 
Marjorie Krueger
Networked Storage Architecture
Networked Storage Solutions Org.
Hewlett-Packard
tel: +1 916 785 2656
fax: +1 916 785 0391
email: marjorie_krueger@hp.com 

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 12, 2002 11:42 AM
To: Santosh Rao
Cc: IPS Reflector; santoshr@hpcuhe.cup.hp.com
Subject: Re: iscsi : changes involving tgt portal group tag.



I did not hear compelling arguments for it and it drags us even more into
discovery teritory - Julo 



	Santosh Rao <santoshr@cup.hp.com> 
Sent by: santoshr@hpcuhe.cup.hp.com 


12-03-02 21:04 
Please respond to Santosh Rao 


        
        To:        Julian Satran/Haifa/IBM@IBMIL 
        cc:        IPS Reflector <ips@ece.cmu.edu> 
        Subject:        Re: iscsi : changes involving tgt portal group tag. 

       



What is the closure on this issue ? Will the Target Portal Group Tag be
a part of the login request ? 

- Santosh


> (assuming we have the TPGT in the Login Request PDU), 

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################





------_=_NextPart_001_01C1CA23.CE538250
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=473580500-13032002><FONT face="Courier New" color=#0000ff 
size=2>Perhaps we should discuss this in Minneapolis.&nbsp; I agree with 
Santosh, TPG should be added to the login message to verify that this is the 
intended target port.&nbsp; I don't see how that is interpreted as "discovery 
territory", since it's just the initiator explicitly identifying the intended 
target port.&nbsp; Currently a login contains initiator and target names, and 
initiator port number (ISID), so adding target port number is consistent.&nbsp; 
There's still room in the login header, and this wouldn't break any current 
implementations.&nbsp; Why is this a problem?</FONT></SPAN></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Marjorie Krueger<BR>Networked Storage 
Architecture<BR>Networked Storage Solutions Org.<BR>Hewlett-Packard<BR>tel: +1 
916 785 2656<BR>fax: +1 916 785 0391<BR>email: marjorie_krueger@hp.com 
</FONT></DIV>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Tuesday, March 12, 2002 
  11:42 AM<BR><B>To:</B> Santosh Rao<BR><B>Cc:</B> IPS Reflector; 
  santoshr@hpcuhe.cup.hp.com<BR><B>Subject:</B> Re: iscsi : changes involving 
  tgt portal group tag.<BR><BR></FONT></DIV><BR><FONT face=sans-serif size=2>I 
  did not hear compelling arguments for it and it drags us even more into 
  discovery teritory - Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Santosh Rao 
        &lt;santoshr@cup.hp.com&gt;</B></FONT> <BR><FONT face=sans-serif 
        size=1>Sent by: santoshr@hpcuhe.cup.hp.com</FONT> 
        <P><FONT face=sans-serif size=1>12-03-02 21:04</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Santosh Rao</FONT> <BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</FONT> <BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; 
        &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;</FONT> <BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; 
        &nbsp; &nbsp; &nbsp;Re: iscsi : changes involving tgt portal group 
        tag.</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; 
        &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" 
  size=2><BR>What is the closure on this issue ? Will the Target Portal Group 
  Tag be<BR>a part of the login request ? <BR><BR>- Santosh<BR><BR><BR>&gt; 
  (assuming we have the TPGT in the Login Request PDU), <BR><BR>-- 
  <BR>##################################<BR>Santosh Rao<BR>Software Design 
  Engineer,<BR>HP-UX iSCSI Driver Team,<BR>Hewlett Packard, Cupertino.<BR>email 
  : santoshr@cup.hp.com<BR>Phone : 
  408-447-3751<BR>##################################<BR></FONT><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CA23.CE538250--


From owner-ips@ece.cmu.edu  Tue Mar 12 20:32:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA14710
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 20:32:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D0iiO23736
	for ips-outgoing; Tue, 12 Mar 2002 19:44:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D0igH23724
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 19:44:42 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP id 60B8AC00381
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:44:36 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id QAA04887 for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 16:46:17 -0800 (PST)
Message-ID: <00e601c1ca28$3f68a610$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: <ips@ece.cmu.edu>
References: <OF7F4AB404.5F2588E1-ONC2256B7A.006B6BF8@telaviv.ibm.com>
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
Date: Tue, 12 Mar 2002 16:44:35 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Julian,

I agree with your proposal to denote ranges with ":".

Also, as somewhat of a digression, I think we need to say 
something about the legality (or lack there of) of a negotiation 
involving multiple ranges as in:

Key=a:b, c:d, e:f

My not-too-strong opinion is that it could be useful to allow this...
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: <ips@ece.cmu.edu>; "Paul Koning" <ni1d@arrl.net>; <owner-ips@ece.cmu.edu>
Sent: Tuesday, March 12, 2002 11:42 AM
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges


> Luben has a good point about range notation. Julo
> 
> 
> 
> 
> John Hufferd/San Jose/IBM@IBMUS
> Sent by: owner-ips@ece.cmu.edu
> 12-03-02 20:37
> Please respond to John Hufferd
> 
>  
>         To:     Paul Koning <ni1d@arrl.net>
>         cc:     ips@ece.cmu.edu
>         Subject:        Re: iSCSI: Text/Operational keys: booleans and ranges
> 
>  
> 
> 
> I agree with Paul, leave good enough alone for now.  We are trying to get
> to last call, and changes which not absolutely needed are causing time to
> elapse which is not worth the change.
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> Paul Koning <ni1d@arrl.net>@ece.cmu.edu on 03/12/2002 09:13:06 AM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    ips@ece.cmu.edu
> cc:
> Subject:    Re: iSCSI: Text/Operational keys: booleans and ranges
> 
> 
> 
> >>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:
> 
>  Luben> 1. Is it possible to make all Boolean Text/Operational keys's
>  Luben> value range be ``0'' and ``1'', rather than the current
>  Luben> ``Yes'', ``No''.
> 
>  Luben> Since those are _Boolean_ values, what will be the objection
>  Luben> to this?
> 
>  Luben> A user interface will probably display ``Yes'' and ``No'', but
>  Luben> in the protocol, why burden implementations with string
>  Luben> comparison, case-sensitive on top of this, rather than use
>  Luben> strtol(), this making content check easier (strtol() will
>  Luben> detect range errors, e.g. ``OFMarker=hello'').
> 
> That's a reasonable enough proposal, but I'm not convinced it's worth
> changing at this time.
> 
>  Luben> 2. Why not make integer ranges, like OFMarkInt, use dash,
>  Luben> ``-'' ASCII: 0x2d, like ``1-65535'', indicating all values in
>  Luben> the interval.
> 
> Same comment -- a bit less strongly since this is a last minute
> addition.  A dash, or a colon, would be ok.  (Double colon?  No
> thanks.)
> 
>  Luben> The reason is that in the future there may be a
>  Luben> text/operational key which can take only a set of distinct
>  Luben> integer values, but no range, e.g. ``SomeBit=0,4,8,16'', That
>  Luben> is ``SomeBit'' is still an integer variable but in negotiation
>  Luben> it can choose between certain disctinct values. Furthermore
>  Luben> the standard text/operational code which many of you already
>  Luben> have written will work in this situation, only add
>  Luben> atoi()/strtol() at the end...
> 
> I'm assuming you're not proposing the addition of "sets of distinct
> values" as a negotiation option in V1, right?
> 
> It's time to stop making changes, even small changes, and freeze the
> spec.  If it's not broken, let it stand.
> 
>  paul
> 
> 
> 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 12 22:52:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA18456
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 22:52:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D2j2A00902
	for ips-outgoing; Tue, 12 Mar 2002 21:45:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from smtp3.electric.net (smtp3.electric.net [216.129.90.16])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2D2j0H00897
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 21:45:00 -0500 (EST)
Received: (qmail 27689 invoked from network); 13 Mar 2002 02:44:44 -0000
Received: from zhora.electric.net (216.129.90.89)
  by virusqueue.electric.net with SMTP; 13 Mar 2002 02:44:44 -0000
Received: from osmtp3.electric.net ([216.129.90.30])
 by zhora.electric.net (NAVGW 2.5.1.19) with SMTP id M2002031218313818750
 ; Tue, 12 Mar 2002 18:31:38 -0800
Received: from [206.175.233.45] (helo=EGRodriguez)
	by osmtp3.electric.net with esmtp (Exim 3.22 #1)
	id 16kykq-000PJZ-04; Tue, 12 Mar 2002 18:44:41 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <ips@ece.cmu.edu>
Cc: "'David Black'" <Black_David@emc.com>
Subject: IPS-ALL: Last Call reminder: FC Frame Encapsulation, FCIP, iFCP
Date: Tue, 12 Mar 2002 20:43:16 -0600
Message-ID: <000d01c1ca38$d585a750$2de9afce@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000E_01C1CA06.8AEB3750"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_000E_01C1CA06.8AEB3750
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

Hi all,

 

A reminder about the three documents that are currently in WG last call.
- FC Frame Encapsulation, iFCP and FCIP

The deadline for comments is next Monday, March 18, at 8am EST.

 

To date, there has been very little in the form of editorial comments on
any of the three documents, and no activity on the reflector (technical
comments).

We encourage everyone to review the documents as soon as possible and
provide any comments on them.

 

Editorial comments may be resolved directly by the editor of the
document, but any technical issues must be discussed on the IPS
reflector.

 

Document information summary (from original last call announcements):

 

FC Encapsulation

----------------------

 

Document:  FC Frame Encapsulation

URL to TXT version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulation-06.tx
t

URL to PDF version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulation-06.pd
f

 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Ralph Weber - roweber@acm.org

 

Please submit editorial comments directly to Ralph, with copy to David
Black (black_david@emc.com), Elizabeth
Rodriguez(ElizabethRodriguez@ieee.org), Franco
Travostino(travos@nortelnetworks.com) and Murali
Rajagopal(muralir@cox.net)

Submit technical comments to the IPS mailing list (ips@ece.cmu.edu)

 

 

FCIP

------

Document:  Fibre Channel Over TCP/IP (FCIP).

URL to TXT version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.txt


URL to PDF version:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.pdf


 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Ralph Weber - roweber@acm.org

 

Please submit editorial comments directly to Ralph, with copy to David
Black (black_david@emc.com), Elizabeth
Rodriguez(ElizabethRodriguez@ieee.org)and Murali
Rajagopal(muralir@cox.net)

Submit technical comments to the IPS mailing list (ips@ece.cmu.edu)

 

 

iFCP:

------ 

Document:  iFCP - A Protocol for Internet Fibre Channel Storage
Networking

URL to TXT version:
<http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt>
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt         

URL to PDF version:
<http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf>
http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf      

 

Last call period: 2 Weeks

Submit comments no later than: Monday, March 18, 2002, 8am EST

 

Editor: Charles Monia - cmonia@nishansystems.com

 

Please submit editorial comments directly to Charles, with copy to David
Black ( <mailto:black_david@emc.com> black_david@emc.com), Elizabeth
Rodriguez( <mailto:ElizabethRodriguez@ieee.org>
ElizabethRodriguez@ieee.org) and Franco Travostino(
<mailto:travos@nortelnetworks.com> travos@nortelnetworks.com) Submit
technical comments to the IPS mailing list ( <mailto:ips@ece.cmu.edu>
ips@ece.cmu.edu)

 

 

Thanks,

 

Elizabeth Rodriguez & David Black

IPS co-chairs


------=_NextPart_000_000E_01C1CA06.8AEB3750
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi all,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>A reminder about the three documents that are =
currently in WG
last call. &#8211; FC Frame Encapsulation, iFCP and =
FCIP</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>The deadline for comments is next Monday, March 18, =
at </span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>8am EST.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>To date, there has been very little in the form of =
editorial
comments on any of the three documents, and no activity on the reflector
(technical comments).</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>We encourage everyone to review the documents as soon =
as
possible and provide any comments on them.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editorial comments may be resolved directly by the =
editor of
the document, but any technical issues must be discussed on the IPS =
reflector.</span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document information summary (from original last call
announcements):</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FC Encapsulation</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----------------------</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; FC Frame =
Encapsulation</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulatio=
n-06.txt">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulat=
ion-06.txt</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulatio=
n-06.pdf">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcencapsulat=
ion-06.pdf</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: </span></font><font =
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Monday, March 18,
 2002</span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>, </span></font><font size=3D2 face=3DArial><span
 style=3D'font-size:10.0pt;font-family:Arial'>8am EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Ralph Weber &#8211; <a =
href=3D"mailto:roweber@acm.org">roweber@acm.org</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Ralph, =
with
copy to David Black (<a =
href=3D"mailto:black_david@emc.com">black_david@emc.com</a>),
Elizabeth Rodriguez(<a =
href=3D"mailto:ElizabethRodriguez@ieee.org">ElizabethRodriguez@ieee.org</=
a>),
Franco Travostino(<a =
href=3D"mailto:travos@nortelnetworks.com">travos@nortelnetworks.com</a>)
and Murali Rajagopal(muralir@cox.net)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit technical comments to the IPS mailing list (<a
href=3D"mailto:ips@ece.cmu.edu">ips@ece.cmu.edu</a>)</span></font></p>

<div style=3D'border:none;border-bottom:solid windowtext =
1.0pt;padding:0in 0in 1.0pt 0in'>

<p class=3DMsoNormal style=3D'border:none;padding:0in'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FCIP</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>------</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; Fibre Channel Over TCP/IP =
(FCIP).</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <font color=3Dnavy><span =
style=3D'color:
navy'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09=
.txt">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.t=
xt</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <font color=3Dnavy><span =
style=3D'color:
navy'><a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09=
.pdf">http://www.ietf.org/internet-drafts/draft-ietf-ips-fcovertcpip-09.p=
df</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: </span></font><font =
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Monday, March 18,
 2002</span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>, </span></font><font size=3D2 face=3DArial><span
 style=3D'font-size:10.0pt;font-family:Arial'>8am EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Ralph Weber &#8211; <a =
href=3D"mailto:roweber@acm.org">roweber@acm.org</a></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Ralph, =
with
copy to David Black (<a =
href=3D"mailto:black_david@emc.com">black_david@emc.com</a>),
Elizabeth Rodriguez(<a =
href=3D"mailto:ElizabethRodriguez@ieee.org">ElizabethRodriguez@ieee.org</=
a>)and
Murali Rajagopal(muralir@cox.net)</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit technical comments to the IPS mailing list (<a
href=3D"mailto:ips@ece.cmu.edu">ips@ece.cmu.edu</a>)</span></font></p>

<div style=3D'border:none;border-bottom:solid windowtext =
1.0pt;padding:0in 0in 1.0pt 0in'>

<p class=3DMsoNormal style=3D'border:none;padding:0in'><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>&nbsp;</span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>iFCP:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>------&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Document:&nbsp; iFCP - A Protocol for Internet Fibre =
Channel
Storage Networking</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to TXT version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.txt"><=
font
color=3Dblack><span =
style=3D'color:windowtext'>http://www.ietf.org/internet-drafts/draft-ietf=
-ips-ifcp-10.txt</span></font></a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>URL to PDF version: <a
href=3D"http://www.ietf.org/internet-drafts/draft-ietf-ips-ifcp-10.pdf"><=
font
color=3Dblack><span =
style=3D'color:windowtext'>http://www.ietf.org/internet-drafts/draft-ietf=
-ips-ifcp-10.pdf</span></font></a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Last call period: 2 Weeks</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Submit comments no later than: </span></font><font =
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Monday, March 18,
 2002</span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>, </span></font><font size=3D2 face=3DArial><span
 style=3D'font-size:10.0pt;font-family:Arial'>8am EST</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Editor: Charles Monia &#8211; =
cmonia@nishansystems.com</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Please submit editorial comments directly to Charles, =
with
copy to David Black (<a href=3D"mailto:black_david@emc.com"><font =
color=3Dblack><span
style=3D'color:windowtext'>black_david@emc.com</span></font></a>), =
Elizabeth Rodriguez(<a
href=3D"mailto:ElizabethRodriguez@ieee.org"><font color=3Dblack><span
style=3D'color:windowtext'>ElizabethRodriguez@ieee.org</span></font></a>)=
 and
Franco Travostino(<a href=3D"mailto:travos@nortelnetworks.com"><font =
color=3Dblack><span
style=3D'color:windowtext'>travos@nortelnetworks.com</span></font></a>) =
Submit
technical comments to the IPS mailing list (<a =
href=3D"mailto:ips@ece.cmu.edu"><font
color=3Dblack><span =
style=3D'color:windowtext'>ips@ece.cmu.edu</span></font></a>)</span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Thanks,</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Elizabeth Rodriguez &amp; David =
Black</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>IPS co-chairs</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_000E_01C1CA06.8AEB3750--



From owner-ips@ece.cmu.edu  Tue Mar 12 23:30:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA19106
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 23:30:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D3XSF03767
	for ips-outgoing; Tue, 12 Mar 2002 22:33:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D3XNH03763
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 22:33:24 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id TAA06037;
	Tue, 12 Mar 2002 19:32:38 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>,
        "IPS Reflector" <ips@ece.cmu.edu>
Subject: RE: iscsi : changes involving tgt portal group tag.
Date: Wed, 13 Mar 2002 03:32:43 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMMEBGDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
In-Reply-To: <6BD67FFB937FD411A04F00D0B74FE87805CCF45A@xrose06.rose.hp.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


	We would also have to change SendTargets to mandate returning the
targetAddress, or specify a default TPG for use in the cases where
SendTargets returns no targetAddress.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
KRUEGER,MARJORIE (HP-Roseville,ex1)
Sent: Wednesday, March 13, 2002 12:13 AM
To: IPS Reflector
Subject: RE: iscsi : changes involving tgt portal group tag.


Perhaps we should discuss this in Minneapolis.  I agree with Santosh,
TPG should be added to the login message to verify that this is the
intended target port.  I don't see how that is interpreted as
"discovery territory", since it's just the initiator explicitly
identifying the intended target port.  Currently a login contains
initiator and target names, and initiator port number (ISID), so
adding target port number is consistent.  There's still room in the
login header, and this wouldn't break any current implementations.
Why is this a problem?

Marjorie Krueger
Networked Storage Architecture
Networked Storage Solutions Org.
Hewlett-Packard
tel: +1 916 785 2656
fax: +1 916 785 0391
email: marjorie_krueger@hp.com
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 12, 2002 11:42 AM
To: Santosh Rao
Cc: IPS Reflector; santoshr@hpcuhe.cup.hp.com
Subject: Re: iscsi : changes involving tgt portal group tag.



I did not hear compelling arguments for it and it drags us even more
into discovery teritory - Julo


Santosh Rao <santoshr@cup.hp.com>
Sent by: santoshr@hpcuhe.cup.hp.com
12-03-02 21:04
Please respond to Santosh Rao

        To:        Julian Satran/Haifa/IBM@IBMIL
        cc:        IPS Reflector <ips@ece.cmu.edu>
        Subject:        Re: iscsi : changes involving tgt portal group
tag.





What is the closure on this issue ? Will the Target Portal Group Tag
be
a part of the login request ?

- Santosh


> (assuming we have the TPGT in the Login Request PDU),

--
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################



From owner-ips@ece.cmu.edu  Tue Mar 12 23:58:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA19738
	for <ips-archive@odin.ietf.org>; Tue, 12 Mar 2002 23:58:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D4MTH06611
	for ips-outgoing; Tue, 12 Mar 2002 23:22:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.us.dg.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D4MRH06606
	for <ips@ece.cmu.edu>; Tue, 12 Mar 2002 23:22:27 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4H3JQS>; Tue, 12 Mar 2002 23:16:36 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375BE@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu, agenda@ietf.org
Subject: IP Storage (ips) DRAFT Minneapolis Agenda
Date: Tue, 12 Mar 2002 23:22:05 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

IETF IP Storage (IPS) Working Group
Minneapolis IETF Meeting, March 17-21, 2002
-------------------------------------------

CHAIRS:
	David L. Black <black_david@emc.com>
	Elizabeth Rodriguez <egrodriguez@lucent.com>

AGENDA: SUBJECT TO CHANGE

Announcement:  Most drafts aside from the MIBs are near (or already in)
Working Group Last Call.  Everyone is encouraged to review all the
documents, prior to the meeting and:
1)    provide editorial feedback directly to the editors/authors
2)    bring up any remaining/outstanding issues immediately on the
reflector.

---- Monday, March 18, 1930-2200 ----

- Agenda Bashing and Administrivia (5 min)
	- BLUE SHEETS
	- NOTE WELL

- Security (25 min)
	draft-ietf-ips-security-11.txt	

- FC Encapsulation (10 min)
	draft-ietf-ips-fcencapsulation-06.txt,.pdf

	Draft is in WG Last Call, which closes prior to this meeting.
	Discuss any issues raised in WG Last Call.

- FCIP (25 min)
	draft-ietf-ips-fcovertcipip-09.txt,.pdf

	Draft is in WG Last Call, which closes prior to this meeting.
	Discuss any issues raised in WG Last Call.

- SLP and FCIP (5 min)
	draft-ietf-ips-fcip-slp-01.txt

	Status update.

- FCIP MIB (5 min)
	draft-ietf-ips-fcip-mib-01.txt

	Status update.

- iFCP (10 min)
	draft-ietf-ips-ifcp-10.txt,.pdf

	Draft is in WG Last Call, which closes prior to this meeting.
	Discuss any issues raised in WG Last Call.

- iFCP MIB (5 min)
	draft-ietf-ips-ifcp-mib-00.txt

	Status update

- iSNS (10 min)
	draft-ietf-ips-isns-08.txt

	Status update. The related draft-tseng-dhc-isnsoption-00.txt
	requests allocation of a DHC option code for iSNS, and will be
	discussed in the DHC WG.

- iSNS MIB (5 min)
	draft-ietf-ips-isns-mib-01.txt

	Status update

- FC Management MIB (15 min)
	draft-ietf-ips-fcmgmt-mib-01.txt

- Sheinwald iSCSI CRC draft recommendation (5 min)
	draft-sheinwald-iscsi-crc-01.txt

	The authors would like the IPS WG to recommend publication of this
	draft (or a revised version) as an informational RFC, based on the
	useful information it contains that helped the WG decide which CRC
	to use for iSCSI.  This draft is on the agenda primarily to solicit
	this recommendation; no change to the iSCSI CRC is planned.

- iSCSI Plugfest Report and Discussion (25 min)

	Results from most recent iSCSI plugfest.

---- Tuesday, March 19, 1545-1800 ----

- Agenda Re-Bashing and Administrivia (5 min)

- SCSI MIB (25 min)
	draft-ietf-ips-scsi-mib-02.txt
		Structure diagram available at:
ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-uml-model-01.pdf
		Diagram showing relationships among SCSI family of MIBS
available at:
ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-mib-family-01.pdf

- iSCSI (20 min)
	draft-ietf-ips-iscsi-11.txt

	Any and all remaining issues.

- iSCSI SRP Intellectual Property Rights (40 min)

	Report on known status of IPR issues for SRP, and discussion of
	requirement level (MUST/SHOULD/MAY) for SRP. 

- iSCSI Boot (5 min)
	draft-ietf-ips-iscsi-boot-05.txt

	Status update.

- iSCSI Naming and Discovery Requirements (15 min)
	draft-ietf-ips-iscsi-name-disc-05.txt

	This draft is now intended to become a standards track RFC.
	This agenda item will include discussion of whether to move
normative
	text from this draft to main iSCSI draft, in which case this draft
	will become an informational RFC.

- iSCSI stringprep (5 min)
	draft-ietf-ips-iscsi-string-prep-00.txt

	Status update.

- iSCSI MIB and IP Storage User Identity MIB (10 min)
	draft-ietf-ips-iscsi-mib-04.txt
	draft-ietf-ips-auth-mib-00.txt

	Status updates and relationships to each other and to SCSI MIB.
		Table structure diagrams available at:
ftp://ftpeng.cisco.com/mbakke/ips/iscsi-mib/working/Visio-ietf-iscsi-uml-mod
el-04.pdf
ftp://ftpeng.cisco.com/mbakke/ips/auth-mib/Visio-ietf-ips-auth-mib-00.pdf

- Use of SLP and iSNS with iSCSI (10 min)
	draft-ietf-ips-iscsi-slp-03.txt
	draft-ietf-ips-isns-08.txt

	Status updates

DESCRIPTION:

	The IP Storage WG works on using IP-based networks to transport
block storage
	traffic.  See http://www.ietf.org/html.charters/ips-charter.html


From owner-ips@ece.cmu.edu  Wed Mar 13 03:40:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA00428
	for <ips-archive@lists.ietf.org>; Wed, 13 Mar 2002 03:40:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2D7rbg18742
	for ips-outgoing; Wed, 13 Mar 2002 02:53:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D7rYH18733;
	Wed, 13 Mar 2002 02:53:34 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id IAA76982;
	Wed, 13 Mar 2002 08:53:27 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2D7tYo26730;
	Wed, 13 Mar 2002 08:55:35 +0100
Subject: Re: CmdSN, StatSN initial value?
To: Martins Krikis <mkrikis@yahoo.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFF77AB042.A9C15449-ONC2256B7B.0029D220@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Wed, 13 Mar 2002 09:37:22 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 13/03/2002 09:55:36
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Read the Login in Chapter 9. Julo


                                                                                             
                      Martins Krikis                                                         
                      <mkrikis@yahoo.co        To:       ips@ece.cmu.edu                     
                      m>                       cc:                                           
                      Sent by:                 Subject:  CmdSN, StatSN initial value?        
                      owner-ips@ece.cmu                                                      
                      .edu                                                                   
                                                                                             
                                                                                             
                      12-03-02 23:43                                                         
                      Please respond to                                                      
                      Martins Krikis                                                         
                                                                                             
                                                                                             



Dear list members,

This must be a stupid question, but I can't find the
intial values of CmdSN and StatSN specified in
draft 11. I only see a requirement to start DataSN
at 0.

Are CmdSN and StatSN also supposed to start with 0,
or is the starting value completely arbitrary?

(I followed an old discussion about CmdSN, but this
issue is still unclear to me.)

Any help is much appreciated.

  Martins Krikis, Intel Corp.


__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/






From owner-ips@ece.cmu.edu  Wed Mar 13 09:53:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA07072
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 09:53:04 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DDvCT18765
	for ips-outgoing; Wed, 13 Mar 2002 08:57:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2D7kXH18333
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 02:46:33 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id CAA31004;
	Wed, 13 Mar 2002 02:43:11 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2D7kTn75708;
	Wed, 13 Mar 2002 00:46:30 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iscsi : changes involving tgt portal group tag.
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF9D1DCCE8.89C89042-ON88256B7B.0023E2DC@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Tue, 12 Mar 2002 23:45:51 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/13/2002 12:46:30 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Perhaps we need to discover what causes the TPGT to change.   I think you
are saying that the IP address has somehow changed to a different portal
group.  Since the SCSI Port is not suppose to change its "effective" name,
if one was to change the IP address, you have a serious implicit change in
effect.

I think that means that the Target Storage Controller has been taken
offline and reconfigured.  Now if you believe that across this probable
manual reconfiguration (including a probable power down), that the Target
will maintain this key state (like persistent reserves) I think we are
talking about a small corner case, which few would really expect.
Especially since there is usually a normal quiesce and the session stopped
normally when that type of thing is planed to be done.  Further, one could
argue that if a Target chose to keep the state, it had the obligation to
keep the same mapping of IP address to TPG.  (And the target would have to
have more then one Target Portal Group.)  If one was to say that the outage
was not planned, then usually what happens in this type of a situation, the
HW is fixed and restarted, not reconfigured.

In fact, lets understand where the Portal gets its IP address.  It gets it
from the configuration software that comes with the controller.  In other
words it is the configuration software (perhaps with Administrative
assistance) that assigns IP address to the portals that make up a portal
group.  It seems like if they assign it to begin with, then there is an
obligation to keep the IP address bound to the TPG as long as a persistent
state exist with an LU that has a Nexus through that Portal group (SCSI
Port).  IP addresses do not automatically move with the physical
HBA/Portals.

If I was to write an Initiator, and the above possibility worried me, I
think I would have a time value, which if passed, I would always rediscover
the Node.  That value can be anything, so if "defaultTime2Wait" is not
good, I think I would pick another time, which reflected the possibility of
a manual change.

Bottom line, I do not think we need to have TPGT in the Login.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Mallikarjun C." <cbm@rose.hp.com> on 03/12/2002 04:09:33 PM

To:    John Hufferd/San Jose/IBM@IBMUS
cc:    <ips@ece.cmu.edu>, <t10@t10.org>
Subject:    Re: iscsi : changes involving tgt portal group tag.



John,

> I do not see the absolute requirement for this TPGT in the Login.

That was my initial inclination as well, but now I believe there's value
in adding the TPGT to the Login Request PDU.

> it would be approprate to say that if the time for the Reconnect has been
> more then the "...Time2Wait" that the Initiator, if it cares about the

If I understand you correctly, you are suggesting that the DefaultTimeWait
value negotiated *for a session* should be used for decisions after the
end of that session.  I am afraid that it's a slippery slope...

OTOH, regardless of the proposed change, it would be reasonable to add text
that generally expresses this idea of potential volatility of portal
<->portal group
association in the iSCSI (or perhaps NDT) draft.

On to reasons that convinced me....

- An iSCSI session is an I_T nexus, and it is between an initiator *port*
   and a target *port*.  Login as a mechanism to instantiate/add to an
   iSCSI session should identify the target port in question, not just the
   target node.  The initiator port is currently identified in the Login
   dialogue
  (the InitiatorName text key and the ISID field), but not the target port.

- When there has been a portal group change for an IP address (portal) -
   meaning its TPGT had changed - it would be much more quicker to
   identify the fact and prevent an I_T nexus establishment by way of
   the TPGT in Login Request PDU.  The other option of having each
   LU assert its UA (REPORTED LUNS DATA HAS CHANGED) on
    the first command is prone to errors (see next bullet), and simply
    ineffcient.

- A target cold reset or a powercycle (possibly done after the portal group
   reconfiguration) would clear the aforementioned UA (but would assert
   a different UA for the power-on reset, but this generic UA gives no
   clue to initiators on the need to re-discover the target ports).

- At the moment, it is unclear to me if SPC-3 is mandating an "interlocked"
   style UA for the REPORTED LUNS DATA HAS CHANGED condition
   (though it seems like it... I will raise it only on t10 reflector under
   a different
    cover).  If that isn't the case, the UA interlock capability
    (T10/00-359) would
    need to deployed as well to realibly deal with this portal group
    reconfiguration.

> That would address the issue with out any protocol changes.

It is certainly a PDU change, but one can argue (successfully, I think)
that
it is not a "protocol" change per se -  since the implicit usage of TPGT so
far
(see my message to Julian earlier on this thread) is merely being turned
into
an explicit usage.

To summarize, I realize the sensitivity of changes this late but I believe
there
are reasonable grounds here.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 12, 2002 11:07 AM
Subject: Re: iscsi : changes involving tgt portal group tag.


>
> Mallikarjun,
> I do not see the absolute requirement for this TPGT in the Login.  I
think
> it would be approprate to say that if the time for the Reconnect has been
> more then the "...Time2Wait" that the Initiator, if it cares about the
> TPGT,  SHOULD perform a rediscovery.
>
> That would address the issue with out any protocol changes.
>
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
>
>
> "Mallikarjun C." <cbm@rose.hp.com>@ece.cmu.edu on 03/12/2002 10:30:29 AM
>
> Sent by:    owner-ips@ece.cmu.edu
>
>
> To:    "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
>
>
>
> Shailesh,
>
> The failure resulting out of a TPGT mismatch (assuming we have the TPGT
in
> the Login Request PDU), would have to trigger a discovery
> (SendTargets/SLP/...)
> updating the initiator of the latest configuration.  This discovery
process
> is
> similar
> to the FCP ADISC process you refer to.
>
> Alternatively, if there has been a change in the LU view of  a given
target
> portal
> group tag (meaning that the TPGT would match correctly), the LUs in the
> view
> should have established UA with an ASC of REPORTED LUNS DATA HAS
> CHANGED since the SCSI port association has changed for the LUs.  This
> again
> should trigger a discovery process from the initiator.
>
> It seems to be that we are now sufficiently covered either way.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> cbm@rose.hp.com
>
>
> ----- Original Message -----
> From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
> <Julian_Satran@il.ibm.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Monday, March 11, 2002 7:51 PM
> Subject: RE: iscsi : changes involving tgt portal group tag.
>
>
> > Hi,
> >
> > On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> > discovery followed by SCSI Inquiry and Report_LUNS which would make the
> > Initiator aware of this change? Can the  Async message - iscsi Event
> > Data notify the Initiator of the change, which would force an
discovery.
> > This would be similar to an ADISC for FCP. Because including the TPGT
in
> > the login would prevent inadvertent logins but would still not notify
> > the initiator of the changed configuration?
> >
> > Thanks,
> > Shailesh.
> > Aarohi Communications.
> > -----Original Message-----
> > From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> > Mallikarjun C.
> > Sent: Wednesday, March 06, 2002 10:17 AM
> > To: Julian Satran
> > Cc: ips@ece.cmu.edu; t10@t10.org
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> > * From the T10 Reflector (t10@t10.org), posted by:
> > * "Mallikarjun C." <cbm@rose.hp.com>
> > *
> > > The issue is that I am not sure that a target is checking today
> > anything -
> > > (adapter drivers may check oif in their realm they can give out a
> > TSID).
> > > Nothing else is needed.
> >
> > Target is required to derive the TPGT and use it in both cases of Login
> > -
> >      a) when TSID = 0, to ascertain if a session reinstatement needs to
> >          be effected for that TPGT.
> >      b) when TSID != 0, to ascertain the validity of TSID and add in
> >           the new connection to an existing session if it is valid for
> > that TPGT.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> >
> > ----- Original Message -----
> > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > To: "Mallikarjun C." <cbm@rose.hp.com>
> > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > Sent: Tuesday, March 05, 2002 11:56 PM
> > Subject: Re: iscsi : changes involving tgt portal group tag.
> >
> >
> > > The issue is that I am not sure that a target is checking today
> > anything -
> > > (adapter drivers may check oif in their realm they can give out a
> > TSID).
> > > Nothing else is needed. Does SCSI have to be aware of it? Perhaps but
> > > iSCSI certainly not. Does a "front-end" have to be - again probably
> > not
> > > the name identifies the node.
> > >
> > > Julo
> > >
> > >
> > >
> > >
> > > "Mallikarjun C." <cbm@rose.hp.com>
> > > 05-03-02 22:34
> > > Please respond to "Mallikarjun C."
> > >
> > >
> > >         To:     Julian Satran/Haifa/IBM@IBMIL
> > >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> > >         Subject:        Re: iscsi : changes involving tgt portal
group
> > tag.
> > >
> > >
> > >
> > > Julian,
> > >
> > > Whatever methods a target is expected to use today to derive the
> > implicit
> > > TPGT to preclude a duplicate I-T nexus would work after the change as
> > > well,
> > > except the derived value needs to be compared against the (proposed)
> > > TPGT in the Login Request payload.
> > >
> > > Please comment if we're missing something.
> > >
> > > Regards.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > > <santoshr@cup.hp.com>;
> > > <t10@t10.org>
> > > Sent: Monday, March 04, 2002 10:24 PM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > Has a decent target implementation and easy way of checking that
the
> > TPG
> > > > is correct?
> > > >
> > > > Julo
> > > >
> > > >
> > > >
> > > >
> > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > Sent by: owner-ips@ece.cmu.edu
> > > > 05-03-02 01:12
> > > > Please respond to "Mallikarjun C."
> > > >
> > > >
> > > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> > <ips@ece.cmu.edu>
> > > >         cc:     <t10@t10.org>
> > > >         Subject:        Re: iscsi : changes involving tgt portal
> > group
> > > tag.
> > > >
> > > >
> > > >
> > > > Santosh and Jim,
> > > >
> > > > It appears a good idea to add in the portal group tag in the Login
> > > > Request header for a sanity check by the receiving target portal.
> > > >
> > > > I generally agree with Jim's comments that the duration of
> > persistence
> > > > of a portal group tag is intricately linked to the extent of portal
> > > > reconfiguration.
> > > > Not every target reconfiguration may result in a portal group tag
> > > > reassignment.
> > > > OTOH, some reconfigurations may be so extensive as to cause even a
> > node
> > > > name change.
> > > >
> > > > Some comments on Santosh's message -
> > > >
> > > > > "If a portal group is re-configured such that all its previously
> > > > > advertised network portals are no longer a part of the portal
> > group,
> > > > > then, the portal group tag (and thereby, the port
name/identifier)
> > > > > *MUST* be changed to indicate a new target port."
> > > >
> > > > I am not sure this solves the problem you're trying to get at.  If
> > none
> > > of
> > > > the earlier IP addresses can get an initiator to the SCSI target
> > port
> > > that
> > > > it
> > > > knew of (your scenario), it appears to me that it doesn't matter if
> > the
> > > > portal group tags are changed or not....A new discovery process
> > should
> > > > update the initiator of the changed portal addresses.
> > > >
> > > > I suggest the following text -
> > > >
> > > >    After a portal group reconfiguration which changed the view of
> > LUs
> > > >    for an initiator with a given set of privileges, the target MUST
> > > change
> > > >    the portal group tag that represents the reconfigured target
> > portal
> > > > group.
> > > >
> > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > have
> > > > been
> > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > issue
> > > at
> > > > all.
> > > > >
> > > > > On a session logout & re-login, it is not efficient/necessary to
> > close
> > > > > and re-open each LUN behind that target port, due to the fact
that
> > a
> > > > > target port may have hundred's of LUNs behind it.
> > > >
> > > > I agree with Jim on this one - there should be *no* open/active
> > I_T_L
> > > > nexus
> > > > traffic after a reconfiguration, targets can enforce this via
simple
> >
> > > iSCSI
> > > > means
> > > > (reject initiator advances to continue the session for
> > DefaultTime2Wait+
> > > > DefaultTime2Retain seconds).  In fact, Async logout request
requires
> > a
> > > > clean closure that implicitly aborts I/Os.
> > > >
> > > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > > interactions.  I agree that they wouldn't have to be repeated, but
> > care
> > > > must be taken to ensure that new I/Os (on the new session after
> > > > reconfiguration)
> > > > are not delivered to the incorrect LUs.  It seems that the addition
> > of
> > > > TPGT in the login header and the proposed new text (above) would
> > take
> > > > care of this.
> > > >
> > > > Regards.
> > > > --
> > > > Mallikarjun
> > > >
> > > > Mallikarjun Chadalapaka
> > > > Networked Storage Architecture
> > > > Network Storage Solutions Organization
> > > > Hewlett-Packard MS 5668
> > > > Roseville CA 95747
> > > >
> > > > ----- Original Message -----
> > > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > > To: <ips@ece.cmu.edu>
> > > > Cc: <t10@t10.org>
> > > > Sent: Monday, March 04, 2002 10:40 AM
> > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > >
> > > >
> > > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > > *
> > > > > Jim,
> > > > >
> > > > > I agree that a "complete re-configuration" of a target port can
> > result
> > > > > in a new port name & port identifier. However, the tricky part is
> > the
> > > > > definition of a "complete re-configuration of an iscsi target
> > port",
> > > due
> > > > > to the concepts of portal groups involving multiple network
> > portals.
> > > > >
> > > > > For example, if a portal group (aka, an iscsi target port) were
to
> > be
> > > > > re-configured to include a new network portal [moved from another
> > > portal
> > > > > group], then, the target port itself has not changed, since it is
> > > still
> > > > > accessible through its previously used network portals. What has
> > > changed
> > > > > is the individual network portal that has moved from 1 target
port
> > to
> > > > > another.
> > > > >
> > > > > Hence, it is sufficient, in this case, to maintain persistence of
> > the
> > > > > target port name/identifier, without requiring any change in port
> > > > > name/identifier. By requiring initiators to send the intended
TPGT
> >
> > > (scsi
> > > > > target port name/identifier) along with the login request, this
> > allows
> > > > > the target port to detect that the network portal is being
> > accessed to
> > > > > connect to a different target port and it can reject the login.
> > > > >
> > > > > It may be helpful to call out the specific case when a port
> > > > > name/identifier MUST change. How about something like :
> > > > >
> > > > > "If a portal group is re-configured such that all its previously
> > > > > advertised network portals are no longer a part of the portal
> > group,
> > > > > then, the portal group tag (and thereby, the port
name/identifier)
> > > > > *MUST* be changed to indicate a new target port."
> > > > >
> > > > > This would allow access to the target port through its un-altered
> > > > > network portals to continue un-disrupted. More comments inline,
in
> > > > > response to some of your queries.
> > > > >
> > > > > Thanks,
> > > > > Santosh
> > > > >
> > > > > NOTE : In this discussion target port and target portal group are
> > used
> > > > > to imply the same entity, within a target node.
> > > > >
> > > > >
> > > > > Jim Hafner wrote:
> > > > >
> > > > > > SAM-2 requires scsi port names to be persistent and
> > > world-wide-unique.
> > > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > > >
> > > > > > "A scsi port name shall never change and may be used to
> > persistently
> > > > > > identify a scsi initiator port or target port...".
> > > > > >
> > > > > > <JLH>
> > > > > > There are different ways that one can interpret this
> > "persistent"
> > > > rule. The
> > > > > > intent was that names shouldn't change over time when
> > *identifying
> > > the
> > > > same
> > > > > > object*.   What that means is that if the object changes (in
any
> > > > > > discernable way), then the name should change.  So, the object
> > can
> > > > move to
> > > > > > a different piece of hardware, but it can still be named the
> > same
> > > way.
> > > >  If
> > > > > > the object changes, e.g., in this case, reconfigures as a
> > different
> > > > set of
> > > > > > network portals with different addressing elements, then I
would
> >
> > > think
> > > > that
> > > > > > the name should change as well.   That's all the persistence
one
> > > > really
> > > > > > needs.
> > > > > >
> > > > > > I'm not sure what that implies about your recommendation.  I
> > don't
> > > see
> > > > any
> > > > > > problem with it, either.
> > > > > > </JLH>
> > > > >
> > > > > I think we may be in agreement. (See reasoning above).
> > > > >
> > > > >
> > > > > >
> > > > > > The rationale for (2) is :
> > > > > > --------------------------
> > > > > > Consider an initiator node establishing multiple sessions to a
> > scsi
> > > > tgt
> > > > > > port, with each session established to a subset of the network
> > > portals
> > > > > > within the tgt portal group.
> > > > > >
> > > > > > Consider an iscsi transport event involving the
re-configuration
> > of
> > > > > > target portal groups on the iscsi target node. This may be
> > preceeded
> > > > by
> > > > > > the iscsi sessions seeing an async message "target requests
> > logout",
> > > > > > followed by session logout, portal group re-configuration, and
> > then,
> > > > the
> > > > > > initiator re-establishes sessions.
> > > > > >
> > > > > > Across a transport event that results in such session
> > termination
> > > and
> > > > > > re-establishment, the initiator needs to authenticate that it
is
> >
> > > still
> > > > > > speaking to the same [i]scsi target port, in order to ensure
> > that
> > > any
> > > > > > open/active I-T-L nexus traffic on that session is not
> > incorrectly
> > > > > > routed to a wrong LUN after such a transport event.
> > > > >
> > > > > > <JLH>
> > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > have
> > > > been
> > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > issue
> > > at
> > > > all.
> > > > >
> > > > > On a session logout & re-login, it is not efficient/necessary to
> > close
> > > > > and re-open each LUN behind that target port, due to the fact
that
> > a
> > > > > target port may have hundred's of LUNs behind it.
> > > > >
> > > > > All outstanding I/Os need to be aborted. Once the session is
> > > > > re-established [and the target port is authenticated to be the
> > same],
> > > > > further I/O traffic can be resumed without requiring the SCSI ULP
> > to
> > > > > close and re-open each LUN. Some transport specific clearing
> > effects
> > > may
> > > > > have occurred, which may require additional LUN level activity,
in
> >
> > > some
> > > > > cases.
> > > > >
> > > > > (There are analogies to the above model in FCP & SRP, which
> > > authenticate
> > > > > port name/identifier on login, allowing I/O resumption after
> > session
> > > > > termination and re-establishment.)
> > > > >
> > > > >
> > > > > > To prevent such authentication issues, iscsi can send the iscsi
> > > target
> > > > > > port identifier (portal group tag) explicitly in the login
> > request,
> > > > and
> > > > > > the login can be rejected by the target on a portal group tag
> > > > mis-match.
> > > > > > (if the network portal does not belong to the addressed portal
> > group
> > > > > > tag).
> > > > > > <JLH>
> > > > > > Did you mean for the initiator to send this TPGT?
> > > > > > </JLH>
> > > > >
> > > > > Yes. The initiator login request must include the target portal
> > group
> > > > > tag, thus identifying the target port to which a session is being
> > > > > established.
> > > > >
> > > > > Login currently carries no addressing information, since the
> > > addressing
> > > > > is implicit, based on the TCP connection in use. The problem with
> > this
> > > > > approach is that the login implicitly addresses a network portal,
> > and
> > > > > not the target port. As seen in the earlier example, the
> > association
> > > of
> > > > > network portal <-> target port can change, and such changes can
be
> > > > > detected, if the initiator were to explicitly identify the target
> > port
> > > > > being logged into.
> > > > >
> > > > > --
> > > > > ##################################
> > > > > Santosh Rao
> > > > > Software Design Engineer,
> > > > > HP-UX iSCSI Driver Team,
> > > > > Hewlett Packard, Cupertino.
> > > > > email : santoshr@cup.hp.com
> > > > > Phone : 408-447-3751
> > > > > ##################################
> > > > > *
> > > > > * For T10 Reflector information, send a message with
> > > > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > > > >
> > > >
> > > >
> > > >
> > >
> > >
> > >
> > >
> > *
> > * For T10 Reflector information, send a message with
> > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> >
> >
>
>
>
>
>




From owner-ips@ece.cmu.edu  Wed Mar 13 10:50:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08743
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 10:50:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DFCtI24803
	for ips-outgoing; Wed, 13 Mar 2002 10:12:55 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DFCsH24798
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 10:12:54 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQQP>; Wed, 13 Mar 2002 10:12:28 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5789@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Use of the A bit
Date: Wed, 13 Mar 2002 10:12:17 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CAA1.7715FE40"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CAA1.7715FE40
Content-Type: text/plain;
	charset="iso-8859-1"

Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.
 
The problem is that a target (perhaps an iSCSI disk drive) does not have
enough memory to transfer the full READ request so it must read from the
medium as much as it can, transmit that, when that transmission is known to
be good, read the next bunch, transmit that and so on.
 
The problem we have is that the target must keep the buffer around until the
transfer has been "ack'd" via ExpStatSN. But that status can't be sent
because all of the requested data has not been sent. So the target would
have to refuse to do the command.
 
I was going to use the A bit for this thinking it would force the initiator
to give an "ack" but our current wording does not make this a sure fire
thing:
 
1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is being set
aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.
 
Comments?
 
mailto:Eddy_Quicksall@iVivity.com <mailto:Eddy_Quicksall@iVivity.com> 
 

------_=_NextPart_001_01C1CAA1.7715FE40
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>Here is a case that 
I want to go over and if there is not already a solution, I think a refinement 
to the A bit could solve it.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem is that 
a target (perhaps an iSCSI disk drive) does not have enough memory to transfer 
the full READ&nbsp;request so it must read from the medium as much as it can, 
transmit that, when that transmission is known to be good, read the next bunch, 
transmit that and so on.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem we have 
is that the target must keep the buffer around until the transfer has been 
"ack'd" via ExpStatSN. But that status can't be sent because all of the 
requested data has not been sent. So the target would have to refuse to do the 
command.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>I was going to use 
the A bit for this thinking it would force the initiator to give an "ack" but 
our current wording does not make this a sure fire thing:</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>1) The initiator may 
not want to run at ErrorRecoveryLevel 1.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>2) The initiator may 
ignore the A bit if it deems that&nbsp;the bit is being set 
aggressively.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>3) The target may 
set the A bit no more frequently than MaxBurstSize.</FONT></SPAN></DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=516533014-13032002><FONT face=Arial 
size=2>Comments?</FONT></SPAN></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>
<DIV><SPAN class=376013222-02032002><FONT face=Arial size=2><A 
href="mailto:Eddy_Quicksall@iVivity.com">mailto:Eddy_Quicksall@iVivity.com</A></FONT></SPAN></DIV></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV></BODY></HTML>

------_=_NextPart_001_01C1CAA1.7715FE40--


From owner-ips@ece.cmu.edu  Wed Mar 13 10:52:49 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08795
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 10:52:49 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DFKdo25425
	for ips-outgoing; Wed, 13 Mar 2002 10:20:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from srexchimc2.lss.emc.com (srexchimc2.lss.emc.com [168.159.40.71])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DFKbH25420
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 10:20:37 -0500 (EST)
Received: by srexchimc2.lss.emc.com with Internet Mail Service (5.5.2653.19)
	id <GQ1KJMDG>; Wed, 13 Mar 2002 10:19:27 -0500
Message-ID: <D103A1D46E25D51186B100B0D0680832024E774C@srmoon.lss.emc.com>
From: "chen, wei" <wchen@emc.com>
To: ips@ece.cmu.edu
Subject: remove
Date: Wed, 13 Mar 2002 10:20:29 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

remove


From owner-ips@ece.cmu.edu  Wed Mar 13 11:07:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA09502
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 11:07:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DF79e24312
	for ips-outgoing; Wed, 13 Mar 2002 10:07:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2DF72H24298
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 10:07:03 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DF6o020046
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 10:06:51 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DF6jK20037;
	Wed, 13 Mar 2002 10:06:45 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2DF6iY30028;
	Wed, 13 Mar 2002 10:06:44 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15503.27395.944417.633037@pkoning.dev.equallogic.com>
Date: Wed, 13 Mar 2002 10:06:43 -0500
From: Paul Koning <ni1d@arrl.net>
To: cbm@rose.hp.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Text/Operational keys: booleans and ranges
References: <OF7F4AB404.5F2588E1-ONC2256B7A.006B6BF8@telaviv.ibm.com>
	<00e601c1ca28$3f68a610$edd52b0f@rose.hp.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Mallikarjun" == Mallikarjun C <cbm@rose.hp.com> writes:

 Mallikarjun> Julian, I agree with your proposal to denote ranges with
 Mallikarjun> ":".

 Mallikarjun> Also, as somewhat of a digression, I think we need to
 Mallikarjun> say something about the legality (or lack there of) of a
 Mallikarjun> negotiation involving multiple ranges as in:

 Mallikarjun> Key=a:b, c:d, e:f

 Mallikarjun> My not-too-strong opinion is that it could be useful to
 Mallikarjun> allow this...

We don't have an identified requirement for this.  We don't have a
reason for adding this to a spec that is supposed to be as close to
frozen as we can possibly get.  

This is NOT the time to keep adding features just "because it could be
useful".

The spec as currently written describes the use of exactly one range.
Leave it that way.  I don't have a problem with changing the delimiter
to ':' but I DO strongly object to any further extensions.

     paul



From owner-ips@ece.cmu.edu  Wed Mar 13 13:07:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13461
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 13:07:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DHBMe05147
	for ips-outgoing; Wed, 13 Mar 2002 12:11:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2DHBHH05139
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:11:18 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DHB7021586
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:11:07 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DHB7K21580
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:11:07 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2DHB7J03920
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:11:07 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15503.34858.531901.384288@pkoning.dev.equallogic.com>
Date: Wed, 13 Mar 2002 12:11:06 -0500
From: Paul Koning <ni1d@arrl.net>
To: ips@ece.cmu.edu
Subject: ISCSI: need to fix handling of partial data transfers
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Here's a point I mentioned before, but it got mixed up in the debate
over the "PDU sector alignment" proposal and wasn't resolved.  So here
it is again, standalone.

There are several places in the protocol where one end specifies a
quantity of data that it would like to see.  Currently, the spec
allows the amount of data transfered to be less than what was asked
for, BUT it also allows the recipient of that data to complain
("Protocol error") if what is received is less than what was asked
for.

In other words, the spec explicitly allows conforming implementations
that do not interoperate.

I do not believe this makes any sense.  Failure to interoperate due to
an implementation bug I can understand: if that happens you fix the
code.  But it is not at all reasonable for the spec to permit one end
to send a sequence of protocol messages, and then permit the other end
to reply to that CONFORMING sequence with the reply "Protocol error".

In particular: 

R2T specifies Desired Data Transfer Length.  Section 9.8 allows the
initiator to reply with less than that amount, and it then allows the
target to call that a protocol error.

Similarly, section 9.3.5 allows an initiator to send less than
FirstBurstSize unsolicited data even when the total transfer length is
more than that, yet it allows the target to reject such transfers.

These need to be changed.  There are two possible fixes:

1. Tighten up the initiator rules to require the initiator to send
precisely the requested amount (i.e., Desired Data Transfer Length in
response to R2T, and the negotiated FirstBurstSize as unsolicited
data) rather than an arbitrary amount <= that amount.  In other words,
in the 4th paragraph of 9.3.5 change "SHOULD" to "MUST"; in the 3rd
paragraph of 9.8  change "MUST not exceed" to "MUST exactly equal" and
before "If the last PDU..." insert "The total amount of data sent by
the initiator must exactly equal the Desired Data Transfer Length."

2. Alternatively, tighten up the target rules, requiring the target to
accept as valid and correct transfers less than the amount requested.
In other words, in the 4th paragraph of 9.3.5 replace the last
sentence by "The target MUST accept a command for which the Expected
Data Transfer Length is higher than the FirstBurstSize and for which
the initiator sent less than the FirstBurstSize unsolicited data."; in
the 3rd paragraph of 9.8 change "If the last PDU..." to "If the last
PDU (marked with the F bit) is received before the Desired Data
Transfer Length is transferred, a target MUST accept that as a valid
response to the R2T PDU."

On grounds of simplicity I prefer solution 1, but I can support either
as a valid fix of the current problem.

    paul



From owner-ips@ece.cmu.edu  Wed Mar 13 13:13:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13633
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 13:13:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DH8aD04955
	for ips-outgoing; Wed, 13 Mar 2002 12:08:36 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2DH8VH04944
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:08:32 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DH8L021556
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:08:21 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2DH8LK21550
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:08:21 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2DH8Lh03773
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:08:21 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15503.34692.589138.379925@pkoning.dev.equallogic.com>
Date: Wed, 13 Mar 2002 12:08:20 -0500
From: Paul Koning <ni1d@arrl.net>
To: ips@ece.cmu.edu
Subject: ISCSI: Typo in section 9.8
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

In section 9.8, third paragraph, it says: "If the R2T is answered with
a sequence of Data PDUs, the Buffer Offset and Length MUST be within
the range of those specified by R2T, and the last PDU SHOULD have the
F bit set to 1."  I don't understand the "SHOULD" here.  What if the
initiator doesn't set the F bit to 1 in the last PDU?  In that case,
the target wouldn't know it's the last PDU, right?  So this looks like
a typo, it needs to have "MUST" here.

     paul



From owner-ips@ece.cmu.edu  Wed Mar 13 14:18:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15662
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 14:18:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DHcId07284
	for ips-outgoing; Wed, 13 Mar 2002 12:38:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DHcGH07279
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 12:38:16 -0500 (EST)
Received: from hq-ex-c2.brocade.com (hq-ex-c2 [192.168.126.35])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id JAA02298;
	Wed, 13 Mar 2002 09:34:05 -0800 (PST)
Received: by hq-ex-c2.brocade.com with Internet Mail Service (5.5.2653.19)
	id <G5JY4011>; Wed, 13 Mar 2002 09:34:05 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D1199A@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: "'Paul Koning'" <ni1d@arrl.net>, santoshr@cup.hp.com
Cc: ips@ece.cmu.edu, t10@t10.org
Subject: RE: iscsi : changes involving tgt portal group tag.
Date: Wed, 13 Mar 2002 09:34:02 -0800
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

In SCSI (and I presume in iSCSI), there is no requirement that
the logical unit number to logical unit mapping be the same as
seen by all ports.  In other words, it is a Port||LUN combination
that identifies a logical unit, not a LUN alone.  The mappings
can be determined by a number of discovery mechanisms and verified
by use of the logical units world-wide name identifier from the
INQUIRY VPD page.

I don't think this has much effect on the rest of the ongoing
discussion, but if it does, please keep it in mind.

> Part of the concern appears to be around the worry that an initiator
> might reconnect to "the wrong" port and as a result end up talking to
> the wrong LU when it issues additional commands to a LUN it knows.
> 
> I don't understand how that's possible.  SAM-2 section 4.7.3 shows
> that an LU is a component of a Device (not of a Port).  And 4.8 says
> that a LUN "identifies the logical unit within a SCSI target device".
> 
> In other words, no matter what port you use to access a device, a
> given LUN identifies the same LU in that device.
> 


From owner-ips@ece.cmu.edu  Wed Mar 13 15:13:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17463
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 15:13:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DIdlc12464
	for ips-outgoing; Wed, 13 Mar 2002 13:39:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from bramg1.net.external.hp.com (bramg1.net.external.hp.com [192.6.126.73])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DIdgH12457
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 13:39:43 -0500 (EST)
Received: from fowey.BR.ITC.HP.COM (fowey.br.itc.hp.com [15.145.8.186])
	by bramg1.net.external.hp.com (Postfix) with SMTP
	id A1874EA; Wed, 13 Mar 2002 19:39:30 +0100 (MET)
Received: from 15.145.8.186 by fowey.BR.ITC.HP.COM (InterScan E-Mail VirusWall NT); Wed, 13 Mar 2002 18:39:30 -0000 (GMT Standard Time)
Received: by fowey.br.itc.hp.com with Internet Mail Service (5.5.2653.19)
	id <GTLSK8T8>; Wed, 13 Mar 2002 18:39:30 -0000
Message-ID: <0B9A57FF1D57D411B47500D0B73E5CC104FF1E5A@dickens.bri.hp.com>
From: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>
To: "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Wed, 13 Mar 2002 18:39:27 -0000
Importance: high
X-Priority: 1
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CABE.67653ED0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CABE.67653ED0
Content-Type: text/plain;
	charset="iso-8859-1"

Eddy,
 
The target is quite within its rights to use the A bit when at recovery
level 0.  If the session is re-established due to recovery 7.11.4 then the
relevant command is aborted anyway and so there is no reason to keep hold of
the data any way: With recovery level 0 there is no recovery mechanism that
requires the target to keep the data.  Therefore the A bit is redundant when
the recovery level is 0.
 
The spec says that the initiator MUST issue a SNACK if the A bit is set.
However, the MaxBurstSize restriction is there to prevent the initiator from
having to send a SNACK on every PDU in the case where a target inadvertently
sets the A bit in (for example) every data in PDU. The target may set the A
bit more often than the MaxBurstSize but it should not expect a SNACK more
often than this.
 
Matthew Burbridge

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.
 
The problem is that a target (perhaps an iSCSI disk drive) does not have
enough memory to transfer the full READ request so it must read from the
medium as much as it can, transmit that, when that transmission is known to
be good, read the next bunch, transmit that and so on.
 
The problem we have is that the target must keep the buffer around until the
transfer has been "ack'd" via ExpStatSN. But that status can't be sent
because all of the requested data has not been sent. So the target would
have to refuse to do the command.
 
I was going to use the A bit for this thinking it would force the initiator
to give an "ack" but our current wording does not make this a sure fire
thing:
 
1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is being set
aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.
 
Comments?
 

mailto:Eddy_Quicksall@iVivity.com <mailto:Eddy_Quicksall@iVivity.com> 
 


------_=_NextPart_001_01C1CABE.67653ED0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.00.3502.4856" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002>Eddy,</SPAN></FONT></DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002>The target is quite within its rights to use the A bit 
when at recovery level 0.&nbsp; If the session is re-established due to recovery 
7.11.4 then the relevant command is aborted anyway and so there is no reason to 
keep hold of the&nbsp;data any way: With recovery level 0 there is no recovery 
mechanism that requires the target to keep the data.&nbsp; Therefore the A bit 
is redundant when the recovery level is 0.</SPAN></FONT></DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002>The spec says that the initiator MUST issue a SNACK if 
the A bit is set.&nbsp; However, the MaxBurstSize restriction is there to 
prevent the initiator from having to send a SNACK on every PDU in the case where 
a target inadvertently sets the A bit in (for example) every data in 
PDU.&nbsp;The target may set the A bit more often than the MaxBurstSize but it 
should not expect a SNACK more often than this.</SPAN></FONT></DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#800080 face="Courier New" size=2><SPAN 
class=953562618-13032002>Matthew Burbridge</SPAN></FONT></DIV>
<BLOCKQUOTE style="MARGIN-RIGHT: 0px">
  <DIV align=left class=OutlookMessageHeader dir=ltr><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Eddy Quicksall 
  [mailto:Eddy_Quicksall@ivivity.com]<BR><B>Sent:</B> Wednesday, March 13, 2002 
  3:12 PM<BR><B>To:</B> ips@ece. cmu. edu (E-mail)<BR><B>Subject:</B> iSCSI: Use 
  of the A bit<BR><BR></DIV></FONT>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>Here is a case 
  that I want to go over and if there is not already a solution, I think a 
  refinement to the A bit could solve it.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem is 
  that a target (perhaps an iSCSI disk drive) does not have enough memory to 
  transfer the full READ&nbsp;request so it must read from the medium as much as 
  it can, transmit that, when that transmission is known to be good, read the 
  next bunch, transmit that and so on.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem we 
  have is that the target must keep the buffer around until the transfer has 
  been "ack'd" via ExpStatSN. But that status can't be sent because all of the 
  requested data has not been sent. So the target would have to refuse to do the 
  command.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>I was going to use 
  the A bit for this thinking it would force the initiator to give an "ack" but 
  our current wording does not make this a sure fire thing:</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>1) The initiator 
  may not want to run at ErrorRecoveryLevel 1.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>2) The initiator 
  may ignore the A bit if it deems that&nbsp;the bit is being set 
  aggressively.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>3) The target may 
  set the A bit no more frequently than MaxBurstSize.</FONT></SPAN></DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=516533014-13032002><FONT face=Arial 
  size=2>Comments?</FONT></SPAN></DIV>
  <DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
  <DIV><FONT face=Arial size=2>
  <DIV><SPAN class=376013222-02032002><FONT face=Arial size=2><A 
  href="mailto:Eddy_Quicksall@iVivity.com">mailto:Eddy_Quicksall@iVivity.com</A></FONT></SPAN></DIV></FONT></DIV>
  <DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CABE.67653ED0--


From owner-ips@ece.cmu.edu  Wed Mar 13 15:35:15 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA18477
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 15:35:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DK4FD20041
	for ips-outgoing; Wed, 13 Mar 2002 15:04:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop2.snjs.qwest.net (snjspop2.snjs.qwest.net [168.103.24.2])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2DK49H20029
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 15:04:10 -0500 (EST)
Received: (qmail 26637 invoked from network); 13 Mar 2002 20:03:49 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop2.snjs.qwest.net with SMTP; 13 Mar 2002 20:03:49 -0000
Date: Wed, 13 Mar 2002 09:38:20 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNIEDKCAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: ips@ece.cmu.edu
Subject: recovering from a header digest error
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

To recover from a header digest error, right now the draft says that neither
party has to escalate the error to logging out and closing that connection,
but they may.  Okay, I have a problem.  This is not the same as the CRC
problem talked about earlier with AHSLength.

Let us say that the header has an error (I do not care what size) in
AHSLength or even DataSegmentLength.  Let us say that wherever it ends up
indicating the Digest is, the algorithm correctly discovers the error.  So
it must toss the packet out.  How?  There is no end of packet delimiter in
the spec.  (Note that detecting any error does not tell what field it is in
(I know, duh).)

So, I decide that I cannot do this in my implementation (I am allowed to
escalate the problem to close the connection, I believe), and I want to be a
good boy and Logout.  Where does my Logout packet start in the TCP stream?
Again, there is no end of packet delimiter, or start of packet either.

I see no solution to this.

Sincerely,
Randy Jennings
Data Transit



From owner-ips@ece.cmu.edu  Wed Mar 13 15:41:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA18725
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 15:41:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DJpQK18777
	for ips-outgoing; Wed, 13 Mar 2002 14:51:26 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop2.snjs.qwest.net (snjspop2.snjs.qwest.net [168.103.24.2])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2DJp3H18745
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 14:51:19 -0500 (EST)
Received: (qmail 4339 invoked from network); 13 Mar 2002 19:50:55 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop2.snjs.qwest.net with SMTP; 13 Mar 2002 19:50:55 -0000
Date: Wed, 13 Mar 2002 09:25:26 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNAEDKCAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: ips@ece.cmu.edu
Subject: Full Feature Phase and Digests
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I am not sure if this is the place for me to ask this question, so forgive
me if I am out of line.

Is there a difference between S5: LOGGED_IN and Full Feature Phase (a.k.a.
full-feature phase in some parts of the document; it would be nice if they
were all the same; I am not a regex guru)?

If so, and I understand the digest section, neither the logout or login
PDU's will have digests on them.  I believe this holds even after the first
connection of the session, because later connections are not yet in Full
Feature Phase (S5).

I.e.  Only iSCSI op codes 0x00, 0x01, 0x02, 0x04, 0x05, 0x010, 0x1c-0x1e
(maybe) for the initiator, and 0x20, 0x21, 0x22, 0x24, 0x25, 0x31, 0x32,
0x3c-0x3e (maybe), 0x3f for the target (anything not Logout or Login) will
have the Digests and they must have them if stated in Login of the session?

Am I right?

TIA

Sincerely,
Randy Jennings
Data Transit



From owner-ips@ece.cmu.edu  Wed Mar 13 15:48:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA18942
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 15:48:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DK2p419902
	for ips-outgoing; Wed, 13 Mar 2002 15:02:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DK2hH19881
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 15:02:49 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ4S>; Wed, 13 Mar 2002 15:02:40 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5793@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Wed, 13 Mar 2002 15:02:38 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CACA.0697C9E0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CACA.0697C9E0
Content-Type: text/plain;
	charset="iso-8859-1"

Then my only concern is that the initiator may ignore the A bit if it deems
that the bit is being set aggressively.
 
If it ignored it, then the target would be stalled waiting for he ACK.
 
Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,
 
The target is quite within its rights to use the A bit when at recovery
level 0.  If the session is re-established due to recovery 7.11.4 then the
relevant command is aborted anyway and so there is no reason to keep hold of
the data any way: With recovery level 0 there is no recovery mechanism that
requires the target to keep the data.  Therefore the A bit is redundant when
the recovery level is 0.
 
The spec says that the initiator MUST issue a SNACK if the A bit is set.
However, the MaxBurstSize restriction is there to prevent the initiator from
having to send a SNACK on every PDU in the case where a target inadvertently
sets the A bit in (for example) every data in PDU. The target may set the A
bit more often than the MaxBurstSize but it should not expect a SNACK more
often than this.
 
Matthew Burbridge

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.
 
The problem is that a target (perhaps an iSCSI disk drive) does not have
enough memory to transfer the full READ request so it must read from the
medium as much as it can, transmit that, when that transmission is known to
be good, read the next bunch, transmit that and so on.
 
The problem we have is that the target must keep the buffer around until the
transfer has been "ack'd" via ExpStatSN. But that status can't be sent
because all of the requested data has not been sent. So the target would
have to refuse to do the command.
 
I was going to use the A bit for this thinking it would force the initiator
to give an "ack" but our current wording does not make this a sure fire
thing:
 
1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is being set
aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.
 
Comments?
 

mailto:Eddy_Quicksall@iVivity.com <mailto:Eddy_Quicksall@iVivity.com> 
 


------_=_NextPart_001_01C1CACA.0697C9E0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=979150020-13032002><FONT face=Arial color=#0000ff size=2>Then 
my only concern is that the <FONT color=#000000>initiator may ignore the A bit 
if it deems that&nbsp;the bit is being set 
aggressively.</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=979150020-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=979150020-13032002><FONT face=Arial size=2>If it ignored it, 
then the target would be stalled waiting for he ACK.</FONT></SPAN></DIV>
<DIV><SPAN class=979150020-13032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=979150020-13032002><FONT face=Arial 
size=2>Eddy</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> BURBRIDGE,MATTHEW 
  (HP-UnitedKingdom,ex2) [mailto:matthew_burbridge@hp.com]<BR><B>Sent:</B> 
  Wednesday, March 13, 2002 1:39 PM<BR><B>To:</B> 'Eddy Quicksall'; ips@ece. 
  cmu. edu (E-mail)<BR><B>Subject:</B> RE: iSCSI: Use of the A 
  bit<BR><B>Importance:</B> High<BR><BR></FONT></DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002>Eddy,</SPAN></FONT></DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002>The target is quite within its rights to use the A 
  bit when at recovery level 0.&nbsp; If the session is re-established due to 
  recovery 7.11.4 then the relevant command is aborted anyway and so there is no 
  reason to keep hold of the&nbsp;data any way: With recovery level 0 there is 
  no recovery mechanism that requires the target to keep the data.&nbsp; 
  Therefore the A bit is redundant when the recovery level is 
  0.</SPAN></FONT></DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002>The spec says that the initiator MUST issue a SNACK 
  if the A bit is set.&nbsp; However, the MaxBurstSize restriction is there to 
  prevent the initiator from having to send a SNACK on every PDU in the case 
  where a target inadvertently sets the A bit in (for example) every data in 
  PDU.&nbsp;The target may set the A bit more often than the MaxBurstSize but it 
  should not expect a SNACK more often than this.</SPAN></FONT></DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
  class=953562618-13032002>Matthew Burbridge</SPAN></FONT></DIV>
  <BLOCKQUOTE style="MARGIN-RIGHT: 0px">
    <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
    size=2>-----Original Message-----<BR><B>From:</B> Eddy Quicksall 
    [mailto:Eddy_Quicksall@ivivity.com]<BR><B>Sent:</B> Wednesday, March 13, 
    2002 3:12 PM<BR><B>To:</B> ips@ece. cmu. edu (E-mail)<BR><B>Subject:</B> 
    iSCSI: Use of the A bit<BR><BR></DIV></FONT>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>Here is a case 
    that I want to go over and if there is not already a solution, I think a 
    refinement to the A bit could solve it.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem is 
    that a target (perhaps an iSCSI disk drive) does not have enough memory to 
    transfer the full READ&nbsp;request so it must read from the medium as much 
    as it can, transmit that, when that transmission is known to be good, read 
    the next bunch, transmit that and so on.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem we 
    have is that the target must keep the buffer around until the transfer has 
    been "ack'd" via ExpStatSN. But that status can't be sent because all of the 
    requested data has not been sent. So the target would have to refuse to do 
    the command.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>I was going to 
    use the A bit for this thinking it would force the initiator to give an 
    "ack" but our current wording does not make this a sure fire 
    thing:</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>1) The initiator 
    may not want to run at ErrorRecoveryLevel 1.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>2) The initiator 
    may ignore the A bit if it deems that&nbsp;the bit is being set 
    aggressively.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>3) The target 
    may set the A bit no more frequently than MaxBurstSize.</FONT></SPAN></DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2></FONT></SPAN>&nbsp;</DIV>
    <DIV><SPAN class=516533014-13032002><FONT face=Arial 
    size=2>Comments?</FONT></SPAN></DIV>
    <DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
    <DIV><FONT face=Arial size=2>
    <DIV><SPAN class=376013222-02032002><FONT face=Arial size=2><A 
    href="mailto:Eddy_Quicksall@iVivity.com">mailto:Eddy_Quicksall@iVivity.com</A></FONT></SPAN></DIV></FONT></DIV>
    <DIV><FONT face=Arial 
size=2></FONT>&nbsp;</DIV></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CACA.0697C9E0--


From owner-ips@ece.cmu.edu  Wed Mar 13 15:50:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA18976
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 15:50:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DJq2e18852
	for ips-outgoing; Wed, 13 Mar 2002 14:52:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel7.hp.com (atlrel7.hp.com [156.153.255.213])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DJpwH18837
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 14:51:59 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel7.hp.com (Postfix) with ESMTP
	id AAD518051F0; Wed, 13 Mar 2002 14:51:48 -0500 (EST)
Received: from swathi (ftc1nai160055.msr.hp.com [15.236.160.55]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id LAA16805; Wed, 13 Mar 2002 11:53:22 -0800 (PST)
Message-ID: <008b01c1cac8$7e0b1510$37a0ec0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>
References: <OF9D1DCCE8.89C89042-ON88256B7B.0023E2DC@boulder.ibm.com>
Subject: Re: iscsi : changes involving tgt portal group tag.
Date: Wed, 13 Mar 2002 11:51:38 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John,

I would have much preferred you addressing each of the 
reasons I listed, but let me make one more attempt at this...

1. Not specifying a *port* in the Login dialogue explicitly 
    is something I am concerned could cause surprises down
    the road.  Given that a Login is meant to establish an I_T
    nexus to a port (not to a node), I am rather surprised to see 
    the opposition simply because the proposal is coming late.

2.  > manual reconfiguration (including a probable power down), that the Target
     > will maintain this key state ..
    This and a lot of your other text below dwells on the unlikelihood of
    target not maintaining the state - I agree with you.  My point is
    *not* that a target would, but the need to design the quickest and 
    most reliable way to communicate the loss of state back to the initiator.  
    I believe addition of TPGT to the Login Request PDU accomplishes that.

With that said, if you (and possibly others) still disagree on the need to 
add the TPGT, I request David Black to make a consensus call on this 
when appropriate, and move on.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 12, 2002 11:45 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


> 
> Perhaps we need to discover what causes the TPGT to change.   I think you
> are saying that the IP address has somehow changed to a different portal
> group.  Since the SCSI Port is not suppose to change its "effective" name,
> if one was to change the IP address, you have a serious implicit change in
> effect.
> 
> I think that means that the Target Storage Controller has been taken
> offline and reconfigured.  Now if you believe that across this probable
> manual reconfiguration (including a probable power down), that the Target
> will maintain this key state (like persistent reserves) I think we are
> talking about a small corner case, which few would really expect.
> Especially since there is usually a normal quiesce and the session stopped
> normally when that type of thing is planed to be done.  Further, one could
> argue that if a Target chose to keep the state, it had the obligation to
> keep the same mapping of IP address to TPG.  (And the target would have to
> have more then one Target Portal Group.)  If one was to say that the outage
> was not planned, then usually what happens in this type of a situation, the
> HW is fixed and restarted, not reconfigured.
> 
> In fact, lets understand where the Portal gets its IP address.  It gets it
> from the configuration software that comes with the controller.  In other
> words it is the configuration software (perhaps with Administrative
> assistance) that assigns IP address to the portals that make up a portal
> group.  It seems like if they assign it to begin with, then there is an
> obligation to keep the IP address bound to the TPG as long as a persistent
> state exist with an LU that has a Nexus through that Portal group (SCSI
> Port).  IP addresses do not automatically move with the physical
> HBA/Portals.
> 
> If I was to write an Initiator, and the above possibility worried me, I
> think I would have a time value, which if passed, I would always rediscover
> the Node.  That value can be anything, so if "defaultTime2Wait" is not
> good, I think I would pick another time, which reflected the possibility of
> a manual change.
> 
> Bottom line, I do not think we need to have TPGT in the Login.
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Mallikarjun C." <cbm@rose.hp.com> on 03/12/2002 04:09:33 PM
> 
> To:    John Hufferd/San Jose/IBM@IBMUS
> cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
> 
> 
> 
> John,
> 
> > I do not see the absolute requirement for this TPGT in the Login.
> 
> That was my initial inclination as well, but now I believe there's value
> in adding the TPGT to the Login Request PDU.
> 
> > it would be approprate to say that if the time for the Reconnect has been
> > more then the "...Time2Wait" that the Initiator, if it cares about the
> 
> If I understand you correctly, you are suggesting that the DefaultTimeWait
> value negotiated *for a session* should be used for decisions after the
> end of that session.  I am afraid that it's a slippery slope...
> 
> OTOH, regardless of the proposed change, it would be reasonable to add text
> that generally expresses this idea of potential volatility of portal
> <->portal group
> association in the iSCSI (or perhaps NDT) draft.
> 
> On to reasons that convinced me....
> 
> - An iSCSI session is an I_T nexus, and it is between an initiator *port*
>    and a target *port*.  Login as a mechanism to instantiate/add to an
>    iSCSI session should identify the target port in question, not just the
>    target node.  The initiator port is currently identified in the Login
>    dialogue
>   (the InitiatorName text key and the ISID field), but not the target port.
> 
> - When there has been a portal group change for an IP address (portal) -
>    meaning its TPGT had changed - it would be much more quicker to
>    identify the fact and prevent an I_T nexus establishment by way of
>    the TPGT in Login Request PDU.  The other option of having each
>    LU assert its UA (REPORTED LUNS DATA HAS CHANGED) on
>     the first command is prone to errors (see next bullet), and simply
>     ineffcient.
> 
> - A target cold reset or a powercycle (possibly done after the portal group
>    reconfiguration) would clear the aforementioned UA (but would assert
>    a different UA for the power-on reset, but this generic UA gives no
>    clue to initiators on the need to re-discover the target ports).
> 
> - At the moment, it is unclear to me if SPC-3 is mandating an "interlocked"
>    style UA for the REPORTED LUNS DATA HAS CHANGED condition
>    (though it seems like it... I will raise it only on t10 reflector under
>    a different
>     cover).  If that isn't the case, the UA interlock capability
>     (T10/00-359) would
>     need to deployed as well to realibly deal with this portal group
>     reconfiguration.
> 
> > That would address the issue with out any protocol changes.
> 
> It is certainly a PDU change, but one can argue (successfully, I think)
> that
> it is not a "protocol" change per se -  since the implicit usage of TPGT so
> far
> (see my message to Julian earlier on this thread) is merely being turned
> into
> an explicit usage.
> 
> To summarize, I realize the sensitivity of changes this late but I believe
> there
> are reasonable grounds here.
> 
> Regards.
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> cbm@rose.hp.com
> 
> ----- Original Message -----
> From: "John Hufferd" <hufferd@us.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Tuesday, March 12, 2002 11:07 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
> 
> 
> >
> > Mallikarjun,
> > I do not see the absolute requirement for this TPGT in the Login.  I
> think
> > it would be approprate to say that if the time for the Reconnect has been
> > more then the "...Time2Wait" that the Initiator, if it cares about the
> > TPGT,  SHOULD perform a rediscovery.
> >
> > That would address the issue with out any protocol changes.
> >
> > .
> > .
> > .
> > John L. Hufferd
> > Senior Technical Staff Member (STSM)
> > IBM/SSG San Jose Ca
> > Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> > Home Office (408) 997-6136, Cell: (408) 499-9702
> > Internet address: hufferd@us.ibm.com
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>@ece.cmu.edu on 03/12/2002 10:30:29 AM
> >
> > Sent by:    owner-ips@ece.cmu.edu
> >
> >
> > To:    "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> > cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> > Subject:    Re: iscsi : changes involving tgt portal group tag.
> >
> >
> >
> > Shailesh,
> >
> > The failure resulting out of a TPGT mismatch (assuming we have the TPGT
> in
> > the Login Request PDU), would have to trigger a discovery
> > (SendTargets/SLP/...)
> > updating the initiator of the latest configuration.  This discovery
> process
> > is
> > similar
> > to the FCP ADISC process you refer to.
> >
> > Alternatively, if there has been a change in the LU view of  a given
> target
> > portal
> > group tag (meaning that the TPGT would match correctly), the LUs in the
> > view
> > should have established UA with an ASC of REPORTED LUNS DATA HAS
> > CHANGED since the SCSI port association has changed for the LUs.  This
> > again
> > should trigger a discovery process from the initiator.
> >
> > It seems to be that we are now sufficiently covered either way.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> > cbm@rose.hp.com
> >
> >
> > ----- Original Message -----
> > From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> > To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
> > <Julian_Satran@il.ibm.com>
> > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > Sent: Monday, March 11, 2002 7:51 PM
> > Subject: RE: iscsi : changes involving tgt portal group tag.
> >
> >
> > > Hi,
> > >
> > > On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> > > discovery followed by SCSI Inquiry and Report_LUNS which would make the
> > > Initiator aware of this change? Can the  Async message - iscsi Event
> > > Data notify the Initiator of the change, which would force an
> discovery.
> > > This would be similar to an ADISC for FCP. Because including the TPGT
> in
> > > the login would prevent inadvertent logins but would still not notify
> > > the initiator of the changed configuration?
> > >
> > > Thanks,
> > > Shailesh.
> > > Aarohi Communications.
> > > -----Original Message-----
> > > From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> > > Mallikarjun C.
> > > Sent: Wednesday, March 06, 2002 10:17 AM
> > > To: Julian Satran
> > > Cc: ips@ece.cmu.edu; t10@t10.org
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > > * From the T10 Reflector (t10@t10.org), posted by:
> > > * "Mallikarjun C." <cbm@rose.hp.com>
> > > *
> > > > The issue is that I am not sure that a target is checking today
> > > anything -
> > > > (adapter drivers may check oif in their realm they can give out a
> > > TSID).
> > > > Nothing else is needed.
> > >
> > > Target is required to derive the TPGT and use it in both cases of Login
> > > -
> > >      a) when TSID = 0, to ascertain if a session reinstatement needs to
> > >          be effected for that TPGT.
> > >      b) when TSID != 0, to ascertain the validity of TSID and add in
> > >           the new connection to an existing session if it is valid for
> > > that TPGT.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > > Sent: Tuesday, March 05, 2002 11:56 PM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > The issue is that I am not sure that a target is checking today
> > > anything -
> > > > (adapter drivers may check oif in their realm they can give out a
> > > TSID).
> > > > Nothing else is needed. Does SCSI have to be aware of it? Perhaps but
> > > > iSCSI certainly not. Does a "front-end" have to be - again probably
> > > not
> > > > the name identifies the node.
> > > >
> > > > Julo
> > > >
> > > >
> > > >
> > > >
> > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > 05-03-02 22:34
> > > > Please respond to "Mallikarjun C."
> > > >
> > > >
> > > >         To:     Julian Satran/Haifa/IBM@IBMIL
> > > >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> > > >         Subject:        Re: iscsi : changes involving tgt portal
> group
> > > tag.
> > > >
> > > >
> > > >
> > > > Julian,
> > > >
> > > > Whatever methods a target is expected to use today to derive the
> > > implicit
> > > > TPGT to preclude a duplicate I-T nexus would work after the change as
> > > > well,
> > > > except the derived value needs to be compared against the (proposed)
> > > > TPGT in the Login Request payload.
> > > >
> > > > Please comment if we're missing something.
> > > >
> > > > Regards.
> > > > --
> > > > Mallikarjun
> > > >
> > > > Mallikarjun Chadalapaka
> > > > Networked Storage Architecture
> > > > Network Storage Solutions Organization
> > > > Hewlett-Packard MS 5668
> > > > Roseville CA 95747
> > > >
> > > > ----- Original Message -----
> > > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > > > <santoshr@cup.hp.com>;
> > > > <t10@t10.org>
> > > > Sent: Monday, March 04, 2002 10:24 PM
> > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > >
> > > >
> > > > > Has a decent target implementation and easy way of checking that
> the
> > > TPG
> > > > > is correct?
> > > > >
> > > > > Julo
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > > Sent by: owner-ips@ece.cmu.edu
> > > > > 05-03-02 01:12
> > > > > Please respond to "Mallikarjun C."
> > > > >
> > > > >
> > > > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> > > <ips@ece.cmu.edu>
> > > > >         cc:     <t10@t10.org>
> > > > >         Subject:        Re: iscsi : changes involving tgt portal
> > > group
> > > > tag.
> > > > >
> > > > >
> > > > >
> > > > > Santosh and Jim,
> > > > >
> > > > > It appears a good idea to add in the portal group tag in the Login
> > > > > Request header for a sanity check by the receiving target portal.
> > > > >
> > > > > I generally agree with Jim's comments that the duration of
> > > persistence
> > > > > of a portal group tag is intricately linked to the extent of portal
> > > > > reconfiguration.
> > > > > Not every target reconfiguration may result in a portal group tag
> > > > > reassignment.
> > > > > OTOH, some reconfigurations may be so extensive as to cause even a
> > > node
> > > > > name change.
> > > > >
> > > > > Some comments on Santosh's message -
> > > > >
> > > > > > "If a portal group is re-configured such that all its previously
> > > > > > advertised network portals are no longer a part of the portal
> > > group,
> > > > > > then, the portal group tag (and thereby, the port
> name/identifier)
> > > > > > *MUST* be changed to indicate a new target port."
> > > > >
> > > > > I am not sure this solves the problem you're trying to get at.  If
> > > none
> > > > of
> > > > > the earlier IP addresses can get an initiator to the SCSI target
> > > port
> > > > that
> > > > > it
> > > > > knew of (your scenario), it appears to me that it doesn't matter if
> > > the
> > > > > portal group tags are changed or not....A new discovery process
> > > should
> > > > > update the initiator of the changed portal addresses.
> > > > >
> > > > > I suggest the following text -
> > > > >
> > > > >    After a portal group reconfiguration which changed the view of
> > > LUs
> > > > >    for an initiator with a given set of privileges, the target MUST
> > > > change
> > > > >    the portal group tag that represents the reconfigured target
> > > portal
> > > > > group.
> > > > >
> > > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > > have
> > > > > been
> > > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > > issue
> > > > at
> > > > > all.
> > > > > >
> > > > > > On a session logout & re-login, it is not efficient/necessary to
> > > close
> > > > > > and re-open each LUN behind that target port, due to the fact
> that
> > > a
> > > > > > target port may have hundred's of LUNs behind it.
> > > > >
> > > > > I agree with Jim on this one - there should be *no* open/active
> > > I_T_L
> > > > > nexus
> > > > > traffic after a reconfiguration, targets can enforce this via
> simple
> > >
> > > > iSCSI
> > > > > means
> > > > > (reject initiator advances to continue the session for
> > > DefaultTime2Wait+
> > > > > DefaultTime2Retain seconds).  In fact, Async logout request
> requires
> > > a
> > > > > clean closure that implicitly aborts I/Os.
> > > > >
> > > > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > > > interactions.  I agree that they wouldn't have to be repeated, but
> > > care
> > > > > must be taken to ensure that new I/Os (on the new session after
> > > > > reconfiguration)
> > > > > are not delivered to the incorrect LUs.  It seems that the addition
> > > of
> > > > > TPGT in the login header and the proposed new text (above) would
> > > take
> > > > > care of this.
> > > > >
> > > > > Regards.
> > > > > --
> > > > > Mallikarjun
> > > > >
> > > > > Mallikarjun Chadalapaka
> > > > > Networked Storage Architecture
> > > > > Network Storage Solutions Organization
> > > > > Hewlett-Packard MS 5668
> > > > > Roseville CA 95747
> > > > >
> > > > > ----- Original Message -----
> > > > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > > > To: <ips@ece.cmu.edu>
> > > > > Cc: <t10@t10.org>
> > > > > Sent: Monday, March 04, 2002 10:40 AM
> > > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > > >
> > > > >
> > > > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > > > *
> > > > > > Jim,
> > > > > >
> > > > > > I agree that a "complete re-configuration" of a target port can
> > > result
> > > > > > in a new port name & port identifier. However, the tricky part is
> > > the
> > > > > > definition of a "complete re-configuration of an iscsi target
> > > port",
> > > > due
> > > > > > to the concepts of portal groups involving multiple network
> > > portals.
> > > > > >
> > > > > > For example, if a portal group (aka, an iscsi target port) were
> to
> > > be
> > > > > > re-configured to include a new network portal [moved from another
> > > > portal
> > > > > > group], then, the target port itself has not changed, since it is
> > > > still
> > > > > > accessible through its previously used network portals. What has
> > > > changed
> > > > > > is the individual network portal that has moved from 1 target
> port
> > > to
> > > > > > another.
> > > > > >
> > > > > > Hence, it is sufficient, in this case, to maintain persistence of
> > > the
> > > > > > target port name/identifier, without requiring any change in port
> > > > > > name/identifier. By requiring initiators to send the intended
> TPGT
> > >
> > > > (scsi
> > > > > > target port name/identifier) along with the login request, this
> > > allows
> > > > > > the target port to detect that the network portal is being
> > > accessed to
> > > > > > connect to a different target port and it can reject the login.
> > > > > >
> > > > > > It may be helpful to call out the specific case when a port
> > > > > > name/identifier MUST change. How about something like :
> > > > > >
> > > > > > "If a portal group is re-configured such that all its previously
> > > > > > advertised network portals are no longer a part of the portal
> > > group,
> > > > > > then, the portal group tag (and thereby, the port
> name/identifier)
> > > > > > *MUST* be changed to indicate a new target port."
> > > > > >
> > > > > > This would allow access to the target port through its un-altered
> > > > > > network portals to continue un-disrupted. More comments inline,
> in
> > > > > > response to some of your queries.
> > > > > >
> > > > > > Thanks,
> > > > > > Santosh
> > > > > >
> > > > > > NOTE : In this discussion target port and target portal group are
> > > used
> > > > > > to imply the same entity, within a target node.
> > > > > >
> > > > > >
> > > > > > Jim Hafner wrote:
> > > > > >
> > > > > > > SAM-2 requires scsi port names to be persistent and
> > > > world-wide-unique.
> > > > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > > > >
> > > > > > > "A scsi port name shall never change and may be used to
> > > persistently
> > > > > > > identify a scsi initiator port or target port...".
> > > > > > >
> > > > > > > <JLH>
> > > > > > > There are different ways that one can interpret this
> > > "persistent"
> > > > > rule. The
> > > > > > > intent was that names shouldn't change over time when
> > > *identifying
> > > > the
> > > > > same
> > > > > > > object*.   What that means is that if the object changes (in
> any
> > > > > > > discernable way), then the name should change.  So, the object
> > > can
> > > > > move to
> > > > > > > a different piece of hardware, but it can still be named the
> > > same
> > > > way.
> > > > >  If
> > > > > > > the object changes, e.g., in this case, reconfigures as a
> > > different
> > > > > set of
> > > > > > > network portals with different addressing elements, then I
> would
> > >
> > > > think
> > > > > that
> > > > > > > the name should change as well.   That's all the persistence
> one
> > > > > really
> > > > > > > needs.
> > > > > > >
> > > > > > > I'm not sure what that implies about your recommendation.  I
> > > don't
> > > > see
> > > > > any
> > > > > > > problem with it, either.
> > > > > > > </JLH>
> > > > > >
> > > > > > I think we may be in agreement. (See reasoning above).
> > > > > >
> > > > > >
> > > > > > >
> > > > > > > The rationale for (2) is :
> > > > > > > --------------------------
> > > > > > > Consider an initiator node establishing multiple sessions to a
> > > scsi
> > > > > tgt
> > > > > > > port, with each session established to a subset of the network
> > > > portals
> > > > > > > within the tgt portal group.
> > > > > > >
> > > > > > > Consider an iscsi transport event involving the
> re-configuration
> > > of
> > > > > > > target portal groups on the iscsi target node. This may be
> > > preceeded
> > > > > by
> > > > > > > the iscsi sessions seeing an async message "target requests
> > > logout",
> > > > > > > followed by session logout, portal group re-configuration, and
> > > then,
> > > > > the
> > > > > > > initiator re-establishes sessions.
> > > > > > >
> > > > > > > Across a transport event that results in such session
> > > termination
> > > > and
> > > > > > > re-establishment, the initiator needs to authenticate that it
> is
> > >
> > > > still
> > > > > > > speaking to the same [i]scsi target port, in order to ensure
> > > that
> > > > any
> > > > > > > open/active I-T-L nexus traffic on that session is not
> > > incorrectly
> > > > > > > routed to a wrong LUN after such a transport event.
> > > > > >
> > > > > > > <JLH>
> > > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > > have
> > > > > been
> > > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > > issue
> > > > at
> > > > > all.
> > > > > >
> > > > > > On a session logout & re-login, it is not efficient/necessary to
> > > close
> > > > > > and re-open each LUN behind that target port, due to the fact
> that
> > > a
> > > > > > target port may have hundred's of LUNs behind it.
> > > > > >
> > > > > > All outstanding I/Os need to be aborted. Once the session is
> > > > > > re-established [and the target port is authenticated to be the
> > > same],
> > > > > > further I/O traffic can be resumed without requiring the SCSI ULP
> > > to
> > > > > > close and re-open each LUN. Some transport specific clearing
> > > effects
> > > > may
> > > > > > have occurred, which may require additional LUN level activity,
> in
> > >
> > > > some
> > > > > > cases.
> > > > > >
> > > > > > (There are analogies to the above model in FCP & SRP, which
> > > > authenticate
> > > > > > port name/identifier on login, allowing I/O resumption after
> > > session
> > > > > > termination and re-establishment.)
> > > > > >
> > > > > >
> > > > > > > To prevent such authentication issues, iscsi can send the iscsi
> > > > target
> > > > > > > port identifier (portal group tag) explicitly in the login
> > > request,
> > > > > and
> > > > > > > the login can be rejected by the target on a portal group tag
> > > > > mis-match.
> > > > > > > (if the network portal does not belong to the addressed portal
> > > group
> > > > > > > tag).
> > > > > > > <JLH>
> > > > > > > Did you mean for the initiator to send this TPGT?
> > > > > > > </JLH>
> > > > > >
> > > > > > Yes. The initiator login request must include the target portal
> > > group
> > > > > > tag, thus identifying the target port to which a session is being
> > > > > > established.
> > > > > >
> > > > > > Login currently carries no addressing information, since the
> > > > addressing
> > > > > > is implicit, based on the TCP connection in use. The problem with
> > > this
> > > > > > approach is that the login implicitly addresses a network portal,
> > > and
> > > > > > not the target port. As seen in the earlier example, the
> > > association
> > > > of
> > > > > > network portal <-> target port can change, and such changes can
> be
> > > > > > detected, if the initiator were to explicitly identify the target
> > > port
> > > > > > being logged into.
> > > > > >
> > > > > > --
> > > > > > ##################################
> > > > > > Santosh Rao
> > > > > > Software Design Engineer,
> > > > > > HP-UX iSCSI Driver Team,
> > > > > > Hewlett Packard, Cupertino.
> > > > > > email : santoshr@cup.hp.com
> > > > > > Phone : 408-447-3751
> > > > > > ##################################
> > > > > > *
> > > > > > * For T10 Reflector information, send a message with
> > > > > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > > > > >
> > > > >
> > > > >
> > > > >
> > > >
> > > >
> > > >
> > > >
> > > *
> > > * For T10 Reflector information, send a message with
> > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > >
> > >
> >
> >
> >
> >
> >
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Wed Mar 13 16:48:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA20826
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 16:48:25 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DLGb026308
	for ips-outgoing; Wed, 13 Mar 2002 16:16:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DLGZH26304
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 16:16:35 -0500 (EST)
Received: from hq-ex-c2.brocade.com (hq-ex-c2 [192.168.126.35])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id NAA22454;
	Wed, 13 Mar 2002 13:16:27 -0800 (PST)
Received: by hq-ex-c2.brocade.com with Internet Mail Service (5.5.2653.19)
	id <G5JYVAHM>; Wed, 13 Mar 2002 13:16:27 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D119A6@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: "'Paul Koning'" <ni1d@arrl.net>, Robert Snively <rsnively@Brocade.COM>
Cc: ips@ece.cmu.edu
Subject: RE: sector alignment for DataOut PDUs?
Date: Wed, 13 Mar 2002 13:16:25 -0800
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Why would an initiator provide any different amount of data than
that requested by an R2T?  By the SCSI SAM definitions, it always
has that data available to send.  

> However, if
> you want to require the initiator to send exactly the amount that the
> target is asking for (for example, by changing the description of R2T
> to say that the amount of data sent by the initiator "MUST be exactly
> equal to the Desired Data Transfer Length specified in the R2T" rather
> than "MUST not exceed the Desired Data Transfer Length specified in
> the R2T" as in the current text), that too imposes a constraint on the
> initiator's data flow engine by the target. 

Yes, I absolutely believe that the description of R2T should be changed
to read (for write data):

	"MUST be exactly equal to the Desired Data Transfer 
	Length specified in the R2T"

The target should never ask for more data than is available or
can be transferred according to any constraining parameters, and
should be considered guilty of a protocol error if it does.  

I would have to be convinced to think that this is not a last call issue.

Bob


> -----Original Message-----
> From: Paul Koning [mailto:ni1d@arrl.net]
> Sent: Monday, March 04, 2002 11:07 AM
> To: rsnively@brocade.com
> Cc: ips@ece.cmu.edu
> Subject: RE: sector alignment for DataOut PDUs?
> 
> 
> >>>>> "Robert" == Robert Snively <rsnively@brocade.com> writes:
> 
>  >> > There has always been a feeling that it was nice to do things >
>  >> on convenient boundaries, including memory page boundaries and >
>  >> device physical block boundaries, but SCSI has long since >
>  >> elected to perform any operation on almost any boundary.  SCSI
>  >> drives > and related operating systems have commonly used block
>  >> sizes of 512 > bytes and 520 bytes and less commonly of other
>  >> values.  > > The only requirement we were able to enforce in
>  >> previous > SCSI protocols is that all but the last PDU of a
>  >> transfer > were required to be on 4 byte boundaries.  We were also
>  >> > able to enforce the maximum values and a requirement that > the
>  >> transferred data count exactly match the requested byte > count.
>  >> 
>  >> I don't see that last point.  Certainly not for unsolicited data
>  >> -- and for R2T I can find no stated requirement to send exactly
>  >> the requested count either.  Or did you mean the total for the
>  >> entire operation as opposed to the individual bursts?
>  >> 
> 
>  Robert> I haven't reviewed all of iSCSI's rules with respect to this
>  Robert> particular issue.  There appears to be an assumption of
>  Robert> non-congested processor-sized buffers that allow unsolicited
>  Robert> write data transfer.  That may be a convenient assumption for
>  Robert> some devices, but a problem for those that want more control
>  Robert> of their buffering.  In general, the requests for write data
>  Robert> are part of the logical unit's write buffer management and
>  Robert> data striping management.  If you don't supply exactly what
>  Robert> is asked for, you foul up the buffer management of the
>  Robert> target, sometimes causing pathological performance problems.
> 
> I agree that this is a concern.  But the iSCSI spec allows initiators
> to do what you don't want them to do.
> 
>  >> ...
>  >> Given alignment, each iSCSI PDU that carries data can be sent to
>  >> disk by itself, because it corresponds exactly to one or more disk
>  >> blocks.  Without alignment, doing writes when the data arrives is
>  >> still possible, but it clearly adds complexity because PDU
>  >> boundaries don't match disk block boundaries.
>  >> 
>  >> I made the proposal because it clearly helps the target and
>  >> appears to add no significant burden on the initiator.  The
>  >> feedback to date indicates that this is indeed the case.
>  >> 
>  >> Are you saying "I don't care one way or the other" or are you
>  >> saying "I feel this is a bad idea because it creates problems you
>  >> haven't thought of"?  I'm reading your comment as the former; if
>  >> you meant the latter, could you elaborate?
> 
>  Robert> I think I am saying that I care, and that it is an idea that
>  Robert> will trap you into limiting simplifications.  In general, the
>  Robert> initiator's data flow engine has no knowledge of the logical
>  Robert> unit's physical block structure.  In addition, the page
>  Robert> structure from which you are obtaining data in the host will
>  Robert> usually have boundaries that are unrelated to the logical
>  Robert> unit's physical block structure.  While it is perfectly
>  Robert> possible to align PDU's with blocks, it requires SCSI ULP
>  Robert> information to be forced in to the lower level data transfer
>  Robert> hardware.  This is a significant inconvenience and will cost
>  Robert> performance and/or complexity.  Note that the blocks in a
>  Robert> logical unit are not all required to be the same size, and in
>  Robert> tape drives and some optical devices are typically not the
>  Robert> same size.
> 
>  Robert> I still think it is best for the logical unit to ask for what
>  Robert> it wants, then expect to get it.  The logical unit is the
>  Robert> only device in the system that really knows what it needs and
>  Robert> when it needs it.  That is one of the important SCSI
>  Robert> principles, allowing the logical unit to take over all the
>  Robert> media dependent functions from the initiator and the host
>  Robert> programming.
> 
> I think we are in agreement.
> 
> As for the point about the initiator data flow engine having no
> knowledge of the target LU block structure, that is true.  However, if
> you want to require the initiator to send exactly the amount that the
> target is asking for (for example, by changing the description of R2T
> to say that the amount of data sent by the initiator "MUST be exactly
> equal to the Desired Data Transfer Length specified in the R2T" rather
> than "MUST not exceed the Desired Data Transfer Length specified in
> the R2T" as in the current text), that too imposes a constraint on the
> initiator's data flow engine by the target. 
> 
> That constraint isn't quite identical to the one needed to support the
> data PDU alignment, but it's pretty similar.  Either way, the
> initiator lost some of its freedom to send exactly what it wants to
> send.
> 
> Also, the arguments for doing it are the same in both cases: giving
> the target some control over how the initiator breaks up the outgoing
> data, so the target can arrange its buffering and memory management
> efficiently.
> 
> You're right that this proposal isn't particularly applicable to
> tapes.  I don't want to claim that every target will want to use the
> proposed alignment capability -- only that there are enough targets
> that will get a significant benefit from it to make the feature worth
> having. 
> 
> 	paul
> 
> 


From owner-ips@ece.cmu.edu  Wed Mar 13 16:53:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA21042
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 16:53:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DL6jf25621
	for ips-outgoing; Wed, 13 Mar 2002 16:06:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DL6eH25614
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 16:06:41 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id NAA06345;
	Wed, 13 Mar 2002 13:05:47 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Wed, 13 Mar 2002 21:05:51 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMKEBNDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <25369470B6F0D41194820002B328BDD22F5793@ATLOPS>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Eddy,

	You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com




From owner-ips@ece.cmu.edu  Wed Mar 13 17:03:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA21352
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 17:03:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DL1sR25255
	for ips-outgoing; Wed, 13 Mar 2002 16:01:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DL1qH25251
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 16:01:52 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQVX>; Wed, 13 Mar 2002 16:01:51 -0500
Message-ID: <25369470B6F0D41194820002B328BDD210B89D@ATLOPS>
From: Sukha Ghosh <sukha_ghosh@ivivity.com>
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Wed, 13 Mar 2002 16:01:50 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CAD2.4BCACF50"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CAD2.4BCACF50
Content-Type: text/plain;
	charset="iso-8859-1"

Is it possible that A bit is defined to be valid when F bit is '1' in
Data-In PDU so that the target sets the A bit (if it requires DataACK SNACK)
only on the last Data-In PDU of a sequence. This may reduce some
aggressiveness and still satisfies the DataACK requirement from Initiator.

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it deems
that the bit is being set aggressively.
 
If it ignored it, then the target would be stalled waiting for he ACK.
 
Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,
 
The target is quite within its rights to use the A bit when at recovery
level 0.  If the session is re-established due to recovery 7.11.4 then the
relevant command is aborted anyway and so there is no reason to keep hold of
the data any way: With recovery level 0 there is no recovery mechanism that
requires the target to keep the data.  Therefore the A bit is redundant when
the recovery level is 0.
 
The spec says that the initiator MUST issue a SNACK if the A bit is set.
However, the MaxBurstSize restriction is there to prevent the initiator from
having to send a SNACK on every PDU in the case where a target inadvertently
sets the A bit in (for example) every data in PDU. The target may set the A
bit more often than the MaxBurstSize but it should not expect a SNACK more
often than this.
 
Matthew Burbridge

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.
 
The problem is that a target (perhaps an iSCSI disk drive) does not have
enough memory to transfer the full READ request so it must read from the
medium as much as it can, transmit that, when that transmission is known to
be good, read the next bunch, transmit that and so on.
 
The problem we have is that the target must keep the buffer around until the
transfer has been "ack'd" via ExpStatSN. But that status can't be sent
because all of the requested data has not been sent. So the target would
have to refuse to do the command.
 
I was going to use the A bit for this thinking it would force the initiator
to give an "ack" but our current wording does not make this a sure fire
thing:
 
1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is being set
aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.
 
Comments?
 

mailto:Eddy_Quicksall@iVivity.com <mailto:Eddy_Quicksall@iVivity.com> 
 


------_=_NextPart_001_01C1CAD2.4BCACF50
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.50.4807.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=187255720-13032002><FONT face=Arial color=#0000ff size=2>Is it 
possible that A bit is defined to be valid when F bit is&nbsp;'1' in Data-In 
PDU&nbsp;so&nbsp;that the target sets the A bit (if it requires DataACK SNACK) 
only on the last Data-In PDU of a sequence. This may reduce some aggressiveness 
and still satisfies the DataACK requirement from Initiator.</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Eddy Quicksall 
  [mailto:Eddy_Quicksall@ivivity.com]<BR><B>Sent:</B> Wednesday, March 13, 2002 
  3:03 PM<BR><B>To:</B> BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. 
  edu (E-mail)<BR><B>Subject:</B> RE: iSCSI: Use of the A 
  bit<BR><BR></FONT></DIV>
  <DIV><SPAN class=979150020-13032002><FONT face=Arial color=#0000ff size=2>Then 
  my only concern is that the <FONT color=#000000>initiator may ignore the A bit 
  if it deems that&nbsp;the bit is being set 
  aggressively.</FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=979150020-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=979150020-13032002><FONT face=Arial size=2>If it ignored it, 
  then the target would be stalled waiting for he ACK.</FONT></SPAN></DIV>
  <DIV><SPAN class=979150020-13032002><FONT face=Arial 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=979150020-13032002><FONT face=Arial 
  size=2>Eddy</FONT></SPAN></DIV>
  <BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
    <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
    size=2>-----Original Message-----<BR><B>From:</B> BURBRIDGE,MATTHEW 
    (HP-UnitedKingdom,ex2) [mailto:matthew_burbridge@hp.com]<BR><B>Sent:</B> 
    Wednesday, March 13, 2002 1:39 PM<BR><B>To:</B> 'Eddy Quicksall'; ips@ece. 
    cmu. edu (E-mail)<BR><B>Subject:</B> RE: iSCSI: Use of the A 
    bit<BR><B>Importance:</B> High<BR><BR></FONT></DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002>Eddy,</SPAN></FONT></DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002>The target is quite within its rights to use the A 
    bit when at recovery level 0.&nbsp; If the session is re-established due to 
    recovery 7.11.4 then the relevant command is aborted anyway and so there is 
    no reason to keep hold of the&nbsp;data any way: With recovery level 0 there 
    is no recovery mechanism that requires the target to keep the data.&nbsp; 
    Therefore the A bit is redundant when the recovery level is 
    0.</SPAN></FONT></DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002>The spec says that the initiator MUST issue a SNACK 
    if the A bit is set.&nbsp; However, the MaxBurstSize restriction is there to 
    prevent the initiator from having to send a SNACK on every PDU in the case 
    where a target inadvertently sets the A bit in (for example) every data in 
    PDU.&nbsp;The target may set the A bit more often than the MaxBurstSize but 
    it should not expect a SNACK more often than this.</SPAN></FONT></DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT face="Courier New" color=#800080 size=2><SPAN 
    class=953562618-13032002>Matthew Burbridge</SPAN></FONT></DIV>
    <BLOCKQUOTE style="MARGIN-RIGHT: 0px">
      <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
      size=2>-----Original Message-----<BR><B>From:</B> Eddy Quicksall 
      [mailto:Eddy_Quicksall@ivivity.com]<BR><B>Sent:</B> Wednesday, March 13, 
      2002 3:12 PM<BR><B>To:</B> ips@ece. cmu. edu (E-mail)<BR><B>Subject:</B> 
      iSCSI: Use of the A bit<BR><BR></DIV></FONT>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>Here is a case 
      that I want to go over and if there is not already a solution, I think a 
      refinement to the A bit could solve it.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem is 
      that a target (perhaps an iSCSI disk drive) does not have enough memory to 
      transfer the full READ&nbsp;request so it must read from the medium as 
      much as it can, transmit that, when that transmission is known to be good, 
      read the next bunch, transmit that and so on.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>The problem we 
      have is that the target must keep the buffer around until the transfer has 
      been "ack'd" via ExpStatSN. But that status can't be sent because all of 
      the requested data has not been sent. So the target would have to refuse 
      to do the command.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>I was going to 
      use the A bit for this thinking it would force the initiator to give an 
      "ack" but our current wording does not make this a sure fire 
      thing:</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>1) The 
      initiator may not want to run at ErrorRecoveryLevel 1.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>2) The 
      initiator may ignore the A bit if it deems that&nbsp;the bit is being set 
      aggressively.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial size=2>3) The target 
      may set the A bit no more frequently than 
MaxBurstSize.</FONT></SPAN></DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2></FONT></SPAN>&nbsp;</DIV>
      <DIV><SPAN class=516533014-13032002><FONT face=Arial 
      size=2>Comments?</FONT></SPAN></DIV>
      <DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
      <DIV><FONT face=Arial size=2>
      <DIV><SPAN class=376013222-02032002><FONT face=Arial size=2><A 
      href="mailto:Eddy_Quicksall@iVivity.com">mailto:Eddy_Quicksall@iVivity.com</A></FONT></SPAN></DIV></FONT></DIV>
      <DIV><FONT face=Arial 
size=2></FONT>&nbsp;</DIV></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CAD2.4BCACF50--


From owner-ips@ece.cmu.edu  Wed Mar 13 18:18:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA24286
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 18:18:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2DMNoK01568
	for ips-outgoing; Wed, 13 Mar 2002 17:23:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel6.hp.com (atlrel6.hp.com [156.153.255.205])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2DMNnH01564
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 17:23:49 -0500 (EST)
Received: from xatlrelay1.atl.hp.com (xatlrelay1.atl.hp.com [15.45.89.190])
	by atlrel6.hp.com (Postfix) with ESMTP
	id CA2D0A8; Wed, 13 Mar 2002 17:23:43 -0500 (EST)
Received: from xatlbh3.atl.hp.com (xatlbh3.atl.hp.com [15.45.89.188])
	by xatlrelay1.atl.hp.com (Postfix) with ESMTP
	id A3561152; Wed, 13 Mar 2002 17:23:33 -0500 (EST)
Received: by xatlbh3.atl.hp.com with Internet Mail Service (5.5.2653.19)
	id <GNZB3K3P>; Wed, 13 Mar 2002 17:23:33 -0500
Message-ID: <6BD67FFB937FD411A04F00D0B74FE87805CCF468@xrose06.rose.hp.com>
From: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>
To: "'Randy Jennings'" <randyj@data-transit.com>, ips@ece.cmu.edu
Subject: RE: recovering from a header digest error
Date: Wed, 13 Mar 2002 17:23:26 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> So, I decide that I cannot do this in my implementation (I am 
> allowed to
> escalate the problem to close the connection, I believe), and 
> I want to be a
> good boy and Logout.  Where does my Logout packet start in 
> the TCP stream?
> Again, there is no end of packet delimiter, or start of packet either.

? You've detected an error on your receive stream - the Logout packet will
be sent on your send stream.  What's the problem?


From owner-ips@ece.cmu.edu  Wed Mar 13 21:43:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28647
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 21:42:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E2Mre15476
	for ips-outgoing; Wed, 13 Mar 2002 21:22:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E2MpH15471
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 21:22:52 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP id 3B48F600385
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 18:22:46 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id SAA28092 for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 18:24:27 -0800 (PST)
Message-ID: <007601c1caff$205ad720$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "ips" <ips@ece.cmu.edu>
Subject: FCEncap: review comments
Date: Wed, 13 Mar 2002 18:22:45 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Some comments on rev6, excuse me if some/all these were earlier
discussed by the design team.

- Section 3.1, page 4.  For the Protocol# values for FCIP and iFCP, the Annex B
   should instead be referred.

- Section 3.1, pages 4 & 5.  I notice that all the ones complement fields (-Protocol#, 
   -Version etc) are described as "contains the ones complement" as opposed to "SHALL 
   contain ones complement", whereas the corresponding non-1's complement fields 
   have the SHALL wording.  Any reasons for this distinction?
  
- Section 3.1, page 5, CRCV bit description.
        "Some protocols may always check the CRC without regard for the state of this bit."
   I am troubled by the literal implication of this sentence.  Why would that be so?
   Would the encapsulating protocol not mandate CRCV to be set to valid
   always instead?  It seems like the purpose of defining a common encapsulation 
   format and associated semantics is watered down for no stated reason....

- Section 3.2.1, page 7.  S/b "step wise" w/ "stepwise".

- Section 4, page 7. 
       "The protocol SHALL specify whether or not implementation support is
         required."
   A general comment on usage of the term "protocol" here and in other areas - 
   I would recommend using "encapsulating protocol" instead to make it easier
   (or perhaps use "Protocol" may be...) for the reader to follow the usage.

- Section 4, page 8.  Since there is no mention of a notification frame to announce
   an entity's transition into/out of the Synchronized state, I assume it's possible and
   even anticipated that there may be times when one of the two entities may be
   in Unsynchronized state even while the operational encapsulating protocol requires 
   Synchronized operation.  The expectation is that the state rules (and encapsulating
   protocol-specified rules) should cause this type of start-up/transient sceanario to 
   be correctly sorted out.  Is that right?

- I think it might be useful to add a statement in this section along the lines of - 
   If the encapsulating protocol mandates Synchronized operation, the entity MUST
   NOT accept TCP connections on the well-known port(s) unless the entity is in the 
   Synchronized state. 

- Section 4, page 9, Synchronized state rules.  I think this should also address what
   is to be done in case there's a case of "bad synchronization" when Time Stamp
   words are valid.  For ex., when the received value is smaller than the received 
   entity's timebase, I assume it would result in arriving at a huge transit time.  While the 
   huge transit time may cause the frame to be discarded, it isn't clear to me what
   may cause the TCP connection drop and a re-synch.

- Section 4, page9, Synchronized state rules.  
   "If both Time Stamp words have a value of zero, the receiving
     entity SHALL process the de-encapsulated frame without
     computing the transit time. The disposition of the frame and
     any other actions by the recipient SHALL be defined by the
     protocol specification."
   
   I am rather perplexed by the usage of the words here.  While saying
   that the frame shall be "processed", this also seems to leave it up to
   the encapsulating protocol to define if it needs to be processed (as
   reaffirmed by rule (e) in Annex A).  One change that makes it clear to me is:  
    S/b "SHALL process the de-encapsulated frame" 
      w/ "SHALL de-encapsulate the frame".

- It may be useful to add informative references to FCIP and iFCP.

- Section 9, page 13.  S/b "no long working" w/ "no longer working".

- Annex B, page 15.  It isn't clear to me from this sentence if the 
   Protocol# values (1 & 2) are temporarily assigned by this draft for 
   now. 
   
    "Standards action on this RFC should be accompanied by IANA
     assignment of the following two Protocol# values:"


--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com


From owner-ips@ece.cmu.edu  Wed Mar 13 21:43:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28660
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 21:43:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E206R14134
	for ips-outgoing; Wed, 13 Mar 2002 21:00:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E204H14121;
	Wed, 13 Mar 2002 21:00:04 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id CAA123996;
	Thu, 14 Mar 2002 02:59:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E1xto61016;
	Thu, 14 Mar 2002 02:59:55 +0100
Subject: RE: iSCSI: Use of the A bit
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF84D699CC.B34A4856-ONC2256B7C.0006B91C@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Thu, 14 Mar 2002 03:17:12 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 14/03/2002 03:59:55
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Eddy,

You need the target to support SNACK so that you need some recovery
capabilities.
And yes the consensus of the group was that the scenario you describe is
not of paramount importance.
So you may ask for ACK and keep the data for a while hoping to get it :-)

Julo


                                                                                             
                      Eddy Quicksall                                                         
                      <Eddy_Quicksall@i        To:       "BURBRIDGE,MATTHEW                  
                      vivity.com>               (HP-UnitedKingdom,ex2)"                      
                      Sent by:                  <matthew_burbridge@hp.com>, "ips@ece. cmu.   
                      owner-ips@ece.cmu         edu (E-mail)" <ips@ece.cmu.edu>              
                      .edu                     cc:                                           
                                               Subject:  RE: iSCSI: Use of the A bit         
                                                                                             
                      13-03-02 22:02                                                         
                      Please respond to                                                      
                      Eddy Quicksall                                                         
                                                                                             
                                                                                             



Then my only concern is that the initiator may ignore the A bit if it deems
that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
      -----Original Message-----
      From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
      [mailto:matthew_burbridge@hp.com]
      Sent: Wednesday, March 13, 2002 1:39 PM
      To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
      Subject: RE: iSCSI: Use of the A bit
      Importance: High

      Eddy,

      The target is quite within its rights to use the A bit when at
      recovery level 0.  If the session is re-established due to recovery
      7.11.4 then the relevant command is aborted anyway and so there is no
      reason to keep hold of the data any way: With recovery level 0 there
      is no recovery mechanism that requires the target to keep the data.
      Therefore the A bit is redundant when the recovery level is 0.

      The spec says that the initiator MUST issue a SNACK if the A bit is
      set.  However, the MaxBurstSize restriction is there to prevent the
      initiator from having to send a SNACK on every PDU in the case where
      a target inadvertently sets the A bit in (for example) every data in
      PDU. The target may set the A bit more often than the MaxBurstSize
      but it should not expect a SNACK more often than this.

      Matthew Burbridge
            -----Original Message-----
            From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
            Sent: Wednesday, March 13, 2002 3:12 PM
            To: ips@ece. cmu. edu (E-mail)
            Subject: iSCSI: Use of the A bit

            Here is a case that I want to go over and if there is not
            already a solution, I think a refinement to the A bit could
            solve it.

            The problem is that a target (perhaps an iSCSI disk drive) does
            not have enough memory to transfer the full READ request so it
            must read from the medium as much as it can, transmit that,
            when that transmission is known to be good, read the next
            bunch, transmit that and so on.

            The problem we have is that the target must keep the buffer
            around until the transfer has been "ack'd" via ExpStatSN. But
            that status can't be sent because all of the requested data has
            not been sent. So the target would have to refuse to do the
            command.

            I was going to use the A bit for this thinking it would force
            the initiator to give an "ack" but our current wording does not
            make this a sure fire thing:

            1) The initiator may not want to run at ErrorRecoveryLevel 1.
            2) The initiator may ignore the A bit if it deems that the bit
            is being set aggressively.
            3) The target may set the A bit no more frequently than
            MaxBurstSize.

            Comments?

            mailto:Eddy_Quicksall@iVivity.com






From owner-ips@ece.cmu.edu  Wed Mar 13 21:44:17 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28675
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 21:44:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E205b14128
	for ips-outgoing; Wed, 13 Mar 2002 21:00:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E200H14116;
	Wed, 13 Mar 2002 21:00:00 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id CAA34556;
	Thu, 14 Mar 2002 02:59:52 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E1xqo52998;
	Thu, 14 Mar 2002 02:59:52 +0100
Subject: RE: sector alignment for DataOut PDUs?
To: Robert Snively <rsnively@Brocade.COM>
Cc: ips@ece.cmu.edu, "'Paul Koning'" <ni1d@arrl.net>, owner-ips@ece.cmu.edu,
        Robert Snively <rsnively@Brocade.COM>
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF01E8459C.CAE6C79A-ONC2256B7C.0005D6FA@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Thu, 14 Mar 2002 03:11:46 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 14/03/2002 03:59:52
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Bob,

That is a constraining design.  In all normal cases that will happen but in
some designs
the target may be willing to deal with less data than it requested.

The target may be willing to create variable length records out of pieces
of data.
There are perfectly legitimate applications for this and we don't need
strong language to help
the fixed length requirements for storage.

A host that delivers data from memory will always deliver what it is
requested.
But an initiator is not always a host.

Julo


                                                                                             
                      Robert Snively                                                         
                      <rsnively@Brocade        To:       "'Paul Koning'" <ni1d@arrl.net>,    
                      .COM>                     Robert Snively <rsnively@Brocade.COM>        
                      Sent by:                 cc:       ips@ece.cmu.edu                     
                      owner-ips@ece.cmu        Subject:  RE: sector alignment for DataOut    
                      .edu                      PDUs?                                        
                                                                                             
                                                                                             
                      13-03-02 23:16                                                         
                      Please respond to                                                      
                      Robert Snively                                                         
                                                                                             
                                                                                             



Why would an initiator provide any different amount of data than
that requested by an R2T?  By the SCSI SAM definitions, it always
has that data available to send.

> However, if
> you want to require the initiator to send exactly the amount that the
> target is asking for (for example, by changing the description of R2T
> to say that the amount of data sent by the initiator "MUST be exactly
> equal to the Desired Data Transfer Length specified in the R2T" rather
> than "MUST not exceed the Desired Data Transfer Length specified in
> the R2T" as in the current text), that too imposes a constraint on the
> initiator's data flow engine by the target.

Yes, I absolutely believe that the description of R2T should be changed
to read (for write data):

             "MUST be exactly equal to the Desired Data Transfer
             Length specified in the R2T"

The target should never ask for more data than is available or
can be transferred according to any constraining parameters, and
should be considered guilty of a protocol error if it does.

I would have to be convinced to think that this is not a last call issue.

Bob


> -----Original Message-----
> From: Paul Koning [mailto:ni1d@arrl.net]
> Sent: Monday, March 04, 2002 11:07 AM
> To: rsnively@brocade.com
> Cc: ips@ece.cmu.edu
> Subject: RE: sector alignment for DataOut PDUs?
>
>
> >>>>> "Robert" == Robert Snively <rsnively@brocade.com> writes:
>
>  >> > There has always been a feeling that it was nice to do things >
>  >> on convenient boundaries, including memory page boundaries and >
>  >> device physical block boundaries, but SCSI has long since >
>  >> elected to perform any operation on almost any boundary.  SCSI
>  >> drives > and related operating systems have commonly used block
>  >> sizes of 512 > bytes and 520 bytes and less commonly of other
>  >> values.  > > The only requirement we were able to enforce in
>  >> previous > SCSI protocols is that all but the last PDU of a
>  >> transfer > were required to be on 4 byte boundaries.  We were also
>  >> > able to enforce the maximum values and a requirement that > the
>  >> transferred data count exactly match the requested byte > count.
>  >>
>  >> I don't see that last point.  Certainly not for unsolicited data
>  >> -- and for R2T I can find no stated requirement to send exactly
>  >> the requested count either.  Or did you mean the total for the
>  >> entire operation as opposed to the individual bursts?
>  >>
>
>  Robert> I haven't reviewed all of iSCSI's rules with respect to this
>  Robert> particular issue.  There appears to be an assumption of
>  Robert> non-congested processor-sized buffers that allow unsolicited
>  Robert> write data transfer.  That may be a convenient assumption for
>  Robert> some devices, but a problem for those that want more control
>  Robert> of their buffering.  In general, the requests for write data
>  Robert> are part of the logical unit's write buffer management and
>  Robert> data striping management.  If you don't supply exactly what
>  Robert> is asked for, you foul up the buffer management of the
>  Robert> target, sometimes causing pathological performance problems.
>
> I agree that this is a concern.  But the iSCSI spec allows initiators
> to do what you don't want them to do.
>
>  >> ...
>  >> Given alignment, each iSCSI PDU that carries data can be sent to
>  >> disk by itself, because it corresponds exactly to one or more disk
>  >> blocks.  Without alignment, doing writes when the data arrives is
>  >> still possible, but it clearly adds complexity because PDU
>  >> boundaries don't match disk block boundaries.
>  >>
>  >> I made the proposal because it clearly helps the target and
>  >> appears to add no significant burden on the initiator.  The
>  >> feedback to date indicates that this is indeed the case.
>  >>
>  >> Are you saying "I don't care one way or the other" or are you
>  >> saying "I feel this is a bad idea because it creates problems you
>  >> haven't thought of"?  I'm reading your comment as the former; if
>  >> you meant the latter, could you elaborate?
>
>  Robert> I think I am saying that I care, and that it is an idea that
>  Robert> will trap you into limiting simplifications.  In general, the
>  Robert> initiator's data flow engine has no knowledge of the logical
>  Robert> unit's physical block structure.  In addition, the page
>  Robert> structure from which you are obtaining data in the host will
>  Robert> usually have boundaries that are unrelated to the logical
>  Robert> unit's physical block structure.  While it is perfectly
>  Robert> possible to align PDU's with blocks, it requires SCSI ULP
>  Robert> information to be forced in to the lower level data transfer
>  Robert> hardware.  This is a significant inconvenience and will cost
>  Robert> performance and/or complexity.  Note that the blocks in a
>  Robert> logical unit are not all required to be the same size, and in
>  Robert> tape drives and some optical devices are typically not the
>  Robert> same size.
>
>  Robert> I still think it is best for the logical unit to ask for what
>  Robert> it wants, then expect to get it.  The logical unit is the
>  Robert> only device in the system that really knows what it needs and
>  Robert> when it needs it.  That is one of the important SCSI
>  Robert> principles, allowing the logical unit to take over all the
>  Robert> media dependent functions from the initiator and the host
>  Robert> programming.
>
> I think we are in agreement.
>
> As for the point about the initiator data flow engine having no
> knowledge of the target LU block structure, that is true.  However, if
> you want to require the initiator to send exactly the amount that the
> target is asking for (for example, by changing the description of R2T
> to say that the amount of data sent by the initiator "MUST be exactly
> equal to the Desired Data Transfer Length specified in the R2T" rather
> than "MUST not exceed the Desired Data Transfer Length specified in
> the R2T" as in the current text), that too imposes a constraint on the
> initiator's data flow engine by the target.
>
> That constraint isn't quite identical to the one needed to support the
> data PDU alignment, but it's pretty similar.  Either way, the
> initiator lost some of its freedom to send exactly what it wants to
> send.
>
> Also, the arguments for doing it are the same in both cases: giving
> the target some control over how the initiator breaks up the outgoing
> data, so the target can arrange its buffering and memory management
> efficiently.
>
> You're right that this proposal isn't particularly applicable to
> tapes.  I don't want to claim that every target will want to use the
> proposed alignment capability -- only that there are enough targets
> that will get a significant benefit from it to make the feature worth
> having.
>
>            paul
>
>






From owner-ips@ece.cmu.edu  Wed Mar 13 21:47:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28708
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 21:47:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E2BKw14784
	for ips-outgoing; Wed, 13 Mar 2002 21:11:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pkoning.akdesign.com (156-88-189-66.wo.cpe.charter-ne.com [66.189.88.156])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E2BIH14779
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 21:11:19 -0500 (EST)
Received: from pkoning.akdesign.com.equallogic.com (IDENT:pkoning@localhost [127.0.0.1])
	by pkoning.akdesign.com (8.11.6/8.9.3) with SMTP id g2E2BCc01374;
	Wed, 13 Mar 2002 21:11:12 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15504.1727.907039.407824@pkoning.akdesign.com>
Date: Wed, 13 Mar 2002 21:11:11 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: rsnively@Brocade.COM, ips@ece.cmu.edu
Subject: RE: ISCSI: need to fix handling of partial data transfers
References: <OF01E8459C.CAE6C79A-ONC2256B7C.0005D6FA@telaviv.ibm.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

(changing the subject from: RE: sector alignment for DataOut PDUs?)

>>>>> "Julian" == Julian Satran <Julian_Satran@il.ibm.com> writes:

 Julian> Bob,

 Julian> That is a constraining design.  In all normal cases that will
 Julian> happen but in some designs the target may be willing to deal
 Julian> with less data than it requested.

 Julian> The target may be willing to create variable length records
 Julian> out of pieces of data.  There are perfectly legitimate
 Julian> applications for this and we don't need strong language to
 Julian> help the fixed length requirements for storage.

 Julian> A host that delivers data from memory will always deliver
 Julian> what it is requested.  But an initiator is not always a host.

If we want that case to be supported, then the spec must be changed to
require targets to accept that.

	paul



From owner-ips@ece.cmu.edu  Wed Mar 13 22:36:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA00495
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 22:36:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E2uTl17236
	for ips-outgoing; Wed, 13 Mar 2002 21:56:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E2uRH17229
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 21:56:27 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id VAA43974;
	Wed, 13 Mar 2002 21:53:06 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E2uPa38024;
	Wed, 13 Mar 2002 19:56:25 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>
Cc: "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFF0F5BB49.DEDF4B78-ON88256B7C.000F9A98@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Wed, 13 Mar 2002 18:55:46 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/13/2002 07:56:25 PM
MIME-Version: 1.0
Content-type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2E2uRH17230
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit


I like this response.  I think it is correct and the best response so far
on this topic.

Does anyone disagree with this?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>
@ece.cmu.edu on 03/13/2002 10:39:27 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>, "ips@ece. cmu. edu
       (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit




Eddy,

The target is quite within its rights to use the A bit  when at recovery
level 0.  If the session is re-established due to recovery  7.11.4 then the
relevant command is aborted anyway and so there is no reason to  keep hold
of the data any way: With recovery level 0 there is no recovery  mechanism
that requires the target to keep the data.  Therefore the A bit  is
redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if  the A bit is set.
However, the MaxBurstSize restriction is there to  prevent the initiator
from having to send a SNACK on every PDU in the case where  a target
inadvertently sets the A bit in (for example) every data in  PDU. The
target may set the A bit more often than the MaxBurstSize but it  should
not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall  [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002  3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use  of the A bit


Here is a case  that I want to go over and if there is not already a
solution, I think a  refinement to the A bit could solve it.

The problem is  that a target (perhaps an iSCSI disk drive) does not have
enough memory to  transfer the full READ request so it must read from the
medium as much as  it can, transmit that, when that transmission is known
to be good, read the  next bunch, transmit that and so on.

The problem we  have is that the target must keep the buffer around until
the transfer has  been "ack'd" via ExpStatSN. But that status can't be sent
because all of the  requested data has not been sent. So the target would
have to refuse to do the  command.

I was going to use  the A bit for this thinking it would force the
initiator to give an "ack" but  our current wording does not make this a
sure fire thing:

1) The initiator  may not want to run at ErrorRecoveryLevel 1.
2) The initiator  may ignore the A bit if it deems that the bit is being
set  aggressively.
3) The target may  set the A bit no more frequently than MaxBurstSize.

Comments?


mailto:Eddy_Quicksall@iVivity.com







From owner-ips@ece.cmu.edu  Wed Mar 13 22:38:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA00591
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 22:38:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E30Ig17487
	for ips-outgoing; Wed, 13 Mar 2002 22:00:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E30GH17483
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 22:00:17 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id VAA52046;
	Wed, 13 Mar 2002 21:56:56 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E30Ea66070;
	Wed, 13 Mar 2002 20:00:14 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFAE5E1391.8C1F809A-ON88256B7C.00103D2A@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Wed, 13 Mar 2002 18:59:34 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/13/2002 08:00:14 PM
MIME-Version: 1.0
Content-type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2E30HH17484
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit


If it hurts, don't do that.  Keep it within MaxBurstSize constraints.  And
set MaxBurstSize correctly for the device.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Eddy Quicksall <Eddy_Quicksall@ivivity.com>@ece.cmu.edu on 03/13/2002
12:02:38 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)"
       <matthew_burbridge@hp.com>, "ips@ece. cmu. edu (E-mail)"
       <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit




Then  my only concern is that the initiator may ignore the A bit  if it
deems that the bit is being set  aggressively.

If it ignored it,  then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW  (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent:  Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece.  cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A  bit
Importance: High


Eddy,

The target is quite within its rights to use the A  bit when at recovery
level 0.  If the session is re-established due to  recovery 7.11.4 then the
relevant command is aborted anyway and so there is no  reason to keep hold
of the data any way: With recovery level 0 there is  no recovery mechanism
that requires the target to keep the data.   Therefore the A bit is
redundant when the recovery level is  0.

The spec says that the initiator MUST issue a SNACK  if the A bit is set.
However, the MaxBurstSize restriction is there to  prevent the initiator
from having to send a SNACK on every PDU in the case  where a target
inadvertently sets the A bit in (for example) every data in  PDU. The
target may set the A bit more often than the MaxBurstSize but it  should
not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall  [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13,  2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject:  iSCSI: Use of the A bit


Here is a case  that I want to go over and if there is not already a
solution, I think a  refinement to the A bit could solve it.

The problem is  that a target (perhaps an iSCSI disk drive) does not have
enough memory to  transfer the full READ request so it must read from the
medium as much  as it can, transmit that, when that transmission is known
to be good, read  the next bunch, transmit that and so on.

The problem we  have is that the target must keep the buffer around until
the transfer has  been "ack'd" via ExpStatSN. But that status can't be sent
because all of the  requested data has not been sent. So the target would
have to refuse to do  the command.

I was going to  use the A bit for this thinking it would force the
initiator to give an  "ack" but our current wording does not make this a
sure fire  thing:

1) The initiator  may not want to run at ErrorRecoveryLevel 1.
2) The initiator  may ignore the A bit if it deems that the bit is being
set  aggressively.
3) The target  may set the A bit no more frequently than MaxBurstSize.

Comments?


mailto:Eddy_Quicksall@iVivity.com







From owner-ips@ece.cmu.edu  Wed Mar 13 22:38:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA00607
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 22:38:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E3D4u18220
	for ips-outgoing; Wed, 13 Mar 2002 22:13:04 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E3D2H18212
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 22:13:02 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id WAA59402;
	Wed, 13 Mar 2002 22:09:41 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E3D0a17654;
	Wed, 13 Mar 2002 20:13:00 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: "Rod Harrison" <rod.harrison@windriver.com>
Cc: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFDB201CFC.B63C6C5F-ON88256B7C.0010B9A1@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Wed, 13 Mar 2002 19:12:21 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/13/2002 08:12:59 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to "This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>, "BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece. cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com







From owner-ips@ece.cmu.edu  Wed Mar 13 23:23:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA01239
	for <ips-archive@odin.ietf.org>; Wed, 13 Mar 2002 23:23:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E3Wkq19242
	for ips-outgoing; Wed, 13 Mar 2002 22:32:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E3PdH18832
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 22:25:49 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP id 7F7BFC00192
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 19:25:33 -0800 (PST)
Received: (from santoshr@localhost)
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) id TAA28238
	for ips@ece.cmu.edu; Wed, 13 Mar 2002 19:25:21 -0800 (PST)
From: Santosh Rao <santoshr@hpcuhe.cup.hp.com>
Message-Id: <200203140325.TAA28238@hpcuhe.cup.hp.com>
Subject: Re: iSCSI: Use of the A bit
To: ips@ece.cmu.edu (ips)
Date: Wed, 13 Mar 2002 19:25:21 -0800 (PST)
In-Reply-To: <OFDB201CFC.B63C6C5F-ON88256B7C.0010B9A1@boulder.ibm.com> from "John Hufferd" at Mar 13, 2002 07:12:21 PM
X-Mailer: ELM [version 2.5 PL2]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> 
> Actually it does not actually say that.  It says "This is limited to
> sessions that support error recovery and is implemented through the A bit
> ..."
> 
> I know what I am about to say, is nit picking, but ....
> ErrorRecoveryLevel=0 is an error recovery technique.
> 
> Having said that, we probably should just change that statement to "This is
> implemented through the A bit ..."

John,

Initiators that use "ErrorRecoveryLevel=0" must not be required to respond to
an A bit setting with a DataACK. "ErrorRecoveryLevel=0" implies the initiator
need not support/use SNACK pdu.  

A target can recycle its data buffers once it has completed sending the data,
since it knows that the initiator will not issue Data SNACK while operating as
"ErrorRecoveryLevel=0".

- Santosh

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Thu Mar 14 01:04:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA02884
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 01:04:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E4mhL23335
	for ips-outgoing; Wed, 13 Mar 2002 23:48:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from magic.adaptec.com (magic.adaptec.com [208.236.45.80])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E4mVH23278
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 23:48:32 -0500 (EST)
Received: from redfish.adaptec.com (redfish.adaptec.com [162.62.50.11])
	by magic.adaptec.com (8.10.2+Sun/8.10.2) with ESMTP id g2E4lNj27695;
	Wed, 13 Mar 2002 20:47:23 -0800 (PST)
Received: from yahoo.com (europa.hyd.adaptec.com [192.168.1.77])
	by redfish.adaptec.com (8.8.8+Sun/8.8.8) with ESMTP id UAA11255;
	Wed, 13 Mar 2002 20:47:22 -0800 (PST)
Message-ID: <3C902BA4.90805@yahoo.com>
Date: Thu, 14 Mar 2002 10:18:36 +0530
From: Ajit Aryan <digital_aryan@yahoo.com>
Reply-To: digital_aryan@yahoo.com
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.4) Gecko/20011126 Netscape6/6.2.1
X-Accept-Language: en-us
MIME-Version: 1.0
To: Santosh Rao <santoshr@hpcuhe.cup.hp.com>
CC: ips <ips@ece.cmu.edu>
Subject: Re: iSCSI: Use of the A bit
References: <200203140325.TAA28238@hpcuhe.cup.hp.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Santosh, your argument seems fair.

Aryan

Santosh Rao wrote:

>>Actually it does not actually say that.  It says "This is limited to
>>sessions that support error recovery and is implemented through the A bit
>>..."
>>
>>I know what I am about to say, is nit picking, but ....
>>ErrorRecoveryLevel=0 is an error recovery technique.
>>
>>Having said that, we probably should just change that statement to "This is
>>implemented through the A bit ..."
>>
>
>John,
>
>Initiators that use "ErrorRecoveryLevel=0" must not be required to respond to
>an A bit setting with a DataACK. "ErrorRecoveryLevel=0" implies the initiator
>need not support/use SNACK pdu.  
>
>A target can recycle its data buffers once it has completed sending the data,
>since it knows that the initiator will not issue Data SNACK while operating as
>"ErrorRecoveryLevel=0".
>
>- Santosh
>



From owner-ips@ece.cmu.edu  Thu Mar 14 04:39:44 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA13571
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 04:39:44 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E8srF06562
	for ips-outgoing; Thu, 14 Mar 2002 03:54:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E8spH06555
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 03:54:51 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id DAA60438;
	Thu, 14 Mar 2002 03:51:30 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2E8sna17538;
	Thu, 14 Mar 2002 01:54:49 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iSCSI: Use of the A bit
To: Santosh Rao <santoshr@hpcuhe.cup.hp.com>
Cc: ips@ece.cmu.edu (ips)
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF89D78A7B.7591A0F1-ON88256B7C.002E93FB@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 14 Mar 2002 00:54:10 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/14/2002 01:54:49 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


I am not sure that was the problem.  The point was if they have such a
device that has such a shortage of memory that it can never complete the
I/O without running out of buffer.  It wants to free up the buffer so that
it can send some more data so that it can fulfill the Read request.

If the Initiator supports the A-bit SNACK (which is optional), then some
buffer control would be possible.  But as was pointed out by Matthew, with
ErrorRecoveryLevel=0, there is no need to even use the A-bit, since there
is no error recovery within command, you can just send the data, then
refill the buffer.  If there is an error, the session has to be torn down.

However, if you have that same type of device but support
ErrorRecoveryLevel=1, then SNACK with A-bit support seems like an strong
preference for a corresponding initiator.  If the device detects that the
A-bit is not supported at the initiator (because A-bit was set, but no
response was received at the approprate after a period of time), then it
probably should "promote" the recovery to level=0, and start refilling the
buffers as mentioned above.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Santosh Rao <santoshr@hpcuhe.cup.hp.com>@ece.cmu.edu on 03/13/2002 07:25:21
PM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu (ips)
cc:
Subject:    Re: iSCSI: Use of the A bit



>
> Actually it does not actually say that.  It says "This is limited to
> sessions that support error recovery and is implemented through the A bit
> ..."
>
> I know what I am about to say, is nit picking, but ....
> ErrorRecoveryLevel=0 is an error recovery technique.
>
> Having said that, we probably should just change that statement to "This
is
> implemented through the A bit ..."

John,

Initiators that use "ErrorRecoveryLevel=0" must not be required to respond
to
an A bit setting with a DataACK. "ErrorRecoveryLevel=0" implies the
initiator
need not support/use SNACK pdu.

A target can recycle its data buffers once it has completed sending the
data,
since it knows that the initiator will not issue Data SNACK while operating
as
"ErrorRecoveryLevel=0".

- Santosh

--
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################





From owner-ips@ece.cmu.edu  Thu Mar 14 04:43:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA13640
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 04:43:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2E9ROd07881
	for ips-outgoing; Thu, 14 Mar 2002 04:27:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E9RKH07875
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 04:27:21 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id BAA29692;
	Thu, 14 Mar 2002 01:26:44 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 09:26:48 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMOECBDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <OFDB201CFC.B63C6C5F-ON88256B7C.0010B9A1@boulder.ibm.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John,

	Actually 9.7.2 says almost exactly that ...

	"For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

	We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

	Having said that it is very easy to support just the positive form of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com







From owner-ips@ece.cmu.edu  Thu Mar 14 07:04:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA15404
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 07:04:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EBJEi23233
	for ips-outgoing; Thu, 14 Mar 2002 06:19:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EBJBH23228;
	Thu, 14 Mar 2002 06:19:11 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id MAA51964;
	Thu, 14 Mar 2002 12:19:03 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2EBJ1W80188;
	Thu, 14 Mar 2002 12:19:02 +0100
Subject: Re: ISCSI: need to fix handling of partial data transfers
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFAD5D610E.90D8A60D-ONC2256B7C.003C1892@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Thu, 14 Mar 2002 13:11:12 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 14/03/2002 13:19:02
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I was under the impression that all over SCSI an initiator sending less
data than requested by a target is tolerable.
from a SCSI point if view but it is not always tolerable at device level.
I will change the wording to better convey this - i.e. choosing another
error code for failing on the FirstBurstSize and not meeting the Desired
Data Length ( "Not Enough Data" instead of "Protocol Error") and attach the
corresponding SCSI error status and sense (as we did with data errors).
Is this acceptable?

Julo


                                                                                                        
                      Paul Koning                                                                       
                      <ni1d@arrl.net>          To:       ips@ece.cmu.edu                                
                      Sent by:                 cc:                                                      
                      owner-ips@ece.cmu        Subject:  ISCSI: need to fix handling of partial data    
                      .edu                      transfers                                               
                                                                                                        
                                                                                                        
                      13-03-02 19:11                                                                    
                      Please respond to                                                                 
                      Paul Koning                                                                       
                                                                                                        
                                                                                                        



Here's a point I mentioned before, but it got mixed up in the debate
over the "PDU sector alignment" proposal and wasn't resolved.  So here
it is again, standalone.

There are several places in the protocol where one end specifies a
quantity of data that it would like to see.  Currently, the spec
allows the amount of data transfered to be less than what was asked
for, BUT it also allows the recipient of that data to complain
("Protocol error") if what is received is less than what was asked
for.

In other words, the spec explicitly allows conforming implementations
that do not interoperate.

I do not believe this makes any sense.  Failure to interoperate due to
an implementation bug I can understand: if that happens you fix the
code.  But it is not at all reasonable for the spec to permit one end
to send a sequence of protocol messages, and then permit the other end
to reply to that CONFORMING sequence with the reply "Protocol error".

In particular:

R2T specifies Desired Data Transfer Length.  Section 9.8 allows the
initiator to reply with less than that amount, and it then allows the
target to call that a protocol error.

Similarly, section 9.3.5 allows an initiator to send less than
FirstBurstSize unsolicited data even when the total transfer length is
more than that, yet it allows the target to reject such transfers.

These need to be changed.  There are two possible fixes:

1. Tighten up the initiator rules to require the initiator to send
precisely the requested amount (i.e., Desired Data Transfer Length in
response to R2T, and the negotiated FirstBurstSize as unsolicited
data) rather than an arbitrary amount <= that amount.  In other words,
in the 4th paragraph of 9.3.5 change "SHOULD" to "MUST"; in the 3rd
paragraph of 9.8  change "MUST not exceed" to "MUST exactly equal" and
before "If the last PDU..." insert "The total amount of data sent by
the initiator must exactly equal the Desired Data Transfer Length."

2. Alternatively, tighten up the target rules, requiring the target to
accept as valid and correct transfers less than the amount requested.
In other words, in the 4th paragraph of 9.3.5 replace the last
sentence by "The target MUST accept a command for which the Expected
Data Transfer Length is higher than the FirstBurstSize and for which
the initiator sent less than the FirstBurstSize unsolicited data."; in
the 3rd paragraph of 9.8 change "If the last PDU..." to "If the last
PDU (marked with the F bit) is received before the Desired Data
Transfer Length is transferred, a target MUST accept that as a valid
response to the R2T PDU."

On grounds of simplicity I prefer solution 1, but I can support either
as a valid fix of the current problem.

    paul







From owner-ips@ece.cmu.edu  Thu Mar 14 07:59:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA16215
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 07:59:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ECMMI25971
	for ips-outgoing; Thu, 14 Mar 2002 07:22:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from bramg1.net.external.hp.com (bramg1.net.external.hp.com [192.6.126.73])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ECMKH25966
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 07:22:20 -0500 (EST)
Received: from loddon.br.itc.hp.com (loddon.br.itc.hp.com [15.145.8.166])
	by bramg1.net.external.hp.com (Postfix) with SMTP
	id CDB961EE; Thu, 14 Mar 2002 13:22:19 +0100 (MET)
Received: from 15.145.8.166 by loddon.br.itc.hp.com (InterScan E-Mail VirusWall NT); Thu, 14 Mar 2002 12:22:19 -0000 (GMT Standard Time)
Received: by loddon.br.itc.hp.com with Internet Mail Service (5.5.2653.19)
	id <GTDHHV54>; Thu, 14 Mar 2002 12:22:19 -0000
Message-ID: <0B9A57FF1D57D411B47500D0B73E5CC104FF1E5E@dickens.bri.hp.com>
From: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>
To: "'Rod Harrison'" <rod.harrison@windriver.com>,
        John Hufferd <hufferd@us.ibm.com>
Cc: Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 12:22:18 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="ISO-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

	Actually 9.7.2 says almost exactly that ...

	"For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

	We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

	Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com






From owner-ips@ece.cmu.edu  Thu Mar 14 08:03:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA16285
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 08:03:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ECLLk25922
	for ips-outgoing; Thu, 14 Mar 2002 07:21:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from magic.adaptec.com (magic.adaptec.com [208.236.45.80])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ECLGH25916;
	Thu, 14 Mar 2002 07:21:16 -0500 (EST)
Received: from redfish.adaptec.com (redfish.adaptec.com [162.62.50.11])
	by magic.adaptec.com (8.10.2+Sun/8.10.2) with ESMTP id g2ECLAj24879;
	Thu, 14 Mar 2002 04:21:10 -0800 (PST)
Received: from yahoo.com (europa.hyd.adaptec.com [192.168.1.77])
	by redfish.adaptec.com (8.8.8+Sun/8.8.8) with ESMTP id EAA08866;
	Thu, 14 Mar 2002 04:21:08 -0800 (PST)
Message-ID: <3C9095FD.1080606@yahoo.com>
Date: Thu, 14 Mar 2002 17:52:21 +0530
From: Ajit Aryan <digital_aryan@yahoo.com>
Reply-To: digital_aryan@yahoo.com
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.4) Gecko/20011126 Netscape6/6.2.1
X-Accept-Language: en-us
MIME-Version: 1.0
To: Julian Satran <Julian_Satran@il.ibm.com>
CC: Paul Koning <ni1d@arrl.net>, ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject: Re: ISCSI: need to fix handling of partial data transfers
References: <OFAD5D610E.90D8A60D-ONC2256B7C.003C1892@telaviv.ibm.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Sounds good.
But I felt, "Not Enough Data" sounds generic.
Can we make it. "Insufficient Data Received" ??
Comments?
Aryan

Julian Satran wrote:

>I was under the impression that all over SCSI an initiator sending less
>data than requested by a target is tolerable.
>from a SCSI point if view but it is not always tolerable at device level.
>I will change the wording to better convey this - i.e. choosing another
>error code for failing on the FirstBurstSize and not meeting the Desired
>Data Length ( "Not Enough Data" instead of "Protocol Error") and attach the
>corresponding SCSI error status and sense (as we did with data errors).
>Is this acceptable?
>
>Julo
>
>
>                                                                                                        
>                      Paul Koning                                                                       
>                      <ni1d@arrl.net>          To:       ips@ece.cmu.edu                                
>                      Sent by:                 cc:                                                      
>                      owner-ips@ece.cmu        Subject:  ISCSI: need to fix handling of partial data    
>                      .edu                      transfers                                               
>                                                                                                        
>                                                                                                        
>                      13-03-02 19:11                                                                    
>                      Please respond to                                                                 
>                      Paul Koning                                                                       
>                                                                                                        
>                                                                                                        
>
>
>
>Here's a point I mentioned before, but it got mixed up in the debate
>over the "PDU sector alignment" proposal and wasn't resolved.  So here
>it is again, standalone.
>
>There are several places in the protocol where one end specifies a
>quantity of data that it would like to see.  Currently, the spec
>allows the amount of data transfered to be less than what was asked
>for, BUT it also allows the recipient of that data to complain
>("Protocol error") if what is received is less than what was asked
>for.
>
>In other words, the spec explicitly allows conforming implementations
>that do not interoperate.
>
>I do not believe this makes any sense.  Failure to interoperate due to
>an implementation bug I can understand: if that happens you fix the
>code.  But it is not at all reasonable for the spec to permit one end
>to send a sequence of protocol messages, and then permit the other end
>to reply to that CONFORMING sequence with the reply "Protocol error".
>
>In particular:
>
>R2T specifies Desired Data Transfer Length.  Section 9.8 allows the
>initiator to reply with less than that amount, and it then allows the
>target to call that a protocol error.
>
>Similarly, section 9.3.5 allows an initiator to send less than
>FirstBurstSize unsolicited data even when the total transfer length is
>more than that, yet it allows the target to reject such transfers.
>
>These need to be changed.  There are two possible fixes:
>
>1. Tighten up the initiator rules to require the initiator to send
>precisely the requested amount (i.e., Desired Data Transfer Length in
>response to R2T, and the negotiated FirstBurstSize as unsolicited
>data) rather than an arbitrary amount <= that amount.  In other words,
>in the 4th paragraph of 9.3.5 change "SHOULD" to "MUST"; in the 3rd
>paragraph of 9.8  change "MUST not exceed" to "MUST exactly equal" and
>before "If the last PDU..." insert "The total amount of data sent by
>the initiator must exactly equal the Desired Data Transfer Length."
>
>2. Alternatively, tighten up the target rules, requiring the target to
>accept as valid and correct transfers less than the amount requested.
>In other words, in the 4th paragraph of 9.3.5 replace the last
>sentence by "The target MUST accept a command for which the Expected
>Data Transfer Length is higher than the FirstBurstSize and for which
>the initiator sent less than the FirstBurstSize unsolicited data."; in
>the 3rd paragraph of 9.8 change "If the last PDU..." to "If the last
>PDU (marked with the F bit) is received before the Desired Data
>Transfer Length is transferred, a target MUST accept that as a valid
>response to the R2T PDU."
>
>On grounds of simplicity I prefer solution 1, but I can support either
>as a valid fix of the current problem.
>
>    paul
>



From owner-ips@ece.cmu.edu  Thu Mar 14 09:34:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA17834
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 09:34:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EDpLY00267
	for ips-outgoing; Thu, 14 Mar 2002 08:51:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EDpJH00263
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 08:51:19 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ71>; Thu, 14 Mar 2002 08:51:18 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57A9@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "'Rod Harrison'" <rod.harrison@windriver.com>,
        John Hufferd
	 <hufferd@us.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 08:51:17 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

	Actually 9.7.2 says almost exactly that ...

	"For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

	We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

	Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com





From owner-ips@ece.cmu.edu  Thu Mar 14 09:38:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA17929
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 09:38:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EDtb000576
	for ips-outgoing; Thu, 14 Mar 2002 08:55:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EDtZH00569
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 08:55:35 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ7G>; Thu, 14 Mar 2002 08:55:34 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57AA@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 08:55:32 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Why is it not of paramount importance? 

How would the target throttle its Data-In's if DataACK is optional when
ErrorRecoveryLevel != 0?

I don't know a lot about FC but parallel SCSI has this capability.

Eddy

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 13, 2002 8:17 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail); BURBRIDGE,MATTHEW
(HP-UnitedKingdom,ex2); owner-ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit



Eddy,

You need the target to support SNACK so that you need some recovery
capabilities.
And yes the consensus of the group was that the scenario you describe is
not of paramount importance.
So you may ask for ACK and keep the data for a while hoping to get it :-)

Julo


 

                      Eddy Quicksall

                      <Eddy_Quicksall@i        To:       "BURBRIDGE,MATTHEW

                      vivity.com>               (HP-UnitedKingdom,ex2)"

                      Sent by:                  <matthew_burbridge@hp.com>,
"ips@ece. cmu.   
                      owner-ips@ece.cmu         edu (E-mail)"
<ips@ece.cmu.edu>              
                      .edu                     cc:

                                               Subject:  RE: iSCSI: Use of
the A bit         
 

                      13-03-02 22:02

                      Please respond to

                      Eddy Quicksall

 

 




Then my only concern is that the initiator may ignore the A bit if it deems
that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
      -----Original Message-----
      From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
      [mailto:matthew_burbridge@hp.com]
      Sent: Wednesday, March 13, 2002 1:39 PM
      To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
      Subject: RE: iSCSI: Use of the A bit
      Importance: High

      Eddy,

      The target is quite within its rights to use the A bit when at
      recovery level 0.  If the session is re-established due to recovery
      7.11.4 then the relevant command is aborted anyway and so there is no
      reason to keep hold of the data any way: With recovery level 0 there
      is no recovery mechanism that requires the target to keep the data.
      Therefore the A bit is redundant when the recovery level is 0.

      The spec says that the initiator MUST issue a SNACK if the A bit is
      set.  However, the MaxBurstSize restriction is there to prevent the
      initiator from having to send a SNACK on every PDU in the case where
      a target inadvertently sets the A bit in (for example) every data in
      PDU. The target may set the A bit more often than the MaxBurstSize
      but it should not expect a SNACK more often than this.

      Matthew Burbridge
            -----Original Message-----
            From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
            Sent: Wednesday, March 13, 2002 3:12 PM
            To: ips@ece. cmu. edu (E-mail)
            Subject: iSCSI: Use of the A bit

            Here is a case that I want to go over and if there is not
            already a solution, I think a refinement to the A bit could
            solve it.

            The problem is that a target (perhaps an iSCSI disk drive) does
            not have enough memory to transfer the full READ request so it
            must read from the medium as much as it can, transmit that,
            when that transmission is known to be good, read the next
            bunch, transmit that and so on.

            The problem we have is that the target must keep the buffer
            around until the transfer has been "ack'd" via ExpStatSN. But
            that status can't be sent because all of the requested data has
            not been sent. So the target would have to refuse to do the
            command.

            I was going to use the A bit for this thinking it would force
            the initiator to give an "ack" but our current wording does not
            make this a sure fire thing:

            1) The initiator may not want to run at ErrorRecoveryLevel 1.
            2) The initiator may ignore the A bit if it deems that the bit
            is being set aggressively.
            3) The target may set the A bit no more frequently than
            MaxBurstSize.

            Comments?

            mailto:Eddy_Quicksall@iVivity.com





From owner-ips@ece.cmu.edu  Thu Mar 14 09:40:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA17978
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 09:40:06 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EENES02310
	for ips-outgoing; Thu, 14 Mar 2002 09:23:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EENDH02306
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:23:13 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ7Z>; Thu, 14 Mar 2002 09:23:12 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57BA@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: Recall: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 09:23:10 -0500
Expiry-Date: Sat, 16 Mar 2002 09:22:54 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Eddy Quicksall would like to recall the message, "iSCSI: Use of the A bit".


From owner-ips@ece.cmu.edu  Thu Mar 14 09:54:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA18291
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 09:54:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EEEeS01747
	for ips-outgoing; Thu, 14 Mar 2002 09:14:40 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EEEbH01735
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:14:37 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ7T>; Thu, 14 Mar 2002 09:14:36 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57B7@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 09:14:35 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Regarding my concern about the A bit ... when I read "An initiator MAY
ignore the A bit if it deems that the bit is being set aggressively by the
target (i.e.,before the MaxBurstSize limit is reached)." I missed the "i.e."
part.

Aside from the fact that I was "stupid" for not noticing that, I think the
sentence should be written so it does not need the "i.e.".


Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

	Actually 9.7.2 says almost exactly that ...

	"For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

	We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

	Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com





From owner-ips@ece.cmu.edu  Thu Mar 14 09:56:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA18325
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 09:56:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EEMRF02263
	for ips-outgoing; Thu, 14 Mar 2002 09:22:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2EEMOH02255
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:22:24 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2EEMG031190
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:22:16 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2EEMFK31181;
	Thu, 14 Mar 2002 09:22:15 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2EEMCm21293;
	Thu, 14 Mar 2002 09:22:13 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Message-ID: <15504.45588.800758.132817@pkoning.dev.equallogic.com>
Date: Thu, 14 Mar 2002 09:22:12 -0500
From: Paul Koning <ni1d@arrl.net>
To: hufferd@us.ibm.com
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
References: <OFF0F5BB49.DEDF4B78-ON88256B7C.000F9A98@boulder.ibm.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2EEMPH02257
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

>>>>> "John" == John Hufferd <hufferd@us.ibm.com> writes:

 John> I like this response.  I think it is correct and the best
 John> response so far on this topic.

I think it's essentially correct, see below.  I agree with the
conclusion. 

 >> "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)"
 >> <matthew_burbridge@hp.com> @ece.cmu.edu on 03/13/2002 10:39:27
 >> AM

 >> The target is quite within its rights to use the A bit when at
 >> recovery level 0.  If the session is re-established due to
 >> recovery 7.11.4 then the relevant command is aborted anyway and
 >> so there is no reason to keep hold of the data any way: With
 >> recovery level 0 there is no recovery mechanism that requires
 >> the target to keep the data.  Therefore the A bit is redundant
 >> when the recovery level is 0.

 >> The spec says that the initiator MUST issue a SNACK if the A
 >> bit is set.  However, the MaxBurstSize restriction is there to
 >> prevent the initiator from having to send a SNACK on every PDU
 >> in the case where a target inadvertently sets the A bit in (for
 >> example) every data in PDU. The target may set the A bit more
 >> often than the MaxBurstSize but it should not expect a SNACK
 >> more often than this.

The spec says that the target MUST NOT set the A it more often that
MaxBurstSize.  If it does, that would be a protocol violation.  Is is
perfectly reasonable for the initiator to ignore A bits that are
protocol violations; even if the spec had not stated so explicitly,
that would have been true.

     paul



From owner-ips@ece.cmu.edu  Thu Mar 14 10:39:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA19757
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 10:39:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EFEF005952
	for ips-outgoing; Thu, 14 Mar 2002 10:14:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail01g.rapidsite.net (mail01g.rapidsite.net [207.158.192.232])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2E8rQH06495
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 03:53:27 -0500 (EST)
Received: from 168.143.84.203 (168.143.84.203)
	by mail01g.rapidsite.net (RS ver 1.0.62s) with SMTP id 0630
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 03:51:46 -0500 (EST)
Message-ID: <000a01c1cb35$e14d76a0$4300a8c0@iisedi>
From: "edward" <edward@iislf.com>
To: <ips@ece.cmu.edu>
Subject: limitation of scsi read 
Date: Thu, 14 Mar 2002 10:54:40 +0200
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0007_01C1CB46.A3EC82E0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4522.1200
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200
X-Loop-Detect: 1
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0007_01C1CB46.A3EC82E0
Content-Type: text/plain;
	charset="windows-1255"
Content-Transfer-Encoding: quoted-printable

Does payload of scsi read command limited by iscsi maxburstsize =
parameter?

thanks.
------------------------------
Regards,
Edward M
IIS LTD
MAIL: edward@iislf.com
------------------------------

------=_NextPart_000_0007_01C1CB46.A3EC82E0
Content-Type: text/html;
	charset="windows-1255"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Dwindows-1255" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.3315.2870" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2>Does payload of scsi read command =
limited by iscsi=20
maxburstsize parameter?</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2>thanks.</FONT></DIV>
<DIV><FONT face=3DArial=20
size=3D2>------------------------------<BR>Regards,<BR>Edward M<BR>IIS=20
LTD<BR>MAIL: <A=20
href=3D"mailto:edward@iislf.com">edward@iislf.com</A><BR>----------------=
--------------</FONT></DIV></BODY></HTML>

------=_NextPart_000_0007_01C1CB46.A3EC82E0--


From owner-ips@ece.cmu.edu  Thu Mar 14 10:43:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20010
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 10:43:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EFG6U06117
	for ips-outgoing; Thu, 14 Mar 2002 10:16:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2E3PdH18832
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 22:25:49 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP id 7F7BFC00192
	for <ips@ece.cmu.edu>; Wed, 13 Mar 2002 19:25:33 -0800 (PST)
Received: (from santoshr@localhost)
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) id TAA28238
	for ips@ece.cmu.edu; Wed, 13 Mar 2002 19:25:21 -0800 (PST)
From: Santosh Rao <santoshr@hpcuhe.cup.hp.com>
Message-Id: <200203140325.TAA28238@hpcuhe.cup.hp.com>
Subject: Re: iSCSI: Use of the A bit
To: ips@ece.cmu.edu (ips)
Date: Wed, 13 Mar 2002 19:25:21 -0800 (PST)
In-Reply-To: <OFDB201CFC.B63C6C5F-ON88256B7C.0010B9A1@boulder.ibm.com> from "John Hufferd" at Mar 13, 2002 07:12:21 PM
X-Mailer: ELM [version 2.5 PL2]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> 
> Actually it does not actually say that.  It says "This is limited to
> sessions that support error recovery and is implemented through the A bit
> ..."
> 
> I know what I am about to say, is nit picking, but ....
> ErrorRecoveryLevel=0 is an error recovery technique.
> 
> Having said that, we probably should just change that statement to "This is
> implemented through the A bit ..."

John,

Initiators that use "ErrorRecoveryLevel=0" must not be required to respond to
an A bit setting with a DataACK. "ErrorRecoveryLevel=0" implies the initiator
need not support/use SNACK pdu.  

A target can recycle its data buffers once it has completed sending the data,
since it knows that the initiator will not issue Data SNACK while operating as
"ErrorRecoveryLevel=0".

- Santosh

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Thu Mar 14 10:50:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20273
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 10:50:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EEtPo04523
	for ips-outgoing; Thu, 14 Mar 2002 09:55:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2EEtIH04517
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:55:19 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2EEt8031477
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 09:55:08 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2EEt8K31468;
	Thu, 14 Mar 2002 09:55:08 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2EEt8B22675;
	Thu, 14 Mar 2002 09:55:08 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15504.47564.22161.433365@pkoning.dev.equallogic.com>
Date: Thu, 14 Mar 2002 09:55:08 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: ISCSI: need to fix handling of partial data transfers
References: <OFAD5D610E.90D8A60D-ONC2256B7C.003C1892@telaviv.ibm.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Julian" == Julian Satran <Julian_Satran@il.ibm.com> writes:

 Julian> I was under the impression that all over SCSI an initiator
 Julian> sending less data than requested by a target is tolerable.
 Julian> from a SCSI point if view but it is not always tolerable at
 Julian> device level. 

I'm not sure that this is true.  Looking at the SCSI specs for
guidance, I find a few words on this topic in SAM-2 (section 5.4.3,
"Data transfer protocol services").  This mentions as one of the
transfer parameters "Byte count requested by device server: number of
bytes to be moved by the data transfer request".  It doesn't say
"maximum number of bytes...".  Also, the confirmation primitives for
the Send Data-In and Receive Data-Out primitives both indicate
completion, but do not indicate an actual byte count, which again
suggests that the actual byte count is supposed to match the requested
byte count.

 Julian> I will change the wording to better convey
 Julian> this - i.e. choosing another error code for failing on the
 Julian> FirstBurstSize and not meeting the Desired Data Length ( "Not
 Julian> Enough Data" instead of "Protocol Error") and attach the
 Julian> corresponding SCSI error status and sense (as we did with
 Julian> data errors).  Is this acceptable?

It's better than what we have now, because the status code you
proposed no longer implies that there's a bug in the implementation.

I still don't like it much.  It's very ugly to have options in the
protocol where, in the middle of a long session, you suddenly get a
reject from the other side because you did something the protocol
allows that the other end doesn't support (and is allowed not to
support). 

It would be far better to resolve this one way or the other and take
away the unnecessary interoperability failures.  So I much prefer
either to require the initiator to do exactly what the target asked
for (as implied by SAM-2) or, failing that, to require the target to
accept shorter responses from the initiator -- as I proposed before.

But if we're going to use this third approach, which is to leave in
the option to reject, it would be much better if that is announced at
login so the initiator will know what the target wants, and can adjust
what it sends accordingly -- or can abandon the login if it is unable
to comply with the target's requirements.

     paul



From owner-ips@ece.cmu.edu  Thu Mar 14 12:15:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23026
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 12:15:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EGSTG11121
	for ips-outgoing; Thu, 14 Mar 2002 11:28:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EGSRH11114
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 11:28:27 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPQ01>; Thu, 14 Mar 2002 11:28:22 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57C1@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: edward <edward@iislf.com>, ips@ece.cmu.edu
Subject: RE: limitation of scsi read 
Date: Thu, 14 Mar 2002 11:28:21 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CB75.41C694F0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CB75.41C694F0
Content-Type: text/plain;
	charset="windows-1255"

Not the read command's "Expected Data Transfer Length". Just the individual
bursts that are used to satisfy the read command.
 
Eddy

-----Original Message-----
From: edward [mailto:edward@iislf.com]
Sent: Thursday, March 14, 2002 3:55 AM
To: ips@ece.cmu.edu
Subject: limitation of scsi read 


Does payload of scsi read command limited by iscsi maxburstsize parameter?
 
thanks.
------------------------------
Regards,
Edward M
IIS LTD
MAIL: edward@iislf.com <mailto:edward@iislf.com> 
------------------------------


------_=_NextPart_001_01C1CB75.41C694F0
Content-Type: text/html;
	charset="windows-1255"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=windows-1255">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><SPAN class=193412516-14032002><FONT color=#0000ff size=2>Not the read 
command's "Expected Data Transfer Length". Just the individual bursts that are 
used to satisfy the read command.</FONT></SPAN></DIV>
<DIV><SPAN class=193412516-14032002><FONT color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=193412516-14032002><FONT color=#0000ff 
size=2>Eddy</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> edward 
  [mailto:edward@iislf.com]<BR><B>Sent:</B> Thursday, March 14, 2002 3:55 
  AM<BR><B>To:</B> ips@ece.cmu.edu<BR><B>Subject:</B> limitation of scsi read 
  <BR><BR></FONT></DIV>
  <DIV><FONT face=Arial size=2>Does payload of scsi read command limited by 
  iscsi maxburstsize parameter?</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT face=Arial size=2>thanks.</FONT></DIV>
  <DIV><FONT face=Arial 
  size=2>------------------------------<BR>Regards,<BR>Edward M<BR>IIS 
  LTD<BR>MAIL: <A 
  href="mailto:edward@iislf.com">edward@iislf.com</A><BR>------------------------------</FONT></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CB75.41C694F0--


From owner-ips@ece.cmu.edu  Thu Mar 14 14:36:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA27636
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 14:36:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EIhjT20963
	for ips-outgoing; Thu, 14 Mar 2002 13:43:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EIhgH20953
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 13:43:42 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 7CD13AADB; Thu, 14 Mar 2002 11:43:36 -0700 (MST)
Received: from axcsbh5.cos.agilent.com (axcsbh5.cos.agilent.com [130.29.152.150])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 766064D7; Thu, 14 Mar 2002 11:43:35 -0700 (MST)
Received: from 130.29.152.150 by axcsbh5.cos.agilent.com (InterScan E-Mail VirusWall NT); Thu, 14 Mar 2002 11:43:34 -0700
Received: by axcsbh5.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <GLTCWADM>; Thu, 14 Mar 2002 11:43:34 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F26904@axcs09.cos.agilent.com>
From: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
To: "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "'Rod Harrison'" <rod.harrison@windriver.com>,
        John Hufferd <hufferd@us.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 11:43:31 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I also do not like the comment about having to wait until maxBurstsize byte
to set the A-bit.

I wanted to use it as Eddie suggested. To force the initiator to acknowledge
the IO so that I can release resources on the target.

This will be especially useful for hardware accelerated IOs where the chip
cannot declare the IO complete until it has been Ack'd.

Could we just change the wording to:
----
For sessions with ErrorRecoveryLevel 1 or higher the target sets this bit to
1 to indicate that it requests from the initiator a positive acknowledgement
for the data received. The target should use the A bit moderately; the A-bit
MAY only be set to 1 at the end of a data sequence.

On receiving a Data-In PDU with the A bit set to 1 the initiator MUST issued
a SNACK of type DataACK. If the initiator has detected holes in the input
sequence, it MUST postpone issuing the SNACK of type ACKN until the holes
are filled.
---

This way I can always set the A bit at the end of an IO.

Kevin Lemay

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Thursday, March 14, 2002 5:51 AM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod Harrison'; John
Hufferd
Cc: ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

	Actually 9.7.2 says almost exactly that ...

	"For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

	We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

	Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com




From owner-ips@ece.cmu.edu  Thu Mar 14 15:42:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00074
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 15:42:01 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EJb9e24698
	for ips-outgoing; Thu, 14 Mar 2002 14:37:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EJb7H24692
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 14:37:07 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id OAA64068;
	Thu, 14 Mar 2002 14:33:45 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2EJb0n92746;
	Thu, 14 Mar 2002 12:37:00 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
Cc: "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>,
        "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "'Rod Harrison'" <rod.harrison@windriver.com>,
        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF9E67CBFC.C828FE68-ON88256B7C.006A8A3B@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 14 Mar 2002 11:36:18 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/14/2002 12:37:00 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


We got to this position, since so many folks did not want to support the
positive ack.  And this approach was put in as a compromise.  I would
suggest, that the thing we are chasing is a small corner case that may not
be smart enough to operate at anything other then ErrorRecoverylevel=0.  In
any event I do not see a problem with limiting the response to MaxBurstSize
intervals.  If the interval is too big, why did the unit negotiate it to
that size?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>@ece.cmu.edu on
03/14/2002 10:43:31 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>, "BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "'Rod Harrison'"
       <rod.harrison@windriver.com>, John Hufferd/San Jose/IBM@IBMUS
cc:    "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject:    RE: iSCSI: Use of the A bit



I also do not like the comment about having to wait until maxBurstsize byte
to set the A-bit.

I wanted to use it as Eddie suggested. To force the initiator to
acknowledge
the IO so that I can release resources on the target.

This will be especially useful for hardware accelerated IOs where the chip
cannot declare the IO complete until it has been Ack'd.

Could we just change the wording to:
----
For sessions with ErrorRecoveryLevel 1 or higher the target sets this bit
to
1 to indicate that it requests from the initiator a positive
acknowledgement
for the data received. The target should use the A bit moderately; the
A-bit
MAY only be set to 1 at the end of a data sequence.

On receiving a Data-In PDU with the A bit set to 1 the initiator MUST
issued
a SNACK of type DataACK. If the initiator has detected holes in the input
sequence, it MUST postpone issuing the SNACK of type ACKN until the holes
are filled.
---

This way I can always set the A bit at the end of an IO.

Kevin Lemay

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Thursday, March 14, 2002 5:51 AM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod Harrison'; John
Hufferd
Cc: ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may
cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

 Actually 9.7.2 says almost exactly that ...

 "For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

 We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

 Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com







From owner-ips@ece.cmu.edu  Thu Mar 14 15:45:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00201
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 15:45:42 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EJnF025529
	for ips-outgoing; Thu, 14 Mar 2002 14:49:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EJnDH25523
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 14:49:13 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 45FAEAE32; Thu, 14 Mar 2002 12:49:12 -0700 (MST)
Received: from axcsbh4.cos.agilent.com (axcsbh4.cos.agilent.com [130.29.152.145])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id DF728347; Thu, 14 Mar 2002 12:49:11 -0700 (MST)
Received: from 130.29.152.145 by axcsbh4.cos.agilent.com (InterScan E-Mail VirusWall NT); Thu, 14 Mar 2002 12:49:09 -0700
Received: by axcsbh4.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <FBZX7J9T>; Thu, 14 Mar 2002 12:49:08 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F26905@axcs09.cos.agilent.com>
From: kevin_lemay@agilent.com
To: hufferd@us.ibm.com, kevin_lemay@agilent.com
Cc: Eddy_Quicksall@ivivity.com, matthew_burbridge@hp.com,
        rod.harrison@windriver.com, ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 12:49:07 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I cannot negotiate the maxBurstSize to a "nice" size because regardless of
what size is chosen, the Ios that I am processing will not line up nicely on
maxBurstSize boundaries.

Consider:

Assume the MaxBurstSize = 128K, This is the only IO on the connection.

1. The initiator sends a 64K read request to the target.
2. The target sends 64K to the initiator. Now it wants to know that all of
the data packets have been received so that resources for the IO can be
released and the IO complete sent to the OS. I cannot set the A-Bit on the
final data PDU because that would violate the clause that says:

"it MAY set the A-bit to 1 once at most every
MaxBurstSize bytes, and MUST NOT do so any more frequently than that."

But since I have the entire IO completed, I could send a Nop-Ping. That
would force the initiator to send the new StatSN which would imply all data
packets have been received. 

But there is also a more complicated case. Our chip allows the higher level
software to break IOs into its own data phases. If more than one phase is
used, then a response is not the last PDU sent and there is no work around
to get the data Ack'd.

Furthermore, negotiating the burstsize low so that I can set the a_bit when
I want has the undesired side effect of allowing only that much data per R2T
request. A definite performance squelcher.

Kevin Lemay

-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 14, 2002 11:36 AM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: 'Eddy Quicksall'; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod
Harrison'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



We got to this position, since so many folks did not want to support the
positive ack.  And this approach was put in as a compromise.  I would
suggest, that the thing we are chasing is a small corner case that may not
be smart enough to operate at anything other then ErrorRecoverylevel=0.  In
any event I do not see a problem with limiting the response to MaxBurstSize
intervals.  If the interval is too big, why did the unit negotiate it to
that size?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>@ece.cmu.edu on
03/14/2002 10:43:31 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>, "BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "'Rod Harrison'"
       <rod.harrison@windriver.com>, John Hufferd/San Jose/IBM@IBMUS
cc:    "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject:    RE: iSCSI: Use of the A bit



I also do not like the comment about having to wait until maxBurstsize byte
to set the A-bit.

I wanted to use it as Eddie suggested. To force the initiator to
acknowledge
the IO so that I can release resources on the target.

This will be especially useful for hardware accelerated IOs where the chip
cannot declare the IO complete until it has been Ack'd.

Could we just change the wording to:
----
For sessions with ErrorRecoveryLevel 1 or higher the target sets this bit
to
1 to indicate that it requests from the initiator a positive
acknowledgement
for the data received. The target should use the A bit moderately; the
A-bit
MAY only be set to 1 at the end of a data sequence.

On receiving a Data-In PDU with the A bit set to 1 the initiator MUST
issued
a SNACK of type DataACK. If the initiator has detected holes in the input
sequence, it MUST postpone issuing the SNACK of type ACKN until the holes
are filled.
---

This way I can always set the A bit at the end of an IO.

Kevin Lemay

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Thursday, March 14, 2002 5:51 AM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod Harrison'; John
Hufferd
Cc: ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may
cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

 Actually 9.7.2 says almost exactly that ...

 "For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

 We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

 Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com






From owner-ips@ece.cmu.edu  Thu Mar 14 15:46:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00286
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 15:46:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EK2f026507
	for ips-outgoing; Thu, 14 Mar 2002 15:02:41 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EK2dH26501
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 15:02:39 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <107NPRC3>; Thu, 14 Mar 2002 15:02:38 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57CC@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: John Hufferd <hufferd@us.ibm.com>
Cc: "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>,
        "'Rod Harrison'" <rod.harrison@windriver.com>,
        "ips@ece. cmu. edu (E-mail)"
	 <ips@ece.cmu.edu>,
        "LEMAY,KEVIN (A-Roseville,ex1)"
	 <kevin_lemay@agilent.com>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 15:02:36 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> why did the unit negotiate it to that size?

Well, if things are layered properly, a ULP would be able to use several
transports and at the same time. And the ULP could have dynamic needs.

The ULP should be separate enough that it only issues a "send" request to
the transport and the transport does everything it can to send it. Then, it
informs the ULP that it is finished. The ULP then re-uses the buffer for the
next "send".

The ULP should not understand the transports and especially it should not
have different code for all the different transports.

So, negotiation should depend on the transports needs, not the ULP's.

> We got to this position, since so many folks did not want to support the
positive ack.

You can do this by negotiating for ErrorRecoveryLevel = 0. Also, what is so
difficult about the positive ack when ErrorRecoveryLevel > 0 (especially
when you have all that complex code to do error recovery anyway)?

BTW, parallel SCSI can do this. Why shouldn't iSCSI? What happens when you
want to use the same ULP but upgrade to iSCSI?

Eddy

-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 14, 2002 2:36 PM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: 'Eddy Quicksall'; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod
Harrison'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



We got to this position, since so many folks did not want to support the
positive ack.  And this approach was put in as a compromise.  I would
suggest, that the thing we are chasing is a small corner case that may not
be smart enough to operate at anything other then ErrorRecoverylevel=0.  In
any event I do not see a problem with limiting the response to MaxBurstSize
intervals.  If the interval is too big, why did the unit negotiate it to
that size?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>@ece.cmu.edu on
03/14/2002 10:43:31 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>, "BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "'Rod Harrison'"
       <rod.harrison@windriver.com>, John Hufferd/San Jose/IBM@IBMUS
cc:    "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject:    RE: iSCSI: Use of the A bit



I also do not like the comment about having to wait until maxBurstsize byte
to set the A-bit.

I wanted to use it as Eddie suggested. To force the initiator to
acknowledge
the IO so that I can release resources on the target.

This will be especially useful for hardware accelerated IOs where the chip
cannot declare the IO complete until it has been Ack'd.

Could we just change the wording to:
----
For sessions with ErrorRecoveryLevel 1 or higher the target sets this bit
to
1 to indicate that it requests from the initiator a positive
acknowledgement
for the data received. The target should use the A bit moderately; the
A-bit
MAY only be set to 1 at the end of a data sequence.

On receiving a Data-In PDU with the A bit set to 1 the initiator MUST
issued
a SNACK of type DataACK. If the initiator has detected holes in the input
sequence, it MUST postpone issuing the SNACK of type ACKN until the holes
are filled.
---

This way I can always set the A bit at the end of an IO.

Kevin Lemay

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Thursday, March 14, 2002 5:51 AM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod Harrison'; John
Hufferd
Cc: ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may
cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

 Actually 9.7.2 says almost exactly that ...

 "For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

 We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

 Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com






From owner-ips@ece.cmu.edu  Thu Mar 14 16:44:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02001
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 16:44:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EL0ih00718
	for ips-outgoing; Thu, 14 Mar 2002 16:00:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic1.isus.emc.com ([168.159.129.100])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EL0hH00713
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 16:00:43 -0500 (EST)
Received: by mxic1.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <GZ43TTH7>; Thu, 14 Mar 2002 16:00:01 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375D6@CORPMX14>
From: Black_David@emc.com
To: Black_David@emc.com, ips@ece.cmu.edu, agenda@ietf.org
Subject: RE: IP Storage (ips) DRAFT Minneapolis Agenda
Date: Thu, 14 Mar 2002 15:59:53 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I made a cut/paste mistake on this.  Elizabeth Rodriguez's
correct email address is ElizabethRodriguez@ieee.org, as she
is no longer with Lucent.

Sorry,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------

> -----Original Message-----
> From: Black_David@emc.com [mailto:Black_David@emc.com]
> Sent: Tuesday, March 12, 2002 11:22 PM
> To: ips@ece.cmu.edu; agenda@ietf.org
> Subject: IP Storage (ips) DRAFT Minneapolis Agenda
> 
> 
> IETF IP Storage (IPS) Working Group
> Minneapolis IETF Meeting, March 17-21, 2002
> -------------------------------------------
> 
> CHAIRS:
> 	David L. Black <black_david@emc.com>
> 	Elizabeth Rodriguez <egrodriguez@lucent.com>
> 
> AGENDA: SUBJECT TO CHANGE
> 
> Announcement:  Most drafts aside from the MIBs are near (or 
> already in)
> Working Group Last Call.  Everyone is encouraged to review all the
> documents, prior to the meeting and:
> 1)    provide editorial feedback directly to the editors/authors
> 2)    bring up any remaining/outstanding issues immediately on the
> reflector.
> 
> ---- Monday, March 18, 1930-2200 ----
> 
> - Agenda Bashing and Administrivia (5 min)
> 	- BLUE SHEETS
> 	- NOTE WELL
> 
> - Security (25 min)
> 	draft-ietf-ips-security-11.txt	
> 
> - FC Encapsulation (10 min)
> 	draft-ietf-ips-fcencapsulation-06.txt,.pdf
> 
> 	Draft is in WG Last Call, which closes prior to this meeting.
> 	Discuss any issues raised in WG Last Call.
> 
> - FCIP (25 min)
> 	draft-ietf-ips-fcovertcipip-09.txt,.pdf
> 
> 	Draft is in WG Last Call, which closes prior to this meeting.
> 	Discuss any issues raised in WG Last Call.
> 
> - SLP and FCIP (5 min)
> 	draft-ietf-ips-fcip-slp-01.txt
> 
> 	Status update.
> 
> - FCIP MIB (5 min)
> 	draft-ietf-ips-fcip-mib-01.txt
> 
> 	Status update.
> 
> - iFCP (10 min)
> 	draft-ietf-ips-ifcp-10.txt,.pdf
> 
> 	Draft is in WG Last Call, which closes prior to this meeting.
> 	Discuss any issues raised in WG Last Call.
> 
> - iFCP MIB (5 min)
> 	draft-ietf-ips-ifcp-mib-00.txt
> 
> 	Status update
> 
> - iSNS (10 min)
> 	draft-ietf-ips-isns-08.txt
> 
> 	Status update. The related draft-tseng-dhc-isnsoption-00.txt
> 	requests allocation of a DHC option code for iSNS, and will be
> 	discussed in the DHC WG.
> 
> - iSNS MIB (5 min)
> 	draft-ietf-ips-isns-mib-01.txt
> 
> 	Status update
> 
> - FC Management MIB (15 min)
> 	draft-ietf-ips-fcmgmt-mib-01.txt
> 
> - Sheinwald iSCSI CRC draft recommendation (5 min)
> 	draft-sheinwald-iscsi-crc-01.txt
> 
> 	The authors would like the IPS WG to recommend 
> publication of this
> 	draft (or a revised version) as an informational RFC, 
> based on the
> 	useful information it contains that helped the WG 
> decide which CRC
> 	to use for iSCSI.  This draft is on the agenda 
> primarily to solicit
> 	this recommendation; no change to the iSCSI CRC is planned.
> 
> - iSCSI Plugfest Report and Discussion (25 min)
> 
> 	Results from most recent iSCSI plugfest.
> 
> ---- Tuesday, March 19, 1545-1800 ----
> 
> - Agenda Re-Bashing and Administrivia (5 min)
> 
> - SCSI MIB (25 min)
> 	draft-ietf-ips-scsi-mib-02.txt
> 		Structure diagram available at:
> ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-uml-model-01.pdf
> 		Diagram showing relationships among SCSI family of MIBS
> available at:
> ftp://ftpeng.cisco.com/mbakke/ips/scsi-mib/Visio-scsi-mib-fami
ly-01.pdf

- iSCSI (20 min)
	draft-ietf-ips-iscsi-11.txt

	Any and all remaining issues.

- iSCSI SRP Intellectual Property Rights (40 min)

	Report on known status of IPR issues for SRP, and discussion of
	requirement level (MUST/SHOULD/MAY) for SRP. 

- iSCSI Boot (5 min)
	draft-ietf-ips-iscsi-boot-05.txt

	Status update.

- iSCSI Naming and Discovery Requirements (15 min)
	draft-ietf-ips-iscsi-name-disc-05.txt

	This draft is now intended to become a standards track RFC.
	This agenda item will include discussion of whether to move
normative
	text from this draft to main iSCSI draft, in which case this draft
	will become an informational RFC.

- iSCSI stringprep (5 min)
	draft-ietf-ips-iscsi-string-prep-00.txt

	Status update.

- iSCSI MIB and IP Storage User Identity MIB (10 min)
	draft-ietf-ips-iscsi-mib-04.txt
	draft-ietf-ips-auth-mib-00.txt

	Status updates and relationships to each other and to SCSI MIB.
		Table structure diagrams available at:
ftp://ftpeng.cisco.com/mbakke/ips/iscsi-mib/working/Visio-ietf-iscsi-uml-mod
el-04.pdf
ftp://ftpeng.cisco.com/mbakke/ips/auth-mib/Visio-ietf-ips-auth-mib-00.pdf

- Use of SLP and iSNS with iSCSI (10 min)
	draft-ietf-ips-iscsi-slp-03.txt
	draft-ietf-ips-isns-08.txt

	Status updates

DESCRIPTION:

	The IP Storage WG works on using IP-based networks to transport
block storage
	traffic.  See http://www.ietf.org/html.charters/ips-charter.html


From owner-ips@ece.cmu.edu  Thu Mar 14 16:47:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02096
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 16:47:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ELcMX03255
	for ips-outgoing; Thu, 14 Mar 2002 16:38:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ELcJH03245
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 16:38:19 -0500 (EST)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g2ELc1h26676
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 15:38:01 -0600 (CST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <G5BJ0BTA>; Thu, 14 Mar 2002 13:38:01 -0800
Message-ID: <F1ADFDB1C850D311BCE20008C79162A60B744BCA@zbl6c004.corpeast.baynetworks.com>
From: "Larry Uffer"<luffer@nortelnetworks.com>
To: "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>
Subject: remove
Date: Thu, 14 Mar 2002 13:37:47 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CBA0.7C0B8460"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CBA0.7C0B8460
Content-Type: text/plain;
	charset="iso-8859-1"

remove



------_=_NextPart_001_01C1CBA0.7C0B8460
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2654.89">
<TITLE>remove</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2 FACE="Arial">remove</FONT>
</P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C1CBA0.7C0B8460--


From owner-ips@ece.cmu.edu  Thu Mar 14 16:51:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02166
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 16:51:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ELYho03034
	for ips-outgoing; Thu, 14 Mar 2002 16:34:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2ELYZH03009
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 16:34:36 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2ELYR003272
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 16:34:27 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2ELYQK03263;
	Thu, 14 Mar 2002 16:34:26 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2ELYQi08925;
	Thu, 14 Mar 2002 16:34:26 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15505.5986.121947.784744@pkoning.dev.equallogic.com>
Date: Thu, 14 Mar 2002 16:34:26 -0500
From: Paul Koning <ni1d@arrl.net>
To: kevin_lemay@agilent.com
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
References: <9F8400020EC5D311AF62009027C3961605F26904@axcs09.cos.agilent.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Kevin" == A-Roseville,ex1  <LEMAY> writes:

 Kevin> I also do not like the comment about having to wait until
 Kevin> maxBurstsize byte to set the A-bit.

 Kevin> I wanted to use it as Eddie suggested. To force the initiator
 Kevin> to acknowledge the IO so that I can release resources on the
 Kevin> target.

 Kevin> This will be especially useful for hardware accelerated IOs
 Kevin> where the chip cannot declare the IO complete until it has
 Kevin> been Ack'd.

 Kevin> Could we just change the wording to: ---- For sessions with
 Kevin> ErrorRecoveryLevel 1 or higher the target sets this bit to 1
 Kevin> to indicate that it requests from the initiator a positive
 Kevin> acknowledgement for the data received. The target should use
 Kevin> the A bit moderately; the A-bit MAY only be set to 1 at the
 Kevin> end of a data sequence.

 Kevin> On receiving a Data-In PDU with the A bit set to 1 the
 Kevin> initiator MUST issued a SNACK of type DataACK. If the
 Kevin> initiator has detected holes in the input sequence, it MUST
 Kevin> postpone issuing the SNACK of type ACKN until the holes are
 Kevin> filled.  ---

Sounds right to me.

       paul



From owner-ips@ece.cmu.edu  Thu Mar 14 18:20:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA04148
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 18:20:04 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2EMUDh06645
	for ips-outgoing; Thu, 14 Mar 2002 17:30:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2EMU8H06624
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 17:30:08 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BVQD>; Thu, 14 Mar 2002 17:29:44 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57CE@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: kevin_lemay@agilent.com, hufferd@us.ibm.com
Cc: Eddy Quicksall <Eddy_Quicksall@ivivity.com>, matthew_burbridge@hp.com,
        rod.harrison@windriver.com, ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 15:25:06 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I think we may need better explanation about why some folks don't want to do
the "positive ack".

Then maybe we can work out something that works for all of us.

Eddy

-----Original Message-----
From: kevin_lemay@agilent.com [mailto:kevin_lemay@agilent.com]
Sent: Thursday, March 14, 2002 2:49 PM
To: hufferd@us.ibm.com; kevin_lemay@agilent.com
Cc: Eddy_Quicksall@ivivity.com; matthew_burbridge@hp.com;
rod.harrison@windriver.com; ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit


I cannot negotiate the maxBurstSize to a "nice" size because regardless of
what size is chosen, the Ios that I am processing will not line up nicely on
maxBurstSize boundaries.

Consider:

Assume the MaxBurstSize = 128K, This is the only IO on the connection.

1. The initiator sends a 64K read request to the target.
2. The target sends 64K to the initiator. Now it wants to know that all of
the data packets have been received so that resources for the IO can be
released and the IO complete sent to the OS. I cannot set the A-Bit on the
final data PDU because that would violate the clause that says:

"it MAY set the A-bit to 1 once at most every
MaxBurstSize bytes, and MUST NOT do so any more frequently than that."

But since I have the entire IO completed, I could send a Nop-Ping. That
would force the initiator to send the new StatSN which would imply all data
packets have been received. 

But there is also a more complicated case. Our chip allows the higher level
software to break IOs into its own data phases. If more than one phase is
used, then a response is not the last PDU sent and there is no work around
to get the data Ack'd.

Furthermore, negotiating the burstsize low so that I can set the a_bit when
I want has the undesired side effect of allowing only that much data per R2T
request. A definite performance squelcher.

Kevin Lemay

-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 14, 2002 11:36 AM
To: LEMAY,KEVIN (A-Roseville,ex1)
Cc: 'Eddy Quicksall'; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod
Harrison'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



We got to this position, since so many folks did not want to support the
positive ack.  And this approach was put in as a compromise.  I would
suggest, that the thing we are chasing is a small corner case that may not
be smart enough to operate at anything other then ErrorRecoverylevel=0.  In
any event I do not see a problem with limiting the response to MaxBurstSize
intervals.  If the interval is too big, why did the unit negotiate it to
that size?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>@ece.cmu.edu on
03/14/2002 10:43:31 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "'Eddy Quicksall'" <Eddy_Quicksall@ivivity.com>, "BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "'Rod Harrison'"
       <rod.harrison@windriver.com>, John Hufferd/San Jose/IBM@IBMUS
cc:    "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject:    RE: iSCSI: Use of the A bit



I also do not like the comment about having to wait until maxBurstsize byte
to set the A-bit.

I wanted to use it as Eddie suggested. To force the initiator to
acknowledge
the IO so that I can release resources on the target.

This will be especially useful for hardware accelerated IOs where the chip
cannot declare the IO complete until it has been Ack'd.

Could we just change the wording to:
----
For sessions with ErrorRecoveryLevel 1 or higher the target sets this bit
to
1 to indicate that it requests from the initiator a positive
acknowledgement
for the data received. The target should use the A bit moderately; the
A-bit
MAY only be set to 1 at the end of a data sequence.

On receiving a Data-In PDU with the A bit set to 1 the initiator MUST
issued
a SNACK of type DataACK. If the initiator has detected holes in the input
sequence, it MUST postpone issuing the SNACK of type ACKN until the holes
are filled.
---

This way I can always set the A bit at the end of an IO.

Kevin Lemay

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Thursday, March 14, 2002 5:51 AM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); 'Rod Harrison'; John
Hufferd
Cc: ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I see a lot of responses talking about ErrorRecoveryLevel = 0. That was not
my original point. ErrorRecoveryLevel = 0 already has this solved. I am
talking about ErrorRecoveryLevel > 0 (I made an error in my first EMAIL and
the point may have been lost).

If the initiator has the option to ignore the A bit, the target will get
stuck. What is wrong with requiring the initiator to respond? Can we just
get that answered first?

I suspect that there is a concern that this may cause too much traffic. My
answer would be "don't buy a cheep target ... their lack of memory may
cause
degraded performance" (not intended for the spec, of course :-) ).

I also do not see the rational in not allowing the A bit more often than
MaxBurstSize. The ULP layers may not know anything about the transport
layers. So their resource issues are not known by the transport(s). The
MaxBurstSize is an iSCSI issue and may not apply to future protocols.

So, why not just say something like:

1) The initiator MUST send a DataACK SNACK if it sees the A bit set (and if
ErrorRecoveryLevel > 0)
2) The A bit may be set only when the F bit is set.

And leave it go at that?

Eddy

-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Thursday, March 14, 2002 7:22 AM
To: 'Rod Harrison'; John Hufferd
Cc: Eddy Quicksall; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


I think that what Santosh and others have stated is the correct think to do
for initiators.  If the revovery level is 0 and the A bit is set then the
initiator is quite with in its rights to ignore the A bit (If the target is
at fault then penalise the target and not the initiator).

IMHO changing the spec to make it more specific is not the right thing and
it could lead to inter operability problems.  However, I do think something
needs to be added so I propose adding the statement:

"If ErrorRecoveryLevel=0 then the initiator MAY ignore the A bit (i.e.
assume A=0)".

One could argue for the MAY to be a MUST but if there is a kind initiator
out there then let it do its stuff - it can only help the rogue target.

Matthew

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Thursday, March 14, 2002 9:27 AM
To: John Hufferd
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit


John,

 Actually 9.7.2 says almost exactly that ...

 "For sessions with ErrorRecoveryLevel 1 or higher, the target sets
this bit to 1 to indicate that it requests a positive acknowledgement
from the initiator for the data received."

 We've interpreted that to mean our initiator should ignore the A bit
if ErrorRecoveryLevel is 0.

 Having said that it is very easy to support just the positive form
of
SNACK, so I would have no objection to removing the A bits current
link to ErrorRecoveryLevel.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
John Hufferd
Sent: Thursday, March 14, 2002 3:12 AM
To: Rod Harrison
Cc: Eddy Quicksall; BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece.
cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit



Actually it does not actually say that.  It says "This is limited to
sessions that support error recovery and is implemented through the A
bit
..."

I know what I am about to say, is nit picking, but ....
ErrorRecoveryLevel=0 is an error recovery technique.

Having said that, we probably should just change that statement to
"This is
implemented through the A bit ..."


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 03/13/2002
01:05:51 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
"BURBRIDGE,MATTHEW
       (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com>, "ips@ece.
cmu.
       edu (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    RE: iSCSI: Use of the A bit



Eddy,

 You were right first time, in draft 11 section 2.5.1.5 paragraph 5
and 9.7.2 state that the A-bit is only supported if ErrorRecoveryLevel
is 1 or higher.

 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Wednesday, March 13, 2002 8:03 PM
To: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2); ips@ece. cmu. edu
(E-mail)
Subject: RE: iSCSI: Use of the A bit


Then my only concern is that the initiator may ignore the A bit if it
deems that the bit is being set aggressively.

If it ignored it, then the target would be stalled waiting for he ACK.

Eddy
-----Original Message-----
From: BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
[mailto:matthew_burbridge@hp.com]
Sent: Wednesday, March 13, 2002 1:39 PM
To: 'Eddy Quicksall'; ips@ece. cmu. edu (E-mail)
Subject: RE: iSCSI: Use of the A bit
Importance: High


Eddy,

The target is quite within its rights to use the A bit when at
recovery level 0.  If the session is re-established due to recovery
7.11.4 then the relevant command is aborted anyway and so there is no
reason to keep hold of the data any way: With recovery level 0 there
is no recovery mechanism that requires the target to keep the data.
Therefore the A bit is redundant when the recovery level is 0.

The spec says that the initiator MUST issue a SNACK if the A bit is
set.  However, the MaxBurstSize restriction is there to prevent the
initiator from having to send a SNACK on every PDU in the case where a
target inadvertently sets the A bit in (for example) every data in
PDU. The target may set the A bit more often than the MaxBurstSize but
it should not expect a SNACK more often than this.

Matthew Burbridge
-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Wednesday, March 13, 2002 3:12 PM
To: ips@ece. cmu. edu (E-mail)
Subject: iSCSI: Use of the A bit


Here is a case that I want to go over and if there is not already a
solution, I think a refinement to the A bit could solve it.

The problem is that a target (perhaps an iSCSI disk drive) does not
have enough memory to transfer the full READ request so it must read
from the medium as much as it can, transmit that, when that
transmission is known to be good, read the next bunch, transmit that
and so on.

The problem we have is that the target must keep the buffer around
until the transfer has been "ack'd" via ExpStatSN. But that status
can't be sent because all of the requested data has not been sent. So
the target would have to refuse to do the command.

I was going to use the A bit for this thinking it would force the
initiator to give an "ack" but our current wording does not make this
a sure fire thing:

1) The initiator may not want to run at ErrorRecoveryLevel 1.
2) The initiator may ignore the A bit if it deems that the bit is
being set aggressively.
3) The target may set the A bit no more frequently than MaxBurstSize.

Comments?

mailto:Eddy_Quicksall@iVivity.com





From owner-ips@ece.cmu.edu  Thu Mar 14 19:04:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA05308
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 19:04:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ENIdF09694
	for ips-outgoing; Thu, 14 Mar 2002 18:18:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ENIcH09690
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 18:18:38 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DL1XST>; Thu, 14 Mar 2002 17:18:32 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631DA@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Thu, 14 Mar 2002 17:14:20 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CBAD.F8AB4840"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CBAD.F8AB4840
Content-Type: text/plain;
	charset="iso-8859-1"

9.4.3 I have a  more general SNACK question.  When would one use use the
iSCSI, SCSI Response message with sense (reason -> SNACK rejected)?  The
reason for using this hasn't jumped out at me yet.  Does it have to do with
connection recovery?

9.16 States that SNACK support is optional.  Since "ErrorRecoveryLevel"
controls SNACK support, can something in the SNACK message description
reference how this feature is negotiated?


Also a cleanup is needed for SNACK- "RunLength".

   2.5.3.4   SNACK Request

           With the SNACK Request, the initiator requests retransmission of
num-
           bered-responses or data from the target. A single SNACK request
covers
           a contiguous set of missing items called a run of a given type of
           items (the type is indicate in a type field in the PDU header).
The
           run is composed of an initial item (StatSN, DataSN, R2TSN) and
the
           number of additional missed Status, Data, or R2T PDUs (0 means
only
           the initial). For long data-in sequences, the target may request
(at
           predefined minimum intervals) a positive acknowledgement for the
data
           sent. A SNACK request with a type field that indicates ACK and
the
           number of Data-In PDUs acknowledged conveys this positive
acknowl-
           edgement.

9.16
           The SNACK request is used to request the retransmission of
numbered-
           responses, data, or R2T PDUs from the target.  The SNACK request
indi-
           cates the missed numbered-response or data "run" to the target,
where
           the run starts with the first missed StatSN, DataSN, or R2TSN and
           indicates also the number of missed Status, Data, or R2T PDUs (0
has
           the special meaning of "all after the initial").




------_=_NextPart_001_01C1CBAD.F8AB4840
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE></TITLE>

<META content="MSHTML 5.50.4611.1300" name=GENERATOR></HEAD>
<BODY>
<P><FONT size=2>9.4.3 I have a&nbsp; more general SNACK question.&nbsp; 
Wh</FONT><FONT size=2>en would one use use the iSCSI, SCSI Response message with 
sense (reason -&gt; SNACK rejected)?&nbsp; The reason for using this hasn't 
jumped out at me yet.&nbsp; Does it have to do with connection 
recovery?</FONT></P>
<P><FONT size=2>9.16 States that SNACK support is optional.&nbsp; Since 
"ErrorRecoveryLevel" controls SNACK support, can something in the SNACK message 
description reference how this feature is negotiated?<BR></FONT></P>
<P><FONT size=2>Also a cleanup is needed 
for&nbsp;SNACK-&nbsp;"RunLength".<BR><BR>&nbsp;&nbsp; 2.5.3.4&nbsp;&nbsp; SNACK 
Request<BR><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; With 
the SNACK Request, the initiator requests retransmission of 
num-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
bered-responses or data from the target. A single SNACK request 
covers<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a 
contiguous set of missing items called a run of a given type 
of<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; items (the 
type is indicate in a type field in the PDU header). 
The<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; run is 
composed of an initial item (StatSN, DataSN, R2TSN) and 
the<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; number of 
additional missed Status, Data, or R2T PDUs <STRONG>(0 means 
only<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the 
initial). </STRONG>For long data-in sequences, the target may request 
(at<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; predefined 
minimum intervals) a positive acknowledgement for the 
data<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; sent. A 
SNACK request with a type field that indicates ACK and 
the<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; number of 
Data-In PDUs acknowledged conveys this positive 
acknowl-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
edgement.<BR><BR>9.16<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
The SNACK request is used to request the retransmission of 
numbered-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
responses, data, or R2T PDUs from the target.&nbsp; The SNACK request 
indi-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cates the 
missed numbered-response or data "run" to the target, 
where<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the run 
starts with the first missed StatSN, DataSN, or R2TSN 
and<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; indicates 
also the number of missed Status, Data, or R2T PDUs <STRONG>(0 
has<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the special 
meaning of "all after the initial").<BR></STRONG><BR></P></FONT></BODY></HTML>

------_=_NextPart_001_01C1CBAD.F8AB4840--


From owner-ips@ece.cmu.edu  Thu Mar 14 23:16:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA12168
	for <ips-archive@odin.ietf.org>; Thu, 14 Mar 2002 23:16:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2F35pB21574
	for ips-outgoing; Thu, 14 Mar 2002 22:05:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel7.hp.com (atlrel7.hp.com [156.153.255.213])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2F35oH21570
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 22:05:50 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel7.hp.com (Postfix) with ESMTP id 77154805159
	for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 22:05:44 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id TAA19247 for <ips@ece.cmu.edu>; Thu, 14 Mar 2002 19:07:21 -0800 (PST)
Message-ID: <009e01c1cbce$485b77a0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "ips" <ips@ece.cmu.edu>
References: <007401c1cbb6$e40f5120$edd52b0f@rose.hp.com>
Subject: FCIP: review comments-1
Date: Thu, 14 Mar 2002 19:05:37 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Some comments on rev9, excuse me if some/all these were earlier
discussed by the design team.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

> 2. Purpose, Motivation and Objectives
.....
>    Network. Since Fibre Channel and IP Networking technologies are
>    compatible, 

I am not sure what's implied by this sentence....

Generally, I would think that the motivation to extend an FC SAN using 
IP networks is based on the ubiquity of the IP networks.

>    The fundamental assumption made in this specification is that the
>    Fibre Channel traffic is carried over the IP Network in such a
>    manner that the Fibre Channel Fabric and all Fibre Channel devices
>    on the Fabric are unaware of the presence of the IP Network. 

Can someone please comment on the protocol interactions that result in 
the failure to set up an FCIP Link if this latency expectation is not met?

>    2)  apply the mechanism described in 1) to an FC Fabric using an IP
>        network as an interconnect for two or more islands in an FC
>        Fabric.

S/b "an" w/ "the"; S/b "for" w/ "between"

> 3. Relationship to Fibre Channel Standards
.....
>    FC is standardized under American National Standard for Information
>    Systems of the National Committee for Information Technology
>    Standards (ANSI-NCITS) in its T11 technical committee.

I believe ANSI stands for Americal National Standards Institute.  Also, 
NCITS had been changed to INCITS last year.

 >    FC-BB and FC-BB-2 describe the relationship between an FC Fabric and
>    interconnect technologies not defined in by Fibre Channel standards
>    (e.g., ATM and SONET). FC-BB-2 is the natural Fibre Channel home for
>    describing relationships to TCP/IP and FCIP.

This is the first instance of FCIP's usage as a *protocol*.  It would be best 
preceded by a definition of what FCIP means as a protocol.  The previous text 
only describes the objectives of the document, but not the protocol.

> 3.2 This Specification and Fibre Channel Standards
.....
>    No attempt is being made to define a specific API between an FCIP
>    Entity and an FC Entity at this time because doing so risks
>    compromising the performance and efficacy of the resulting products.

I am somewhat concerned that the names are implying an incorrect distribution 
of functionality between "FC Entity" and "FCIP Entity"....  

From the name, I had assumed that FC Entity is simply a standard FC fabric 
element with no FCIP-isms.  But further reading of the document made me realize 
that it in fact knows about the TCP connections and even actively participates in 
QoS and authentication decisions.

As a first time reader, it appears to me that retaining only the FC E_Port functionality 
perhaps additionally providing timestamp and flow control services to the FCIP Entity
(and dropping everything else into the FCIP Entity) may be a lot cleaner distribution 
of functionality.  At any rate, I would like to understand the current distribution rationale.

BTW, can someone please clarify if the expected "role" of the FC Entity on
the FC side is indeed an E_Port?  It appears so from the requirement that FCIP
be totally transparent to the FC fabric, but I don't see it called out in Annex G.

>....fully functional and compliant
>    products can be built provided they contain both an FCIP Entity and
>    an FC Entity. The only products that cannot be built are those that
>    contain only one or the other.

The last sentence seems to stress the obvious at first glance, but I would 
think that products with just the FC Entity should be able to be built (not
that one would...) to act as regular fabric elements with no FCIP features?

Also, I take it that products with two FC Entities and one FCIP Entity 
for ex. are disallowed - but the last sentence seems to imply otherwise.

> 4. Terminology
....

>    FCIP Entity - The principal FCIP interface point to the IP Network
>    (see section 6.4).

This doesn't sound right to me....this definition is more appropriate for FCIP_LEP.
This can perhaps be described as "the entity responsible for the FCIP protocol
exchanges on the IP Network and which encompasses FCIP_LEP(s) and FCIP Control 
& Services module".

> 5. Protocol Summary
...
>    2)  Viewed from the IP Network perspective, FCIP Entities are peers
>        and communicate using TCP/IP. Each FCIP Entity is a TCP endpoint
>        in the IP-based network.

The second sentence seems a little context-sensitive, since each FCIP Entity
can be the TCP endpoint for several TCP connections. 

> 
>    3)  Viewed from the FC Fabric perspective, pairs of FCIP Entities,
>        in combination with their associated FC Entities, serve as an FC
>        Frame transmission component of the FC Fabric. The FC End Nodes
>        are unaware of the existence of the FCIP Link.

Can a "FC Frame transmission component" be something other than an E_Port?

>    6)  An FCIP Entity MAY contain multiple FCIP Link Endpoints, 

I would add "each of which MAY service multiple TCP connections, " here...

>but
>        each FCIP Link Endpoint (FCIP_LEP) communicates with exactly one
>        other FCIP_LEP.
> 
>    7)  When multiple FCIP_LEPs with multiple FCIP_DEs are in use,
>        selection of which FCIP_DE to use for encapsulating and
>        transmitting a given FC Frame is outside the scope of this
>        document. FCIP Entities do not actively participate in FC Frame
>        routing.

Couple of comments on this bullet (7) - 

Let's consider the case of multiple FCIP_DEs in one FCIP_LEP.
This draft does not specify how each inbound FC frame from the 
FC fabric is distributed onto one of these FCIP_DEs (TCP connections).   
Where is it specified in wrt routing on TCP connections?  I take it that 
the regular FC fabric routing rules aren't quite applicable in this case.

To stress the obvious, I think we should have some standard covering
this case - else we will end up with frames destined to the same D_ID
being striped on multiple TCP connections, and thus ending up OOO.

>    13) On a given TCP Connection, this specification relies on TCP/IP
>        to deliver a byte stream in the same order that it was sent.

Perhaps we should add - ", but allows confirmation of the same for each 
frame by checking the FCIP and FC CRCs."....

> 6.3 FC Entity
....
>    the combination shown in figure 3. As another example, the
>    combination cannot be used to replace cable connections in a Fibre
>    Channel Arbitrated Loop because loop primitive signals cannot be
>    encapsulated for transmission over TCP.

I am not sure the last sentence is needed since figure 3 is explicit 
about the usage of fabrics.

> 6.4 FCIP Entity
.....

>    The FCIP Entity is the connection interface point for the IP Network

As commented earlier, the "connection interface point" doesn't sound totally
correct - I would suggest "interfacing element" instead.

>    and is the owner of the IP Address and Well Known Port used to form
>    TCP Connections. An FC Fabric to IP Network interface product SHALL
>    provide each FC Entity FCIP Entity pair contained in the product

May I suggest a new term "FC-FCIP Pair" in place of "FC Entity FCIP Entity pair ".
I think it improves the general readability.

>    FC Entity with an interface to key IP Network features. The
>    interfaces to the IP Network features is implementation specific,
>    however, to maintain interoperability, the notable TCP/IP mechanisms
>    used are specified in this document as follows:

I think the last sentence is incorrectly implying interoperability issues
around the (private) FC Entity-FCIP Entity interface.

I would suggest a rewrite for the last sentence as something like -

"The interfaces to the IP Network features are implementation-specific.
  To aid interoperability, this document specifies the notable TCP/IP Network 
  features that are typically used ."

> 6.5 FCIP Link Endpoint (FCIP_LEP)
....

>An FCIP_LEP
>    MAY communicate with its FC Entity counterpart to coordinate flow
>    control.

Suggest adding the phrase "across the domains".

> 6.6 FCIP Data Engine (FCIP_DE)
.....
>    7)  In the absence of errors, the de-encapsulated FC Frame and time
>        stamp SHALL be passed to the FC Transmitter Portal for delivery
>        to the FC Entity.

It is nice to add a sentence about the handling in the presence of errors.
At a minimum, this should provide a cross-reference to the error detection
section.

> 6.6.1 FCIP Encapsulation of FC Frames
....
>    The FCIP Special Frame SHALL only be sent as the first bytes
>    transmitted in each direction on a newly formed TCP Connection and
>    only one FCIP Special Frame SHALL be transmitted in each direction
>    at that time (see section 9.1). After that all FCIP Frames SHALL
>    have the SF bit set to 0.

This para seems slightly out of context here, and perhaps should be moved
to section 9.1.  This usage semantics should ideally be preceded by what *is* 
a Special Frame and its purpose - though I could gather that from the 
usage and format descriptions in the entire document, I don't really find a
place where its purpose is defined...

> 
>    Table 1 summarizes the usage of the pFlags SF and Ch bits.

- It may be useful to add a protocol-specific bit to distinguish originated vs
echoed SF, so the parsing and validation can be self-contained.

- Also, I think a sentence should be added which says that the -pFlags field 
SHALL contain the ones-complement of the pFlags field.


From owner-ips@ece.cmu.edu  Fri Mar 15 01:56:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA14232
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 01:56:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2F5tiX29834
	for ips-outgoing; Fri, 15 Mar 2002 00:55:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2F5tfH29820
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 00:55:41 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id AAA134020;
	Fri, 15 Mar 2002 00:52:13 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2F5tVD22718;
	Thu, 14 Mar 2002 22:55:32 -0700
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: kevin_lemay@agilent.com, ips@ece.cmu.edu, matthew_burbridge@hp.com,
        rod.harrison@windriver.com, Paul Koning <ni1d@arrl.net>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF0B4D5CFD.E08FEA4A-ON88256B7D.001DCC9B@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 14 Mar 2002 21:54:50 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/14/2002 10:55:32 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


A lot of this thinking on this thread reflects the "send and Ack response"
type design.  The work last year rejected that thinking and we overtly
designed against that approach with iSCSI.  This is because, at distance,
this can be a major performance issue.  (round trip delay)

Anyway, that is why people did not want to get into the positive Ack, mode,
since 99.9999999% of the time, TCP/IP will deliver everything just fine.
Then if you look at the probability that TCP/IP thinks it did its job, but
did not detect the problem and the CRC-32c detects it, the probability is
even smaller.

To base a design on requirements for Positive Ack, when the probability of
failure is so remote, is in many people's opinions the wrong way to build
product.  And since our products need to inter-operate, and inter-operate
at distance, what one does poorly effects everyone's product.

When you put a Positive Ack into place, you encourage the type of thinking
we have been seeing on this thread, and that hurts others!  That is the
reason that folks did not like the idea of a positive Ack.

We rolled over with this small "A" bit approach because of issues with Tape
Drives since even if Rare, the resultant problem with tape can be severe,
but we put the restrictions on it that you currently see.

To make things work at distance, yes you need some additional buffering,
somewhere.

I heard the arguments that I cant get my ULP to give me enough buffers to
work with, I do not buy that argument, and I think folks are reaching for
straws to try to prove their point.  I do not doubt there will be some
really dumb devices that do not have enough buffers to do a really good
job, but that was the reason that ErrorRecoveryLevel=0 is there.  It will
happen very very rarely, that the CRC-32c will find a problem that TCP/IP
does not find.  So if you do not have the buffers to handle this "once in a
bluemoon" occurrence, then restart the session when this rare occurrence
happens.  But there is no need to impact the other implementations with a
design that will show up poorly at distance.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com



From owner-ips@ece.cmu.edu  Fri Mar 15 03:41:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA23593
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 03:41:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2F7srT04883
	for ips-outgoing; Fri, 15 Mar 2002 02:54:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2F7soH04877
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 02:54:51 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id CAA124334;
	Fri, 15 Mar 2002 02:51:28 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2F7shn103908;
	Fri, 15 Mar 2002 00:54:47 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iscsi : changes involving tgt portal group tag.
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>, <t10@t10.org>, "Jim Hafner" <hafner@almaden.ibm.com>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF6EAC9122.9E58AB23-ON88256B7D.0029421B@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 14 Mar 2002 23:53:59 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/15/2002 12:54:47 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Comments in line. Between [Huff/] and [\Huff].

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Mallikarjun C." <cbm@rose.hp.com> on 03/13/2002 11:51:38 AM

To:    John Hufferd/San Jose/IBM@IBMUS
cc:    <ips@ece.cmu.edu>, <t10@t10.org>
Subject:    Re: iscsi : changes involving tgt portal group tag.



John,

I would have much preferred you addressing each of the
reasons I listed, but let me make one more attempt at this...

1. Not specifying a *port* in the Login dialogue explicitly
    is something I am concerned could cause surprises down
    the road.  Given that a Login is meant to establish an I_T
    nexus to a port (not to a node), I am rather surprised to see
    the opposition simply because the proposal is coming late.
[Huff/]
    based on my previous note, I do not buy this as a problem, since I do
    not think this occurs without manual intervention and a significant
    time interval (and most likely a power down).  This means that it would
    seem to be a natural thing for the initiator to attempt to rediscover
    the connection.  It seems that simple wordage that Jim Hafner has
    suggested for the draft meets this issue.

    One of the reasons that I am concerned about late proposals, is that
    the full review of impacts tends not to be done adequately.  All my
    experience has shown me that the largest number of errors and retrofits
    occur with the last items added to a product, or spec.  In fact I
    believe there can be a strong correlation between time of arrival of a
    change, and the probability of unforeseen impacts.  So yes, I would
    hate to make changes this late for a problem that I am not sure even
    exist, and if it does, a rediscovery fixes the problem.
[\Huff]


2.  > manual reconfiguration (including a probable power down), that the
     Target
     > will maintain this key state ..
    This and a lot of your other text below dwells on the unlikelihood of
    target not maintaining the state - I agree with you.  My point is
    *not* that a target would, but the need to design the quickest and
    most reliable way to communicate the loss of state back to the
    initiator.
    I believe addition of TPGT to the Login Request PDU accomplishes that.

    [Huff/]
    Since I feel this type of thing is rare if a problem at all, I think
    that documentation about not affecting the TPG if state is outstanding,
    and a suggestion to the Initiator that if an unusual amount of time
    goes by with the Session Down, that a Rediscovery should be done (as if
    they would not do that anyway).  So, because of it being rare, if a
    problem at all, I am not convinced that the right approach is to
    optimize the response time to restart a session that has been down for
    a long time anyway.  If it take an extra discovery, I do not think this
    is a problem.
    [\Huff]

With that said, if you (and possibly others) still disagree on the need to
add the TPGT, I request David Black to make a consensus call on this
when appropriate, and move on.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <ips@ece.cmu.edu>; <t10@t10.org>
Sent: Tuesday, March 12, 2002 11:45 PM
Subject: Re: iscsi : changes involving tgt portal group tag.


>
> Perhaps we need to discover what causes the TPGT to change.   I think you
> are saying that the IP address has somehow changed to a different portal
> group.  Since the SCSI Port is not suppose to change its "effective"
name,
> if one was to change the IP address, you have a serious implicit change
in
> effect.
>
> I think that means that the Target Storage Controller has been taken
> offline and reconfigured.  Now if you believe that across this probable
> manual reconfiguration (including a probable power down), that the Target
> will maintain this key state (like persistent reserves) I think we are
> talking about a small corner case, which few would really expect.
> Especially since there is usually a normal quiesce and the session
stopped
> normally when that type of thing is planed to be done.  Further, one
could
> argue that if a Target chose to keep the state, it had the obligation to
> keep the same mapping of IP address to TPG.  (And the target would have
to
> have more then one Target Portal Group.)  If one was to say that the
outage
> was not planned, then usually what happens in this type of a situation,
the
> HW is fixed and restarted, not reconfigured.
>
> In fact, lets understand where the Portal gets its IP address.  It gets
it
> from the configuration software that comes with the controller.  In other
> words it is the configuration software (perhaps with Administrative
> assistance) that assigns IP address to the portals that make up a portal
> group.  It seems like if they assign it to begin with, then there is an
> obligation to keep the IP address bound to the TPG as long as a
persistent
> state exist with an LU that has a Nexus through that Portal group (SCSI
> Port).  IP addresses do not automatically move with the physical
> HBA/Portals.
>
> If I was to write an Initiator, and the above possibility worried me, I
> think I would have a time value, which if passed, I would always
rediscover
> the Node.  That value can be anything, so if "defaultTime2Wait" is not
> good, I think I would pick another time, which reflected the possibility
of
> a manual change.
>
> Bottom line, I do not think we need to have TPGT in the Login.
>
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
>
>
> "Mallikarjun C." <cbm@rose.hp.com> on 03/12/2002 04:09:33 PM
>
> To:    John Hufferd/San Jose/IBM@IBMUS
> cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> Subject:    Re: iscsi : changes involving tgt portal group tag.
>
>
>
> John,
>
> > I do not see the absolute requirement for this TPGT in the Login.
>
> That was my initial inclination as well, but now I believe there's value
> in adding the TPGT to the Login Request PDU.
>
> > it would be approprate to say that if the time for the Reconnect has
been
> > more then the "...Time2Wait" that the Initiator, if it cares about the
>
> If I understand you correctly, you are suggesting that the
DefaultTimeWait
> value negotiated *for a session* should be used for decisions after the
> end of that session.  I am afraid that it's a slippery slope...
>
> OTOH, regardless of the proposed change, it would be reasonable to add
text
> that generally expresses this idea of potential volatility of portal
> <->portal group
> association in the iSCSI (or perhaps NDT) draft.
>
> On to reasons that convinced me....
>
> - An iSCSI session is an I_T nexus, and it is between an initiator *port*
>    and a target *port*.  Login as a mechanism to instantiate/add to an
>    iSCSI session should identify the target port in question, not just
the
>    target node.  The initiator port is currently identified in the Login
>    dialogue
>   (the InitiatorName text key and the ISID field), but not the target
port.
>
> - When there has been a portal group change for an IP address (portal) -
>    meaning its TPGT had changed - it would be much more quicker to
>    identify the fact and prevent an I_T nexus establishment by way of
>    the TPGT in Login Request PDU.  The other option of having each
>    LU assert its UA (REPORTED LUNS DATA HAS CHANGED) on
>     the first command is prone to errors (see next bullet), and simply
>     ineffcient.
>
> - A target cold reset or a powercycle (possibly done after the portal
group
>    reconfiguration) would clear the aforementioned UA (but would assert
>    a different UA for the power-on reset, but this generic UA gives no
>    clue to initiators on the need to re-discover the target ports).
>
> - At the moment, it is unclear to me if SPC-3 is mandating an
"interlocked"
>    style UA for the REPORTED LUNS DATA HAS CHANGED condition
>    (though it seems like it... I will raise it only on t10 reflector
under
>    a different
>     cover).  If that isn't the case, the UA interlock capability
>     (T10/00-359) would
>     need to deployed as well to realibly deal with this portal group
>     reconfiguration.
>
> > That would address the issue with out any protocol changes.
>
> It is certainly a PDU change, but one can argue (successfully, I think)
> that
> it is not a "protocol" change per se -  since the implicit usage of TPGT
so
> far
> (see my message to Julian earlier on this thread) is merely being turned
> into
> an explicit usage.
>
> To summarize, I realize the sensitivity of changes this late but I
believe
> there
> are reasonable grounds here.
>
> Regards.
> --
> Mallikarjun
>
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> cbm@rose.hp.com
>
> ----- Original Message -----
> From: "John Hufferd" <hufferd@us.ibm.com>
> To: "Mallikarjun C." <cbm@rose.hp.com>
> Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> Sent: Tuesday, March 12, 2002 11:07 AM
> Subject: Re: iscsi : changes involving tgt portal group tag.
>
>
> >
> > Mallikarjun,
> > I do not see the absolute requirement for this TPGT in the Login.  I
> think
> > it would be approprate to say that if the time for the Reconnect has
been
> > more then the "...Time2Wait" that the Initiator, if it cares about the
> > TPGT,  SHOULD perform a rediscovery.
> >
> > That would address the issue with out any protocol changes.
> >
> > .
> > .
> > .
> > John L. Hufferd
> > Senior Technical Staff Member (STSM)
> > IBM/SSG San Jose Ca
> > Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> > Home Office (408) 997-6136, Cell: (408) 499-9702
> > Internet address: hufferd@us.ibm.com
> >
> >
> > "Mallikarjun C." <cbm@rose.hp.com>@ece.cmu.edu on 03/12/2002 10:30:29
AM
> >
> > Sent by:    owner-ips@ece.cmu.edu
> >
> >
> > To:    "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> > cc:    <ips@ece.cmu.edu>, <t10@t10.org>
> > Subject:    Re: iscsi : changes involving tgt portal group tag.
> >
> >
> >
> > Shailesh,
> >
> > The failure resulting out of a TPGT mismatch (assuming we have the TPGT
> in
> > the Login Request PDU), would have to trigger a discovery
> > (SendTargets/SLP/...)
> > updating the initiator of the latest configuration.  This discovery
> process
> > is
> > similar
> > to the FCP ADISC process you refer to.
> >
> > Alternatively, if there has been a change in the LU view of  a given
> target
> > portal
> > group tag (meaning that the TPGT would match correctly), the LUs in the
> > view
> > should have established UA with an ASC of REPORTED LUNS DATA HAS
> > CHANGED since the SCSI port association has changed for the LUs.  This
> > again
> > should trigger a discovery process from the initiator.
> >
> > It seems to be that we are now sufficiently covered either way.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions Organization
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> > cbm@rose.hp.com
> >
> >
> > ----- Original Message -----
> > From: "Shailesh Manjrekar" <shaileshm@aarohicommunications.com>
> > To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "'Julian Satran'"
> > <Julian_Satran@il.ibm.com>
> > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > Sent: Monday, March 11, 2002 7:51 PM
> > Subject: RE: iscsi : changes involving tgt portal group tag.
> >
> >
> > > Hi,
> > >
> > > On a TPG reconfiguration or TPGT reassignment, shouldn't there be a
> > > discovery followed by SCSI Inquiry and Report_LUNS which would make
the
> > > Initiator aware of this change? Can the  Async message - iscsi Event
> > > Data notify the Initiator of the change, which would force an
> discovery.
> > > This would be similar to an ADISC for FCP. Because including the TPGT
> in
> > > the login would prevent inadvertent logins but would still not notify
> > > the initiator of the changed configuration?
> > >
> > > Thanks,
> > > Shailesh.
> > > Aarohi Communications.
> > > -----Original Message-----
> > > From: owner-t10@t10.org [mailto:owner-t10@t10.org] On Behalf Of
> > > Mallikarjun C.
> > > Sent: Wednesday, March 06, 2002 10:17 AM
> > > To: Julian Satran
> > > Cc: ips@ece.cmu.edu; t10@t10.org
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > > * From the T10 Reflector (t10@t10.org), posted by:
> > > * "Mallikarjun C." <cbm@rose.hp.com>
> > > *
> > > > The issue is that I am not sure that a target is checking today
> > > anything -
> > > > (adapter drivers may check oif in their realm they can give out a
> > > TSID).
> > > > Nothing else is needed.
> > >
> > > Target is required to derive the TPGT and use it in both cases of
Login
> > > -
> > >      a) when TSID = 0, to ascertain if a session reinstatement needs
to
> > >          be effected for that TPGT.
> > >      b) when TSID != 0, to ascertain the validity of TSID and add in
> > >           the new connection to an existing session if it is valid
for
> > > that TPGT.
> > > --
> > > Mallikarjun
> > >
> > > Mallikarjun Chadalapaka
> > > Networked Storage Architecture
> > > Network Storage Solutions Organization
> > > Hewlett-Packard MS 5668
> > > Roseville CA 95747
> > >
> > > ----- Original Message -----
> > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > Cc: <ips@ece.cmu.edu>; <t10@t10.org>
> > > Sent: Tuesday, March 05, 2002 11:56 PM
> > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > >
> > >
> > > > The issue is that I am not sure that a target is checking today
> > > anything -
> > > > (adapter drivers may check oif in their realm they can give out a
> > > TSID).
> > > > Nothing else is needed. Does SCSI have to be aware of it? Perhaps
but
> > > > iSCSI certainly not. Does a "front-end" have to be - again probably
> > > not
> > > > the name identifies the node.
> > > >
> > > > Julo
> > > >
> > > >
> > > >
> > > >
> > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > 05-03-02 22:34
> > > > Please respond to "Mallikarjun C."
> > > >
> > > >
> > > >         To:     Julian Satran/Haifa/IBM@IBMIL
> > > >         cc:     <ips@ece.cmu.edu>, <t10@t10.org>
> > > >         Subject:        Re: iscsi : changes involving tgt portal
> group
> > > tag.
> > > >
> > > >
> > > >
> > > > Julian,
> > > >
> > > > Whatever methods a target is expected to use today to derive the
> > > implicit
> > > > TPGT to preclude a duplicate I-T nexus would work after the change
as
> > > > well,
> > > > except the derived value needs to be compared against the
(proposed)
> > > > TPGT in the Login Request payload.
> > > >
> > > > Please comment if we're missing something.
> > > >
> > > > Regards.
> > > > --
> > > > Mallikarjun
> > > >
> > > > Mallikarjun Chadalapaka
> > > > Networked Storage Architecture
> > > > Network Storage Solutions Organization
> > > > Hewlett-Packard MS 5668
> > > > Roseville CA 95747
> > > >
> > > > ----- Original Message -----
> > > > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > > > To: "Mallikarjun C." <cbm@rose.hp.com>
> > > > Cc: <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; "Santosh Rao"
> > > > <santoshr@cup.hp.com>;
> > > > <t10@t10.org>
> > > > Sent: Monday, March 04, 2002 10:24 PM
> > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > >
> > > >
> > > > > Has a decent target implementation and easy way of checking that
> the
> > > TPG
> > > > > is correct?
> > > > >
> > > > > Julo
> > > > >
> > > > >
> > > > >
> > > > >
> > > > > "Mallikarjun C." <cbm@rose.hp.com>
> > > > > Sent by: owner-ips@ece.cmu.edu
> > > > > 05-03-02 01:12
> > > > > Please respond to "Mallikarjun C."
> > > > >
> > > > >
> > > > >         To:     "Santosh Rao" <santoshr@cup.hp.com>,
> > > <ips@ece.cmu.edu>
> > > > >         cc:     <t10@t10.org>
> > > > >         Subject:        Re: iscsi : changes involving tgt portal
> > > group
> > > > tag.
> > > > >
> > > > >
> > > > >
> > > > > Santosh and Jim,
> > > > >
> > > > > It appears a good idea to add in the portal group tag in the
Login
> > > > > Request header for a sanity check by the receiving target portal.
> > > > >
> > > > > I generally agree with Jim's comments that the duration of
> > > persistence
> > > > > of a portal group tag is intricately linked to the extent of
portal
> > > > > reconfiguration.
> > > > > Not every target reconfiguration may result in a portal group tag
> > > > > reassignment.
> > > > > OTOH, some reconfigurations may be so extensive as to cause even
a
> > > node
> > > > > name change.
> > > > >
> > > > > Some comments on Santosh's message -
> > > > >
> > > > > > "If a portal group is re-configured such that all its
previously
> > > > > > advertised network portals are no longer a part of the portal
> > > group,
> > > > > > then, the portal group tag (and thereby, the port
> name/identifier)
> > > > > > *MUST* be changed to indicate a new target port."
> > > > >
> > > > > I am not sure this solves the problem you're trying to get at.
If
> > > none
> > > > of
> > > > > the earlier IP addresses can get an initiator to the SCSI target
> > > port
> > > > that
> > > > > it
> > > > > knew of (your scenario), it appears to me that it doesn't matter
if
> > > the
> > > > > portal group tags are changed or not....A new discovery process
> > > should
> > > > > update the initiator of the changed portal addresses.
> > > > >
> > > > > I suggest the following text -
> > > > >
> > > > >    After a portal group reconfiguration which changed the view of
> > > LUs
> > > > >    for an initiator with a given set of privileges, the target
MUST
> > > > change
> > > > >    the portal group tag that represents the reconfigured target
> > > portal
> > > > > group.
> > > > >
> > > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > > have
> > > > > been
> > > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > > issue
> > > > at
> > > > > all.
> > > > > >
> > > > > > On a session logout & re-login, it is not efficient/necessary
to
> > > close
> > > > > > and re-open each LUN behind that target port, due to the fact
> that
> > > a
> > > > > > target port may have hundred's of LUNs behind it.
> > > > >
> > > > > I agree with Jim on this one - there should be *no* open/active
> > > I_T_L
> > > > > nexus
> > > > > traffic after a reconfiguration, targets can enforce this via
> simple
> > >
> > > > iSCSI
> > > > > means
> > > > > (reject initiator advances to continue the session for
> > > DefaultTime2Wait+
> > > > > DefaultTime2Retain seconds).  In fact, Async logout request
> requires
> > > a
> > > > > clean closure that implicitly aborts I/Os.
> > > > >
> > > > > What you're describing is typical O/S "LUN open" and "LUN close"
> > > > > interactions.  I agree that they wouldn't have to be repeated,
but
> > > care
> > > > > must be taken to ensure that new I/Os (on the new session after
> > > > > reconfiguration)
> > > > > are not delivered to the incorrect LUs.  It seems that the
addition
> > > of
> > > > > TPGT in the login header and the proposed new text (above) would
> > > take
> > > > > care of this.
> > > > >
> > > > > Regards.
> > > > > --
> > > > > Mallikarjun
> > > > >
> > > > > Mallikarjun Chadalapaka
> > > > > Networked Storage Architecture
> > > > > Network Storage Solutions Organization
> > > > > Hewlett-Packard MS 5668
> > > > > Roseville CA 95747
> > > > >
> > > > > ----- Original Message -----
> > > > > From: "Santosh Rao" <santoshr@cup.hp.com>
> > > > > To: <ips@ece.cmu.edu>
> > > > > Cc: <t10@t10.org>
> > > > > Sent: Monday, March 04, 2002 10:40 AM
> > > > > Subject: Re: iscsi : changes involving tgt portal group tag.
> > > > >
> > > > >
> > > > > > * From the T10 Reflector (t10@t10.org), posted by:
> > > > > > * Santosh Rao <santoshr@cup.hp.com>
> > > > > > *
> > > > > > Jim,
> > > > > >
> > > > > > I agree that a "complete re-configuration" of a target port can
> > > result
> > > > > > in a new port name & port identifier. However, the tricky part
is
> > > the
> > > > > > definition of a "complete re-configuration of an iscsi target
> > > port",
> > > > due
> > > > > > to the concepts of portal groups involving multiple network
> > > portals.
> > > > > >
> > > > > > For example, if a portal group (aka, an iscsi target port) were
> to
> > > be
> > > > > > re-configured to include a new network portal [moved from
another
> > > > portal
> > > > > > group], then, the target port itself has not changed, since it
is
> > > > still
> > > > > > accessible through its previously used network portals. What
has
> > > > changed
> > > > > > is the individual network portal that has moved from 1 target
> port
> > > to
> > > > > > another.
> > > > > >
> > > > > > Hence, it is sufficient, in this case, to maintain persistence
of
> > > the
> > > > > > target port name/identifier, without requiring any change in
port
> > > > > > name/identifier. By requiring initiators to send the intended
> TPGT
> > >
> > > > (scsi
> > > > > > target port name/identifier) along with the login request, this
> > > allows
> > > > > > the target port to detect that the network portal is being
> > > accessed to
> > > > > > connect to a different target port and it can reject the login.
> > > > > >
> > > > > > It may be helpful to call out the specific case when a port
> > > > > > name/identifier MUST change. How about something like :
> > > > > >
> > > > > > "If a portal group is re-configured such that all its
previously
> > > > > > advertised network portals are no longer a part of the portal
> > > group,
> > > > > > then, the portal group tag (and thereby, the port
> name/identifier)
> > > > > > *MUST* be changed to indicate a new target port."
> > > > > >
> > > > > > This would allow access to the target port through its
un-altered
> > > > > > network portals to continue un-disrupted. More comments inline,
> in
> > > > > > response to some of your queries.
> > > > > >
> > > > > > Thanks,
> > > > > > Santosh
> > > > > >
> > > > > > NOTE : In this discussion target port and target portal group
are
> > > used
> > > > > > to imply the same entity, within a target node.
> > > > > >
> > > > > >
> > > > > > Jim Hafner wrote:
> > > > > >
> > > > > > > SAM-2 requires scsi port names to be persistent and
> > > > world-wide-unique.
> > > > > > > (SAM-2 Rev 22 Section 4.7.7). Quoting from SAM-2 :
> > > > > > >
> > > > > > > "A scsi port name shall never change and may be used to
> > > persistently
> > > > > > > identify a scsi initiator port or target port...".
> > > > > > >
> > > > > > > <JLH>
> > > > > > > There are different ways that one can interpret this
> > > "persistent"
> > > > > rule. The
> > > > > > > intent was that names shouldn't change over time when
> > > *identifying
> > > > the
> > > > > same
> > > > > > > object*.   What that means is that if the object changes (in
> any
> > > > > > > discernable way), then the name should change.  So, the
object
> > > can
> > > > > move to
> > > > > > > a different piece of hardware, but it can still be named the
> > > same
> > > > way.
> > > > >  If
> > > > > > > the object changes, e.g., in this case, reconfigures as a
> > > different
> > > > > set of
> > > > > > > network portals with different addressing elements, then I
> would
> > >
> > > > think
> > > > > that
> > > > > > > the name should change as well.   That's all the persistence
> one
> > > > > really
> > > > > > > needs.
> > > > > > >
> > > > > > > I'm not sure what that implies about your recommendation.  I
> > > don't
> > > > see
> > > > > any
> > > > > > > problem with it, either.
> > > > > > > </JLH>
> > > > > >
> > > > > > I think we may be in agreement. (See reasoning above).
> > > > > >
> > > > > >
> > > > > > >
> > > > > > > The rationale for (2) is :
> > > > > > > --------------------------
> > > > > > > Consider an initiator node establishing multiple sessions to
a
> > > scsi
> > > > > tgt
> > > > > > > port, with each session established to a subset of the
network
> > > > portals
> > > > > > > within the tgt portal group.
> > > > > > >
> > > > > > > Consider an iscsi transport event involving the
> re-configuration
> > > of
> > > > > > > target portal groups on the iscsi target node. This may be
> > > preceeded
> > > > > by
> > > > > > > the iscsi sessions seeing an async message "target requests
> > > logout",
> > > > > > > followed by session logout, portal group re-configuration,
and
> > > then,
> > > > > the
> > > > > > > initiator re-establishes sessions.
> > > > > > >
> > > > > > > Across a transport event that results in such session
> > > termination
> > > > and
> > > > > > > re-establishment, the initiator needs to authenticate that it
> is
> > >
> > > > still
> > > > > > > speaking to the same [i]scsi target port, in order to ensure
> > > that
> > > > any
> > > > > > > open/active I-T-L nexus traffic on that session is not
> > > incorrectly
> > > > > > > routed to a wrong LUN after such a transport event.
> > > > > >
> > > > > > > <JLH>
> > > > > > > Under these events, shouldn't all "open/active I_T_L traffic"
> > > have
> > > > > been
> > > > > > > aborted, closed or otherwise ended?  So this shouldn't be an
> > > issue
> > > > at
> > > > > all.
> > > > > >
> > > > > > On a session logout & re-login, it is not efficient/necessary
to
> > > close
> > > > > > and re-open each LUN behind that target port, due to the fact
> that
> > > a
> > > > > > target port may have hundred's of LUNs behind it.
> > > > > >
> > > > > > All outstanding I/Os need to be aborted. Once the session is
> > > > > > re-established [and the target port is authenticated to be the
> > > same],
> > > > > > further I/O traffic can be resumed without requiring the SCSI
ULP
> > > to
> > > > > > close and re-open each LUN. Some transport specific clearing
> > > effects
> > > > may
> > > > > > have occurred, which may require additional LUN level activity,
> in
> > >
> > > > some
> > > > > > cases.
> > > > > >
> > > > > > (There are analogies to the above model in FCP & SRP, which
> > > > authenticate
> > > > > > port name/identifier on login, allowing I/O resumption after
> > > session
> > > > > > termination and re-establishment.)
> > > > > >
> > > > > >
> > > > > > > To prevent such authentication issues, iscsi can send the
iscsi
> > > > target
> > > > > > > port identifier (portal group tag) explicitly in the login
> > > request,
> > > > > and
> > > > > > > the login can be rejected by the target on a portal group tag
> > > > > mis-match.
> > > > > > > (if the network portal does not belong to the addressed
portal
> > > group
> > > > > > > tag).
> > > > > > > <JLH>
> > > > > > > Did you mean for the initiator to send this TPGT?
> > > > > > > </JLH>
> > > > > >
> > > > > > Yes. The initiator login request must include the target portal
> > > group
> > > > > > tag, thus identifying the target port to which a session is
being
> > > > > > established.
> > > > > >
> > > > > > Login currently carries no addressing information, since the
> > > > addressing
> > > > > > is implicit, based on the TCP connection in use. The problem
with
> > > this
> > > > > > approach is that the login implicitly addresses a network
portal,
> > > and
> > > > > > not the target port. As seen in the earlier example, the
> > > association
> > > > of
> > > > > > network portal <-> target port can change, and such changes can
> be
> > > > > > detected, if the initiator were to explicitly identify the
target
> > > port
> > > > > > being logged into.
> > > > > >
> > > > > > --
> > > > > > ##################################
> > > > > > Santosh Rao
> > > > > > Software Design Engineer,
> > > > > > HP-UX iSCSI Driver Team,
> > > > > > Hewlett Packard, Cupertino.
> > > > > > email : santoshr@cup.hp.com
> > > > > > Phone : 408-447-3751
> > > > > > ##################################
> > > > > > *
> > > > > > * For T10 Reflector information, send a message with
> > > > > > * 'info t10' (no quotes) in the message body to
majordomo@t10.org
> > > > > >
> > > > >
> > > > >
> > > > >
> > > >
> > > >
> > > >
> > > >
> > > *
> > > * For T10 Reflector information, send a message with
> > > * 'info t10' (no quotes) in the message body to majordomo@t10.org
> > >
> > >
> >
> >
> >
> >
> >
>
>
>
>





From owner-ips@ece.cmu.edu  Fri Mar 15 06:42:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA26705
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 06:42:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FAs0B23197
	for ips-outgoing; Fri, 15 Mar 2002 05:54:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d06lmsgate-4.uk.ibm.COM (d06lmsgate-4.uk.ibm.com [195.212.29.4])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FArxH23193
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 05:53:59 -0500 (EST)
Received: from d06relay02 (d06relay02.portsmouth.uk.ibm.com [9.166.84.148])
	by d06lmsgate-4.uk.ibm.COM (1.0.0) with ESMTP id KAA23866;
	Fri, 15 Mar 2002 10:38:05 GMT
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d06relay02 (8.11.1m3/NCO/VER6.00) with ESMTP id g2FApIJ279366;
	Fri, 15 Mar 2002 10:51:19 GMT
Subject: Re: ISCSI: need to fix handling of partial data transfers
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu, "Julian Satran" <Julian_Satran@il.ibm.com>
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFB8DAFF41.2C7143D8-ONC2256B7C.007420EE@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Thu, 14 Mar 2002 23:13:24 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 15/03/2002 12:51:20
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Paul,

You has two sets of counters - block counters in the CDB and byte counters
in the execute command.
That is enough evidence I think and some time both block and byte in
extended CDBs.

As for announcing at login - this is not good enough as this capability may
also vary per LUN and/or command.

Julo


                                                                                                         
                      Paul Koning                                                                        
                      <ni1d@arrl.net>          To:       Julian Satran/Haifa/IBM@IBMIL                   
                                               cc:       ips@ece.cmu.edu                                 
                      14-03-02 16:55           Subject:  Re: ISCSI: need to fix handling of partial data 
                      Please respond to         transfers                                                
                      Paul Koning                                                                        
                                                                                                         
                                                                                                         



>>>>> "Julian" == Julian Satran <Julian_Satran@il.ibm.com> writes:

 Julian> I was under the impression that all over SCSI an initiator
 Julian> sending less data than requested by a target is tolerable.
 Julian> from a SCSI point if view but it is not always tolerable at
 Julian> device level.

I'm not sure that this is true.  Looking at the SCSI specs for
guidance, I find a few words on this topic in SAM-2 (section 5.4.3,
"Data transfer protocol services").  This mentions as one of the
transfer parameters "Byte count requested by device server: number of
bytes to be moved by the data transfer request".  It doesn't say
"maximum number of bytes...".  Also, the confirmation primitives for
the Send Data-In and Receive Data-Out primitives both indicate
completion, but do not indicate an actual byte count, which again
suggests that the actual byte count is supposed to match the requested
byte count.

 Julian> I will change the wording to better convey
 Julian> this - i.e. choosing another error code for failing on the
 Julian> FirstBurstSize and not meeting the Desired Data Length ( "Not
 Julian> Enough Data" instead of "Protocol Error") and attach the
 Julian> corresponding SCSI error status and sense (as we did with
 Julian> data errors).  Is this acceptable?

It's better than what we have now, because the status code you
proposed no longer implies that there's a bug in the implementation.

I still don't like it much.  It's very ugly to have options in the
protocol where, in the middle of a long session, you suddenly get a
reject from the other side because you did something the protocol
allows that the other end doesn't support (and is allowed not to
support).

It would be far better to resolve this one way or the other and take
away the unnecessary interoperability failures.  So I much prefer
either to require the initiator to do exactly what the target asked
for (as implied by SAM-2) or, failing that, to require the target to
accept shorter responses from the initiator -- as I proposed before.

But if we're going to use this third approach, which is to leave in
the option to reject, it would be much better if that is announced at
login so the initiator will know what the target wants, and can adjust
what it sends accordingly -- or can abandon the login if it is unable
to comply with the target's requirements.

     paul







From owner-ips@ece.cmu.edu  Fri Mar 15 07:36:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA27457
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 07:36:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FBi9W25409
	for ips-outgoing; Fri, 15 Mar 2002 06:44:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FBi7H25404;
	Fri, 15 Mar 2002 06:44:07 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id MAA153070;
	Fri, 15 Mar 2002 12:42:06 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2FBfX867198;
	Fri, 15 Mar 2002 12:41:33 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF8935BB59.C5BBF76C-ONC2256B7D.003EB2B6@telaviv.ibm.com>
Date: Fri, 15 Mar 2002 13:43:40 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 15/03/2002 13:41:34,
	Serialize complete at 15/03/2002 13:41:34
Content-Type: multipart/alternative; boundary="=_alternative 003EEB05C2256B7D_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 003EEB05C2256B7D_=
Content-Type: text/plain; charset="us-ascii"

Thanks for catching 2.5.3.4 conflict (it was not updated together with 9).
It reads now:

With the SNACK Request, the initiator requests retransmission of 
num-bered-responses or data from the target. A single SNACK request covers 
a contiguous set of missing items called a run of a given type of items 
(the type is indicate in a type field in the PDU header). The run is 
composed of an initial item (StatSN, DataSN, R2TSN) and the number of 
missed Status, Data, or R2T PDUs. For long data-in sequences, the target 
may request (at predefined minimum intervals) a positive acknowledgement 
for the data sent. A SNACK request with a type field that indicates ACK 
and the number of Data-In PDUs acknowl-edged conveys this positive 
acknowledgement. 

SNACKs can be rejected when the target does not have the data or status or 
has never sent it (error in error recovery :-)).

Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
15-03-02 01:14
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        RE: iSCSI: Use of the A bit

 

9.4.3 I have a  more general SNACK question.  When would one use use the 
iSCSI, SCSI Response message with sense (reason -> SNACK rejected)?  The 
reason for using this hasn't jumped out at me yet.  Does it have to do 
with connection recovery?
9.16 States that SNACK support is optional.  Since "ErrorRecoveryLevel" 
controls SNACK support, can something in the SNACK message description 
reference how this feature is negotiated?
Also a cleanup is needed for SNACK- "RunLength".

   2.5.3.4   SNACK Request

           With the SNACK Request, the initiator requests retransmission 
of num-
           bered-responses or data from the target. A single SNACK request 
covers
           a contiguous set of missing items called a run of a given type 
of
           items (the type is indicate in a type field in the PDU header). 
The
           run is composed of an initial item (StatSN, DataSN, R2TSN) and 
the
           number of additional missed Status, Data, or R2T PDUs (0 means only
           the initial). For long data-in sequences, the target may request (at
           predefined minimum intervals) a positive acknowledgement for 
the data
           sent. A SNACK request with a type field that indicates ACK and 
the
           number of Data-In PDUs acknowledged conveys this positive 
acknowl-
           edgement.

9.16
           The SNACK request is used to request the retransmission of 
numbered-
           responses, data, or R2T PDUs from the target.  The SNACK 
request indi-
           cates the missed numbered-response or data "run" to the target, 
where
           the run starts with the first missed StatSN, DataSN, or R2TSN 
and
           indicates also the number of missed Status, Data, or R2T PDUs (0 has
           the special meaning of "all after the initial").



--=_alternative 003EEB05C2256B7D_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Thanks for catching 2.5.3.4 conflict (it was not updated together with 9).</font>
<br><font size=2 face="sans-serif">It reads now:</font>
<br>
<br><font size=3 face="Courier New">With the SNACK Request, the initiator requests retransmission of num-bered-responses or data from the target. A single SNACK request covers a contiguous set of missing items called a run of a given type of items (the type is indicate in a type field in the PDU header). The run is composed of an initial item (StatSN, DataSN, R2TSN) and the number of missed Status, Data, or R2T PDUs. For long data-in sequences, the target may request (at predefined minimum intervals) a positive acknowledgement for the data sent. A SNACK request with a type field that indicates ACK and the number of Data-In PDUs acknowl-edged conveys this positive acknowledgement. </font>
<br>
<br><font size=2 face="sans-serif">SNACKs can be rejected when the target does not have the data or status or has never sent it (error in error recovery :-)).</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">15-03-02 01:14</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Times New Roman">9.4.3 I have a &nbsp;more general SNACK question. &nbsp;When would one use use the iSCSI, SCSI Response message with sense (reason -&gt; SNACK rejected)? &nbsp;The reason for using this hasn't jumped out at me yet. &nbsp;Does it have to do with connection recovery?</font>
<p><font size=2 face="Times New Roman">9.16 States that SNACK support is optional. &nbsp;Since &quot;ErrorRecoveryLevel&quot; controls SNACK support, can something in the SNACK message description reference how this feature is negotiated?</font>
<p><font size=2 face="Times New Roman">Also a cleanup is needed for SNACK- &quot;RunLength&quot;.<br>
<br>
 &nbsp; 2.5.3.4 &nbsp; SNACK Request<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; With the SNACK Request, the initiator requests retransmission of num-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; bered-responses or data from the target. A single SNACK request covers<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; a contiguous set of missing items called a run of a given type of<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; items (the type is indicate in a type field in the PDU header). The<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; run is composed of an initial item (StatSN, DataSN, R2TSN) and the<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; number of additional missed Status, Data, or R2T PDUs <b>(0 means only<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the initial). </b>For long data-in sequences, the target may request (at<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; predefined minimum intervals) a positive acknowledgement for the data<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sent. A SNACK request with a type field that indicates ACK and the<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; number of Data-In PDUs acknowledged conveys this positive acknowl-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; edgement.<br>
<br>
9.16<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The SNACK request is used to request the retransmission of numbered-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; responses, data, or R2T PDUs from the target. &nbsp;The SNACK request indi-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; cates the missed numbered-response or data &quot;run&quot; to the target, where<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the run starts with the first missed StatSN, DataSN, or R2TSN and<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; indicates also the number of missed Status, Data, or R2T PDUs <b>(0 has<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the special meaning of &quot;all after the initial&quot;).</b><br>
</font>
<p>
<p>
--=_alternative 003EEB05C2256B7D_=--


From owner-ips@ece.cmu.edu  Fri Mar 15 09:54:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA00674
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 09:54:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FE9Yf03948
	for ips-outgoing; Fri, 15 Mar 2002 09:09:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2FE9Vw03943
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 09:09:31 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2FE9N009723
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 09:09:23 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2FE9MK09711;
	Fri, 15 Mar 2002 09:09:22 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2FE9Mu10490;
	Fri, 15 Mar 2002 09:09:22 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15506.146.400956.249175@pkoning.dev.equallogic.com>
Date: Fri, 15 Mar 2002 09:09:22 -0500
From: Paul Koning <ni1d@arrl.net>
To: Eddy_Quicksall@ivivity.com
Cc: rod.harrison@windriver.com, ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
References: <25369470B6F0D41194820002B328BDD22F57CE@ATLOPS>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:

 Eddy> I think we may need better explanation about why some folks
 Eddy> don't want to do the "positive ack".

 >> We got to this position, since so many folks did not want to
 >> support the positive ack.

Something doesn't compute here.

I don't believe the discussion has anything to do with whether you
support positive ACK or not.  If you're doing error recovery level 1
or above, then you are required to support it, because the other end
is allowed to say A=1 and you're required to answer that.

If you don't want to support positive ACK, the solution is to support
only error recovery level 0.

The issue under discussion is whether the rule "you are allowed to set
A=1 only once per MaxBurstSize" is correct.  At this point it's clear
to me that it is not, because you need to be able to set A=1 at the
end of the transfer.  The current rule forbids that unless the total
transfer size is >= MaxBurstSize.

Kevin's proposal is a simple fix to this problem.

	 paul



From owner-ips@ece.cmu.edu  Fri Mar 15 10:36:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA01738
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 10:36:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FErHH06656
	for ips-outgoing; Fri, 15 Mar 2002 09:53:17 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2FErCw06650
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 09:53:13 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2FEqx010284
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 09:53:00 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2FEqsK10275;
	Fri, 15 Mar 2002 09:52:55 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2FEqrB12388;
	Fri, 15 Mar 2002 09:52:53 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15506.2757.207865.434562@pkoning.dev.equallogic.com>
Date: Fri, 15 Mar 2002 09:52:53 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: ISCSI: need to fix handling of partial data transfers
References: <OFB8DAFF41.2C7143D8-ONC2256B7C.007420EE@telaviv.ibm.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Julian" == Julian Satran <Julian_Satran@il.ibm.com> writes:

 Julian> Paul, You has two sets of counters - block counters in the
 Julian> CDB and byte counters in the execute command.  That is enough
 Julian> evidence I think and some time both block and byte in
 Julian> extended CDBs.

But both describe the command as a whole.  We were talking about the
piece-wise data transfers that occur during the execution of the
command.  If the target requests size X, can the initiator send < X?

I don't see SAM-2 allowing for that.  But since it's just talking
about architectural models, perhaps it doesn't really matter.

 Julian> As for announcing at login - this is not good enough as this
 Julian> capability may also vary per LUN and/or command.

Yes, I suppose so.  That assumes, of course, that it makes sense to
build an initiator that can't comply with any data length a target can
legitimately ask for.  I'm not sure why anyone would build such an
initiator. 

This leaves us with a problem.  If the target requests X, the
initiator sends < X, and the target objects, what next?  What is the
recovery algorithm?  Is there a recovery algorithm?

One possible recovery algorithm is: the initiator gets the error code,
recognizes it should have sent exactly X, and does so.  But if it can
do that, it should have sent exactly X the first time around.

Another possibility is that the initiator is completely unable to send
exactly X.  At that point, it seems that the only thing it can do is
to fail the I/O operation.  In that case, it might as well have done
that the first time around, when it was asked to send X and realized
it could not comply.

An error message response to an exchange is useful only if it permits
a meaningful recovery action.  I may be missing something, but I don't
see a way that the error message gives you any new capability.  The
situation is no better than it would be if you use the rule "you must
send exactly X if the target asks for X".  That rule is much simpler
than the rule currently in the spec, and it eliminates the confusing
possibility of mismatched expectations between the two sides.

If there is a more elegant recovery than what I described above, what
is it?  The spec may need to document what that would be.

   paul



From owner-ips@ece.cmu.edu  Fri Mar 15 15:37:24 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09621
	for <ips-archive@lists.ietf.org>; Fri, 15 Mar 2002 15:37:24 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FJp7W05660
	for ips-outgoing; Fri, 15 Mar 2002 14:51:07 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FJp3w05651;
	Fri, 15 Mar 2002 14:51:03 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id UAA153410;
	Fri, 15 Mar 2002 20:50:53 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2FJom835124;
	Fri, 15 Mar 2002 20:50:53 +0100
To: Paul Koning <ni1d@arrl.net>
Cc: Eddy_Quicksall@ivivity.com, ips@ece.cmu.edu, owner-ips@ece.cmu.edu,
        rod.harrison@windriver.com
MIME-Version: 1.0
Subject: RE: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF930D842D.13F08316-ONC2256B7D.006C1B66@telaviv.ibm.com>
Date: Fri, 15 Mar 2002 21:50:44 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 15/03/2002 21:50:53,
	Serialize complete at 15/03/2002 21:50:53
Content-Type: multipart/alternative; boundary="=_alternative 006C5854C2256B7D_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 006C5854C2256B7D_=
Content-Type: text/plain; charset="us-ascii"

That could be so but it would be overkill. Status ACK can implicitly 
acknowledge the last transfer.
And Yes the fact that the last transfer is not mentioned is an oversight 
that I will correct.
This does not mean that you HAVE TO raise the A flag or that you are 
ENCOURAGED to do so :-)

Julo




Paul Koning <ni1d@arrl.net>
Sent by: owner-ips@ece.cmu.edu
15-03-02 16:09
Please respond to Paul Koning

 
        To:     Eddy_Quicksall@ivivity.com
        cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
        Subject:        RE: iSCSI: Use of the A bit

 

>>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:

 Eddy> I think we may need better explanation about why some folks
 Eddy> don't want to do the "positive ack".

 >> We got to this position, since so many folks did not want to
 >> support the positive ack.

Something doesn't compute here.

I don't believe the discussion has anything to do with whether you
support positive ACK or not.  If you're doing error recovery level 1
or above, then you are required to support it, because the other end
is allowed to say A=1 and you're required to answer that.

If you don't want to support positive ACK, the solution is to support
only error recovery level 0.

The issue under discussion is whether the rule "you are allowed to set
A=1 only once per MaxBurstSize" is correct.  At this point it's clear
to me that it is not, because you need to be able to set A=1 at the
end of the transfer.  The current rule forbids that unless the total
transfer size is >= MaxBurstSize.

Kevin's proposal is a simple fix to this problem.

                  paul




--=_alternative 006C5854C2256B7D_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">That could be so but it would be overkill. Status ACK can implicitly acknowledge the last transfer.</font>
<br><font size=2 face="sans-serif">And Yes the fact that the last transfer is not mentioned is an oversight that I will correct.</font>
<br><font size=2 face="sans-serif">This does not mean that you HAVE TO raise the A flag or that you are ENCOURAGED to do so :-)</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Paul Koning &lt;ni1d@arrl.net&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">15-03-02 16:09</font>
<br><font size=1 face="sans-serif">Please respond to Paul Koning</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Eddy_Quicksall@ivivity.com</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;rod.harrison@windriver.com, ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">&gt;&gt;&gt;&gt;&gt; &quot;Eddy&quot; == Eddy Quicksall &lt;Eddy_Quicksall@ivivity.com&gt; writes:<br>
<br>
 Eddy&gt; I think we may need better explanation about why some folks<br>
 Eddy&gt; don't want to do the &quot;positive ack&quot;.<br>
<br>
 &gt;&gt; We got to this position, since so many folks did not want to<br>
 &gt;&gt; support the positive ack.<br>
<br>
Something doesn't compute here.<br>
<br>
I don't believe the discussion has anything to do with whether you<br>
support positive ACK or not. &nbsp;If you're doing error recovery level 1<br>
or above, then you are required to support it, because the other end<br>
is allowed to say A=1 and you're required to answer that.<br>
<br>
If you don't want to support positive ACK, the solution is to support<br>
only error recovery level 0.<br>
<br>
The issue under discussion is whether the rule &quot;you are allowed to set<br>
A=1 only once per MaxBurstSize&quot; is correct. &nbsp;At this point it's clear<br>
to me that it is not, because you need to be able to set A=1 at the<br>
end of the transfer. &nbsp;The current rule forbids that unless the total<br>
transfer size is &gt;= MaxBurstSize.<br>
<br>
Kevin's proposal is a simple fix to this problem.<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;paul<br>
<br>
</font>
<br>
<br>
--=_alternative 006C5854C2256B7D_=--


From owner-ips@ece.cmu.edu  Fri Mar 15 15:43:47 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09831
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 15:43:47 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FK9Mr08149
	for ips-outgoing; Fri, 15 Mar 2002 15:09:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FK9Gw08126
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 15:09:16 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BV86>; Fri, 15 Mar 2002 15:09:00 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57E7@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu, Paul Koning <ni1d@arrl.net>
Subject: RE: iSCSI: Use of the A bit
Date: Fri, 15 Mar 2002 15:09:00 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CC5D.3F0FA7E0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CC5D.3F0FA7E0
Content-Type: text/plain;
	charset="iso-8859-1"

By status ack, if you mean a SCSI Response with ExpStatSN, then that does
not acknowledge the Data-In unless the Data-In was followed by status.
 
Julian, all we are asking is that you don't create a spec that has a
pitfall. If one is worried about performance then he should work that out by
not asking for the Ack in the first place. Don't mandate it in the spec,
just say it in a note.
 
Eddy

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Friday, March 15, 2002 2:51 PM
To: Paul Koning
Cc: Eddy_Quicksall@ivivity.com; ips@ece.cmu.edu; owner-ips@ece.cmu.edu;
rod.harrison@windriver.com
Subject: RE: iSCSI: Use of the A bit



That could be so but it would be overkill. Status ACK can implicitly
acknowledge the last transfer. 
And Yes the fact that the last transfer is not mentioned is an oversight
that I will correct. 
This does not mean that you HAVE TO raise the A flag or that you are
ENCOURAGED to do so :-) 

Julo 



	Paul Koning <ni1d@arrl.net> 
Sent by: owner-ips@ece.cmu.edu 


15-03-02 16:09 
Please respond to Paul Koning 


        
        To:        Eddy_Quicksall@ivivity.com 
        cc:        rod.harrison@windriver.com, ips@ece.cmu.edu 
        Subject:        RE: iSCSI: Use of the A bit 

       


>>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:

Eddy> I think we may need better explanation about why some folks
Eddy> don't want to do the "positive ack".

>> We got to this position, since so many folks did not want to
>> support the positive ack.

Something doesn't compute here.

I don't believe the discussion has anything to do with whether you
support positive ACK or not.  If you're doing error recovery level 1
or above, then you are required to support it, because the other end
is allowed to say A=1 and you're required to answer that.

If you don't want to support positive ACK, the solution is to support
only error recovery level 0.

The issue under discussion is whether the rule "you are allowed to set
A=1 only once per MaxBurstSize" is correct.  At this point it's clear
to me that it is not, because you need to be able to set A=1 at the
end of the transfer.  The current rule forbids that unless the total
transfer size is >= MaxBurstSize.

Kevin's proposal is a simple fix to this problem.

                 paul






------_=_NextPart_001_01C1CC5D.3F0FA7E0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.00.2920.0" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=648230220-15032002>By 
status ack, if you mean a SCSI Response with ExpStatSN, then that does not 
acknowledge the Data-In unless the Data-In was followed by 
status.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=648230220-15032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=648230220-15032002>Julian, all we are asking is that you don't create a 
spec that has a pitfall. If one is worried about performance then he should work 
that out by not asking for the Ack in the first place. Don't mandate it in the 
spec, just say it in a note.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=648230220-15032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=648230220-15032002>Eddy</SPAN></FONT></DIV>
<BLOCKQUOTE>
  <DIV align=left class=OutlookMessageHeader dir=ltr><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Friday, March 15, 2002 2:51 
  PM<BR><B>To:</B> Paul Koning<BR><B>Cc:</B> Eddy_Quicksall@ivivity.com; 
  ips@ece.cmu.edu; owner-ips@ece.cmu.edu; 
  rod.harrison@windriver.com<BR><B>Subject:</B> RE: iSCSI: Use of the A 
  bit<BR><BR></DIV></FONT><BR><FONT face=sans-serif size=2>That could be so but 
  it would be overkill. Status ACK can implicitly acknowledge the last 
  transfer.</FONT> <BR><FONT face=sans-serif size=2>And Yes the fact that the 
  last transfer is not mentioned is an oversight that I will correct.</FONT> 
  <BR><FONT face=sans-serif size=2>This does not mean that you HAVE TO raise the 
  A flag or that you are ENCOURAGED to do so :-)</FONT> <BR><BR><FONT 
  face=sans-serif size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Paul Koning 
        &lt;ni1d@arrl.net&gt;</B></FONT> <BR><FONT face=sans-serif size=1>Sent 
        by: owner-ips@ece.cmu.edu</FONT> 
        <P><FONT face=sans-serif size=1>15-03-02 16:09</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Paul Koning</FONT> <BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;Eddy_Quicksall@ivivity.com</FONT> <BR><FONT face=sans-serif 
        size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; 
        &nbsp;rod.harrison@windriver.com, ips@ece.cmu.edu</FONT> <BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; 
        &nbsp; &nbsp; &nbsp;RE: iSCSI: Use of the A bit</FONT> <BR><BR><FONT 
        face=Arial size=1>&nbsp; &nbsp; &nbsp; 
  &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" 
  size=2>&gt;&gt;&gt;&gt;&gt; "Eddy" == Eddy Quicksall 
  &lt;Eddy_Quicksall@ivivity.com&gt; writes:<BR><BR>Eddy&gt; I think we may need 
  better explanation about why some folks<BR>Eddy&gt; don't want to do the 
  "positive ack".<BR><BR>&gt;&gt; We got to this position, since so many folks 
  did not want to<BR>&gt;&gt; support the positive ack.<BR><BR>Something doesn't 
  compute here.<BR><BR>I don't believe the discussion has anything to do with 
  whether you<BR>support positive ACK or not. &nbsp;If you're doing error 
  recovery level 1<BR>or above, then you are required to support it, because the 
  other end<BR>is allowed to say A=1 and you're required to answer 
  that.<BR><BR>If you don't want to support positive ACK, the solution is to 
  support<BR>only error recovery level 0.<BR><BR>The issue under discussion is 
  whether the rule "you are allowed to set<BR>A=1 only once per MaxBurstSize" is 
  correct. &nbsp;At this point it's clear<BR>to me that it is not, because you 
  need to be able to set A=1 at the<BR>end of the transfer. &nbsp;The current 
  rule forbids that unless the total<BR>transfer size is &gt;= 
  MaxBurstSize.<BR><BR>Kevin's proposal is a simple fix to this 
  problem.<BR><BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;paul<BR><BR></FONT><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1CC5D.3F0FA7E0--


From owner-ips@ece.cmu.edu  Fri Mar 15 17:34:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA12552
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 17:34:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FLjHD18780
	for ips-outgoing; Fri, 15 Mar 2002 16:45:17 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web13706.mail.yahoo.com (web13706.mail.yahoo.com [216.136.175.139])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2FLjFw18775
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 16:45:15 -0500 (EST)
Message-ID: <20020315214514.50379.qmail@web13706.mail.yahoo.com>
Received: from [192.52.58.4] by web13706.mail.yahoo.com via HTTP; Fri, 15 Mar 2002 13:45:14 PST
Date: Fri, 15 Mar 2002 13:45:14 -0800 (PST)
From: Martins Krikis <mkrikis@yahoo.com>
Subject: RE: iSCSI: Use of the A bit
To: ips@ece.cmu.edu
In-Reply-To: <25369470B6F0D41194820002B328BDD22F57E7@ATLOPS>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Just a quick note. Some people have implied that the
use of A-bit necessarily means poor performance.

I would like to disagree. If the target is just
sitting there waiting for acknowledgment to come
back before sending the next Data-In sequence, then
yes, that's poor performance. But I can imagine
targets that keep sending data while waiting for
the outstanding acknowledgments. Yes, it requires
more buffer space, but the acknowledgments are
actually helpful in managing that bigger buffer space.
It's a very similar situation to multiple outstanding
R2T-s. Hopefully everybody agrees that there may be
benefits to those. 

Or am I just missing something again?

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine and may not
            reflect those of my employer.




__________________________________________________
Do You Yahoo!?
Yahoo! Sports - live college hoops coverage
http://sports.yahoo.com/


From owner-ips@ece.cmu.edu  Fri Mar 15 18:12:24 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA13350
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 18:12:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FMg5A22549
	for ips-outgoing; Fri, 15 Mar 2002 17:42:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FMg4w22543
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 17:42:04 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4HT6YF>; Fri, 15 Mar 2002 17:36:05 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375ED@CORPMX14>
From: Black_David@emc.com
To: rsaecc@yahoo.com, ips@ece.cmu.edu
Subject: RE: Build a iSCSI test network--emergent
Date: Fri, 15 Mar 2002 17:41:32 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a mailing list for technical development of IP
Storage protocols including iSCSI.  This sort of request
to discuss attributes of iSCSI products for purchase
is not appropriate traffic for this list.  Please take
your enquiries elsewhere.

Thanks,
--David (IETF IPS WG co-chair)

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Fri Mar 15 18:16:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA13458
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 18:16:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FMVC921899
	for ips-outgoing; Fri, 15 Mar 2002 17:31:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web21210.mail.yahoo.com (web21210.mail.yahoo.com [216.136.175.253])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2FMNBw21316
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 17:23:12 -0500 (EST)
Message-ID: <20020315222311.36467.qmail@web21210.mail.yahoo.com>
Received: from [64.229.59.252] by web21210.mail.yahoo.com via HTTP; Fri, 15 Mar 2002 17:23:11 EST
Date: Fri, 15 Mar 2002 17:23:11 -0500 (EST)
From: David Wong <rsaecc@yahoo.com>
Subject: Build a iSCSI test network--emergent
To: ips@ece.cmu.edu
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I am leading a research group in university and
want to do some research on IP Stroage.
As usual, I do not have too much money to spend...

Can any one give me any idea on how much I need
to spend to build a IP storage system (talking iSCSI
protocol)? And what kind of product I need to buy?
I need to make the purchase in two weeks..
thus your immediate help will be greatly
appreciated...

Thank!
Rick!


______________________________________________________________________ 
Find, Connect, Date! http://personals.yahoo.ca


From owner-ips@ece.cmu.edu  Fri Mar 15 19:15:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA14516
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 19:15:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2G01Dj26782
	for ips-outgoing; Fri, 15 Mar 2002 19:01:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2G01Aw26775
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 19:01:10 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP id D939A40016F
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 16:01:04 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id QAA24932
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 16:00:56 -0800 (PST)
Message-ID: <3C928C2E.17C898C2@cup.hp.com>
Date: Fri, 15 Mar 2002 16:05:02 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: iscsi : TSID rule.
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hello,

Section 2.4.3 states the following requirement :

"a) Between a given iSCSI Initiator and iSCSI Target, at any given time,
only one session can exist with a given session identifier (SSID)."

This requirement is then translated into, what is called a TSID rule,
which is expressed in the same section as :

"TSID RULE: The iSCSI Target SHOULD NOT select a TSID for a given login
request if the resulting SSID is already in use by an existing session
between the target and the requesting iSCSI Initiator. See Section 8.1.1
Conservative Reuse of ISIDs."

I have the following questions regarding the above requirement and
corresponding rule :

1) What is the basis for this requirement ? Why is a SSID required to be
unique for a given initiator-target node pair ?(My thinking was that
requirement (b) was all that was needed.)

2) What is the SSID used for and why is its unique-ness required ?

3) If there is some valid reason that justifies the retention of this
rule, then, why is the rule stated as "SHOULD NOT" and not "MUST NOT".
It seems that "SHOULD NOT" allows for conforming implementation to
violate this rule. Is that ok ?

Any clarifications would be appreciated.

Thanks,
Santosh

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Fri Mar 15 19:17:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA14553
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 19:17:47 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2FNRRl25025
	for ips-outgoing; Fri, 15 Mar 2002 18:27:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2FNRQw25020
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 18:27:26 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWB5>; Fri, 15 Mar 2002 18:27:25 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57F2@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: David Wong <rsaecc@yahoo.com>, ips@ece.cmu.edu
Subject: RE: Build a iSCSI test network--emergent
Date: Fri, 15 Mar 2002 18:27:23 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Use Linux and get the iSCSI stuff from UNH. See
http://www.iol.unh.edu/consortiums/iscsi/.

You can use a couple of simple PC's with a network card.

Cost - just your time.

Eddy

-----Original Message-----
From: David Wong [mailto:rsaecc@yahoo.com]
Sent: Friday, March 15, 2002 5:23 PM
To: ips@ece.cmu.edu
Subject: Build a iSCSI test network--emergent


I am leading a research group in university and
want to do some research on IP Stroage.
As usual, I do not have too much money to spend...

Can any one give me any idea on how much I need
to spend to build a IP storage system (talking iSCSI
protocol)? And what kind of product I need to buy?
I need to make the purchase in two weeks..
thus your immediate help will be greatly
appreciated...

Thank!
Rick!


______________________________________________________________________ 
Find, Connect, Date! http://personals.yahoo.ca


From owner-ips@ece.cmu.edu  Fri Mar 15 20:23:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA15277
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 20:23:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2G0hsj28822
	for ips-outgoing; Fri, 15 Mar 2002 19:43:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2G0hqw28818
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 19:43:52 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 999F5C0042A; Fri, 15 Mar 2002 16:43:42 -0800 (PST)
Received: from cup.hp.com (hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id QAA28829;
	Fri, 15 Mar 2002 16:43:36 -0800 (PST)
Message-ID: <3C92962E.6B92A0E9@cup.hp.com>
Date: Fri, 15 Mar 2002 16:47:42 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: John Hufferd <hufferd@us.ibm.com>, ips@ece.cmu.edu
Cc: t10@t10.org
Subject: Re: iscsi : changes involving tgt portal group tag.
References: <OF6EAC9122.9E58AB23-ON88256B7D.0029421B@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John Hufferd wrote:

> 
> 1. Not specifying a *port* in the Login dialogue explicitly
>     is something I am concerned could cause surprises down
>     the road.  Given that a Login is meant to establish an I_T
>     nexus to a port (not to a node), I am rather surprised to see
>     the opposition simply because the proposal is coming late.
> [Huff/]
>     based on my previous note, I do not buy this as a problem, since I do
>     not think this occurs without manual intervention and a significant
>     time interval (and most likely a power down).  This means that it would
>     seem to be a natural thing for the initiator to attempt to rediscover
>     the connection.  It seems that simple wordage that Jim Hafner has
>     suggested for the draft meets this issue.

John,

The procedure to re-config a target portal group is specific to each
product and while it may be reasonable for some product installation
manuals to recommend that all sessions be terminated and the target be
taken offline for a re-config, I don't believe the spec should base its
correct-ness upon this requirement.

After all, with multi-connection session architecture, iscsi does allow
for the target to continue to service active session traffic while being
able to de-commision individual NICs and re-assign them to other portal
groups. Consider also that such a network portal re-assign may only be a
logical admin operation and does not always require the target to be
taken offline or powered off.

Since there is no iscsi protocol specified async notification and
authentication mechanism that prevents connections from being
accidentally established to incorrect portal groups, there is a
possiblity of high-end arrays that advertise 24 x 7 support and online
re-config capabilities, causing initiators to accidentally log into the
wrong portal group during such re-configs.

This can be solved in 2 steps :

a) Have a new async pdu reason code that says "portal group
re-configured" which allows currently logged-in initiator sessions to be
notified and in turn, trigger re-discovery.

b) Send the TPGT as a part of the login and require the tgt port to
authenticate the port name/identifier upon login. 

I don't see these as major changes in the spec. They will block
initiators from accidentally logging into the wrong portal groups, which
needs to be protected against, since it can result in a number of side
effects. If we want to minimize the changes, perhaps, the TPGT could be
introduced as a login key, instead of being in the login pdu header,
thereby, causing no change in the login pdu format.

> 
>     One of the reasons that I am concerned about late proposals, is that
>     the full review of impacts tends not to be done adequately.  All my
>     experience has shown me that the largest number of errors and retrofits
>     occur with the last items added to a product, or spec.  In fact I
>     believe there can be a strong correlation between time of arrival of a
>     change, and the probability of unforeseen impacts.  So yes, I would
>     hate to make changes this late for a problem that I am not sure even
>     exist, and if it does, a rediscovery fixes the problem.

I agree with your risk assessment. However, we do have a correctness
issue in that the protocol does not authenticate port name/identifier
upon login and does not have an async notification scheme to existing
initiators which will prevent accidental [re-]login to incorrect portal
groups.

To depend on Unit Attentions to solve this problem is insufficient due
to the following reasons :

a) The "REPORTED LUNS DATA HAS CHANGED" UA can get cleared if the target
were to be power cycled, prior to I/O activity from the initiator.

b) UAs can get cleared if several other UA conditions that caused the
target to exceed the number of concurrent UAs it can queue and deliver.

c) Requiring that the initiator's legacy SCSI ULP stacks be modified in
order to react to these UAs to address an iscsi specific problem is not
a good idea, since, iscsi drivers must not require changes in the O.S.
SCSI ULPs. Further, iscsi driver writers may not control the O.S. SCSI
ULPs and the change may not be under their control.
by the time the next I/O comes in from an initiator, and reacting to UAs
requires a change in the legacy SCSI ULPs of the O.S' that will run
iscsi, or requires all the iscsi initiators to be 

It is common for all other serial scsi transports (FCP, SRP) to perform
port name/identifier authenticatio upon login.

> [\Huff]
> 
> 2.  > manual reconfiguration (including a probable power down), that the
>      Target
>      > will maintain this key state ..
>     This and a lot of your other text below dwells on the unlikelihood of
>     target not maintaining the state - I agree with you.  My point is
>     *not* that a target would, but the need to design the quickest and
>     most reliable way to communicate the loss of state back to the
>     initiator.
>     I believe addition of TPGT to the Login Request PDU accomplishes that.

> 
>     [Huff/]
>     Since I feel this type of thing is rare if a problem at all,

This is debatable, since I can envision a field engineer using the
portal group re-config as a quick customer site workaround upon
detecting a bug in the multi-connection session implementation in a
target, or a bug in the co-operation of multiple network portal types in
supporting a multi-connection session. 

Without losing the connectivity of the target, it can be converted from
a (2 x 4) connectivity array to a (1 x 8) connectivity array, causing
minimal degradation in its performance and no downtime of the customer's
data.
(m x n => no. of portal groups  x no. of network portals).

Initial implementations of a new protocol are not without their share of
bugs and it would be a useful feature to not have to bring down the
target to perform such re-configs.

>     I think
>     that documentation about not affecting the TPG if state is outstanding,
>     and a suggestion to the Initiator that if an unusual amount of time
>     goes by with the Session Down, that a Rediscovery should be done (as if
>     they would not do that anyway).  So, because of it being rare, if a
>     problem at all, I am not convinced that the right approach is to
>     optimize the response time to restart a session that has been down for
>     a long time anyway.  If it take an extra discovery, I do not think this
>     is a problem.
>     [\Huff]

We seem to be talking about different scenarios here ! I have called out
an issue regarding the re-config of portal groups without requiring a
down-time in the storage (i.e. no disruption to existing sessions),
while you seem to be referring to a session being down for a long time
above. We don't seem to be talking about the same scenario (?).

Again, I agree that a product installation guide can resolve this issue
by requiring all initiators to be quiesced and the storage to be taken
offline for any re-config. However, this limitation should not be
imposed on a scsi transport protocol for ensuring its correctness and
should not limit implementation's capabilites of providing 24x7 uptime.

Thanks in advance for considering all aspects of this issue.

Regards,
Santosh




-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Fri Mar 15 23:57:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA20187
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 23:57:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2G3gba07208
	for ips-outgoing; Fri, 15 Mar 2002 22:42:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel6.hp.com (atlrel6.hp.com [156.153.255.205])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2G3gYw07202
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 22:42:35 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel6.hp.com (Postfix) with ESMTP id E4E9F357
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 22:42:28 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id TAA16871 for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 19:44:10 -0800 (PST)
Message-ID: <008a01c1cc9c$97510b80$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "ips" <ips@ece.cmu.edu>
References: <007401c1cbb6$e40f5120$edd52b0f@rose.hp.com>
Subject: FCIP: review comments - 2
Date: Fri, 15 Mar 2002 19:42:26 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Some more comments on rev9, excuse me if some/all these were earlier
discussed by the design team.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

> 6.6.1 FCIP Encapsulation of FC Frames
....
>    The CRCV (CRC Valid) Flag SHALL be set to 0.
> 
>    The CRC field SHALL be set to 0.

I am surprised that the FCIP encapsulated header is never protected
by a CRC.  The error detection section clearly acknowledges the
possibility that TCP checksum could be inadequate for certain 
deployments - and even suggests checking the FC frame CRC (sort
of like a data digest) on reception at the Encapsulated Frame Receiver 
Portal.

My recommendation is to require an FCIP Entity to employ the header
CRC if the SF that it receives asks for CRC - IOW, similar to iSCSI's 
approach.  So, I guess I am also advocating a new bit in the pFlags field 
to announce this.  When this CRC expectation is announced, the FC CRC
checking test in 6.6.2.2 should also be a mandatory test - from the 
"semi-optional" list it is currently in.

> 6.6.2 FCIP Data Engine Error Detection and Recover

The last word in the above should be "Recovery".
 
> 6.6.2.1 TCP Assistance With Error Detection and Recovery
.....
>Thus, the byte stream passed from TCP to
>    the FCIP_LEP will be in order and free of errors detectable by the
>    TCP checksum. If TCP did not perform these functions, the FCIP_LEP
>    would have to.

Suggest rewording the last sentence (TCP always performs these functions
to *its* satisfaction, the question is if FCIP feels the same; secondly, FCIP_LEP's
error mgmt behavior is not dynamically contingent upon TCP's behavior as this 
sentence implies) -
  "To address the possibility that TCP did not perform these functions adequately 
    in a given FCIP deployment context, the FCIP_LEP verifies if these expectations
    are met."

> 
> 6.6.2.2 Errors in FCIP Headers and Discarding FCIP Frames
.....

>    Further, some errors in the encapsulation will result in the FCIP_DE
>    losing synchronization with the FCIP frames in the byte stream

I don't see "frames" here with the uppercase "F" used everywhere else.

Also, one observation is that FCEncap document uses "frames" consistently 
throughout, whereas this document chooses to use uppercase "F" (mostly).

>    1)  Length field validation -- 15 < Length < 545;

I assume "Frame Length" is meant by "Length" above.

> 6.6.2.3 Synchronization Failures
.....
> 
>    If an FCIP_DE determines that it cannot find the next FCIP Frame
>    header in the byte stream entering through the Encapsulated Frame
>    Receiver Portal, the FCIP_DE SHALL either:

S/b "either" w/ "do one of the following".

>    b)  recover synchronization by searching the bytes delivered by the
>        Encapsulated Frame Receiver Portal for a valid FCIP Frame header
>        having the correct properties

Useful to refer to 6.6.2.2 here for "correct properties". 

> 7. Checking FC Frame Transit Times in the IP Network
....
>    requirement in the FC Entity is based on a desire to include the

S/b "in"  w/  "on"

>    Frame. If no synchronized time stamp value is available to accompany
>    the entering FC Frame a value of zero SHALL be supplied.

From this, it isn't clear to me if FCIP *requires* only Synchronized operation.
If so, the draft should also specify how implementations are expected to 
deal with "benign" transitions into and out of the Unsynchronized state (i.e.
transitions happening when no Encapsulated Frames are being received).

>    The FC Entity SHALL
>    verify that the FC Entity it is communicating with on an FCIP Link
>    is using the same synchronized time source as it is, either Fibre
>    Channel services or SNTP server.

I see a chicken-and-egg problem for some implementations:  Since Fibre 
Channel time services are not available until the FCIP Link is successfully 
set up and since timestamp is to be carried on every FC Frame (including 
those Fibre Channel time service exchanges) once the Link is set up, the only 
decent option for an implementation (assuming it suppots only Synchronized
operation) is to rely on SNTP server.  Is this correct?  

If Unsynchronized operation is intended to be disallowed (my earlier 
question), then it seems to me that SNTP is the only option.

> 8. The FCIP Special Frame
.....

> 
>    The FCIP Special Frame SHALL only be sent as the first bytes
>    transmitted in each direction on a newly formed TCP Connection and
>    only one FCIP Special Frame SHALL be transmitted in each direction.

A general comment on this wording (and others similar to this).   I would
suggest rewording (to be much stronger) to:

The FCIP Special Frame SHALL be the first application data exchanged on 
each newly formed TCP connection, and only one FCIP Special Frame SHALL 
be transmitted in each direction.

>    Note: The combination of the Source FC Entity World Wide Name and
>    Source FCIP Entity Identifier fields uniquely identifies every FC
>    Entity FCIP Entity pair in the IP Network.

- S/b "Source FCIP Entity Identifier" w/ "Source FC/FCIP Entity Identifier"

- Also I take it that the "FC/FCIP Entity Identifier" is unique only within the
  scope of the given FC Entity's WWN.  So, does the model allow multiple
  FCIP Entities to be associated with the FC Fabric Entity WWN?

- From this statement, it implies to me that the Destination FC/FCIP Entity
  Identifier must be present in the special frame to ensure that the TCP connection
  is indeed established to the right "FC/FCIP Entity" under the scope of the 
  given Destination FC Fabric Entity WWN.  What am I missing?

>    The Destination FC Fabric Entity World Wide Name field MAY contain

Why isn't the above requirement a SHALL?

> 
> 9.1.2.2 Dynamic Creation of New TCP Connections
...

>     - The expected Destination FC Fabric Entity World Wide Name of the
>       FC Entity FCIP Entity pair to which the TCP Connection is being
>       made
>     - TCP Connection Parameters (see section 9.3)
>     - Quality of Service Information (see section 11)
> 
>    Based on this information, the FCIP Entity SHALL generate a TCP
>    connect request [8] to the FCIP Well-Known Port of 3225 (or other
>    configuration specific port number) at the IP Address specified by
>    the service advertisement. If the TCP connect request is rejected,
>    act to limit unnecessary repetition of attempts to establish similar
>    connections. If the TCP connect request is accepted, the FCIP Entity
>    SHALL follow the steps described in section 9.1.2.3 to complete the
>    establishment of a new FCIP_DE.
> 
>    It is recommended that an FCIP Entity not initiate TCP connect
>    requests to another FCIP Entity if incoming TCP connect requests
>    from that FCIP Entity have already been accepted.

This entire text is duplicated from previous section 9.1.2.1.  Seems like 
we could do with one instance (possibly in a new subsection).

> 
> 9.1.2.3 Connection Setup After a Successful TCP Connect Request
>
......
>All fields in the FCIP Special
>    Frame SHALL be filled in as described in section 8, particularly:

While the sentence above is unequivocally clear, I don't understand the need
for all the text that follows "particularly"....  It is confusingly repetitive since as far 
as I can tell, all these are covered in more or less the same language in section 8.

>    After the FCIP Special Frame bytes are sent on the newly formed
>    connection, the FCIP Entity SHALL wait for the FCIP Special Frame to
>    be echoed as the first bytes received on the newly formed connection.

- S/b "bytes are" w/ "is"
- S/b "first bytes" w/ "first TCP segment data"
- I take it that the onus is on the FCIP Entity that did the TCP active open 
  to send the SF.  That leads me to: What if there's a TCP simultaneous open?
  Would not each end end up sending the SF and waiting for the echo?  Also,
  would not the earlier rule on only one frame being transferred in each
  direction be violated then?
 
> 
>    If the echoed FCIP Special Frame bytes do not exactly match the FCIP
>    Special Frame bytes sent (words 7 through 17 inclusive), the FCIP
>    Entity SHALL close the TCP Connection and notify the FC Entity with
>    the reason for the closure.

Seems like all the 11 words are required to be compared. If so, what is the
Ch bit being used for?  IOW, why SHALL it be set by the responder?

> 9.1.3 Processing Incoming TCP Connect Requests
....
> 
>    The FCIP Entity SHALL listen for new TCP Connection requests [8] on
>    the FCIP Well-Known Port (3225). An FCIP Entity MAY also accept and
>    establish TCP Connections to a TCP port number other than the FCIP
>    Well-Known Port, as configured by the network administrator.

It may be useful to add that this usage is outside the scope of this document.

> 
>    The FCIP Entity SHALL determine the following information about the
>    requested connection:
> 
>     - Whether the requested connection is allowed

I take it that by means not specified in this spec?  If so, it's useful to call 
it out.

>    abort the TCP connect request [8]. If the requested connection is

I was told that "abort" isn't available on all implementations - perhaps
"abort/close" would be better....

>    The FCIP Entity MAY apply a timeout of not less than 90 seconds to
>    the waiting for the FCIP Special Frame bytes and if the timeout
>    expires the FCIP Entity SHALL close the TCP Connection and notify
>    the FC Entity with the reason for the closure.

I am not clear why this notification is required, since the local FC Entity did
not motivate the TCP connection establishment.  If it is intended for logging,
perhaps notifying the Control & Services module would be more appropriate.

>    If the Connection Nonce field contains a value identical to the most
>    recently received Connection Nonce from the same IP Address, the
>    FCIP Entity SHALL close the TCP Connection and notify the FC Entity
>    with the reason for the closure.

Same comment.

>    1)  Leave the Destination FC Fabric Entity World Wide Name field and
>        Ch bit both 0;

So allow the FCIP Link to be established?  It is unclear to me how implementations
adopting this option would be able to prevent unintended FCIP Link formation.

>    2)  Change the Destination FC Fabric Entity World Wide Name field to
>        match FC Fabric Entity World Wide Name associated with the FCIP
>        Entity that received the TCP connect request and change the Ch
>        bit to 1; or

In effect, this is being indirectly allowed as a legal discovery process.  Is
there a DoS concern here?  Also, would revealing the FC WWN be acceptable
in confidentiality terms?

>    3)  Close the TCP Connection without sending any response.

I like this option best, :-)

> 10.2 FC Fabric and IP Network Deployment Models
.....
>        Entities in an equal manner. This varies from a true Client-

S/b "varies" w/ "differs".




From owner-ips@ece.cmu.edu  Fri Mar 15 23:57:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA20200
	for <ips-archive@odin.ietf.org>; Fri, 15 Mar 2002 23:57:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2G4LpD08927
	for ips-outgoing; Fri, 15 Mar 2002 23:21:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2G4Lnw08920
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 23:21:49 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP id 6AB7FC00324
	for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 20:21:43 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id UAA22473 for <ips@ece.cmu.edu>; Fri, 15 Mar 2002 20:23:25 -0800 (PST)
Message-ID: <00b901c1cca2$12c23410$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: <ips@ece.cmu.edu>
References: <OF930D842D.13F08316-ONC2256B7D.006C1B66@telaviv.ibm.com>
Subject: Re: iSCSI: Use of the A bit
Date: Fri, 15 Mar 2002 20:21:41 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and MUST NOT do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the last
   Data-In PDU that concludes the entire requested transfer from the target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to set
> A=1 only once per MaxBurstSize" is correct.  At this point it's clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>



From owner-ips@ece.cmu.edu  Sat Mar 16 04:39:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA00999
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 04:39:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2G8wLK20113
	for ips-outgoing; Sat, 16 Mar 2002 03:58:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2G8wJw20109
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 03:58:19 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id DAA32224;
	Sat, 16 Mar 2002 03:54:58 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2G8wIB47472;
	Sat, 16 Mar 2002 01:58:18 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: Martins Krikis <mkrikis@yahoo.com>
Cc: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF901C29AE.3E4B77A3-ON88256B7E.002FA557@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 16 Mar 2002 00:57:49 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/16/2002 01:58:17 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


To any specific user, performance is judged by their own performance not
the performance of the link or the storage controller over all.

When you read an at-distance disk, and its performance sucks, because of a
Send and Ack design, you will not have good things to say about iSCSI.  And
it is not easy to tell what the problem is.  And it is not really possible
for a customer to determine before purchase that he is buying a poorly
designed target HBA or chip.  In fact they may have tested it out in a
local environment and found it OK, and then when contacted by a remote
initiator, that remote unit is very disappointed.  This gives everyone a
bad name.  Even if the Links are well used and the overall efficiency of
the storage controller good, if the individual performance is bad, iSCSI
will be seen to be bad.

Send and Ack designs are bad designs, and in almost all cases are not
needed.  And it gives iSCSI a bad name in the environment we have been
claiming as our own, the at-distance environment.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Martins Krikis <mkrikis@yahoo.com>@ece.cmu.edu on 03/15/2002 01:45:14 PM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    RE: iSCSI: Use of the A bit



Just a quick note. Some people have implied that the
use of A-bit necessarily means poor performance.

I would like to disagree. If the target is just
sitting there waiting for acknowledgment to come
back before sending the next Data-In sequence, then
yes, that's poor performance. But I can imagine
targets that keep sending data while waiting for
the outstanding acknowledgments. Yes, it requires
more buffer space, but the acknowledgments are
actually helpful in managing that bigger buffer space.
It's a very similar situation to multiple outstanding
R2T-s. Hopefully everybody agrees that there may be
benefits to those.

Or am I just missing something again?

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine and may not
            reflect those of my employer.




__________________________________________________
Do You Yahoo!?
Yahoo! Sports - live college hoops coverage
http://sports.yahoo.com/





From owner-ips@ece.cmu.edu  Sat Mar 16 08:22:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA02942
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 08:22:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GCeil09285
	for ips-outgoing; Sat, 16 Mar 2002 07:40:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GCehw09281
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 07:40:43 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BW1L>; Sat, 16 Mar 2002 07:40:42 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F57FA@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 07:40:41 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to set
> A=1 only once per MaxBurstSize" is correct.  At this point it's clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>


From owner-ips@ece.cmu.edu  Sat Mar 16 08:28:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA03012
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 08:28:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GD4kM10204
	for ips-outgoing; Sat, 16 Mar 2002 08:04:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GD4iw10200
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 08:04:44 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id OAA151510;
	Sat, 16 Mar 2002 14:04:37 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2GD4af138014;
	Sat, 16 Mar 2002 14:04:36 +0100
Subject: Re: ISCSI: need to fix handling of partial data transfers
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu, "Julian Satran" <Julian_Satran@il.ibm.com>
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF355F78C0.680F6B08-ONC2256B7E.0042959F@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Sat, 16 Mar 2002 14:12:47 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 16/03/2002 15:04:36
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Paul,

We have different opinions on basics.
If I enter into an appliance shop and ask for a bottle of milk - I get an
"error message".
It may fall in one of two categories:

   "protocol error" (in humanes - "you are an idiot")
   "we don't keep milk"


I agreed that the first was not nice and I will change it.
But there are errors from which you have no recovery - the devices can't
work with each other.

Julo


                                                                                               
                      Paul Koning                                                              
                      <ni1d@arrl.net>          To:       Julian Satran/Haifa/IBM@IBMIL         
                                               cc:       ips@ece.cmu.edu                       
                      15-03-02 16:52           Subject:  Re: ISCSI: need to fix handling of    
                      Please respond to         partial data transfers                         
                      Paul Koning                                                              
                                                                                               
                                                                                               



>>>>> "Julian" == Julian Satran <Julian_Satran@il.ibm.com> writes:

 Julian> Paul, You has two sets of counters - block counters in the
 Julian> CDB and byte counters in the execute command.  That is enough
 Julian> evidence I think and some time both block and byte in
 Julian> extended CDBs.

But both describe the command as a whole.  We were talking about the
piece-wise data transfers that occur during the execution of the
command.  If the target requests size X, can the initiator send < X?

I don't see SAM-2 allowing for that.  But since it's just talking
about architectural models, perhaps it doesn't really matter.

 Julian> As for announcing at login - this is not good enough as this
 Julian> capability may also vary per LUN and/or command.

Yes, I suppose so.  That assumes, of course, that it makes sense to
build an initiator that can't comply with any data length a target can
legitimately ask for.  I'm not sure why anyone would build such an
initiator.

This leaves us with a problem.  If the target requests X, the
initiator sends < X, and the target objects, what next?  What is the
recovery algorithm?  Is there a recovery algorithm?

One possible recovery algorithm is: the initiator gets the error code,
recognizes it should have sent exactly X, and does so.  But if it can
do that, it should have sent exactly X the first time around.

Another possibility is that the initiator is completely unable to send
exactly X.  At that point, it seems that the only thing it can do is
to fail the I/O operation.  In that case, it might as well have done
that the first time around, when it was asked to send X and realized
it could not comply.

An error message response to an exchange is useful only if it permits
a meaningful recovery action.  I may be missing something, but I don't
see a way that the error message gives you any new capability.  The
situation is no better than it would be if you use the rule "you must
send exactly X if the target asks for X".  That rule is much simpler
than the rule currently in the spec, and it eliminates the confusing
possibility of mismatched expectations between the two sides.

If there is a more elegant recovery than what I described above, what
is it?  The spec may need to document what that would be.

   paul







From owner-ips@ece.cmu.edu  Sat Mar 16 10:08:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04570
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 10:08:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GEPwB13257
	for ips-outgoing; Sat, 16 Mar 2002 09:25:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GEPvw13253
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 09:25:57 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWFJ>; Sat, 16 Mar 2002 09:25:56 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5808@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: John Hufferd <hufferd@us.ibm.com>, Martins Krikis <mkrikis@yahoo.com>
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 09:25:56 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Nobody in this thread has proposed a "send and ack" design.

Eddy

-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Saturday, March 16, 2002 3:58 AM
To: Martins Krikis
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit



To any specific user, performance is judged by their own performance not
the performance of the link or the storage controller over all.

When you read an at-distance disk, and its performance sucks, because of a
Send and Ack design, you will not have good things to say about iSCSI.  And
it is not easy to tell what the problem is.  And it is not really possible
for a customer to determine before purchase that he is buying a poorly
designed target HBA or chip.  In fact they may have tested it out in a
local environment and found it OK, and then when contacted by a remote
initiator, that remote unit is very disappointed.  This gives everyone a
bad name.  Even if the Links are well used and the overall efficiency of
the storage controller good, if the individual performance is bad, iSCSI
will be seen to be bad.

Send and Ack designs are bad designs, and in almost all cases are not
needed.  And it gives iSCSI a bad name in the environment we have been
claiming as our own, the at-distance environment.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Martins Krikis <mkrikis@yahoo.com>@ece.cmu.edu on 03/15/2002 01:45:14 PM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    RE: iSCSI: Use of the A bit



Just a quick note. Some people have implied that the
use of A-bit necessarily means poor performance.

I would like to disagree. If the target is just
sitting there waiting for acknowledgment to come
back before sending the next Data-In sequence, then
yes, that's poor performance. But I can imagine
targets that keep sending data while waiting for
the outstanding acknowledgments. Yes, it requires
more buffer space, but the acknowledgments are
actually helpful in managing that bigger buffer space.
It's a very similar situation to multiple outstanding
R2T-s. Hopefully everybody agrees that there may be
benefits to those.

Or am I just missing something again?

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine and may not
            reflect those of my employer.




__________________________________________________
Do You Yahoo!?
Yahoo! Sports - live college hoops coverage
http://sports.yahoo.com/




From owner-ips@ece.cmu.edu  Sat Mar 16 10:09:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04583
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 10:09:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GEoGm14366
	for ips-outgoing; Sat, 16 Mar 2002 09:50:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GEoBw14354
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 09:50:11 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWFL>; Sat, 16 Mar 2002 09:50:10 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5809@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: Julian_Satran@il.ibm.com, ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 09:50:09 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

It was pointed out to me by a college that when you said "entire requested
transfer from the target's perspective" that you meant this transfer would
be followed by status.

That is not how I interpreted it. I interpret it as meaning that the target
may have additional transfers before the entire transfer from the initiators
perspective is finished. And therefore this transfer would may not be
followed by status.

Can you please clear that up?

Eddy

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Saturday, March 16, 2002 7:41 AM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to set
> A=1 only once per MaxBurstSize" is correct.  At this point it's clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>


From owner-ips@ece.cmu.edu  Sat Mar 16 11:34:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA05638
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 11:34:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GFhas16582
	for ips-outgoing; Sat, 16 Mar 2002 10:43:36 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GFhVw16575
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 10:43:32 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id HAA02623;
	Sat, 16 Mar 2002 07:42:42 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>
Cc: <Julian_Satran@il.ibm.com>
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 15:42:44 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMMEDDDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Importance: Normal
In-Reply-To: <25369470B6F0D41194820002B328BDD22F57FA@ATLOPS>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Mallikarjun, Eddy and all,

	I think this might be dangerous.

	If the initiator receives a DATA-IN with F and A bits set and a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

	Initiator task tags are of course reused and there is no requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

	Even if the data SNACK were required to be sent immediately there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

	Since the SCSI status ends the task and therefore releases the ITT it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>



From owner-ips@ece.cmu.edu  Sat Mar 16 11:34:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA05652
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 11:34:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GFuWK17098
	for ips-outgoing; Sat, 16 Mar 2002 10:56:32 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GFuVw17094
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 10:56:31 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWFW>; Sat, 16 Mar 2002 10:56:30 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F580F@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Rod Harrison <rod.harrison@windriver.com>,
        "Mallikarjun C."
	 <cbm@rose.hp.com>, ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 10:56:30 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

The ITT has no good use in a DataACK SNACK and is residual after we added
the TTT. It should  probably be "reserved" for DataACK SNACK.

Would that take care of the problem?

Eddy

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Saturday, March 16, 2002 10:43 AM
To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Mallikarjun, Eddy and all,

	I think this might be dangerous.

	If the initiator receives a DATA-IN with F and A bits set and a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

	Initiator task tags are of course reused and there is no requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

	Even if the data SNACK were required to be sent immediately there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

	Since the SCSI status ends the task and therefore releases the ITT
it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>


From owner-ips@ece.cmu.edu  Sat Mar 16 12:26:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06448
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 12:26:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GGFVu17933
	for ips-outgoing; Sat, 16 Mar 2002 11:15:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GGFTw17927
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:15:29 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWF6>; Sat, 16 Mar 2002 11:15:29 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5810@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Rod Harrison <rod.harrison@windriver.com>,
        "Mallikarjun C."
	 <cbm@rose.hp.com>, ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 11:15:28 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I don't know the original reason why TTT was added but from my perspective,
I never liked the search for ITT (or hash table). So I thought it was a good
idea.

Now that it has been added we should be able to get rid of the ITT and that
will solve the problem you have pointed out.

BTW, the problem you pointed out has nothing to do with the A bit problem
this thread was addressing. But, I'm really glad you pointed that out! (It
would have been yet another good reason for the TTT).

If there is debate on what Rod pointed out, we should probably start another
thread.

Eddy

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Saturday, March 16, 2002 11:00 AM
To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit



	I believe so, but I thought targets were intending to do some
indexing on the ITT? This has always seemed odd to me, but I thought
it was the case.

	- Rod

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Saturday, March 16, 2002 3:57 PM
To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


The ITT has no good use in a DataACK SNACK and is residual after we
added
the TTT. It should  probably be "reserved" for DataACK SNACK.

Would that take care of the problem?

Eddy

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Saturday, March 16, 2002 10:43 AM
To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Mallikarjun, Eddy and all,

	I think this might be dangerous.

	If the initiator receives a DATA-IN with F and A bits set and a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

	Initiator task tags are of course reused and there is no requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

	Even if the data SNACK were required to be sent immediately there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

	Since the SCSI status ends the task and therefore releases the ITT
it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>


From owner-ips@ece.cmu.edu  Sat Mar 16 12:26:15 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06466
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 12:26:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GG19r17324
	for ips-outgoing; Sat, 16 Mar 2002 11:01:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GG15w17319
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:01:06 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id IAA05633;
	Sat, 16 Mar 2002 08:00:19 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>
Cc: <Julian_Satran@il.ibm.com>
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 16:00:21 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMCEDEDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Importance: Normal
In-Reply-To: <25369470B6F0D41194820002B328BDD22F580F@ATLOPS>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


	I believe so, but I thought targets were intending to do some
indexing on the ITT? This has always seemed odd to me, but I thought
it was the case.

	- Rod

-----Original Message-----
From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
Sent: Saturday, March 16, 2002 3:57 PM
To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


The ITT has no good use in a DataACK SNACK and is residual after we
added
the TTT. It should  probably be "reserved" for DataACK SNACK.

Would that take care of the problem?

Eddy

-----Original Message-----
From: Rod Harrison [mailto:rod.harrison@windriver.com]
Sent: Saturday, March 16, 2002 10:43 AM
To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Mallikarjun, Eddy and all,

	I think this might be dangerous.

	If the initiator receives a DATA-IN with F and A bits set and a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

	Initiator task tags are of course reused and there is no requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

	Even if the data SNACK were required to be sent immediately there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

	Since the SCSI status ends the task and therefore releases the ITT
it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>



From owner-ips@ece.cmu.edu  Sat Mar 16 12:26:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06482
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 12:26:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GGORs18343
	for ips-outgoing; Sat, 16 Mar 2002 11:24:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2GGONw18338
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:24:24 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2GGOG019754
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:24:16 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2GGOFK19745;
	Sat, 16 Mar 2002 11:24:15 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2GGOF815664;
	Sat, 16 Mar 2002 11:24:15 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15507.29104.23000.996517@gargle.gargle.HOWL>
Date: Sat, 16 Mar 2002 11:24:16 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: ISCSI: need to fix handling of partial data transfers
References: <OF355F78C0.680F6B08-ONC2256B7E.0042959F@telaviv.ibm.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 16 March 2002) by Julian Satran:
> 
> Paul,
> 
> We have different opinions on basics.
> If I enter into an appliance shop and ask for a bottle of milk - I get an
> "error message".
> It may fall in one of two categories:
> 
>    "protocol error" (in humanes - "you are an idiot")
>    "we don't keep milk"
> 
> 
> I agreed that the first was not nice and I will change it.
> But there are errors from which you have no recovery - the devices can't
> work with each other.

I think we're actually pretty much in agreement here.

My point is this:

Right now the spec says "you can ask for milk in an appliance store,
but the shopkeeper is allowed to tell you 'no'".  I'm proposing to say
"you cannot ask for milk in an appliance store".

The outcome is the same either way: the devices discover that they
can't talk to each other.  But the second rule is simpler.

So that's why I proposed to make the rule "you must answer with
exactly the data length asked for (R2T) or negotiated (unsolicited
data length)".

     paul



From owner-ips@ece.cmu.edu  Sat Mar 16 12:32:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA06550
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 12:32:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GGH2n18012
	for ips-outgoing; Sat, 16 Mar 2002 11:17:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2GGGww17997
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:16:58 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2GGGn019731
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 11:16:49 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2GGGlK19722;
	Sat, 16 Mar 2002 11:16:47 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2GGGkt15552;
	Sat, 16 Mar 2002 11:16:47 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15507.28655.699000.864992@gargle.gargle.HOWL>
Date: Sat, 16 Mar 2002 11:16:47 -0500
From: Paul Koning <ni1d@arrl.net>
To: cbm@rose.hp.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit
References: <OF930D842D.13F08316-ONC2256B7D.006C1B66@telaviv.ibm.com>
	<00b901c1cca2$12c23410$edd52b0f@rose.hp.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 15 March 2002) by Mallikarjun C.:
> I agree with Julian.
> 
> Seems to me that targets should be allowed to ask for an ack
> on the last Data-In PDU that concludes the entire transfer for the
> task - a follow-up NOP-ping is needless.  I propose that we
> 
> replace:
>   "it MAY set the A bit to 1 only once every MaxBurstSize bytes and MUST NOT do so more frequently than this."
> 
> with:
>   "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the last
>    Data-In PDU that concludes the entire requested transfer from the target's
>    perspective, and MUST NOT do so more frequently than this."

Sounds good to me.  As far as I can tell, this matches the intent of
what Eddy and Kevin were talking about.

     paul



From owner-ips@ece.cmu.edu  Sat Mar 16 15:48:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09215
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 15:48:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GJBIJ25770
	for ips-outgoing; Sat, 16 Mar 2002 14:11:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GJBDw25759
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 14:11:14 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id LAA12175;
	Sat, 16 Mar 2002 11:10:26 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>
Cc: <Julian_Satran@il.ibm.com>
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 19:10:28 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMOEDFDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Importance: Normal
In-Reply-To: <25369470B6F0D41194820002B328BDD22F5810@ATLOPS>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 4:15 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  I don't know the original reason why TTT was added but
  >  from my perspective,
  >  I never liked the search for ITT (or hash table). So I
  >  thought it was a good
  >  idea.
  >
  >  Now that it has been added we should be able to get rid
  >  of the ITT and that
  >  will solve the problem you have pointed out.
  >
  >  BTW, the problem you pointed out has nothing to do with
  >  the A bit problem
  >  this thread was addressing. But, I'm really glad you
  >  pointed that out! (It
  >  would have been yet another good reason for the TTT).
  >

Since the SCSI status ends the task and therefore the lifetime of the
initiator task tag the problem I mentioned was specifically caused by
allowing the A bit to be set with the F bit when there is piggyback
status. But you are right, the problem was actually always there since
if the SCSI transfer length was an exact multiple of MaxBurstSize the
A and F bits would be valid together. In fact I now see there are
several other ways this combination would be valid.

Anyway, removing the requirement for the initiator to send the ITT in
the data SNACK solves the problem.

  >  If there is debate on what Rod pointed out, we should
  >  probably start another
  >  thread.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 11:00 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >
  >  	I believe so, but I thought targets were intending to do some
  >  indexing on the ITT? This has always seemed odd to me,
  >  but I thought
  >  it was the case.
  >
  >  	- Rod
  >
  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 3:57 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  The ITT has no good use in a DataACK SNACK and is
  >  residual after we
  >  added
  >  the TTT. It should  probably be "reserved" for DataACK SNACK.
  >
  >  Would that take care of the problem?
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 10:43 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Mallikarjun, Eddy and all,
  >
  >  	I think this might be dangerous.
  >
  >  	If the initiator receives a DATA-IN with F and A bits
  >  set and a GOOD
  >  SCSI status it would be required to send a data SNACK
  >  PDU containing
  >  an initiator task tag that has "expired" at the initiator.
  >
  >  	Initiator task tags are of course reused and there is
  >  no requirement
  >  for the data SNACK to be sent immediately so it would be
  >  possible to
  >  have a single ITT in the network referring to more than 1 task. I
  >  think it is way too late in the game to start
  >  considering conservative
  >  reuse rules for initiator task tags. That could be a potentially
  >  invasive implementation change, especially when you consider that
  >  reusing things is generally a good thing to do from a caching
  >  perspective.
  >
  >  	Even if the data SNACK were required to be sent
  >  immediately there is
  >  no guarantee that it would be received by the target
  >  before PDUs for
  >  the task with the reused ITT when there is more than one
  >  connection
  >  per session.
  >
  >  	Since the SCSI status ends the task and therefore
  >  releases the ITT
  >  it
  >  seems the only safe way to do this would be to make
  >  piggyback status
  >  mutually exclusive with the A bit in a DATA-IN with the
  >  F bit set.
  >  This would require the target to wait for the data SNACK before
  >  issuing a SCSI status PDU. Clearly this is unpalatable
  >  for latency
  >  reasons.
  >
  >  	- Rod
  >
  >  -----Original Message-----
  >  From: owner-ips@ece.cmu.edu
  >  [mailto:owner-ips@ece.cmu.edu]On Behalf Of
  >  Eddy Quicksall
  >  Sent: Saturday, March 16, 2002 12:41 PM
  >  To: Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Yes, I agree.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Mallikarjun C. [mailto:cbm@rose.hp.com]
  >  Sent: Friday, March 15, 2002 11:22 PM
  >  To: ips@ece.cmu.edu
  >  Subject: Re: iSCSI: Use of the A bit
  >
  >
  >  I agree with Julian.
  >
  >  Seems to me that targets should be allowed to ask for an ack
  >  on the last Data-In PDU that concludes the entire
  >  transfer for the
  >  task - a follow-up NOP-ping is needless.  I propose that we
  >
  >  replace:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes and
  >  MUST NOT
  >  do so more frequently than this."
  >
  >  with:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes or on
  >  the
  >  last
  >     Data-In PDU that concludes the entire requested
  >  transfer from the
  >  target's
  >     perspective, and MUST NOT do so more frequently than this."
  >  --
  >  Mallikarjun
  >
  >  Mallikarjun Chadalapaka
  >  Networked Storage Architecture
  >  Network Storage Solutions Organization
  >  Hewlett-Packard MS 5668
  >  Roseville CA 95747
  >  cbm@rose.hp.com
  >
  >  ----- Original Message -----
  >  From: "Julian Satran" <Julian_Satran@il.ibm.com>
  >  To: "Paul Koning" <ni1d@arrl.net>
  >  Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
  >  <owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
  >  Sent: Friday, March 15, 2002 11:50 AM
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  > That could be so but it would be overkill. Status ACK
  >  can implicitly
  >  > acknowledge the last transfer.
  >  > And Yes the fact that the last transfer is not mentioned is an
  >  oversight
  >  > that I will correct.
  >  > This does not mean that you HAVE TO raise the A flag
  >  or that you are
  >  > ENCOURAGED to do so :-)
  >  >
  >  > Julo
  >  >
  >  >
  >  >
  >  >
  >  > Paul Koning <ni1d@arrl.net>
  >  > Sent by: owner-ips@ece.cmu.edu
  >  > 15-03-02 16:09
  >  > Please respond to Paul Koning
  >  >
  >  >
  >  >         To:     Eddy_Quicksall@ivivity.com
  >  >         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
  >  >         Subject:        RE: iSCSI: Use of the A bit
  >  >
  >  >
  >  >
  >  > >>>>> "Eddy" == Eddy Quicksall
  >  <Eddy_Quicksall@ivivity.com> writes:
  >  >
  >  >  Eddy> I think we may need better explanation about
  >  why some folks
  >  >  Eddy> don't want to do the "positive ack".
  >  >
  >  >  >> We got to this position, since so many folks did
  >  not want to
  >  >  >> support the positive ack.
  >  >
  >  > Something doesn't compute here.
  >  >
  >  > I don't believe the discussion has anything to do with
  >  whether you
  >  > support positive ACK or not.  If you're doing error
  >  recovery level 1
  >  > or above, then you are required to support it, because
  >  the other end
  >  > is allowed to say A=1 and you're required to answer that.
  >  >
  >  > If you don't want to support positive ACK, the solution is to
  >  support
  >  > only error recovery level 0.
  >  >
  >  > The issue under discussion is whether the rule "you
  >  are allowed to
  >  set
  >  > A=1 only once per MaxBurstSize" is correct.  At this point it's
  >  clear
  >  > to me that it is not, because you need to be able to
  >  set A=1 at the
  >  > end of the transfer.  The current rule forbids that
  >  unless the total
  >  > transfer size is >= MaxBurstSize.
  >  >
  >  > Kevin's proposal is a simple fix to this problem.
  >  >
  >  >                   paul
  >  >
  >  >
  >  >
  >  >



From owner-ips@ece.cmu.edu  Sat Mar 16 16:35:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA09563
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 16:35:49 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GKAGx28539
	for ips-outgoing; Sat, 16 Mar 2002 15:10:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GKAEw28535
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 15:10:14 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id PAA128960;
	Sat, 16 Mar 2002 15:06:53 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2GKACv209010;
	Sat, 16 Mar 2002 13:10:13 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: iSCSI: Use of the A bit
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: Martins Krikis <mkrikis@yahoo.com>, ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF3657B045.60CF3BC9-ON88256B7E.0069480B@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 16 Mar 2002 12:09:42 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/16/2002 01:10:12 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Yes, that is what is going on.

Last year positive Acks were Overtly Voted Out by the iSCSI group (we had a
consensus call).  It was felt that since TCP/IP already did the error
detection and recovery -- the additional checking of CRC-32c would seldom
find an error which was not caught by TCP/IP.  Therefore, they did not want
to add stuff to the protocol which would inspire or require folks to
perform Send and Ack types of flow in order to guarantee safe arrival.
Instead, they wanted designs to assume that almost always the data arrived
correctly, and just had a back door recovery whenever the rare situation
occurred that our Digests found an error.  In that way:
* things did not hang around and wait, for Acks,
* there was a reduction in line protocol over-head,
* and at-distance interactions would not have to slow down.

This was a clear consensus, no positive Acks!!!

Well finally the case was made that Tapes needed special handling.  That
is, they needed this type of support, because many of the implementations
simply could not perform a reasonable recovery without adding lots more
buffers then they ever needed before.  Tape buffers are not, as a rule,
pooled memory, they are devoted to specific LUs (Tape Drives).  So any
increase to these memory requirements was simply multiplied by the number
of R/W units in the Library.  So because of this, we added back in, over
much contention, the "A" bit as it is today.

It did not need the Ack on the last I/O, since the tape buffer would not be
reused by anyone else anyway until the next command arrived, at which point
the success of the last operation is determined, etc.  This was not a
problem and the consensus was that it was tolerable in the case of tapes.

Now we have, what I think are contrived situations, in which people are
stating that there is no communication between the SCSI Buffer pool and the
iSCSI implementation so we have to act like a tape.  This is, in my opinion
not a correct assumption,  Buffer management was appropriately adjusted, in
most cases,  between SCSI and FC when FC brought the concepts of Credits
into the picture.   And there needs to be corresponding flexibility in the
buffering when you appropriately work with iSCSI.  The concepts of
immediate data, and unsolicited data, make that need clear.  Further the
use of the iSCSI Command Window management, is different then credits.
This means that to make the best use of iSCSI especially at-distance, where
we can clearly stand out from the other protocols,  we should push back on
this idea of Send and Ack.  We should leave the current Positive SNACK to
the realm of Tape.  However, if it is used for disk, consider it additional
information, that can occur at very infrequent intervals (MaxBurstSize),
which might help buffer management, but is not needed!!!

This thread has tried to come up with designs in which the use of the 'A'
bit is required, for their implementation to work.  I think that is just
wrong design, and will cause all of the other implementations to look bad
when placed in the same network at-distance.

There is not a way for the customer to know that the product they are
buying will not work well at-distance, since that is, after all, one of
iSCSI's claim to fame.  Therefore, it will make all the Initiators, which
interact with such devices, look bad and give all of iSCSI a bad name.

I think we should respect the previous consensus call, and Not add back
into the protocol, positive Acks that are not needed for Tape.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Eddy Quicksall <Eddy_Quicksall@ivivity.com> on 03/16/2002 06:25:56 AM

To:    John Hufferd/San Jose/IBM@IBMUS, Martins Krikis <mkrikis@yahoo.com>
cc:    ips@ece.cmu.edu
Subject:    RE: iSCSI: Use of the A bit



Nobody in this thread has proposed a "send and ack" design.

Eddy

-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Saturday, March 16, 2002 3:58 AM
To: Martins Krikis
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: Use of the A bit



To any specific user, performance is judged by their own performance not
the performance of the link or the storage controller over all.

When you read an at-distance disk, and its performance sucks, because of a
Send and Ack design, you will not have good things to say about iSCSI.  And
it is not easy to tell what the problem is.  And it is not really possible
for a customer to determine before purchase that he is buying a poorly
designed target HBA or chip.  In fact they may have tested it out in a
local environment and found it OK, and then when contacted by a remote
initiator, that remote unit is very disappointed.  This gives everyone a
bad name.  Even if the Links are well used and the overall efficiency of
the storage controller good, if the individual performance is bad, iSCSI
will be seen to be bad.

Send and Ack designs are bad designs, and in almost all cases are not
needed.  And it gives iSCSI a bad name in the environment we have been
claiming as our own, the at-distance environment.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Martins Krikis <mkrikis@yahoo.com>@ece.cmu.edu on 03/15/2002 01:45:14 PM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    RE: iSCSI: Use of the A bit



Just a quick note. Some people have implied that the
use of A-bit necessarily means poor performance.

I would like to disagree. If the target is just
sitting there waiting for acknowledgment to come
back before sending the next Data-In sequence, then
yes, that's poor performance. But I can imagine
targets that keep sending data while waiting for
the outstanding acknowledgments. Yes, it requires
more buffer space, but the acknowledgments are
actually helpful in managing that bigger buffer space.
It's a very similar situation to multiple outstanding
R2T-s. Hopefully everybody agrees that there may be
benefits to those.

Or am I just missing something again?

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine and may not
            reflect those of my employer.




__________________________________________________
Do You Yahoo!?
Yahoo! Sports - live college hoops coverage
http://sports.yahoo.com/







From owner-ips@ece.cmu.edu  Sat Mar 16 17:04:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09905
	for <ips-archive@odin.ietf.org>; Sat, 16 Mar 2002 17:04:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GKkXQ00166
	for ips-outgoing; Sat, 16 Mar 2002 15:46:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GKkVw00157
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 15:46:31 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP id 8CEC9C00671
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 12:46:25 -0800 (PST)
Received: from swathi (ftc1nai161043.msr.hp.com [15.236.161.43]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id MAA25580 for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 12:48:06 -0800 (PST)
Message-ID: <008e01c1cd2b$a33657e0$f1a0f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: <ips@ece.cmu.edu>
References: <25369470B6F0D41194820002B328BDD22F5809@ATLOPS>
Subject: Re: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 12:46:23 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Eddy,

Your colleague is mostly right (I will explain "mostly" below - I meant
that status follows this last Data-In PDU, but there may still be other
data transfers).

I reasoned that "concludes the entire requested transfer" is fairly
clear - since the "entire requested" is Expected Data Transfer Length
for read commands.  But perhaps it isn't clear, besides I also realized
that this wording isn't explicit about bidirectional commands.  So, here
is the next attempt -

   "it MAY set the A bit to 1 only once every MaxBurstSize bytes or 
    on the last Data-In PDU that concludes the entire requested read
    data transfer for the task from the target's perspective, and MUST NOT 
    do so more frequently than this."

Note that while a given data PDU may conclude the I/O for the target
(and so within its rights to set the A-bit, per this wording), the initiator may
request retransmissions via data SNACK and the target is obligated to 
satisfy the requests (hence the wording "target's perspective").  

Let us recall that several of us were concerned about too many ACK/SNACKs
flying back and forth that caused us to place the MaxBurstSize constraint.
I believe that it's a very reasonable constraint (coupled with the above change), 
and I would be opposed to leaning towards the flexibility argument at this late stage.
We need to move on.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: <Julian_Satran@il.ibm.com>; <ips@ece.cmu.edu>
Sent: Saturday, March 16, 2002 6:50 AM
Subject: RE: iSCSI: Use of the A bit


> It was pointed out to me by a college that when you said "entire requested
> transfer from the target's perspective" that you meant this transfer would
> be followed by status.
> 
> That is not how I interpreted it. I interpret it as meaning that the target
> may have additional transfers before the entire transfer from the initiators
> perspective is finished. And therefore this transfer would may not be
> followed by status.
> 
> Can you please clear that up?
> 
> Eddy
> 
> -----Original Message-----
> From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
> Sent: Saturday, March 16, 2002 7:41 AM
> To: Mallikarjun C.; ips@ece.cmu.edu
> Cc: Julian_Satran@il.ibm.com
> Subject: RE: iSCSI: Use of the A bit
> 
> 
> Yes, I agree.
> 
> Eddy
> 
> -----Original Message-----
> From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> Sent: Friday, March 15, 2002 11:22 PM
> To: ips@ece.cmu.edu
> Subject: Re: iSCSI: Use of the A bit
> 
> 
> I agree with Julian.
> 
> Seems to me that targets should be allowed to ask for an ack
> on the last Data-In PDU that concludes the entire transfer for the
> task - a follow-up NOP-ping is needless.  I propose that we
> 
> replace:
>   "it MAY set the A bit to 1 only once every MaxBurstSize bytes and MUST NOT
> do so more frequently than this."
> 
> with:
>   "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the
> last
>    Data-In PDU that concludes the entire requested transfer from the
> target's
>    perspective, and MUST NOT do so more frequently than this."
> --
> Mallikarjun
> 
> Mallikarjun Chadalapaka
> Networked Storage Architecture
> Network Storage Solutions Organization
> Hewlett-Packard MS 5668
> Roseville CA 95747
> cbm@rose.hp.com
> 
> ----- Original Message -----
> From: "Julian Satran" <Julian_Satran@il.ibm.com>
> To: "Paul Koning" <ni1d@arrl.net>
> Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
> <owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
> Sent: Friday, March 15, 2002 11:50 AM
> Subject: RE: iSCSI: Use of the A bit
> 
> 
> > That could be so but it would be overkill. Status ACK can implicitly
> > acknowledge the last transfer.
> > And Yes the fact that the last transfer is not mentioned is an oversight
> > that I will correct.
> > This does not mean that you HAVE TO raise the A flag or that you are
> > ENCOURAGED to do so :-)
> >
> > Julo
> >
> >
> >
> >
> > Paul Koning <ni1d@arrl.net>
> > Sent by: owner-ips@ece.cmu.edu
> > 15-03-02 16:09
> > Please respond to Paul Koning
> >
> >
> >         To:     Eddy_Quicksall@ivivity.com
> >         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
> >         Subject:        RE: iSCSI: Use of the A bit
> >
> >
> >
> > >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
> >
> >  Eddy> I think we may need better explanation about why some folks
> >  Eddy> don't want to do the "positive ack".
> >
> >  >> We got to this position, since so many folks did not want to
> >  >> support the positive ack.
> >
> > Something doesn't compute here.
> >
> > I don't believe the discussion has anything to do with whether you
> > support positive ACK or not.  If you're doing error recovery level 1
> > or above, then you are required to support it, because the other end
> > is allowed to say A=1 and you're required to answer that.
> >
> > If you don't want to support positive ACK, the solution is to support
> > only error recovery level 0.
> >
> > The issue under discussion is whether the rule "you are allowed to set
> > A=1 only once per MaxBurstSize" is correct.  At this point it's clear
> > to me that it is not, because you need to be able to set A=1 at the
> > end of the transfer.  The current rule forbids that unless the total
> > transfer size is >= MaxBurstSize.
> >
> > Kevin's proposal is a simple fix to this problem.
> >
> >                   paul
> >
> >
> >
> >
> 


From owner-ips@ece.cmu.edu  Sat Mar 16 17:43:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA10657
	for <ips-archive@lists.ietf.org>; Sat, 16 Mar 2002 17:43:55 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2GLAI901232
	for ips-outgoing; Sat, 16 Mar 2002 16:10:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from astutenetworks.com (2.astutenetworks.com [216.142.74.2])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2GLAGw01228
	for <ips@ece.cmu.edu>; Sat, 16 Mar 2002 16:10:16 -0500 (EST)
Received: from amirdesktop (dhcp62 [172.21.2.62])
	by astutenetworks.com (8.11.6/8.11.2) with SMTP id g2GL96102726;
	Sat, 16 Mar 2002 13:09:06 -0800
From: "Amir Shalit" <amir@astutenetworks.com>
To: "Rod Harrison" <rod.harrison@windriver.com>,
        "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>
Cc: <Julian_Satran@il.ibm.com>
Subject: RE: iSCSI: Use of the A bit
Date: Sat, 16 Mar 2002 13:09:05 -0800
Message-ID: <NDENIJJABNDACKOMLGPNAEEKCHAA.amir@astutenetworks.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
In-Reply-To: <NEBBKMMOEMCINPLCHKGMOEDFDDAA.rod.harrison@windriver.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Successful delivery of last burst is implicitly acknowledged by 
ExpStatSN therefore we may want to discourage setting
the A bit on last burst.

Amir

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Rod Harrison
Sent: Saturday, March 16, 2002 11:10 AM
To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 4:15 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  I don't know the original reason why TTT was added but
  >  from my perspective,
  >  I never liked the search for ITT (or hash table). So I
  >  thought it was a good
  >  idea.
  >
  >  Now that it has been added we should be able to get rid
  >  of the ITT and that
  >  will solve the problem you have pointed out.
  >
  >  BTW, the problem you pointed out has nothing to do with
  >  the A bit problem
  >  this thread was addressing. But, I'm really glad you
  >  pointed that out! (It
  >  would have been yet another good reason for the TTT).
  >

Since the SCSI status ends the task and therefore the lifetime of the
initiator task tag the problem I mentioned was specifically caused by
allowing the A bit to be set with the F bit when there is piggyback
status. But you are right, the problem was actually always there since
if the SCSI transfer length was an exact multiple of MaxBurstSize the
A and F bits would be valid together. In fact I now see there are
several other ways this combination would be valid.

Anyway, removing the requirement for the initiator to send the ITT in
the data SNACK solves the problem.

  >  If there is debate on what Rod pointed out, we should
  >  probably start another
  >  thread.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 11:00 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >
  >  	I believe so, but I thought targets were intending to do some
  >  indexing on the ITT? This has always seemed odd to me,
  >  but I thought
  >  it was the case.
  >
  >  	- Rod
  >
  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 3:57 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  The ITT has no good use in a DataACK SNACK and is
  >  residual after we
  >  added
  >  the TTT. It should  probably be "reserved" for DataACK SNACK.
  >
  >  Would that take care of the problem?
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 10:43 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Mallikarjun, Eddy and all,
  >
  >  	I think this might be dangerous.
  >
  >  	If the initiator receives a DATA-IN with F and A bits
  >  set and a GOOD
  >  SCSI status it would be required to send a data SNACK
  >  PDU containing
  >  an initiator task tag that has "expired" at the initiator.
  >
  >  	Initiator task tags are of course reused and there is
  >  no requirement
  >  for the data SNACK to be sent immediately so it would be
  >  possible to
  >  have a single ITT in the network referring to more than 1 task. I
  >  think it is way too late in the game to start
  >  considering conservative
  >  reuse rules for initiator task tags. That could be a potentially
  >  invasive implementation change, especially when you consider that
  >  reusing things is generally a good thing to do from a caching
  >  perspective.
  >
  >  	Even if the data SNACK were required to be sent
  >  immediately there is
  >  no guarantee that it would be received by the target
  >  before PDUs for
  >  the task with the reused ITT when there is more than one
  >  connection
  >  per session.
  >
  >  	Since the SCSI status ends the task and therefore
  >  releases the ITT
  >  it
  >  seems the only safe way to do this would be to make
  >  piggyback status
  >  mutually exclusive with the A bit in a DATA-IN with the
  >  F bit set.
  >  This would require the target to wait for the data SNACK before
  >  issuing a SCSI status PDU. Clearly this is unpalatable
  >  for latency
  >  reasons.
  >
  >  	- Rod
  >
  >  -----Original Message-----
  >  From: owner-ips@ece.cmu.edu
  >  [mailto:owner-ips@ece.cmu.edu]On Behalf Of
  >  Eddy Quicksall
  >  Sent: Saturday, March 16, 2002 12:41 PM
  >  To: Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Yes, I agree.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Mallikarjun C. [mailto:cbm@rose.hp.com]
  >  Sent: Friday, March 15, 2002 11:22 PM
  >  To: ips@ece.cmu.edu
  >  Subject: Re: iSCSI: Use of the A bit
  >
  >
  >  I agree with Julian.
  >
  >  Seems to me that targets should be allowed to ask for an ack
  >  on the last Data-In PDU that concludes the entire
  >  transfer for the
  >  task - a follow-up NOP-ping is needless.  I propose that we
  >
  >  replace:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes and
  >  MUST NOT
  >  do so more frequently than this."
  >
  >  with:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes or on
  >  the
  >  last
  >     Data-In PDU that concludes the entire requested
  >  transfer from the
  >  target's
  >     perspective, and MUST NOT do so more frequently than this."
  >  --
  >  Mallikarjun
  >
  >  Mallikarjun Chadalapaka
  >  Networked Storage Architecture
  >  Network Storage Solutions Organization
  >  Hewlett-Packard MS 5668
  >  Roseville CA 95747
  >  cbm@rose.hp.com
  >
  >  ----- Original Message -----
  >  From: "Julian Satran" <Julian_Satran@il.ibm.com>
  >  To: "Paul Koning" <ni1d@arrl.net>
  >  Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
  >  <owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
  >  Sent: Friday, March 15, 2002 11:50 AM
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  > That could be so but it would be overkill. Status ACK
  >  can implicitly
  >  > acknowledge the last transfer.
  >  > And Yes the fact that the last transfer is not mentioned is an
  >  oversight
  >  > that I will correct.
  >  > This does not mean that you HAVE TO raise the A flag
  >  or that you are
  >  > ENCOURAGED to do so :-)
  >  >
  >  > Julo
  >  >
  >  >
  >  >
  >  >
  >  > Paul Koning <ni1d@arrl.net>
  >  > Sent by: owner-ips@ece.cmu.edu
  >  > 15-03-02 16:09
  >  > Please respond to Paul Koning
  >  >
  >  >
  >  >         To:     Eddy_Quicksall@ivivity.com
  >  >         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
  >  >         Subject:        RE: iSCSI: Use of the A bit
  >  >
  >  >
  >  >
  >  > >>>>> "Eddy" == Eddy Quicksall
  >  <Eddy_Quicksall@ivivity.com> writes:
  >  >
  >  >  Eddy> I think we may need better explanation about
  >  why some folks
  >  >  Eddy> don't want to do the "positive ack".
  >  >
  >  >  >> We got to this position, since so many folks did
  >  not want to
  >  >  >> support the positive ack.
  >  >
  >  > Something doesn't compute here.
  >  >
  >  > I don't believe the discussion has anything to do with
  >  whether you
  >  > support positive ACK or not.  If you're doing error
  >  recovery level 1
  >  > or above, then you are required to support it, because
  >  the other end
  >  > is allowed to say A=1 and you're required to answer that.
  >  >
  >  > If you don't want to support positive ACK, the solution is to
  >  support
  >  > only error recovery level 0.
  >  >
  >  > The issue under discussion is whether the rule "you
  >  are allowed to
  >  set
  >  > A=1 only once per MaxBurstSize" is correct.  At this point it's
  >  clear
  >  > to me that it is not, because you need to be able to
  >  set A=1 at the
  >  > end of the transfer.  The current rule forbids that
  >  unless the total
  >  > transfer size is >= MaxBurstSize.
  >  >
  >  > Kevin's proposal is a simple fix to this problem.
  >  >
  >  >                   paul
  >  >
  >  >
  >  >
  >  >





From owner-ips@ece.cmu.edu  Sun Mar 17 08:50:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA01345
	for <ips-archive@odin.ietf.org>; Sun, 17 Mar 2002 08:50:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2HCsVv18473
	for ips-outgoing; Sun, 17 Mar 2002 07:54:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2HCsOw18467;
	Sun, 17 Mar 2002 07:54:24 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id NAA87816;
	Sun, 17 Mar 2002 13:54:07 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2HCs0L164482;
	Sun, 17 Mar 2002 13:54:07 +0100
Subject: Re: iscsi : TSID rule.
To: Santosh Rao <santoshr@cup.hp.com>
Cc: IPS Reflector <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF0BDAC367.2B5C4563-ONC2256B7F.004442F5@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Sun, 17 Mar 2002 14:34:14 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 17/03/2002 14:54:07
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Santosh,

This  text is old and has not being updated for a while.
The Session uniqueness is assured now by the
Inititaor-name+ISID+TPGT+Target-name.
The text will be updated to reflect the fact the TSID - except for the
value "0" (reserved to indicate a new session) is there for the convenience
of the target and has no meaning for the protocol.
SSID has no meaning associated with it either and will be removed.  Your
issue about TPGT has also a neat solution - endorsed by the NDT - that they
may want to/have relayed to list.

Julo


                                                                                              
                      Santosh Rao                                                             
                      <santoshr@cup.hp.        To:       IPS Reflector <ips@ece.cmu.edu>      
                      com>                     cc:                                            
                      Sent by:                 Subject:  iscsi : TSID rule.                   
                      owner-ips@ece.cmu                                                       
                      .edu                                                                    
                                                                                              
                                                                                              
                      16-03-02 02:05                                                          
                      Please respond to                                                       
                      Santosh Rao                                                             
                                                                                              
                                                                                              



Hello,

Section 2.4.3 states the following requirement :

"a) Between a given iSCSI Initiator and iSCSI Target, at any given time,
only one session can exist with a given session identifier (SSID)."

This requirement is then translated into, what is called a TSID rule,
which is expressed in the same section as :

"TSID RULE: The iSCSI Target SHOULD NOT select a TSID for a given login
request if the resulting SSID is already in use by an existing session
between the target and the requesting iSCSI Initiator. See Section 8.1.1
Conservative Reuse of ISIDs."

I have the following questions regarding the above requirement and
corresponding rule :

1) What is the basis for this requirement ? Why is a SSID required to be
unique for a given initiator-target node pair ?(My thinking was that
requirement (b) was all that was needed.)

2) What is the SSID used for and why is its unique-ness required ?

3) If there is some valid reason that justifies the retention of this
rule, then, why is the rule stated as "SHOULD NOT" and not "MUST NOT".
It seems that "SHOULD NOT" allows for conforming implementation to
violate this rule. Is that ok ?

Any clarifications would be appreciated.

Thanks,
Santosh

--
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################






From owner-ips@ece.cmu.edu  Sun Mar 17 08:50:47 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA01359
	for <ips-archive@odin.ietf.org>; Sun, 17 Mar 2002 08:50:47 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2HCs5O18452
	for ips-outgoing; Sun, 17 Mar 2002 07:54:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2HCs2w18446;
	Sun, 17 Mar 2002 07:54:03 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id NAA87810;
	Sun, 17 Mar 2002 13:53:55 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2HCrt9103006;
	Sun, 17 Mar 2002 13:53:55 +0100
To: Martins Krikis <mkrikis@yahoo.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF33160DF9.85DB2C39-ONC2256B7E.0049E7A7@telaviv.ibm.com>
Date: Sun, 17 Mar 2002 14:53:51 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 17/03/2002 14:53:55,
	Serialize complete at 17/03/2002 14:53:55
Content-Type: multipart/alternative; boundary="=_alternative 004A0B7AC2256B7E_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004A0B7AC2256B7E_=
Content-Type: text/plain; charset="us-ascii"

You are not missing anything but a consensus was reached and I am not 
willing to reopen the issue.
You may choose to support errorlevel=1.

Julo




Martins Krikis <mkrikis@yahoo.com>
Sent by: owner-ips@ece.cmu.edu
15-03-02 23:45
Please respond to Martins Krikis

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        RE: iSCSI: Use of the A bit

 

Just a quick note. Some people have implied that the
use of A-bit necessarily means poor performance.

I would like to disagree. If the target is just
sitting there waiting for acknowledgment to come
back before sending the next Data-In sequence, then
yes, that's poor performance. But I can imagine
targets that keep sending data while waiting for
the outstanding acknowledgments. Yes, it requires
more buffer space, but the acknowledgments are
actually helpful in managing that bigger buffer space.
It's a very similar situation to multiple outstanding
R2T-s. Hopefully everybody agrees that there may be
benefits to those. 

Or am I just missing something again?

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine and may not
            reflect those of my employer.




__________________________________________________
Do You Yahoo!?
Yahoo! Sports - live college hoops coverage
http://sports.yahoo.com/



--=_alternative 004A0B7AC2256B7E_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">You are not missing anything but a consensus was reached and I am not willing to reopen the issue.</font>
<br><font size=2 face="sans-serif">You may choose to support errorlevel=1.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Martins Krikis &lt;mkrikis@yahoo.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">15-03-02 23:45</font>
<br><font size=1 face="sans-serif">Please respond to Martins Krikis</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Just a quick note. Some people have implied that the<br>
use of A-bit necessarily means poor performance.<br>
<br>
I would like to disagree. If the target is just<br>
sitting there waiting for acknowledgment to come<br>
back before sending the next Data-In sequence, then<br>
yes, that's poor performance. But I can imagine<br>
targets that keep sending data while waiting for<br>
the outstanding acknowledgments. Yes, it requires<br>
more buffer space, but the acknowledgments are<br>
actually helpful in managing that bigger buffer space.<br>
It's a very similar situation to multiple outstanding<br>
R2T-s. Hopefully everybody agrees that there may be<br>
benefits to those. <br>
<br>
Or am I just missing something again?<br>
<br>
 &nbsp;Martins Krikis, Intel Corp.<br>
<br>
Disclaimer: These opinions are mine and may not<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;reflect those of my employer.<br>
<br>
<br>
<br>
<br>
__________________________________________________<br>
Do You Yahoo!?<br>
Yahoo! Sports - live college hoops coverage<br>
http://sports.yahoo.com/<br>
</font>
<br>
<br>
--=_alternative 004A0B7AC2256B7E_=--


From owner-ips@ece.cmu.edu  Sun Mar 17 16:57:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA11678
	for <ips-archive@odin.ietf.org>; Sun, 17 Mar 2002 16:57:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2HL1XS07976
	for ips-outgoing; Sun, 17 Mar 2002 16:01:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from siaar2ab.compuserve.com (siaar2ab.compuserve.com [149.174.40.138])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2HL1Uw07971
	for <ips@ece.cmu.edu>; Sun, 17 Mar 2002 16:01:31 -0500 (EST)
Received: (from mailgate@localhost)
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) id QAA29845
	for ips@ece.cmu.edu; Sun, 17 Mar 2002 16:01:25 -0500 (EST)
Received: from compuserve.com (dal-tgn-tvq-vty29.as.wcom.net [216.192.240.29])
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) with ESMTP id QAA29821
	for <ips@ece.cmu.edu>; Sun, 17 Mar 2002 16:01:17 -0500 (EST)
Message-ID: <3C95056C.81B131A4@compuserve.com>
Date: Sun, 17 Mar 2002 15:06:52 -0600
From: Ralph Weber <ralphoweber@compuserve.com>
Reply-To: roweber@acm.org
X-Mailer: Mozilla 4.7 [en]C-CCK-MCD NSCPCD47  (Win98; I)
X-Accept-Language: en,pdf
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: FC Encapsulation and FCIP WG last call comments
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

With WG last call scheduled to end in less than 24 hours
for the FC Encapsulation and FCIP drafts, I am aware of
comments from Rob Elliott and Mallikarjun Chadalapaka.

If you have offered comments on these drafts but do not
see your name listed above, please contact me directly
with the date and time of your e-mail message so that
I can search for it.

Thanks.

Ralph...


From owner-ips@ece.cmu.edu  Mon Mar 18 00:52:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA20827
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 00:52:35 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5Aqv29303
	for ips-outgoing; Mon, 18 Mar 2002 00:10:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5Anw29285;
	Mon, 18 Mar 2002 00:10:49 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id GAA197252;
	Mon, 18 Mar 2002 06:10:32 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2I5AVL112492;
	Mon, 18 Mar 2002 06:10:31 +0100
Subject: Re: iSCSI: Use of the A bit
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFDF710C04.75D555A8-ONC2256B80.00095B57@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Mon, 18 Mar 2002 03:52:46 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 07:10:31
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear all,

The text for the A bit part (9.7.2) reads now:

   A (Acknowledge) bit


       For sessions with ErrorRecoveryLevel 1 or higher, the target sets
       this bit to 1 to indicate that it requests a positive
       acknowledgement from the initiator for the data received.  The
       target should use the A bit moderately; it MAY set the A bit to 1
       only once every MaxBurstSize bytes or on the last Data-In PDU that
       concludes the entire requested read data transfer for the task from
       the target's perspective, and MUST NOT do so more frequently than
       this.

       On receiving a Data-In PDU with the A bit set to 1, the initiator
       MUST issue a SNACK of type DataACK.  If the initiator has detected
       holes in the input sequence, it MUST postpone issuing the SNACK of
       type DataACK until the holes are filled. An initiator MUST ONLY
       acknowledge the status for command that produced Data-In PDUs after
       acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
       requested by the target. A status acknowledgement for a command that
       generated Data-In PDUs is considered by the target as an implicit
       acknowledgement of the Data-In PDUs if such an acknowledgement was
       requested by the target.

The ITT mandating text in 9,16.1 will read:

       For Status SNACK and DataACK, the Initiator Task Tag is reserved. In
       all other cases, the Initiator Task Tag field MUST be set to the
       Ini-tiator Task Tag of the referenced command.


       Julo



From owner-ips@ece.cmu.edu  Mon Mar 18 00:53:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA20841
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 00:53:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5KrG29770
	for ips-outgoing; Mon, 18 Mar 2002 00:20:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5Kqw29766
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:20:52 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <GZSJA89C>; Mon, 18 Mar 2002 00:20:28 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375FD@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: Last Call comments coming soon.
Date: Mon, 18 Mar 2002 00:20:26 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> With WG last call scheduled to end in less than 24 hours
> for the FC Encapsulation and FCIP drafts, I am aware of
> comments from Rob Elliott and Mallikarjun Chadalapaka.

Oh dear, Ralph's about to have one of those proverbial "be
careful what you ask for ..." experiences :-) :-).

Seriously, I've spent most of today reviewing all three of
the drafts that are in WG Last Call, and my (somewhat lengthy)
comments will follow to the list and/or directly to the
document editors as appropriate.  I want to set some context
first:

- I'm impressed by the amount of text in the drafts, and
	that they're in reasonably good shape.  The amount
	of comments I have is not unusual for the first
	WG Last Call attempt on drafts of this size (at
	least not for me ...).
- The length and/or tone of my comments should not be
	interpreted as opposition to a draft or an attempt
	to obstruct its progress.  As a WG co-chair, I'm
	committed to getting all the drafts through the
	WG, and this sort of technical review is part of
	that process.
- I apologize for being pressed on time.  In an ideal
	world, I would have gotten this done earlier this
	week and had the opportunity to edit my comments
	to knock off some of the rougher edges.  No offense
	is intended, please don't take any.

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar 18 00:54:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA20858
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 00:54:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5AUk29254
	for ips-outgoing; Mon, 18 Mar 2002 00:10:30 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5AQw29244;
	Mon, 18 Mar 2002 00:10:27 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id GAA54072;
	Mon, 18 Mar 2002 06:10:15 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2I5AEL47516;
	Mon, 18 Mar 2002 06:10:14 +0100
Subject: Re: ISCSI: need to fix handling of partial data transfers
To: Paul Koning <ni1d@arrl.net>
Cc: ips@ece.cmu.edu, "Julian Satran" <Julian_Satran@il.ibm.com>,
        owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF5B49F133.FEC50704-ONC2256B80.000243A6@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Mon, 18 Mar 2002 02:30:26 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 07:10:14
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Device operation is not in the iSCSI domain.  You can find the information
you need in SCSI.
It comes complete with device type, capabilities, alignment required(if
any), block sizes and much more (enough to fill many pages for every device
class).  If you want the information you require just ask for it by SCSI
means.
A perusal of the SCSI standards for several classes of devices might help.

Julo


                                                                                                         
                      Paul Koning                                                                        
                      <ni1d@arrl.net>          To:       Julian Satran/Haifa/IBM@IBMIL                   
                      Sent by:                 cc:       ips@ece.cmu.edu                                 
                      owner-ips@ece.cmu        Subject:  Re: ISCSI: need to fix handling of partial data 
                      .edu                      transfers                                                
                                                                                                         
                                                                                                         
                      16-03-02 18:24                                                                     
                      Please respond to                                                                  
                      Paul Koning                                                                        
                                                                                                         
                                                                                                         



Excerpt of message (sent 16 March 2002) by Julian Satran:
>
> Paul,
>
> We have different opinions on basics.
> If I enter into an appliance shop and ask for a bottle of milk - I get an
> "error message".
> It may fall in one of two categories:
>
>    "protocol error" (in humanes - "you are an idiot")
>    "we don't keep milk"
>
>
> I agreed that the first was not nice and I will change it.
> But there are errors from which you have no recovery - the devices can't
> work with each other.

I think we're actually pretty much in agreement here.

My point is this:

Right now the spec says "you can ask for milk in an appliance store,
but the shopkeeper is allowed to tell you 'no'".  I'm proposing to say
"you cannot ask for milk in an appliance store".

The outcome is the same either way: the devices discover that they
can't talk to each other.  But the second rule is simpler.

So that's why I proposed to make the rule "you must answer with
exactly the data length asked for (R2T) or negotiated (unsolicited
data length)".

     paul







From owner-ips@ece.cmu.edu  Mon Mar 18 00:55:49 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA20899
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 00:55:49 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5AWd29256
	for ips-outgoing; Mon, 18 Mar 2002 00:10:32 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5ARw29245
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:10:27 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id GAA18744;
	Mon, 18 Mar 2002 06:10:21 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2I5AIL107800;
	Mon, 18 Mar 2002 06:10:18 +0100
Subject: RE: iSCSI: Use of the A bit
To: "Rod Harrison" <rod.harrison@windriver.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>,
        "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>, ips@ece.cmu.edu,
        "Julian Satran" <Julian_Satran@il.ibm.com>
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFB60B549A.27B84E5C-ONC2256B80.0002F692@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Mon, 18 Mar 2002 02:45:05 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 07:10:19
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Rod,

If you thought that you can reuse ITT as soon as the status arrived you are
mistaken. There is no need for a conservative reuse rule. The ITT may be
reused only after the task termination (status) has been acknowledged.

However even then on a multiple connection a target may get a new command
with an ITT before status ack.
In this case a well designed target will avoid sending the status for the
second command before having the first acked.

The data ack (if any) must precede the status ack and the target should
consider the status ack as implying a data ack.

Julo


                                                                                                         
                      "Rod Harrison"                                                                     
                      <rod.harrison@win        To:       "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,  
                      driver.com>               "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>    
                                               cc:       Julian Satran/Haifa/IBM@IBMIL                   
                      16-03-02 17:42           Subject:  RE: iSCSI: Use of the A bit                     
                      Please respond to                                                                  
                      "Rod Harrison"                                                                     
                                                                                                         
                                                                                                         



Mallikarjun, Eddy and all,

             I think this might be dangerous.

             If the initiator receives a DATA-IN with F and A bits set and
a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

             Initiator task tags are of course reused and there is no
requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

             Even if the data SNACK were required to be sent immediately
there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

             Since the SCSI status ends the task and therefore releases the
ITT it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

             - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>







From owner-ips@ece.cmu.edu  Mon Mar 18 01:01:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA21023
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 01:01:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5enk00804
	for ips-outgoing; Mon, 18 Mar 2002 00:40:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5elw00799
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:40:47 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4H49NF>; Mon, 18 Mar 2002 00:34:52 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937600@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: FCIP Last Call technical comments
Date: Mon, 18 Mar 2002 00:40:22 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

[T] Technical comments only.  Editorial comments have been sent directly
to the document editor.

----- FC over TCP/IP -09 -----

-- Section 6.6 - FCIP Data Engine (FCIP_DE)

   Table 2 shows the SOF and EOF code values that are legal in FCIP
   Frames. This list may be a subset of the SOF and EOF codes listed in
   the FC Frame Encapsulation [27].

[T] This is a problem because these codes are being specified in more
than one place.  I think the FC Frame Encapsulation document is the right
place for the normative specification of these codes (and see my comments
against it on the need to get IANA involved).  This would be ok as a list
of codes that are currently valid, but the specification authority needs
to be in one place.

-- Section 6.6.2.2 - Errors in FCIP Headers and Discarding FCIP Frames

   In addition to the tests above, the validity and positioning of the
   following FCIP Frame information SHOULD be used to detect
   encapsulation errors that may or may not affect synchronization:
 
   a)  Protocol # field and its ones complement (2 tests);
   b)  Version field and its ones complement (2 tests);
[... list continues, snipped ...]

[T] I think at least these two are MUSTs.  At a minimum, the Protocol#
and Version field must be checked against expected values - I might accept
the checks against their ones complements being SHOULDs.  Same comment
applies to the Flags field and SOF.  Someone MUST check the FC frame CRC
before forwarding the frame, but that responsibility could be assigned
to the FC Entity.

   At least 5 of the 18 tests listed above SHALL be performed. Failure
   of any of the above tests actually performed SHALL indicate an
   encapsulation error and the frame SHALL NOT be forwarded on to the
   FC Entity. Further, such errors SHOULD be considered carefully,
   since some may be synchronization errors.

[T] There aren't 18 tests, and I think some of the individual tests (or
subsets) are MUSTs (see previous comment).  This needs to be gone over
carefully - in essence a MUST is only appropriate where failure to apply
the test carries a non-negligible risk of forwarding a bad frame to FC.
The authors are the experts on this and need to do this analysis.  I
don't understand the last "SHOULD" - what is the (testable) requirement
on an implementation?

-- Section 6.6.2.3 - Synchronization Failures

   If the FCIP_DE attempts to recover synchronization, the
   resynchronization algorithm used SHALL meet the following
   requirements:

[T] One requirement is missing, which may be part of b):

   b)  return to sending valid FC Frames only after synchronization has
       been verified; and

[T] Verification of synchronization MUST exclude any possibility of
forwarding an FC frame that was not sent by the transmitting FCIP Entity.
This includes the scenario in which a valid encapsulated
FCIP frame occurs in the payload of an FC frame that is encapsulated
and sent over FCIP; excluding this scenario is necessary but not
sufficient to meet the requirement.

   An example algorithm meeting these requirements can be found in
   annex C.

[T] That doesn't meet the missing requirement that my
above comment wants to add.  The problem is at step 2 of the algorithm
description.

   2)  Use multiple strong candidate headers to locate a verified
       candidate header:
 
       The Frame Length in one strong candidate header is used to skip
       incoming bytes until the expected location of the next strong
       candidate header is reached. Then the tests described in step 1)
       are applied to see if another strong candidate header has
       successfully been located.

The "skip incoming bytes" step makes it possible that a set of valid
FC headers is interlaced in the payloads of FC frames in a fashion
that causes all the real headers to be skipped.  This is a rather
unlikely, but not impossible scenario.  This could be dealt with by
searching for headers instead of skipping data and aborting if a
header is found where data should have been or carrying on and
aborting if an interlaced header chain scenario arises.  The algorithm
in Annex C does address the scenario of FCIP frames occurring in
FC frame payloads, but it doesn't meet the "can't be fooled"
requirement that I think should be added.

Unfortunately, this issue appears to not be resolvable within the WG.
I have had heated and lengthy offline discussions with the FCIP Authors
in which they have made clear their strong opposition to the "missing
requirement" and resulting scan rather than skip of data, and have
argued that the algorithm in Annex C produces a long enough chain of
headers that the odds of having followed a chain that is interlaced
through frame payloads is small enough to be ignored.  I will have to
consult the Area Directors.

-- Section 7 - Checking FC Frame Transit Times in the IP Network
 
[T] I don't believe that this paragraph meets the requirements in the
FC Frame Encapsulation specification for processing transit time
information.  Punting this up to the FC Entity is problematic -
the minimum functional requirements on the FC Entity to meet the
FC Frame Encapsulation requirements will need to be spelled out here
in detail (i.e., a single sentence saying "must meet requirements in
Section 4 of the FC Frame Encapsulation document" is probably not
going to fly).  Mallikarjun caught some issues in this area also.

-- Section 8 - The FCIP Special Frame

[T] How is the FCIP Special Frame payload protected?  I don't see the
equivalent
of an FC Frame CRC.

   The Connection Usage Code field contains Fibre Channel defined
   information regarding the intended usage of the connection as
   specified in FC-BB-2 [4].

[T] The authors need to talk to me about this, so that I can understand
what's going on here, and whether we need another IANA registry, as is
the case for the SOF and EOF values.

[T] This section needs to describe the usage of the FCIP Special Frame,
including the structure of the interaction between the two FCIP Entities,
and how that establishes the security and connection usage properties
that are desired.  The descriptions in Section 9 contain a great deal
of detail that mixes several mechanisms together - a high level guide
to what's going on is necessary to understand them.

-- Section 9.1.2.1 - Non-Dynamic Creation of New TCP Connections

   If the TCP connect request is rejected, the FCIP Entity SHALL act to
   limit unnecessary repetition of attempts to establish similar
   connections.

[T] That's a little vague.  How about specifying a minimum time period
that MUST elapse before retry?

   It is recommended that an FCIP Entity not initiate TCP connect
   requests to another FCIP Entity if incoming TCP connect requests
   from that FCIP Entity have already been accepted.

[T] Needs an upper case "SHOULD" or "RECOMMENDED".  This also needs
a MUST or SHOULD on the configuration mechanism to indicate in which
direction connections are to be established between a pair of FCIP
Entities in order to deal with a problem that turns up near the end
of Section 9.1.3.  This is related to Mallikarjun's issue about
handling of simultaneous opens.

-- Section 9.1.2.3 - Connection Setup After a Successful TCP Connect Request

[T] This dives into the details of FCIP Special Frame handling without
explaining
the overall structure and goals of the use, and is unclear as a result.  For
example, For example, on p. 29, after constructing the FCIP Special Frame,
the
text says:

   After the FCIP Special Frame bytes are sent on the newly formed
   connection, the FCIP Entity SHALL wait for the FCIP Special Frame to
   be echoed as the first bytes received on the newly formed connection.

But one has to wade all the way down to p.33 towards the end of Section
9.1.3
to discover that the other FCIP Entity is expected to perform validation
actions
before echoing the frame.  The structural outline of the usage of the FCIP
Special Frame (without the blow by blow details) needs to be described in
Section 8.

   The remaining steps in this section SHALL be performed only if the
   echoed FCIP Special Frame bytes exactly match the FCIP Special Frame
   bytes sent (words 7 through 17 inclusive).

-- Section 9.1.3 - Processing Incoming TCP Connect Requests

   If the requested connection is
   allowed, the FC Entity SHALL ensure that required IP security
   features are enabled and accept the TCP connect request.

[T] As written, this appears to require a dynamic interrogation of the IPsec
Security Association Database, and possibly the IPsec Security Policy
Database.
I suspect that this is in excess of what was intended, and suspect a longer
description is needed.

   If the Destination FC Fabric Entity World Wide Name contains 0, the
   FCIP Entity SHALL take one of the following three actions:
 
   1)  Leave the Destination FC Fabric Entity World Wide Name field and
       Ch bit both 0;
   2)  Change the Destination FC Fabric Entity World Wide Name field to
       match FC Fabric Entity World Wide Name associated with the FCIP
       Entity that received the TCP connect request and change the Ch
       bit to 1; or
   3)  Close the TCP Connection without sending any response.
 
   The choice between the above actions depends on the anticipated
   usage of the FCIP Entity and is outside the scope of this
   specification.  The FCIP Entity may consult the "shared" database
   when choosing between the above actions.

[T] I'm not buying the "outside the scope" disclaimer.  Some more
description
of why the three choices are available is in order even if the normative
criteria for choosing among them are specified in FC-BB-2.  If my assumption
about FC-BB-2 is correct, the last sentence is almost certainly too weak -
it needs to refer to consulting the FC Entity to determine what to do.

   If:
   a)  The Destination FC Fabric Entity World Wide Name contains a non-
       zero value that does not match the FC Fabric Entity World Wide
       Name associated with the FCIP Entity that received the TCP
       connect request, or
   b)  The contents of the Connection Usage Flags, and Connection Usage
       Code fields is not acceptable to the FCIP Entity that received
       the TCP connect request,
   then the FCIP Entity SHALL take one of the following two actions:
   1)  Change the contents of the unacceptable fields to correct/
       acceptable values and set the Ch bit to 1; or
   2)  Close the TCP Connection without sending any response.

[T] 1) looks like a security hole that discloses information an attacker
may find useful in establishing an undesired connection to FCIP.  What's
the motivation/purpose for this?

   If the Source FC Fabric Entity World Wide Name and Source FC/FCIP
   Entity Identifier field values in the FCIP Special Frame match the
   Source FC Fabric Entity World Wide Name and Source FC/FCIP Entity
   Identifier associated with an existing FCIP_LEP, the FCIP Entity
   SHALL:
 
   1)  Request that the FC Entity authenticate the source of TCP
       connect request, providing the following information to the FC
       Entity for authentication purposes:

[T] Need to say more about what the FC Entity MUST do to "authenticate the
source".
I realize that the details are specified in FC-BB-2, but the functional
requirements on the FC Entity can be specified here.

       The FCIP Entity SHALL wait indefinitely for the FC Entity to
       authenticate source of the TCP connect request and SHALL not use
       the new TCP Connection for any purpose until the FC Entity
       completes the authentication.

[T] "wait indefinitely" creates an obvious denial of service attack
vulnerability.  Try something else.

   Note that the originator of TCP connect requests uses IP Address and
   TCP Port to identify which TCP Connections belong to which FCIP_LEPs
   while the recipient of TCP connect requests uses the Source FC
   Fabric Entity World Wide Name, Source FC/FCIP Entity Identifier
   fields from the FCIP Special Frame to identify which TCP Connection
   belong to which FCIP_LEPs.  For this reason, an FCIP Entity that both
   originates and receives TCP connect requests is unable to match the
   FCIP_LEPs associated with originated TCP connect requests to the
   FCIP_LEPs associated with received TCP connect requests.

[T] That's a problem.  See comment against Section 9.1.2.1 for one
suggestion
for how to fix this, but some sort of fix appears necessary to me.

-- Section 9.3.4 TCP_NODELAY Option
 
   FCIP Entities SHALL set the TCP_NODELAY option to one. This will
   disable the Nagle Algorithm that is designed for usage in a telnet
   environment.

[T] I believe that "SHALL" should be a lower case "should".  This is a local
performance optimization that has no other effects.

-- Section 9.5 - Flow Control Mapping between TCP and FC

   Coordination of these flow control mechanisms one of which is credit
   based and the other of which is window based depends on painstaking
   design that is outside the scope of this specification.

[T] This is content-free.  At least warn about some of the things that
can go wrong, in particular BB-credit starvation and the potential to
really screw up a Fibre Channel fabric if this is long-lived.

-- Section 10 Security

[T] Need to get this whole section aligned with the latest (currently -11)
version of the IPS Security draft.

-- Section 10.3.1 - IPSec ESP Authentication and Confidentiality
 
   FCIP Entities MUST implement IPSec ESP [16] in Tunnel Mode for
   providing Data Integrity and Confidentiality. FCIP Entities MAY
   implement IPSec ESP in Transport Mode, if deployment considerations
   require use of Transport Mode.

[T] Those deployment considerations include RFC 2401 requirement for
Transport mode because the IPsec implementation is a host implementation
rather than a security gateway.  I thought this was understood by the FCIP
authors, and it needs to be explicit here including an appropriate reference
to RFC 2401.  I expect to be able to double-check this requirement with the
IETF Security Area in the next few days.

-- Section 10.3.2 - Key Management

   When pre-shared keys are used, IKE Aggressive Mode SHOULD be used
   and Main Mode SHOULD NOT be used.

[T] I think this is too strong and will cause problems.  Pre-Shared keys
are a "MUST", Aggressive Mode is a "MAY", so this "SHOULD" is inconsistent.
The issue with Main Mode arises when dynamically assigned IP addresses are
used (and hence Main Mode can't figure out which pre-shared key to use).
The escape from this box appears to be that Aggressive Mode is a MUST
(SHOULD?) when dynamic assignment of IP addresses to FCIP implementations
is used, but support for dynamic assignment of IP addresses is NOT REQUIRED.

The problem with this approach is that one gets into trouble on one end
of an FCIP Link when the *other* end has its IP address dynamically
assigned.  The obvious solutions to this issue are to forbid (MUST NOT)
dynamic IP address assignment (which has no chance of making it through
the IESG) or to REQUIRE Aggressive Mode.  In addition, the IPS Security
draft appears to need some editing to allow Aggressive Mode to be a "MAY"
for FCIP (and iFCP).  Darn - I thought we had this issue closed in
Huntington
Beach -- I didn't pay enough attention to the details of what we did at
the very end of the security session.

	Support for IKE Oakley Groups is not required.

[T] What does this refer to?  At a minimum, it needs a reference.

   For the purposes of establishing a secure FCIP Link, the two
   participating FCIP Entities consult a Security Policy Database
   (SPD).

-- Section 10.4.2 - TCP Connection Security Associations (SAs)
 
   For a TCP Connection establishment, IKE Phase 2 is employed,
   resulting in an SA, identified by an SPI. All IP datagrams of the
   TCP Connection MUST carry an ESP header with a valid SPI and
   Sequence Number to be accepted as valid by the receiving peer.

[T] The requirement for a phase 2 SA per TCP connection has been removed.
This text (and possibly the rest of this section) need some editing to
reflect that.

-- Section 10.4.3 - Handling data integrity and confidentiality violations
 
   Confidentiality checks MUST be performed if Confidentiality is
   enabled.

[T] And what would those be, please?  Replace this with a prohibition on
use of Confidentiality without Integrity.

-- Section 10.4.4 - Handling SA parameter mismatches
 
   When SA parameters do not match, the TCP Connection may reach a
   point where no traffic moves, or there are excessive TCP
   retransmissions. In such a case, either side MAY take one of the
   following actions:
   a)  Reestablish another set of SA parameters; or
   b)  Close the TCP Connection and notify the FC Entity with the
       reason for the closure.

[T/E] Needs some more explanation, including an example of the sort of
mismatch that could cause this problem.  Recall that IKE negotiates SA
parameters, and this fact needs to be included in the explanation and
example.

-- Section 11.2 - IP Quality of Service (QoS) Support

   If diffserv/PHB QoS is NOT implemented, the DSCP field for all IP
   packets SHALL be set to '000000'.

[T] Not a good idea.  That's not consistent with RFC 2474.  Best
bet is to drop this sentence, but if the authors want to say something
here, they should contact me directly to discuss/vet appropriate text

-- Section 12 - Normative References

[E] This needs to be carefully checked to minimize normative references.
[7] is definitely non-normative.  Most of the QoS references are or can
be non-normative, specifically [11], [22], [23], [24]).  [22] is
an Informational RFC and hence has to be referenced in a non-normative
fashion, and I really want to see [23] and [24] be non-normative (else
any FCIP implementation will have to implement both EF and AF, which
is surely not what was intended).  Need to add a non-normative MPLS
reference.

-- Section 14 - Acknowledgments
 
[E] This is a good place to thank everyone who's reviewed the document,
commented on ideas in it, or helped in other ways.
 
-- Section 15 - Contributors' Addresses
 
We'll try this structure of not separating the folks listed on p.1 from
the other contributors and see if there are any procedural objections.
It's unusual to say the least.

-- Annex A - IANA Considerations

[T] Instruct IANA to change the authority for those port allocations to
reference
this RFC when it is approved.  Add a sentence forbidding the use of UDP with
FCIP even though IANA has allocated a port.

[T] Will need to reference the SOF/EOF registry that the FC Frame
Encapsulation
Draft will need to set up.  Point to the Protocol# allocation done by that
draft also.  If a connection usage registry is needed (see comment against
Section 8, details of that will have to go here).

[E] Should the ANNEXes be APPENDIXes instead?

-- Annex C - Example of synchronization recovery algorithm

[T] See comment on this Annex under Section 6.6.2.3 above.

-- Annexes E, F, and G

I skipped reviewing these three annexes based on the assumption that they
correctly reproduce information specified elsewhere, and the amount of time
I've already spent on this review.


---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar 18 01:05:49 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA21073
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 01:05:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5CNE29387
	for ips-outgoing; Mon, 18 Mar 2002 00:12:23 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5CMw29382
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:12:22 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id GAA196658;
	Mon, 18 Mar 2002 06:12:14 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2I5AQ995364;
	Mon, 18 Mar 2002 06:11:58 +0100
Subject: RE: iSCSI: Use of the A bit
To: "Rod Harrison" <rod.harrison@windriver.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>,
        "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>, ips@ece.cmu.edu,
        "Julian Satran" <Julian_Satran@il.ibm.com>
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFB6A1FF8D.A52D9946-ONC2256B80.00048BA8@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Mon, 18 Mar 2002 02:50:16 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 07:11:58
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

That is correct but the race is not there :-) Julo


                                                                                                         
                      "Rod Harrison"                                                                     
                      <rod.harrison@win        To:       "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,  
                      driver.com>               "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>    
                                               cc:       Julian Satran/Haifa/IBM@IBMIL                   
                      16-03-02 21:10           Subject:  RE: iSCSI: Use of the A bit                     
                      Please respond to                                                                  
                      "Rod Harrison"                                                                     
                                                                                                         
                                                                                                         



  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 4:15 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  I don't know the original reason why TTT was added but
  >  from my perspective,
  >  I never liked the search for ITT (or hash table). So I
  >  thought it was a good
  >  idea.
  >
  >  Now that it has been added we should be able to get rid
  >  of the ITT and that
  >  will solve the problem you have pointed out.
  >
  >  BTW, the problem you pointed out has nothing to do with
  >  the A bit problem
  >  this thread was addressing. But, I'm really glad you
  >  pointed that out! (It
  >  would have been yet another good reason for the TTT).
  >

Since the SCSI status ends the task and therefore the lifetime of the
initiator task tag the problem I mentioned was specifically caused by
allowing the A bit to be set with the F bit when there is piggyback
status. But you are right, the problem was actually always there since
if the SCSI transfer length was an exact multiple of MaxBurstSize the
A and F bits would be valid together. In fact I now see there are
several other ways this combination would be valid.

Anyway, removing the requirement for the initiator to send the ITT in
the data SNACK solves the problem.

  >  If there is debate on what Rod pointed out, we should
  >  probably start another
  >  thread.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 11:00 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >
  >          I believe so, but I thought targets were intending to do some
  >  indexing on the ITT? This has always seemed odd to me,
  >  but I thought
  >  it was the case.
  >
  >          - Rod
  >
  >  -----Original Message-----
  >  From: Eddy Quicksall [mailto:Eddy_Quicksall@ivivity.com]
  >  Sent: Saturday, March 16, 2002 3:57 PM
  >  To: Rod Harrison; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  The ITT has no good use in a DataACK SNACK and is
  >  residual after we
  >  added
  >  the TTT. It should  probably be "reserved" for DataACK SNACK.
  >
  >  Would that take care of the problem?
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Rod Harrison [mailto:rod.harrison@windriver.com]
  >  Sent: Saturday, March 16, 2002 10:43 AM
  >  To: Eddy Quicksall; Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Mallikarjun, Eddy and all,
  >
  >          I think this might be dangerous.
  >
  >          If the initiator receives a DATA-IN with F and A bits
  >  set and a GOOD
  >  SCSI status it would be required to send a data SNACK
  >  PDU containing
  >  an initiator task tag that has "expired" at the initiator.
  >
  >          Initiator task tags are of course reused and there is
  >  no requirement
  >  for the data SNACK to be sent immediately so it would be
  >  possible to
  >  have a single ITT in the network referring to more than 1 task. I
  >  think it is way too late in the game to start
  >  considering conservative
  >  reuse rules for initiator task tags. That could be a potentially
  >  invasive implementation change, especially when you consider that
  >  reusing things is generally a good thing to do from a caching
  >  perspective.
  >
  >          Even if the data SNACK were required to be sent
  >  immediately there is
  >  no guarantee that it would be received by the target
  >  before PDUs for
  >  the task with the reused ITT when there is more than one
  >  connection
  >  per session.
  >
  >          Since the SCSI status ends the task and therefore
  >  releases the ITT
  >  it
  >  seems the only safe way to do this would be to make
  >  piggyback status
  >  mutually exclusive with the A bit in a DATA-IN with the
  >  F bit set.
  >  This would require the target to wait for the data SNACK before
  >  issuing a SCSI status PDU. Clearly this is unpalatable
  >  for latency
  >  reasons.
  >
  >          - Rod
  >
  >  -----Original Message-----
  >  From: owner-ips@ece.cmu.edu
  >  [mailto:owner-ips@ece.cmu.edu]On Behalf Of
  >  Eddy Quicksall
  >  Sent: Saturday, March 16, 2002 12:41 PM
  >  To: Mallikarjun C.; ips@ece.cmu.edu
  >  Cc: Julian_Satran@il.ibm.com
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  Yes, I agree.
  >
  >  Eddy
  >
  >  -----Original Message-----
  >  From: Mallikarjun C. [mailto:cbm@rose.hp.com]
  >  Sent: Friday, March 15, 2002 11:22 PM
  >  To: ips@ece.cmu.edu
  >  Subject: Re: iSCSI: Use of the A bit
  >
  >
  >  I agree with Julian.
  >
  >  Seems to me that targets should be allowed to ask for an ack
  >  on the last Data-In PDU that concludes the entire
  >  transfer for the
  >  task - a follow-up NOP-ping is needless.  I propose that we
  >
  >  replace:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes and
  >  MUST NOT
  >  do so more frequently than this."
  >
  >  with:
  >    "it MAY set the A bit to 1 only once every
  >  MaxBurstSize bytes or on
  >  the
  >  last
  >     Data-In PDU that concludes the entire requested
  >  transfer from the
  >  target's
  >     perspective, and MUST NOT do so more frequently than this."
  >  --
  >  Mallikarjun
  >
  >  Mallikarjun Chadalapaka
  >  Networked Storage Architecture
  >  Network Storage Solutions Organization
  >  Hewlett-Packard MS 5668
  >  Roseville CA 95747
  >  cbm@rose.hp.com
  >
  >  ----- Original Message -----
  >  From: "Julian Satran" <Julian_Satran@il.ibm.com>
  >  To: "Paul Koning" <ni1d@arrl.net>
  >  Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
  >  <owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
  >  Sent: Friday, March 15, 2002 11:50 AM
  >  Subject: RE: iSCSI: Use of the A bit
  >
  >
  >  > That could be so but it would be overkill. Status ACK
  >  can implicitly
  >  > acknowledge the last transfer.
  >  > And Yes the fact that the last transfer is not mentioned is an
  >  oversight
  >  > that I will correct.
  >  > This does not mean that you HAVE TO raise the A flag
  >  or that you are
  >  > ENCOURAGED to do so :-)
  >  >
  >  > Julo
  >  >
  >  >
  >  >
  >  >
  >  > Paul Koning <ni1d@arrl.net>
  >  > Sent by: owner-ips@ece.cmu.edu
  >  > 15-03-02 16:09
  >  > Please respond to Paul Koning
  >  >
  >  >
  >  >         To:     Eddy_Quicksall@ivivity.com
  >  >         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
  >  >         Subject:        RE: iSCSI: Use of the A bit
  >  >
  >  >
  >  >
  >  > >>>>> "Eddy" == Eddy Quicksall
  >  <Eddy_Quicksall@ivivity.com> writes:
  >  >
  >  >  Eddy> I think we may need better explanation about
  >  why some folks
  >  >  Eddy> don't want to do the "positive ack".
  >  >
  >  >  >> We got to this position, since so many folks did
  >  not want to
  >  >  >> support the positive ack.
  >  >
  >  > Something doesn't compute here.
  >  >
  >  > I don't believe the discussion has anything to do with
  >  whether you
  >  > support positive ACK or not.  If you're doing error
  >  recovery level 1
  >  > or above, then you are required to support it, because
  >  the other end
  >  > is allowed to say A=1 and you're required to answer that.
  >  >
  >  > If you don't want to support positive ACK, the solution is to
  >  support
  >  > only error recovery level 0.
  >  >
  >  > The issue under discussion is whether the rule "you
  >  are allowed to
  >  set
  >  > A=1 only once per MaxBurstSize" is correct.  At this point it's
  >  clear
  >  > to me that it is not, because you need to be able to
  >  set A=1 at the
  >  > end of the transfer.  The current rule forbids that
  >  unless the total
  >  > transfer size is >= MaxBurstSize.
  >  >
  >  > Kevin's proposal is a simple fix to this problem.
  >  >
  >  >                   paul
  >  >
  >  >
  >  >
  >  >







From owner-ips@ece.cmu.edu  Mon Mar 18 01:07:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA21095
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 01:07:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5VCx00279
	for ips-outgoing; Mon, 18 Mar 2002 00:31:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5VBw00275
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:31:11 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4H49JB>; Mon, 18 Mar 2002 00:25:15 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E029375FE@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: FC Encapsulation WG Last Call comments
Date: Mon, 18 Mar 2002 00:30:45 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Comments flagged with [E] for editorial, [T] for technical.

----- FC Encapsulation -06 -----

-- Section 1 - Scope

   The organization responsible for the Fibre Channel standards (NCITS
   Technical Committee T11) has determined that some functions and
   modes of operation are not interoperable to the degree required by
   the IETF. This draft includes applicable T11 interoperability
   determinations in the form of restrictions on the use of this
   encapsulation mechanism.

[E] Is there an official citation for this statement?  It really needs one
to be published in an archival unchangeable format such as an RFC.

-- Section 2 - Encapsulation Concepts

	FC frames have several possible lengths.

[E] Should read "variable length" or something like that - this implies
several possible choices of fixed length, which is incorrect.

   To facilitate transporting FC frames over TCP the native FC frame needs
   to be contained in (encapsulated in) a slightly larger structure as
   shown in figure 1.

[E] The use of TCP in this context is overly restrictive.  This
encapsulation
is in principle applicable to any means of transport over IP, including
TCP, SCTP, UDP, and carrier pigeon ;-), even though in practice all the
initial uses will use TCP.

   The format and content of an FC frame is described in the FC

[E] "is" --> "are"

-- Section 3 - The FC Encapsulation Header
-- Section 3.1 - FC Encapsulation Header Format

   The values in the Protocol# field are assigned by
   IANA [8]. The following values are known to be in use:
 
    - FCIP -- TO BE ASSIGNED by IANA
    - iFCP -- TO BE ASSIGNED by IANA
 
[T] Delete the text starting with "The following values" and insert
a forward reference to the IANA Consideration section.

   FC Encapsulation receivers may compare the Protocol# and -Protocol#
   fields as an additional verification that an FC Encapsulation Header
   is being processed.

   FC Encapsulation
   receivers may compare the Version and -Version fields as an
   additional verification that an FC Encapsulation Header is being
   processed.

[T] Those "may"s are misleading.  I think "SHOULD" is appropriate, but I
could
accept "SHOULD"s that only applied when the CRC is not valid.

   Flags (bits 31-26 in word 3): The Flags bits provide information
   about the usage of the FC Encapsulation Header as shown in figure 3.
 
   Note: Implementers are advised to consult the specifications of
   protocols that use this header to determine how each individual
   protocol uses the bits in the Flags field.

[T] The "Note:" paragraph is part of the CRCV issue (see below), and
probably
needs to be deleted as part of resolving that issue.  This paragraph also
has the additional problem in that it implies that protocol specific uses
of the reserved flags are allowed, which is not the case.

   Reserved (Flags, bits 31-27 in word 3): These bits are reserved for
   use by future versions of the FC Encapsulation and SHALL be set to
   zero on send. Protocols employing this encapsulation MAY require
   checking for zero on receive, however doing so has the potential to
   create incompatibilities with future versions of this encapsulation.

[E] Second sentence is poorly worded.  Suggested rewrite: Protocols
employing
this encapsulation SHOULD ignore the Reserved bits on receive in order
to avoid creating incompatibilities with possible future versions of this
encapsulation.  I believe this change is editorial, and it also applies
to the -Flags and -Frame Length fields.

   CRCV (CRC Valid Flag, bit 26 in word 3): A CRCV bit value of one
   indicates that the contents of the CRC field are valid. A CRCV bit
   value of zero indicates that CRC are invalid. Some protocols may
   always check the CRC without regard for the state of this bit. The
   value of the CRCV bit SHALL be constant for all FC Encapsulation
   Headers sent on a given TCP connection.

[T] The "Some protocols may always check the CRC ..." is the CRCV issue
that Mallikarjun also found and that has been problematic in the past.
I believe that what's going on here is that all protocols have to check
the Protocol#, and once that's been checked, the implementation knows
whether there's supposed to be a CRC there and hence doesn't need to
look at CRCV.  In practice this won't cause problems, as including the
CRC when it's not supposed to be there is harmless, and failing to
include it when it should be there will almost certainly cause a CRC
check failure.

I offer a proposal to resolve this by expanding the Protocol
# registry that IANA will create so that each registered protocol
must supply not only its name and an RFC reference, but also whether
the protocol uses (Yes) or does not use (No) the CRC in this header.
The above text could then be revised to make the CRCV check at the
receiver OPTIONAL in all cases because its value can be inferred
from the protocol#.

[E] Also need to generalize away from TCP connection to allow possible
future
use with other transports.

[T] Here or in the description of the Protocol Specific fields, a warning
to implementers is needed says some sort of error checking redundancy
(e.g., the ones complements found elsewhere in the header) SHOULD (or MUST)
be used when the CRC is not used.  This warning should be duplicated
in Section 3.2.1.  This is a technical comment, but should not be
controversial.

   Time Stamp [integer] and Time Stamp [fraction] (words 4 and 5): The
   two Time Stamp fields contain time at which the FC Encapsulated
   frame was sent as known to the sender. The format of integer and
   fraction Time Stamp word values is specified in Simple Network Time
   Protocol (SNTP) Version 4 [9]. The contents of the Time Stamp
   [integer] and Time Stamp [fraction] words SHALL be set as described
   in section 4.

[E] For convenience, it might be good to summarize those formats here with
an indication that [9] is the normative authority.  I don't feel strongly
about this, though.

[T] We have a problem here - RFC 2030 is Informational, and hence can't
be referenced in a normative fashion from a standards track document.  I'll
talk to Ralph offline about how to get around this.

   CRC (word 6): When the CRCV Flag bit is zero, the CRC field SHALL
   contain zero. When the CRCV Flag bit is one, the CRC field SHALL
   contain a CRC for words 0 to 5 of the FC Encapsulation Header
   computed using the polynomial, initial value, and bit order defined
   for Fibre Channel in FC-FS [3]. Using this algorithm, the bit order
   of the resulting CRC corresponds to that of FC-1 layer. The CRC
   transmitted over the IP network shall correspond to the equivalent
   value converted to FC-2 format as specified in FC-FS.

[E] I realize that FC-FS is the latest and greatest version of the FC
frame standard, BUT, referencing a project in progress for this sort of
basic CRC mechanism is an invitation to procedural problems.  Can this
reference be changed to FC-PH accompanied by a note that FC-FS is
supplanting FC-PH, but will make *no* changes in this area?  Note that
I'm comfortable with the earlier reference to FC-FS for frame contents.

-- Section 3.2.1

[T] The warning that the protocol-specific fields SHOULD (or MUST) be
protected
by redundancy needs to go here.

   Redundancy based header validation can be built from simple logic
   (e.g., XORs and comparisons). Header validation based on redundancy
   also is a step wise process in that the first word is validated,
   then the second, then the third and so on. A decision that a
   candidate header is not valid may be reached before the complete
   header is available.

[E] First sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 3.2.2

   CRC based header validation employs a straight forward algorithm
   (e.g., compute the CRC for all bytes preceding the CRC word and
   compare the results to the CRC word's contents). The number of
   comparisons required to perform CRC validation is exactly one and
   the method for computing the CRC is well known with proven
   implementations.

[E] Last sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 4 - Measuring Fibre Channel frame transit time

   To comply with FC-FS [3], an FC Fabric must specify and limit the
   lifetime of a frame.

[E] Same comment as before about referencing FC-FS.  Can this be changed to
reference FC-PH with a note that FC-FS won't change this ... or is FC-FS
tinkering with things here?

   When originating an encapsulated frame, an entity that does not
   support transit time calculation SHALL always set the Time Stamp
   [integer] and Time Stamp [fraction] fields to zero. When receiving
   an encapsulated frame, an entity that does not support transit time
   calculation SHALL ignore the contents of the Time Stamp words. The
   protocol SHALL specify whether or not implementation support is
   required.

[T] This is about "MUST/SHOULD/MAY implement".  Need a similar requirement
on the protocol to specify "MUST/SHOULD/MAY use" and under what conditions.

   The policy for processing frames while in the Unsynchronized state
   SHALL be defined by the protocol specification, including whether or
   not the entity may continue to send and receive frames from the IP
   network.

[T] On the receive side, this condition appears to be specified in the
wrong direction.  Receiving frames from the IP network cannot possibly cause
problems, the issues are in forwarding (stale) frames into FC.

   When de-encapsulating a frame, an entity in the Synchronized state
   SHALL:

[E] While the sub-bullets are correct, they leave a reader unfamiliar
with FC somewhat high and dry.  I would include a "for example" in both
a) and b), along the lines of:
 
	a) For example, if a calculated transit time exceeds a value that
		could cause the frame to violate FC maximum time in transit
		limits (Time Out Values), the protocol may specify that the
		frame is to be discarded.
	b) For example, a protocol may specify that frames for which transit
		time cannot be determined are never to be forwarded over FC.


[T] At the end of this section, it would be good to warn protocol designers
that well-designed protocols are unlikely to accomplish useful communication
when the communicating entities are in different states, and hence protocol
designers need to consider how to coordinate state transitions, especially
the Unsynchronized to Synchronized transition on startup and an unexpected
Synchronized to Unsynchronized transition (e.g., caused by loss of contact
with an external time service).  This is related to some issues that
Mallikarjun
found.

-- Section 5 - The FC frame
-- Section 5.1 - FC frame content

   As shown in figure 4, the FC frame content is defined as the data
   between the EOF and SOF delimiters (including the FC CRC) after
   conversion from FC-1 to FC-2 format as specified by FC-FS [3].

[E] This needs some more explanation.  The important things that need to
be said are:
	- FC uses the same 8b/10b encoding as Gigabit Ethernet in which
		each 8 bit byte is transmitted using 10 bits on the wire
		for reasons that include redundancy and low level timing
		synchronization between sender and receiver.
	- All discussion of FC frame content in this draft is at the 8b
		level prior to 8b->10b expansion on send or after 10b->8b
		reduction on receive.
The Gigabit Ethernet reference is particularly important in increasing
accessibility of this document to a network-savvy, but new to FC audience.

-- Section 5.3 - FC SOF and EOF
 
   The FC frame content is composed of 8-bit bytes that can be
   translated directly for transmission over TCP. The FC SOF and EOF
   [3] require 8b/10b special characters that cannot be translated
   directly to 8-bit bytes, encoded values are required.

[E] I think this paragraph needs to be moved to Section 5.1, and replaced
with a sentence here that refers back to it.  One important editorial
change is "8b/10b special characters that cannot be translated directly
to 8-bit bytes" should be changed to "10b special characters that have
no 8b equivalents" or something like that.

   SOF (bits 31-24 and bits 23-16 in word 0): The SOF fields contain
   the encoded SOF value selected from table 1.

[T] As we've learned from the Class 4 adventure, this table is subject
to change/extension.  IANA will need to manage it, and will need some
sort of allocation guidelines to remain consistent with whatever mechanism
produced this peculiar set of values.  While we probably don't want to
allow value recycling, we may want to write some text dealing with
retiring values (making them no longer usable).  This also applies to the
EOF values in Table 2.

   Note: FC-BB-2 [6] lists SOF and EOF codes not shown in table 1 and
   table 2 (e.g., SOFi1 and SOFn1). However, FC-MI [7] identifies these
   codes as not interoperable, so they are not listed in this
   specification.

[T] There are a couple of problems here.  If FC-BB-2 has assigned values
to SOF and EOF encodings that MUST NOT be used with FCIP, then we need to
instruct IANA to reserve and not allocate those values.  As part of
allocating future values in this table, we need to (1) instruct the
author(s)
of the draft/RFC doing the allocation to ensure that T11.3 review of the
proposed allocation is obtained (2) that the IPS WG chair(s) (if the IPS
WG still exists) and the Transport ADs are informed of this review, and
(3) that IANA allocates the values approved by T11.3 as opposed to choosing
values.  Since Murali's been appointed as T11's official liaison to IETF,
I think it's his responsibility to suggest a coordination process.

-- Section 7 - Normative References

I would really like to remove the normative reference to FC-FS, substituting
FC-PH with a note that FC-FS will replace FC-PH.  I don't object to an FC-FS
reference where it's really needed, but the portions of FC-FS that this
draft
relies on are sufficiently basic and stable that an FC-PH reference will
make
their stability clear.  The FC-BB-2 and FC-MI references for SOF and EOF
codes
need to become non-normative as part of setting up the IANA registry and
management
process.  The FC-SW-2 reference may not need to be normative here.

RFC 1700 is almost certainly the wrong reference to instruct IANA on what
procedures to follow.  See RFC 2434 for guidance on this topic, although it
may
not be necessary to reference it.

-- ANNEX A - Protocol Requirements

[E] I think this should be an Appendix, rather than an Annex.  Some changes
may be in order here based on the above comments.

-- ANNEX B - IANA Considerations

[T] This needs to be made somewhat more explicit and direct.  IANA is
looking for
simple straightforward instructions roughly of the form "IANA is instructed
to
do <X>".  in particular, the following sentence is a problem:

   Standards action on this RFC should be accompanied by IANA
   assignment of the following two Protocol# values:

It should read something like:

   In addition to creating the FC Encapsulation Protocol Number Registry,
   the standards action of this RFC allocates the following
   two values from this registry:

While one normally asks IANA to allocate values, the exception is that
when creating a registry, one can instruct IANA as to what the initial
contents are (i.e., a new registry does not have to be created empty).

[T] Also, earlier comments suggest that the Protocol# registry needs to be
expanded with a CRC field (Yes/No) and that registries need to be created
for the SOF and EOF values.

   It is requested that the ips working group chairs or the
   Transport Services area directors be notified when any new Protocol#
   value assignment is requested.

[T] Given that an approved RFC is required, this sentence seems redundant.
If the intent was notification of the IPS WG chairs and/or ADs when a
an I-D draft is submitted that will cause a Protocol# assignment if/when
approved as an RFC, the language needs to say that and should be
rephrased to require notification of the IP Storage WG chairs (don't
use WG acronyms here) and notification of the Transport ADs instead
in the case that the IPS WG does not exist or is not active.

[T] Also see previous comments about needing to set up an IANA
registry for SOF and EOF values.  I'll work with Ralph on crafting the
right IANA instructions.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar 18 03:07:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA00537
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 03:07:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2I5ikR01003
	for ips-outgoing; Mon, 18 Mar 2002 00:44:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I5ijw00999
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 00:44:45 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4H493X>; Mon, 18 Mar 2002 00:38:49 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937601@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: iFCP Last Call comments
Date: Mon, 18 Mar 2002 00:44:19 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2I5ijw01000
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

[E] Editorial, [T] Technical

------ iFCP -10 ----------

[E] Remove Change Log in the version after a successful WG Last Call.

[E] Section 2.1 - Definitions

         Terms needed to clarify the concepts presented in this document are
         presented here.

[E] I don't like the usage of "clarify".  How about "Terms used to
describe the concepts presented in this document are defined here." ?

         Address-translation mode û A mode of gateway operation in which the
                 scope of N_PORT fabric addresses for locally attached

[E] Some tool has helpfully inserted a non-ASCII character.  MS Word
AutoCorrect
is a likely suspect.  Hunt all of these down and fix them, then discipline
the tool severely ;-).

         FC-4 - The fibre channel application layer. This layer is
                 functionally equivalent to the TCP/IP application layer.

[T] I don't understand this.  Are you equating FC-4 with OSI layer 7?  If
so, I'm not sure that is correct, and it might be better to leave out this
attempted analogy.

-- Section 3.2 - Fabric Topologies

         a)  Arbitrated Loop -- A series of N_PORTs connected together in
             daisy-chain fashion.  Data transmission between N_PORTs
             requires arbitration for control of the loop in a manner
             similar to a token ring network.

[T] That's not a fabric topology, unless the loop is fabric attached, in
which case you're in case c), Mixed Fabric.  iFCP can't support an FC-AL
loop that isn't fabric-attached.

         Depending on the topology, the N_PORT and fabric port variants
         through which a fibre channel device is attached to the network may
         be one of the following:

              Fabric Topology  Fabric Port Type    N_PORT Variant
              ---------------  ----------------    --------------

              Loop             L_PORT              NL_PORT

              Switched         F_PORT              N_PORT

              Mixed            FL_PORT             NL_PORT

                               F_PORT              N_PORT

[T] I believe the Loop line in this table does not match the other lines
and if so, this is one more reason to leave non-fabric-attached FC-AL out
of this description.

-- Section 3.3.1 - Fabric-Supplied Link Services

         All switched fabrics must provide the following services:

            Fabric F_PORT server û Services an N_PORT request to access the
            fabric for communications.

[E] "request" --> "requests"

-- Section 4.4 - iFCP Fabric Properties

         As discussed below, an
         unbounded iFCP fabric may have any number of switch elements and
         gateways.

[E] It's not "any", but the limit is a very large number by comparison to
239.
At some point the need to reuse 24-bit addresses for outbound traffic from a
single FC link behind an iFCP gateway will be a problem.  This comment also
applies to the second paragraph in Section 4.4.2.

-- 4.5 - The iFCP N_PORT Address Model

         In the iFCP protocol, an N_PORT is represented by the following
         addresses:

[E] "addresses" --> "types of addresses" to avoid implying that there's
only one alias.  Different gateways will assign different aliases to the
same N_PORT.

         The mode of gateway operation is settable in an implementation-
         specific manner.  The implementation MUST NOT allow the mode to be
         changed after the gateway begins processing fibre channel frame
         traffic.

[E] Might want to add a MUST that a gateway cannot operate in more than
one mode at the same time, and a repeat of the (implied) requirement that
all gateways in an iFCP fabric MUST operate in the same mode.

-- 4.6 - Operation in Address Transparent Mode

         b) When interoperating with locally attached fibre channel switch
            elements, each iFCP gateway MUST assume control of DOMAIN_ID
            assignments in accordance with the appropriate fibre channel
            standard or vendor-specific protocol specification.

[T] This is ok, but turns up another requirement that needs to be explicitly
stated earlier.  Any given FC N_PORT MUST NOT be behind more than one iFCP
gateway.  Address Transparent mode satisfies this because only one gateway
can become the principal switch, so the others presumably shut down, but
Address
Translation mode appears to have the potential for seriously nasty
misbehavior
unless the "iFCP gateway MUST become the principal switch" requirement is
imposed on it also.  Need to add a sentence or two on how an iFCP gateway
can be assured of becoming the principal switch.  Beyond this, the fact that
any Fabric Attached FC-AL loop can have only one FL port completes the
picture,
ensuring that a loop can't stitch two gateway domains together.  Requiring
the
iFCP gateway to be the principal switch also avoids problems with the
gateway
being unable to obtain sufficient Domain IDs from the principal switch.

-- Section 5.2.2.2 - Creating an iFCP Session

        The gateway SHALL initiate the creation of an iFCP session in
         response to a PLOGI ELS directed to a remote N_PORT from a locally
         attached N_PORT as described in the following steps.

         a) Using the D_ID field in the PLOGI frame header, locate the
            remote N_PORT descriptor.  If no descriptor exists, the iFCP
            gateway SHALL return a response of LS_RJT, with a Reason Code of
            'Unable to Perform Command Request' (0x09) and a Reason Code
            Explanation of 'Invalid N_PORT_ID' (0x1F). An iFCP session SHALL
            NOT be created.

[E] Need to explain why this is ok.  The answer is that a properly operating
FC N_PORT will have previously issued an FC nameserver query that the
gateway
translated to an iSNS query, and hence when it issues PLOGI to the result of
the nameserver query, the iSNS query response created the required
descriptor
in the gateway before being translated to the FC nameserver result.  There's
an implication here that remote N_PORT descriptors that result from iSNS
queries translated from FC nameserver queries MUST NOT be discarded as long
as any N_PORT that has issued a query for that remote N_PORT is logged into
the fabric.

       e) If a CBIND response is returned with one of the following
            statuses, the PLOGI SHALL be terminated with an LS_RJT message.
            Depending on the CBIND failure status, the Reason Code and
            Reason Explanation SHALL be set to the following values
            specified in [FC-FS].

[E] Add a statement that this plus case f) is a comprehensive list of
possible
CBIND failure statuses, as specified in Section 6.1.

         f) A CBIND response with a CBIND STATUS of "N_PORT session already
            exists" indicates that the remote gateway has concurrently
            initiated a CBIND request to create an iFCP session between the
            same pair of N_PORTs. The receiving gateway SHALL terminate this
            attempt, return the connection to the Unbound state and prepare
            to respond to an incoming CBIND request as described below.

[E] Add a sentence indicating that the "simultaneous open" race is dealt
with
by allowing the sender with the numerically larger N_PORT name to succeed in
establishing the session.

     The gateway receiving a CBIND request SHALL respond as follows:

         a) If the receiver has a duplicate iFCP session in the OPEN PENDING
            state, then the receiving gateway SHALL compare the Source
            N_PORT Name in the incoming CBIND payload with the Destination
            N_PORT Name.

         b) If the Source N_PORT Name is greater, the receiver SHALL issue a
            CBIND response of "Success" and SHALL place the session in the
            OPEN state.

[E] Add a sentence indicating that in case b), case c) will occur at the
other gateway because N_PORT names are globally unique WWNs, and hence this
gateway's duplicate session will receive a CBIND STATUS of "N_PORT session
already exists" and will be terminated in due course.

[T] There's no discussion of what to do if a TCP connection closes
unexpectedly
during this process (e.g., if closing of unbound connections is allowed at
arbitrary times for reasons such as reducing the resources consumed by
unbound
connections).  This needs to be added even if the reason in parentheses is
not
allowed.

         Upon receiving such a request, the gateway providing the
         connectivity probe SHALL transmit LTEST messages at the specified
         interval. 

[T] This requires liveness test (LTEST) messages even when the connection is
in active use.  Was that intended?

-- Section 5.2.2.4 - Use of TCP Features and Settings

[E] For Wrapped sequence detection, "Should use" in the table should be
"SHOULD use".

-- Section 5.2.3.1 - iFCP Session Completion

         In response to the Unbind message, either gateway may choose to
         close the TCP connection or return it to a pool of unbound
         connections.

[T] This assumes that Unbind is always successful.  It can fail, as
documented
in Section 6.2.  Need to specify how to deal with this (e.g., close the TCP
connection).

[T] Can an iFCP gateway reduce the pool of unbound connections (e.g., due to
demands for resources for other connections), possibly by closing them?  If
yes, need to say so, and 

-- Section 5.3 - IANA Considerations

[E] Put this near the end of the document where IANA can more easily find
it.

-- Section 5.4.1 - Encapsulation Header Format

          Protocol#            IANA-assigned protocol number
                                identifying the protocol using the
                                encapsulation.  For iFCP the value is
                                (/TBD/).

[T] It's 2 - cite the FC Encapsulation draft's IANA Considerations section
as
the authority for this.

-- Section 5.4.2 - SOF and EOF Delimiter Fields

[E] Need to say that the format is specified in the FC Common Encapsulation
document
and reproduced here for convenience.

          SOF (bits 31-24 and bits 23-16 in word 0):  iFCP uses the
          following subset of the SOF fields described in [ENCAP].

[T] This is a problem because these codes are being specified in more
than one place.  I think the FC Frame Encapsulation document is the right
place for the normative specification of these codes (and see my comments
against it on the need to get IANA involved).  This would be ok as a list
of codes that are currently valid, but the specification authority needs
to be in one place.  Same comment applies to EOF.

-- Section 6 - TCP Session Control Messages

[E] There's an LS_COMMAND field in figure 16 and a second one in the iFCP
portion
of the FC Common Encapsulation header (from Section 5.4.1).

          LS_COMMAND           For a special link service ACC
                                response to be processed by iFCP, the
                                LS_COMMAND field SHALL contain bits 31
                                through 24 of the LS_COMMAND to which
                                the ACC applies. Otherwise the
                                LS_COMMAND field shall be set to zero.

When a single section discusses both fields, as Section 6 does, this gets
confusing fast.  Please rename the LS_COMMAND field in the iFCP portion of
the FC Common Encapsulation header to something like ACC_LS_COMMAND or
LS_COMMAND_ACC.

                     Request            LS_COMMAND Short Name  iFCP Support
                     -------            ---------- ----------  -----------
         Connection Bind                  0xE0       CBIND      REQUIRED
         Unbind Connection                0xE4      UNBIND      REQUIRED
         Test Connection Liveness         0xE5       LTEST      REQUIRED

[T/E] How do we know that those three values (E0, E4, and E5) will not
conflict
with some future usage by Fibre Channel?  I think the answer is that SES=1
in the iFCP flags in the header, and would be 0 in any future use of these
values in an ELS, but the use of those three values looks like an
attempt to avoid conflict and should be explained. 

-- 6.2 - Unbind Connection (UNBIND)

         Unbind Status Description
          ------------- -----------

                0       Successful û No other status
             1 û 15     Reserved
               16       Failed û Unspecified Reason
               18       Failed û Connection ID Invalid
             Others     Reserved

Unbind can fail, but earlier specification of the use of Unbind (e.g., in
Section 5.2.3.1) assumes that it cannot fail.  Description of how to deal
with Failed status needs to be added there (e.g., close the TCP connection).

-- Section 7.2 - Link Services Requiring Payload Address Translation

         For translation type 3, the receiving gateway SHALL obtain the
         information needed to fill in the field in the link service frame
         payload by converting the specified N_PORT worldwide identifier to
         a gateway IP address and N_PORT ID.  This information MUST be
         obtained through an iSNS name server query. 

[E] This requires an iSNS query for every type 3 translation received even
if
it exists locally in a Remote N_PORT descriptor.  It looks like this was
intended due to the possibility of the descriptor being stale, but I wanted
to check if that was in fact the intention.

         When the ACC response requires iFCP intervention, the receiving
         gateway MUST act as a proxy for the originator, retaining the state
         needed to process the response from the N_PORT to which the request
         was directed.

[E] That doesn't parse for me.  I think the intended meaning was
that when an ELS request is sent whose ACC will require iFCP intervention,
the ELS also requires intervention to capture the state necessary to process
the ACC.

-- 7.3 - Fibre Channel Link Services Processed by iFCP

         The following Extended and FC-4 Link Service Messages must receive
         special processing.

[T] Process question - how does this list get coordinated with T11 so that
it gets updated when T11 defines a new ELS or FC-4 LS that requires iFCP
intervention?

-- 7.3.1.1 - Abort Exchange (ABTX)

         Fields Requiring       Translation   Supplemental Data
         Address Translation     Type (see      (type 3 only)
         -------------------    section 7.2)     ------------
                                 -----------

         Exchange Originator        1, 2              N/A
         S_ID

[T] Need to specify how to choose the translation type.  This comment also
applies to RES, RES ACC, RLS, RSS, RRQ, RSI, REC and REC ACC.  It may be
best
resolved by adding additional text in Section 7.2.

-- 7.3.1.3 - Discover Address Accept (ADISC ACC)

[E] Should the Command field be 0x20 or 0x02?

         Other Special Processing:

             The Hard Address of the ELS originator SHALL be set to 0.

[T] Doesn't this also require setting the LS_COMMAND iFCP-specific field
(to be renamed) in the FC Common Encapsulation header?  This comment also
applies to all other ACC's in Section 7.

-- Section 8.2.1 - Enforcing R_A_TOV Limits

[T] The rules in this section appear to allow forwarding of all frames
received
while in Unsynchronized mode or with a timestamp of 0,0.  This looks like a
formula for violating R_A_TOV - was this intended?

-- Section 9.4.1 - Establishing the Broadcast Configuration

         The broadcast configuration is managed using facilities provided by
         the iSNS server. Specifically:

         a)  An iSNS discovery domain is created and seeded with the network
             address of the global broadcast server N_PORT.  The global
             server is identified as such by setting the appropriate N_PORT
             entity attribute.

[T] There are no means for recovery from failure, so loss of the gateway
performing the broadcast service results in loss of the broadcast service.
This needs to be explained at a minimum, and probably corrected.

-- Section 10.2.2 - Security Threats

              Conformant implementations of the iFCP
         protocol MAY use such security definitions.

[T] I don't understand this sentence.  What was intended?

-- Section 10.2.3  Interoperability with Security Gateways

         Enterprise data center networks are considered mission-critical
         facilities that must be isolated and protected from all possible
         security threats.  Such networks are usually protected by security
         gateways, which at a minimum provide a shield against denial of
         service attacks.  The iFCP security architecture is capable of
         leveraging the protective services of the existing security
         infrastructure, including firewall protection, NAT and NAPT
         services, and IPSec VPN services available on existing security
         gateways.

[T] While this is true of iFCP, iSNS has some serious issues with NAT and
NAPT,
and iFCP cannot be operated without iSNS.

-- Section 10.2.4 - Authentication

         iFCP gateways MUST use Discovery Domain information obtained from
         the iSNS server [ISNS] to determine whether the initiating fibre
         channel N_PORT should be allowed access to the target N_PORT.
         N_PORT identities used in the Port Login (PLOGI) process shall be
         considered authenticated provided the PLOGI request is received
         from the remote gateway over a secure, IPSec-protected connection.

[T] Need to say something about the IKE identities (ID payloads) used for
the authentication, and how they correspond to information obtained from
iSNS - NATs/NAPTs will cause issues here.  Just requiring an IPsec-protected
connection isn't good enough as it may allow a node not registered with iSNS
to get in.

-- Section 10.2.6  Rekeying

[E] I believe the security draft has changed in this area (small rekeying
interval example), please check it.

-- Section 10.2.7  Authorization

         Authorization is outside of the scope of this specification, and is
         seen as fully orthogonal to the iFCP security design. Such design,
         however, includes key authorization-enabling features in the form
         of Identity Payload (e.g., ID_FQDN), certificate-based
         authentication (e.g., with X509v3 certificates), and discovery
         domains [ISNS].

[T] What??  If iSNS doesn't know about an iFCP gateway, that gateway
shouldn't
be able to talk to any other iFCP gateway.  That's access control, which
counts
as authorization in my book.

-- Section 10.3.2 - Use of IKE and IPsec

         If an iFCP implementation makes use of unbound TCP connections, and
         such connections belong to an iFCP Portal with security
         requirements, then the unbound connections MUST be protected by an
         SA at all times just like bounded connections.

[E] "bounded" --> "bound"

         Upon receiving an IKE Phase-2 delete message, there is no
         requirement to terminate the protected TCP connections or delete
         the associated IKE Phase-1 SA. Since an IKE Phase-2 SA may be
         associated with multiple TCP connections, terminating such
         connections might in fact be inappropriate and untimely. An iFCP
         Portal must instead attempt to create a new Phase-2 SA while there
         are outstanding iFCP sessions.

[T] That's a problem.  If the other side is behaving in accordance with the
next paragraph ...:

         To minimize the number of active Phase-2 SAs, IKE Phase-2 delete
         messages may be sent for Phase-2 SAs whose TCP connections have not
         handled data traffic for a while. To minimize the use of SA
         resources while the associated TCP connections are idle, creation
         of a new SA may be deferred until new data is to be sent over the
         connections.

... and is deleting the Phase-2 SAs because it lacks the resources to
support
them, immediately creating a new Phase-2 SA in response to delete messages
risks
livelock (massive churn in Phase-2 SA creation/destruction).  Creating a
new Phase-2 SA in response to a Phase-2 delete message SHOULD be deferred
until
there is traffic to send over that SA.

-- Section 13. - Normative References

[E] RFC 2451 reference shows up twice.

-- Section A.2 - Link Services Processed Transparently

           ACC       Accept

[T] Is that right?  I thought this was intercepted in some cases, as
indicated
in Table 6.

           FDISC     Discover F_Port Service Parameters
           FLOGI     F_Port Login
           RTV       Read Timeout Value

[T] Definitely wrong - the iFCP gateway has to implement these itself as
specified in Section 9.1.

           LINIT     Loop Initialize
           LPC       Loop Port Control
           LSTS      Loop Status
           SCL       Scan Remote Loop

[T] I don't have time to check these, but I'm suspicious about whether
anything that has "Loop" as part of its name can/should be forwarded
transparently into an FC fabric, although SCL seems plausible.  Please\
verify whether these are transparent.

           RSCN      Registered State Change Notification
           SCN       State Change Notification
           SCR       State Change Registration

[T] Those can't be transparent, as Section 9.2 requires the iFCP gateway to
implement them.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar 18 07:13:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA03805
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 07:13:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IBSRV24705
	for ips-outgoing; Mon, 18 Mar 2002 06:28:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IBSPw24699
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 06:28:25 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id DAA08479;
	Mon, 18 Mar 2002 03:27:25 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>,
        "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>, <ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Mon, 18 Mar 2002 11:27:23 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMGEDLDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <OFB60B549A.27B84E5C-ONC2256B80.0002F692@telaviv.ibm.com>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Julian,

	I hadn't seen this explicitly stated in the spec, although thinking
through the implications of what is said I think it is implicitly in
there. Perhaps we should spell this out a little more. Clearly when
processing DATA-IN with F, A bits and GOOD status initiators need to
be very careful about the order they free the ITT and increment
expStatSn. Although it seems you are saying the target shouldn't
consider it an error to receive a command reusing an ITT before it
sees expStatSn acknowledge status on the original command. Presumably
the target should consider it an error to see an ITT reused if it
hasn't issued a status for the task.

	Both SNACK and Command PDUs carry expStatSN so presumably these could
be used to acknowledge the status. And in the case of the command PDU
the ITT could be reused in the same PDU that acknowledges the its
previous status.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Monday, March 18, 2002 12:45 AM
To: Rod Harrison
Cc: Mallikarjun C.; Eddy Quicksall; ips@ece.cmu.edu; Julian Satran
Subject: RE: iSCSI: Use of the A bit


Rod,

If you thought that you can reuse ITT as soon as the status arrived
you are
mistaken. There is no need for a conservative reuse rule. The ITT may
be
reused only after the task termination (status) has been acknowledged.

However even then on a multiple connection a target may get a new
command
with an ITT before status ack.
In this case a well designed target will avoid sending the status for
the
second command before having the first acked.

The data ack (if any) must precede the status ack and the target
should
consider the status ack as implying a data ack.

Julo



                      "Rod Harrison"
                      <rod.harrison@win        To:       "Eddy
Quicksall" <Eddy_Quicksall@ivivity.com>,
                      driver.com>               "Mallikarjun C."
<cbm@rose.hp.com>, <ips@ece.cmu.edu>
                                               cc:       Julian
Satran/Haifa/IBM@IBMIL
                      16-03-02 17:42           Subject:  RE: iSCSI:
Use of the A bit
                      Please respond to
                      "Rod Harrison"





Mallikarjun, Eddy and all,

             I think this might be dangerous.

             If the initiator receives a DATA-IN with F and A bits set
and
a GOOD
SCSI status it would be required to send a data SNACK PDU containing
an initiator task tag that has "expired" at the initiator.

             Initiator task tags are of course reused and there is no
requirement
for the data SNACK to be sent immediately so it would be possible to
have a single ITT in the network referring to more than 1 task. I
think it is way too late in the game to start considering conservative
reuse rules for initiator task tags. That could be a potentially
invasive implementation change, especially when you consider that
reusing things is generally a good thing to do from a caching
perspective.

             Even if the data SNACK were required to be sent
immediately
there is
no guarantee that it would be received by the target before PDUs for
the task with the reused ITT when there is more than one connection
per session.

             Since the SCSI status ends the task and therefore
releases the
ITT it
seems the only safe way to do this would be to make piggyback status
mutually exclusive with the A bit in a DATA-IN with the F bit set.
This would require the target to wait for the data SNACK before
issuing a SCSI status PDU. Clearly this is unpalatable for latency
reasons.

             - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Eddy Quicksall
Sent: Saturday, March 16, 2002 12:41 PM
To: Mallikarjun C.; ips@ece.cmu.edu
Cc: Julian_Satran@il.ibm.com
Subject: RE: iSCSI: Use of the A bit


Yes, I agree.

Eddy

-----Original Message-----
From: Mallikarjun C. [mailto:cbm@rose.hp.com]
Sent: Friday, March 15, 2002 11:22 PM
To: ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit


I agree with Julian.

Seems to me that targets should be allowed to ask for an ack
on the last Data-In PDU that concludes the entire transfer for the
task - a follow-up NOP-ping is needless.  I propose that we

replace:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes and
MUST NOT
do so more frequently than this."

with:
  "it MAY set the A bit to 1 only once every MaxBurstSize bytes or on
the
last
   Data-In PDU that concludes the entire requested transfer from the
target's
   perspective, and MUST NOT do so more frequently than this."
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: "Paul Koning" <ni1d@arrl.net>
Cc: <Eddy_Quicksall@ivivity.com>; <ips@ece.cmu.edu>;
<owner-ips@ece.cmu.edu>; <rod.harrison@windriver.com>
Sent: Friday, March 15, 2002 11:50 AM
Subject: RE: iSCSI: Use of the A bit


> That could be so but it would be overkill. Status ACK can implicitly
> acknowledge the last transfer.
> And Yes the fact that the last transfer is not mentioned is an
oversight
> that I will correct.
> This does not mean that you HAVE TO raise the A flag or that you are
> ENCOURAGED to do so :-)
>
> Julo
>
>
>
>
> Paul Koning <ni1d@arrl.net>
> Sent by: owner-ips@ece.cmu.edu
> 15-03-02 16:09
> Please respond to Paul Koning
>
>
>         To:     Eddy_Quicksall@ivivity.com
>         cc:     rod.harrison@windriver.com, ips@ece.cmu.edu
>         Subject:        RE: iSCSI: Use of the A bit
>
>
>
> >>>>> "Eddy" == Eddy Quicksall <Eddy_Quicksall@ivivity.com> writes:
>
>  Eddy> I think we may need better explanation about why some folks
>  Eddy> don't want to do the "positive ack".
>
>  >> We got to this position, since so many folks did not want to
>  >> support the positive ack.
>
> Something doesn't compute here.
>
> I don't believe the discussion has anything to do with whether you
> support positive ACK or not.  If you're doing error recovery level 1
> or above, then you are required to support it, because the other end
> is allowed to say A=1 and you're required to answer that.
>
> If you don't want to support positive ACK, the solution is to
support
> only error recovery level 0.
>
> The issue under discussion is whether the rule "you are allowed to
set
> A=1 only once per MaxBurstSize" is correct.  At this point it's
clear
> to me that it is not, because you need to be able to set A=1 at the
> end of the transfer.  The current rule forbids that unless the total
> transfer size is >= MaxBurstSize.
>
> Kevin's proposal is a simple fix to this problem.
>
>                   paul
>
>
>
>







From owner-ips@ece.cmu.edu  Mon Mar 18 08:24:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA04759
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 08:24:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ID9Y828817
	for ips-outgoing; Mon, 18 Mar 2002 08:09:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ID9Ww28813
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 08:09:32 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id OAA81644;
	Mon, 18 Mar 2002 14:09:21 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2ID9Ko102064;
	Mon, 18 Mar 2002 14:09:20 +0100
Subject: Re: MaxBurstSize ambiguous and should be separated
To: Ron Grinfeld <Rong@siliquent.com>
Cc: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF3B410FDF.69F496A4-ONC2256B80.00450182@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Mon, 18 Mar 2002 14:45:51 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 15:09:20
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Ron,

Arguments can be brought for having single limit such as:

   simplicity
   it is a SCSI-to-SCSI limit and most devices are using one direction at a
   time

However it is a simple matter to make 2 limits as for the transport so we
may want to do it if there are no good technical arguments against it.

Julo



                                                                                                         
                      Ron Grinfeld                                                                       
                      <Rong@siliquent.c        To:       Julian Satran/Haifa/IBM@IBMIL                   
                      om>                      cc:                                                       
                                               Subject:  MaxBurstSize ambiguous and should be separated  
                      17-03-02 15:25                                                                     
                      Please respond to                                                                  
                      Ron Grinfeld                                                                       
                                                                                                         
                                                                                                         



Julian,

MaxBurstSize, as it is now defined, limits both write sequences (by
limiting
the R2T) and limits read sequences supposedly when using the A bit.
Furthermore, according to section 11.13, it limits ANY data-in sequence
(without mentioning error recovery or A bit usage). Therefore it is both:

(1) Ambiguous - is it or is not applicable to data-ins when A bit is NOT
used?
(2) Needlessly confining - why should data-in and data-out sequence limits
be artificially tied through this one parameter

Why don't we define instead:

(a) MaxDataOutBurstSize (max sequence of data-outs - limits R2Ts)
(b) MaxDataInBurstSize  (max sequence of data-ins, point of ACK or
direction
change)

Rong






From owner-ips@ece.cmu.edu  Mon Mar 18 08:25:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA04781
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 08:25:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ICe0P27504
	for ips-outgoing; Mon, 18 Mar 2002 07:40:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.bustech.com (mail.bustech.com [199.190.209.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ICdvw27495
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 07:39:57 -0500 (EST)
Received: from bobkennedy ([198.178.232.46]) by mail.bustech.com over TLS secured channel with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 18 Mar 2002 07:39:56 -0500
From: "Bob Kennedy" <rjk@bustech.com>
To: <ips@ece.cmu.edu>
Subject: remove
Date: Mon, 18 Mar 2002 07:39:50 -0500
Message-ID: <000001c1ce7a$00f87760$2ee8b2c6@bustech.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0001_01C1CE50.182A1080"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook CWS, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600
X-OriginalArrivalTime: 18 Mar 2002 12:39:56.0739 (UTC) FILETIME=[028FB930:01C1CE7A]
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_0001_01C1CE50.182A1080
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

remove
Bob Kennedy 
Director, Software Development and Support
Bus-Tech, Inc 
110 Horizon Drive 
Suite 210 
Raleigh, NC 27615 
(919) 847-3114 
Fax-(919) 847-0182 



------=_NextPart_000_0001_01C1CE50.182A1080
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<META content=3D"MSHTML 5.00.2919.6307" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D440363912-18032002>remove</SPAN></FONT></DIV>
<P><I><FONT face=3DArial size=3D2>Bob Kennedy</FONT></I> <BR><I><FONT =
face=3DArial=20
size=3D2>Director, Software Development</FONT></I> <EM><FONT =
face=3DArial size=3D2>and=20
Support<BR>Bus-Tech, Inc</FONT></EM> <BR><I><FONT face=3DArial =
size=3D2>110 Horizon=20
Drive</FONT></I> <BR><I><FONT face=3DArial size=3D2>Suite 210</FONT></I> =

<BR><I><FONT face=3DArial size=3D2>Raleigh, NC 27615</FONT></I> =
<BR><I><FONT=20
face=3DArial size=3D2>(919) 847-3114</FONT></I> <BR><I><FONT =
face=3DArial=20
size=3D2>Fax-(919) 847-0182</FONT></I> </P>
<DIV>&nbsp;</DIV></BODY></HTML>

------=_NextPart_000_0001_01C1CE50.182A1080--



From owner-ips@ece.cmu.edu  Mon Mar 18 09:15:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA05672
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 09:15:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IDWZc29976
	for ips-outgoing; Mon, 18 Mar 2002 08:32:35 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2IDWWw29968
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 08:32:32 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2IDWQ002563
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 08:32:26 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2IDWOK02554;
	Mon, 18 Mar 2002 08:32:24 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2IDWNL14271;
	Mon, 18 Mar 2002 08:32:24 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15509.60522.184000.800722@gargle.gargle.HOWL>
Date: Mon, 18 Mar 2002 08:32:26 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: ISCSI: need to fix handling of partial data transfers
References: <OF5B49F133.FEC50704-ONC2256B80.000243A6@telaviv.ibm.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 18 March 2002) by Julian Satran:
> Device operation is not in the iSCSI domain.  You can find the information
> you need in SCSI.
> It comes complete with device type, capabilities, alignment required(if
> any), block sizes and much more (enough to fill many pages for every device
> class).  If you want the information you require just ask for it by SCSI
> means.
> A perusal of the SCSI standards for several classes of devices might help.

I have looked through SAM-2, the common commands standard, and the
block devices standard.  In SAM-2, I found the discussion I mentioned;
nothing else showed up that I could find.  I wasn't talking about
block sizes, device types, or stuff like that.

Indeed, device operation isn't part of iSCSI.  But I wasn't talking
about device operation.  The subject is moving data from and to the
devices, and that certainly is the job of iSCSI.  It's the job of
iSCSI to allow an initiator to talk successfully to a target.  If one
end has limits on how it can talk, it should therefore also be part of
iSCSI to communicate those limits to the other side.

I prefer to find out the limitations ahead of time, rather than to
bump into them and be told "surprise, you can't do that".  Most of the
time, iSCSI lets you know ahead of time.  Why else would we have login
parameters like Max PDU size?

	   paul




From owner-ips@ece.cmu.edu  Mon Mar 18 10:45:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07806
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 10:44:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IF0gF05634
	for ips-outgoing; Mon, 18 Mar 2002 10:00:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from siaar2aa.compuserve.com (siaar2aa.compuserve.com [149.174.40.137])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2I7fEw05706
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 02:41:14 -0500 (EST)
Received: (from mailgate@localhost)
	by siaar2aa.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) id CAA09329
	for ips@ece.cmu.edu; Mon, 18 Mar 2002 02:41:09 -0500 (EST)
Received: from EGRodriguez (dal-tgn-tkx-vty3.as.wcom.net [216.192.233.3])
	by siaar2aa.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) with ESMTP id CAA09305
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 02:41:06 -0500 (EST)
From: "Elizabeth Rodriguez" <ElizabethRodriguez@ieee.org>
To: <ips@ece.cmu.edu>
Subject: FCIP: Last Call Technical Comment
Date: Mon, 18 Mar 2002 01:39:36 -0600
Message-ID: <000c01c1ce50$0e9c3bb0$03e9c0d8@EGRodriguez>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000D_01C1CE1D.C401CBB0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

------=_NextPart_000_000D_01C1CE1D.C401CBB0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi all, 

 

I have 1 technical comment on the FCIP document:

 

Section 3.1:

 

    - FC-BB   - Fibre Channel Backbone [3]
    - FC-BB-2 - Fibre Channel Backbone -2 [4]
    - FC-SW-2 - Fibre Channel Switch Fabric -2 [5]
    - FC-FS   - Fibre Channel Framing and Signaling [6]
 
   FC-BB and FC-BB-2 describe the relationship between an FC Fabric and
   interconnect technologies not defined in by Fibre Channel standards
   (e.g., ATM and SONET). FC-BB-2 is the natural Fibre Channel home for
   describing relationships to TCP/IP and FCIP.
 
 

The FC-BB reference should be removed from the document.  FC-BB-2 is the
applicable document for interactions between FC, FCIP and TCP/IP.  Since
FC-BB-2 is a replacement document to FC-BB, FC-BB shoud not be mentioned
in the FCIP document, either as a normative or non-normative reference.

 

Elizabeth

 

 


------=_NextPart_000_000D_01C1CE1D.C401CBB0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">


<meta name=3DGenerator content=3D"Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
pre
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Hi all, </span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>I have 1 technical comment on the FCIP =
document:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Section 3.1:</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<pre><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp;&nbsp; - FC-BB&nbsp;&nbsp; - =
Fibre Channel Backbone [3]</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp;&nbsp; - FC-BB-2 - Fibre Channel =
Backbone -2 [4]</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp;&nbsp; - FC-SW-2 - Fibre Channel =
Switch Fabric -2 [5]</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp;&nbsp; - FC-FS&nbsp;&nbsp; - =
Fibre Channel Framing and Signaling [6]</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span style=3D'font-size:10.0pt'> =
</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp;&nbsp;FC-BB and FC-BB-2 describe =
the relationship between an FC Fabric and</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp; interconnect technologies not =
defined in by Fibre Channel standards</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp; (e.g., ATM and SONET). FC-BB-2 =
is the natural Fibre Channel home for</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;&nbsp; describing relationships to =
TCP/IP and FCIP.</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;</span></font></pre><pre><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>&nbsp;</span></font></pre>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>The FC-BB reference should be removed from the =
document.&nbsp;
FC-BB-2 is the applicable document for interactions between FC, FCIP and
TCP/IP.&nbsp; Since FC-BB-2 is a replacement document to FC-BB, FC-BB =
shoud not
be mentioned in the FCIP document, either as a normative or =
non-normative
reference.</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
  font-family:Arial'>Elizabeth</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

</div>

</body>

</html>

------=_NextPart_000_000D_01C1CE1D.C401CBB0--


From owner-ips@ece.cmu.edu  Mon Mar 18 12:34:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12688
	for <ips-archive@odin.ietf.org>; Mon, 18 Mar 2002 12:34:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IGodW13771
	for ips-outgoing; Mon, 18 Mar 2002 11:50:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IGobw13766
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 11:50:37 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id LAA45790;
	Mon, 18 Mar 2002 11:47:13 -0500
Received: from d03nm014.boulder.ibm.com (d03nm014.boulder.ibm.com [9.17.194.13])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2IGoRx25806;
	Mon, 18 Mar 2002 09:50:28 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: MaxBurstSize ambiguous and should be separated
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: Ron Grinfeld <Rong@siliquent.com>, ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFBF783616.EF870250-ON88256B80.005B00EF@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Mon, 18 Mar 2002 08:49:49 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/18/2002 09:50:27 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Before, we do this,  I think we need to understand if there really are
devices, that have more buffers for input then they have for output, or
visa versa.  It would seem that we remove simplicity that applies to 99% of
the devices, for some imagined flexibility.

I see no need for this change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/18/2002
04:45:51 AM

Sent by:    owner-ips@ece.cmu.edu


To:    Ron Grinfeld <Rong@siliquent.com>
cc:    ips@ece.cmu.edu
Subject:    Re: MaxBurstSize ambiguous and should be separated




Ron,

Arguments can be brought for having single limit such as:

   simplicity
   it is a SCSI-to-SCSI limit and most devices are using one direction at a
   time

However it is a simple matter to make 2 limits as for the transport so we
may want to do it if there are no good technical arguments against it.

Julo




                      Ron Grinfeld
                      <Rong@siliquent.c        To:       Julian
                      Satran/Haifa/IBM@IBMIL
                      om>                      cc:
                                               Subject:  MaxBurstSize
                      ambiguous and should be separated
                      17-03-02 15:25
                      Please respond to
                      Ron Grinfeld





Julian,

MaxBurstSize, as it is now defined, limits both write sequences (by
limiting
the R2T) and limits read sequences supposedly when using the A bit.
Furthermore, according to section 11.13, it limits ANY data-in sequence
(without mentioning error recovery or A bit usage). Therefore it is both:

(1) Ambiguous - is it or is not applicable to data-ins when A bit is NOT
used?
(2) Needlessly confining - why should data-in and data-out sequence limits
be artificially tied through this one parameter

Why don't we define instead:

(a) MaxDataOutBurstSize (max sequence of data-outs - limits R2Ts)
(b) MaxDataInBurstSize  (max sequence of data-ins, point of ACK or
direction
change)

Rong









From owner-ips@ece.cmu.edu  Mon Mar 18 12:36:15 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12793
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 12:36:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IHHmA15743
	for ips-outgoing; Mon, 18 Mar 2002 12:17:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IHHjw15737;
	Mon, 18 Mar 2002 12:17:46 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id MAA68336;
	Mon, 18 Mar 2002 12:14:22 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2IHHbS36520;
	Mon, 18 Mar 2002 10:17:37 -0700
Importance: Normal
Subject: Re: iSCSI: Use of the A bit
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu, owner-ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF462496C6.C914C5FC-ON88256B80.005CF89E@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Mon, 18 Mar 2002 09:17:02 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/18/2002 10:17:37 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Julian the following statement is confusing:

 "An initiator MUST ONLY acknowledge the status for command that produced
 Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
 acknowledgment is requested by the target.  A status acknowledgement for a
 command that generated Data-In PDUs is considered by the target as an
 implicit acknowledgement of the Data-In PDUs if such an acknowledgement
 was requested by the target."

What did you intend to say.  All commands MUST have t status acknowledge,
via ExpStatSN, so I do not understand the first sentence.  And if the
Data-In PDUs must be acknowledged (if the A bit is set), what is the
meaning of the last statement.

Since I do not believe there is a need to ack the last Data-In PDU, I am
hoping you agree.  But it is not clear.

If the Target sets the A bit on the last Data-In PDU, which also has good
status set -- and the Initiator has a PDU ready to send to which it can
attach the value of ExpStatSN, which will show that the Data-In PDU was
received -- there should be no reason to send a extra SNACK for the Data-In
PDU.

Please tell me that is what you intended to say in the above quoted text.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
05:52:46 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Mallikarjun C." <cbm@rose.hp.com>
cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject:    Re: iSCSI: Use of the A bit



Dear all,

The text for the A bit part (9.7.2) reads now:

   A (Acknowledge) bit


       For sessions with ErrorRecoveryLevel 1 or higher, the target sets
       this bit to 1 to indicate that it requests a positive
       acknowledgement from the initiator for the data received.  The
       target should use the A bit moderately; it MAY set the A bit to 1
       only once every MaxBurstSize bytes or on the last Data-In PDU that
       concludes the entire requested read data transfer for the task from
       the target's perspective, and MUST NOT do so more frequently than
       this.

       On receiving a Data-In PDU with the A bit set to 1, the initiator
       MUST issue a SNACK of type DataACK.  If the initiator has detected
       holes in the input sequence, it MUST postpone issuing the SNACK of
       type DataACK until the holes are filled. An initiator MUST ONLY
       acknowledge the status for command that produced Data-In PDUs after
       acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
       requested by the target. A status acknowledgement for a command that
       generated Data-In PDUs is considered by the target as an implicit
       acknowledgement of the Data-In PDUs if such an acknowledgement was
       requested by the target.

The ITT mandating text in 9,16.1 will read:

       For Status SNACK and DataACK, the Initiator Task Tag is reserved. In
       all other cases, the Initiator Task Tag field MUST be set to the
       Ini-tiator Task Tag of the referenced command.


       Julo






From owner-ips@ece.cmu.edu  Mon Mar 18 14:07:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15758
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 14:07:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IHwur18764
	for ips-outgoing; Mon, 18 Mar 2002 12:58:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel9.hp.com (atlrel9.hp.com [156.153.255.214])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IHwsw18757
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 12:58:54 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel9.hp.com (Postfix) with ESMTP
	id 0DF94805C6A; Mon, 18 Mar 2002 12:58:38 -0500 (EST)
Received: from swathi (pal1nai161032.nsr.hp.com [15.244.161.32]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA28698; Mon, 18 Mar 2002 10:00:18 -0800 (PST)
Message-ID: <006e01c1cea6$86662a60$20a1f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>,
        "John Hufferd" <hufferd@us.ibm.com>
Cc: <ips@ece.cmu.edu>
References: <OF462496C6.C914C5FC-ON88256B80.005CF89E@boulder.ibm.com>
Subject: Re: iSCSI: Use of the A bit
Date: Mon, 18 Mar 2002 09:58:34 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John,

I think you're describing the intent of the wording, though the
paragraph you point out doesn't seem consistent.

Here's what I suggest with a few tweaks -

       On receiving a Data-In PDU with the A bit set to 1, if there are no holes 
       in the read data until that Data-In PDU, the initiator MUST issue a SNACK 
       of type DataACK , or alternatively MAY acknowledge the status for the task 
       immediately via ExpStatSN on other outbound PDUs if the status for the task
       is also received.  If the initiator has detected holes in the read data until that Data-In 
       PDU, it MUST postpone issuing the SNACK of type DataACK until the holes 
       are filled. An initiator also MUST NOT acknowledge the status for the task 
       before those holes are filled.  A status acknowledgement for a task that generated 
       the Data-In PDUs is considered by the target as an implicit acknowledgement 
      of the Data-In PDUs if an acknowledgement was requested by the target.

I hope this works better....
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>; <ips@ece.cmu.edu>; <owner-ips@ece.cmu.edu>
Sent: Monday, March 18, 2002 9:17 AM
Subject: Re: iSCSI: Use of the A bit


> 
> Julian the following statement is confusing:
> 
>  "An initiator MUST ONLY acknowledge the status for command that produced
>  Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
>  acknowledgment is requested by the target.  A status acknowledgement for a
>  command that generated Data-In PDUs is considered by the target as an
>  implicit acknowledgement of the Data-In PDUs if such an acknowledgement
>  was requested by the target."
> 
> What did you intend to say.  All commands MUST have t status acknowledge,
> via ExpStatSN, so I do not understand the first sentence.  And if the
> Data-In PDUs must be acknowledged (if the A bit is set), what is the
> meaning of the last statement.
> 
> Since I do not believe there is a need to ack the last Data-In PDU, I am
> hoping you agree.  But it is not clear.
> 
> If the Target sets the A bit on the last Data-In PDU, which also has good
> status set -- and the Initiator has a PDU ready to send to which it can
> attach the value of ExpStatSN, which will show that the Data-In PDU was
> received -- there should be no reason to send a extra SNACK for the Data-In
> PDU.
> 
> Please tell me that is what you intended to say in the above quoted text.
> 
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
> 05:52:46 PM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    "Mallikarjun C." <cbm@rose.hp.com>
> cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
> Subject:    Re: iSCSI: Use of the A bit
> 
> 
> 
> Dear all,
> 
> The text for the A bit part (9.7.2) reads now:
> 
>    A (Acknowledge) bit
> 
> 
>        For sessions with ErrorRecoveryLevel 1 or higher, the target sets
>        this bit to 1 to indicate that it requests a positive
>        acknowledgement from the initiator for the data received.  The
>        target should use the A bit moderately; it MAY set the A bit to 1
>        only once every MaxBurstSize bytes or on the last Data-In PDU that
>        concludes the entire requested read data transfer for the task from
>        the target's perspective, and MUST NOT do so more frequently than
>        this.
> 
>        On receiving a Data-In PDU with the A bit set to 1, the initiator
>        MUST issue a SNACK of type DataACK.  If the initiator has detected
>        holes in the input sequence, it MUST postpone issuing the SNACK of
>        type DataACK until the holes are filled. An initiator MUST ONLY
>        acknowledge the status for command that produced Data-In PDUs after
>        acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
>        requested by the target. A status acknowledgement for a command that
>        generated Data-In PDUs is considered by the target as an implicit
>        acknowledgement of the Data-In PDUs if such an acknowledgement was
>        requested by the target.
> 
> The ITT mandating text in 9,16.1 will read:
> 
>        For Status SNACK and DataACK, the Initiator Task Tag is reserved. In
>        all other cases, the Initiator Task Tag field MUST be set to the
>        Ini-tiator Task Tag of the referenced command.
> 
> 
>        Julo
> 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Mon Mar 18 14:42:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA17189
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 14:42:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IImoj22809
	for ips-outgoing; Mon, 18 Mar 2002 13:48:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IImmw22804
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 13:48:48 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel12.hp.com (Postfix) with ESMTP
	id D77A76007B2; Mon, 18 Mar 2002 10:48:35 -0800 (PST)
Received: from swathi (pal1nai161198.nsr.hp.com [15.244.161.198]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA12414; Mon, 18 Mar 2002 10:50:17 -0800 (PST)
Message-ID: <007401c1cead$81f7cf90$20a1f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>,
        "John Hufferd" <hufferd@us.ibm.com>
Cc: "Ron Grinfeld" <Rong@siliquent.com>, <ips@ece.cmu.edu>
References: <OFBF783616.EF870250-ON88256B80.005B00EF@boulder.ibm.com>
Subject: Re: MaxBurstSize ambiguous and should be separated
Date: Mon, 18 Mar 2002 10:48:33 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

John and Julian,

A couple of comments.

> devices, that have more buffers for input then they have for output

I think the issue is that the input buffer limit of the target which 
generally decides MaxBurstSize doesn't have to constrain the 
read data sequence size if the initiator is willing to receive more in
a sequence (generally limitless).  OTOH, there are two (arguably minority)
cases where the targets can't generate very long read data sequences 
even after the proposed change - 
    a) when the initiator wants the read sequence to end sooner, possibly 
        to start the outbound data transfer in the case of bidi commands. It
        may however be larger than target's buffer  limit.
    b)when the A-bit is used, the target can not really pipeline the data 
        into one long sequence, since it must keep the data until it's ack'ed and 
        the same buffer restrictions apply that it has for inbound data (John's
        argument).

My question really is: what is being gained in longer sequences?  IOW,
how is one 4K burst with one F-bit more efficient than one 4K burst with 
two F-bits?

At least, I am not clear on the answer to this question.  Changing obviously
has some downsides besides that it's not a must-fix issue - the A-bit text
would need to be changed (again), and there may be other text that needs to 
be revised that currently depends on MaxBurstSize (for ex. MaxRecvPDULength)...

Comment on Ron's original question -
> MaxBurstSize, as it is now defined, limits both write sequences (by
> limiting
> the R2T) and limits read sequences supposedly when using the A bit.

The implication in this sentence isn't quite correct.  The text only says that
the A-bit must not be set more frequently than MaxBurstSize, it doesn't
say anything in regards to the association of *A-bit* to the sequence size.  
MaxBurstSize generally mandates the setting of the *F-bit* (even though 
this isn't quite obvious today), not the setting of the A-bit (A-bit doesn't have 
to be used at all!).
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Ron Grinfeld" <Rong@siliquent.com>; <ips@ece.cmu.edu>
Sent: Monday, March 18, 2002 8:49 AM
Subject: Re: MaxBurstSize ambiguous and should be separated


> 
> Before, we do this,  I think we need to understand if there really are
> devices, that have more buffers for input then they have for output, or
> visa versa.  It would seem that we remove simplicity that applies to 99% of
> the devices, for some imagined flexibility.
> 
> I see no need for this change.
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/18/2002
> 04:45:51 AM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    Ron Grinfeld <Rong@siliquent.com>
> cc:    ips@ece.cmu.edu
> Subject:    Re: MaxBurstSize ambiguous and should be separated
> 
> 
> 
> 
> Ron,
> 
> Arguments can be brought for having single limit such as:
> 
>    simplicity
>    it is a SCSI-to-SCSI limit and most devices are using one direction at a
>    time
> 
> However it is a simple matter to make 2 limits as for the transport so we
> may want to do it if there are no good technical arguments against it.
> 
> Julo
> 
> 
> 
> 
>                       Ron Grinfeld
>                       <Rong@siliquent.c        To:       Julian
>                       Satran/Haifa/IBM@IBMIL
>                       om>                      cc:
>                                                Subject:  MaxBurstSize
>                       ambiguous and should be separated
>                       17-03-02 15:25
>                       Please respond to
>                       Ron Grinfeld
> 
> 
> 
> 
> 
> Julian,
> 
> MaxBurstSize, as it is now defined, limits both write sequences (by
> limiting
> the R2T) and limits read sequences supposedly when using the A bit.
> Furthermore, according to section 11.13, it limits ANY data-in sequence
> (without mentioning error recovery or A bit usage). Therefore it is both:
> 
> (1) Ambiguous - is it or is not applicable to data-ins when A bit is NOT
> used?
> (2) Needlessly confining - why should data-in and data-out sequence limits
> be artificially tied through this one parameter
> 
> Why don't we define instead:
> 
> (a) MaxDataOutBurstSize (max sequence of data-outs - limits R2Ts)
> (b) MaxDataInBurstSize  (max sequence of data-ins, point of ACK or
> direction
> change)
> 
> Rong
> 
> 
> 
> 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Mon Mar 18 16:25:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA20901
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 16:25:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IKNjl29699
	for ips-outgoing; Mon, 18 Mar 2002 15:23:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IKNgw29690;
	Mon, 18 Mar 2002 15:23:42 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id VAA62020;
	Mon, 18 Mar 2002 21:23:31 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2IKNLo147462;
	Mon, 18 Mar 2002 21:23:30 +0100
To: "John Hufferd" <hufferd@us.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF3B54B79D.5C5066BA-ONC2256B80.006ED962@telaviv.ibm.com>
Date: Mon, 18 Mar 2002 22:23:13 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 22:23:30,
	Serialize complete at 18/03/2002 22:23:30
Content-Type: multipart/alternative; boundary="=_alternative 006F8863C2256B80_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 006F8863C2256B80_=
Content-Type: text/plain; charset="us-ascii"

John,

comments in text - JUlo




John Hufferd/San Jose/IBM@IBMUS
18-03-02 19:17
Please respond to John Hufferd

 
        To:     Julian Satran/Haifa/IBM@IBMIL
        cc:     "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu, owner-ips@ece.cmu.edu
        Subject:        Re: iSCSI: Use of the A bit

 


Julian the following statement is confusing:

 "An initiator MUST ONLY acknowledge the status for command that produced
 Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
 acknowledgment is requested by the target.  A status acknowledgement for 
a
 command that generated Data-In PDUs is considered by the target as an
 implicit acknowledgement of the Data-In PDUs if such an acknowledgement
 was requested by the target."

What did you intend to say.  All commands MUST have t status acknowledge,
via ExpStatSN, so I do not understand the first sentence.  And if the
Data-In PDUs must be acknowledged (if the A bit is set), what is the
meaning of the last statement.

+++ The first statement says that IF data-ack is requested it MUST be sent 
by the initiator before it acknowledges status. 
+++

Since I do not believe there is a need to ack the last Data-In PDU, I am
hoping you agree.  But it is not clear.


+++
In fact the target may want a data ack as the status ack might be delayed 
for various reasons.
The second statement says that if the target sees a status ack that is 
also an ack for the data

The first statement says that the initiator must send ack if asked - and 
send status ack only afterwards.

The second says that when status is received the data are acked and target 
should wait no longer (i.e., no recovery action).
+++
If the Target sets the A bit on the last Data-In PDU, which also has good
status set -- and the Initiator has a PDU ready to send to which it can
attach the value of ExpStatSN, which will show that the Data-In PDU was
received -- there should be no reason to send a extra SNACK for the 
Data-In
PDU.

Please tell me that is what you intended to say in the above quoted text.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
05:52:46 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Mallikarjun C." <cbm@rose.hp.com>
cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject:    Re: iSCSI: Use of the A bit



Dear all,

The text for the A bit part (9.7.2) reads now:

   A (Acknowledge) bit


       For sessions with ErrorRecoveryLevel 1 or higher, the target sets
       this bit to 1 to indicate that it requests a positive
       acknowledgement from the initiator for the data received.  The
       target should use the A bit moderately; it MAY set the A bit to 1
       only once every MaxBurstSize bytes or on the last Data-In PDU that
       concludes the entire requested read data transfer for the task from
       the target's perspective, and MUST NOT do so more frequently than
       this.

       On receiving a Data-In PDU with the A bit set to 1, the initiator
       MUST issue a SNACK of type DataACK.  If the initiator has detected
       holes in the input sequence, it MUST postpone issuing the SNACK of
       type DataACK until the holes are filled. An initiator MUST ONLY
       acknowledge the status for command that produced Data-In PDUs after
       acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
       requested by the target. A status acknowledgement for a command 
that
       generated Data-In PDUs is considered by the target as an implicit
       acknowledgement of the Data-In PDUs if such an acknowledgement was
       requested by the target.

The ITT mandating text in 9,16.1 will read:

       For Status SNACK and DataACK, the Initiator Task Tag is reserved. 
In
       all other cases, the Initiator Task Tag field MUST be set to the
       Ini-tiator Task Tag of the referenced command.


       Julo







--=_alternative 006F8863C2256B80_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">John,</font>
<br>
<br><font size=2 face="sans-serif">comments in text - JUlo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>John Hufferd/San Jose/IBM@IBMUS</b></font>
<p><font size=1 face="sans-serif">18-03-02 19:17</font>
<br><font size=1 face="sans-serif">Please respond to John Hufferd</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;, ips@ece.cmu.edu, owner-ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
Julian the following statement is confusing:<br>
<br>
 &quot;An initiator MUST ONLY acknowledge the status for command that produced<br>
 Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU<br>
 acknowledgment is requested by the target. &nbsp;A status acknowledgement for a<br>
 command that generated Data-In PDUs is considered by the target as an<br>
 implicit acknowledgement of the Data-In PDUs if such an acknowledgement<br>
 was requested by the target.&quot;<br>
<br>
What did you intend to say. &nbsp;All commands MUST have t status acknowledge,<br>
via ExpStatSN, so I do not understand the first sentence. &nbsp;And if the<br>
Data-In PDUs must be acknowledged (if the A bit is set), what is the<br>
meaning of the last statement.<br>
</font>
<br><font size=2 face="Courier New">+++ The first statement says that IF data-ack is requested it MUST be sent by the initiator before it acknowledges status. </font>
<br><font size=2 face="Courier New">+++</font>
<br><font size=2 face="Courier New"><br>
Since I do not believe there is a need to ack the last Data-In PDU, I am<br>
hoping you agree. &nbsp;But it is not clear.<br>
</font>
<br>
<br><font size=2 face="Courier New">+++</font>
<br><font size=2 face="Courier New">In fact the target may want a data ack as the status ack might be delayed for various reasons.</font>
<br><font size=2 face="Courier New">The second statement says that if the target sees a status ack that is also an ack for the data</font>
<br>
<br><font size=2 face="Courier New">The first statement says that the initiator must send ack if asked - and send status ack only afterwards.</font>
<br>
<br><font size=2 face="Courier New">The second says that when status is received the data are acked and target should wait no longer (i.e., no recovery action).</font>
<br><font size=2 face="Courier New">+++<br>
If the Target sets the A bit on the last Data-In PDU, which also has good<br>
status set -- and the Initiator has a PDU ready to send to which it can<br>
attach the value of ExpStatSN, which will show that the Data-In PDU was<br>
received -- there should be no reason to send a extra SNACK for the Data-In<br>
PDU.<br>
<br>
Please tell me that is what you intended to say in the above quoted text.<br>
<br>
<br>
.<br>
.<br>
.<br>
John L. Hufferd<br>
Senior Technical Staff Member (STSM)<br>
IBM/SSG San Jose Ca<br>
Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
Home Office (408) 997-6136, Cell: (408) 499-9702<br>
Internet address: hufferd@us.ibm.com<br>
<br>
<br>
&quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;@ece.cmu.edu on 03/17/2002<br>
05:52:46 PM<br>
<br>
Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
<br>
<br>
To: &nbsp; &nbsp;&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
cc: &nbsp; &nbsp;ips@ece.cmu.edu, owner-ips@ece.cmu.edu<br>
Subject: &nbsp; &nbsp;Re: iSCSI: Use of the A bit<br>
<br>
<br>
<br>
Dear all,<br>
<br>
The text for the A bit part (9.7.2) reads now:<br>
<br>
 &nbsp; A (Acknowledge) bit<br>
<br>
<br>
 &nbsp; &nbsp; &nbsp; For sessions with ErrorRecoveryLevel 1 or higher, the target sets<br>
 &nbsp; &nbsp; &nbsp; this bit to 1 to indicate that it requests a positive<br>
 &nbsp; &nbsp; &nbsp; acknowledgement from the initiator for the data received. &nbsp;The<br>
 &nbsp; &nbsp; &nbsp; target should use the A bit moderately; it MAY set the A bit to 1<br>
 &nbsp; &nbsp; &nbsp; only once every MaxBurstSize bytes or on the last Data-In PDU that<br>
 &nbsp; &nbsp; &nbsp; concludes the entire requested read data transfer for the task from<br>
 &nbsp; &nbsp; &nbsp; the target's perspective, and MUST NOT do so more frequently than<br>
 &nbsp; &nbsp; &nbsp; this.<br>
<br>
 &nbsp; &nbsp; &nbsp; On receiving a Data-In PDU with the A bit set to 1, the initiator<br>
 &nbsp; &nbsp; &nbsp; MUST issue a SNACK of type DataACK. &nbsp;If the initiator has detected<br>
 &nbsp; &nbsp; &nbsp; holes in the input sequence, it MUST postpone issuing the SNACK of<br>
 &nbsp; &nbsp; &nbsp; type DataACK until the holes are filled. An initiator MUST ONLY<br>
 &nbsp; &nbsp; &nbsp; acknowledge the status for command that produced Data-In PDUs after<br>
 &nbsp; &nbsp; &nbsp; acknowledging the Data-In PDUs if Data-In PDU acknowledgment is<br>
 &nbsp; &nbsp; &nbsp; requested by the target. A status acknowledgement for a command that<br>
 &nbsp; &nbsp; &nbsp; generated Data-In PDUs is considered by the target as an implicit<br>
 &nbsp; &nbsp; &nbsp; acknowledgement of the Data-In PDUs if such an acknowledgement was<br>
 &nbsp; &nbsp; &nbsp; requested by the target.<br>
<br>
The ITT mandating text in 9,16.1 will read:<br>
<br>
 &nbsp; &nbsp; &nbsp; For Status SNACK and DataACK, the Initiator Task Tag is reserved. In</font>
<br><font size=2 face="Courier New">&nbsp; &nbsp; &nbsp; &nbsp;all other cases, the Initiator Task Tag field MUST be set to the<br>
 &nbsp; &nbsp; &nbsp; Ini-tiator Task Tag of the referenced command.<br>
<br>
<br>
 &nbsp; &nbsp; &nbsp; Julo<br>
<br>
<br>
<br>
<br>
</font>
<br>
<br>
--=_alternative 006F8863C2256B80_=--


From owner-ips@ece.cmu.edu  Mon Mar 18 16:52:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA21693
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 16:52:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ILBes03343
	for ips-outgoing; Mon, 18 Mar 2002 16:11:40 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ILBaw03337
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 16:11:36 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id QAA79622
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 16:08:11 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2ILBUS108086
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 14:11:30 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: iSCSI: New Suggested Wordage to cover TPGTs
To: <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF8C7ADF66.CB4AA4FF-ON88256B80.0073F005@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Mon, 18 Mar 2002 13:11:00 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/18/2002 02:11:30 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

The Naming and Discovery Team (NDT) and Julian, have had meetings on the
issue
of TPGT. These meetings were to address the TPGT issue express on this
reflector.  The following is the recomendation of the extended NDT:

In section 4.3 (possibly as the last paragraph on page 63 of rev11) -

The first Login Response PDU during the Login phase from the iSCSI target
SHOULD return the TargetPortalGroupTag key that contains the tag value of
the iSCSI portal group servicing the the Login Request PDU.  If the iSCSI
target implementation supports altering the portal group configuration
(including adding, deleting, and swapping of portals in a portal group), it
MUST return the TargetPortalGroupTag key carrying the tag value of the
servicing portal group. If the reconfiguration of iSCSI portal groups is a
concern in a given environment, the iSCSI initiator MUST use this key to
ascertain that it had indeed initiated the Login phase with the intended
target portal group.


In chapter 11 (possibly as section 11.5) -

11.5  TargetPortalGroupTag

Use: IO by target, Declarative
Senders: Target
Scope: SW

TargetPortalGroupTag=<integer-from-0-to-65535>

Examples:
TargetPortalGroupTag=1

Target portal group tag is a 16-bit integer that uniquely identifies a
portal group within an iSCSI target node.  This key carries the value of
the
tag that is servicing the Login request.  The iSCSI target returns this key
to the initiator in the first Login Response PDU.
For the complete usage expectations of this key, refer to section 4.3.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com



From owner-ips@ece.cmu.edu  Mon Mar 18 17:05:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA22111
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 17:05:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ILUY904932
	for ips-outgoing; Mon, 18 Mar 2002 16:30:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ILUSw04915;
	Mon, 18 Mar 2002 16:30:29 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id NAA12142;
	Mon, 18 Mar 2002 13:29:34 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>,
        "John Hufferd" <hufferd@us.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>, <ips@ece.cmu.edu>,
        <owner-ips@ece.cmu.edu>
Subject: RE: iSCSI: Use of the A bit
Date: Mon, 18 Mar 2002 21:29:32 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMOEEADDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <OF3B54B79D.5C5066BA-ONC2256B80.006ED962@telaviv.ibm.com>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


	Can we explicitly allow the status and data ACKs to be at the same
time? Otherwise we prevent sending the status ACK (expStatSn) in the
data ACK SNACK PDU.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Monday, March 18, 2002 8:23 PM
To: John Hufferd
Cc: Mallikarjun C.; ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit



John,

comments in text - JUlo


John Hufferd/San Jose/IBM@IBMUS
18-03-02 19:17
Please respond to John Hufferd

        To:        Julian Satran/Haifa/IBM@IBMIL
        cc:        "Mallikarjun C." <cbm@rose.hp.com>,
ips@ece.cmu.edu, owner-ips@ece.cmu.edu
        Subject:        Re: iSCSI: Use of the A bit





Julian the following statement is confusing:

"An initiator MUST ONLY acknowledge the status for command that
produced
Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
acknowledgment is requested by the target.  A status acknowledgement
for a
command that generated Data-In PDUs is considered by the target as an
implicit acknowledgement of the Data-In PDUs if such an
acknowledgement
was requested by the target."

What did you intend to say.  All commands MUST have t status
acknowledge,
via ExpStatSN, so I do not understand the first sentence.  And if the
Data-In PDUs must be acknowledged (if the A bit is set), what is the
meaning of the last statement.

+++ The first statement says that IF data-ack is requested it MUST be
sent by the initiator before it acknowledges status.
+++

Since I do not believe there is a need to ack the last Data-In PDU, I
am
hoping you agree.  But it is not clear.


+++
In fact the target may want a data ack as the status ack might be
delayed for various reasons.
The second statement says that if the target sees a status ack that is
also an ack for the data

The first statement says that the initiator must send ack if asked -
and send status ack only afterwards.

The second says that when status is received the data are acked and
target should wait no longer (i.e., no recovery action).
+++
If the Target sets the A bit on the last Data-In PDU, which also has
good
status set -- and the Initiator has a PDU ready to send to which it
can
attach the value of ExpStatSN, which will show that the Data-In PDU
was
received -- there should be no reason to send a extra SNACK for the
Data-In
PDU.

Please tell me that is what you intended to say in the above quoted
text.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
05:52:46 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Mallikarjun C." <cbm@rose.hp.com>
cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject:    Re: iSCSI: Use of the A bit



Dear all,

The text for the A bit part (9.7.2) reads now:

  A (Acknowledge) bit


      For sessions with ErrorRecoveryLevel 1 or higher, the target
sets
      this bit to 1 to indicate that it requests a positive
      acknowledgement from the initiator for the data received.  The
      target should use the A bit moderately; it MAY set the A bit to
1
      only once every MaxBurstSize bytes or on the last Data-In PDU
that
      concludes the entire requested read data transfer for the task
from
      the target's perspective, and MUST NOT do so more frequently
than
      this.

      On receiving a Data-In PDU with the A bit set to 1, the
initiator
      MUST issue a SNACK of type DataACK.  If the initiator has
detected
      holes in the input sequence, it MUST postpone issuing the SNACK
of
      type DataACK until the holes are filled. An initiator MUST ONLY
      acknowledge the status for command that produced Data-In PDUs
after
      acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
      requested by the target. A status acknowledgement for a command
that
      generated Data-In PDUs is considered by the target as an
implicit
      acknowledgement of the Data-In PDUs if such an acknowledgement
was
      requested by the target.

The ITT mandating text in 9,16.1 will read:

      For Status SNACK and DataACK, the Initiator Task Tag is
reserved. In
       all other cases, the Initiator Task Tag field MUST be set to
the
      Ini-tiator Task Tag of the referenced command.


      Julo



From owner-ips@ece.cmu.edu  Mon Mar 18 17:08:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA22197
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 17:08:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2ILX9e05156
	for ips-outgoing; Mon, 18 Mar 2002 16:33:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2ILX6w05148
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 16:33:06 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id WAA14526;
	Mon, 18 Mar 2002 22:32:59 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2ILWxI56588;
	Mon, 18 Mar 2002 22:32:59 +0100
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu, "John Hufferd" <hufferd@us.ibm.com>
MIME-Version: 1.0
Subject: Re: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF08B567B5.8E6B65D4-ONC2256B80.006FBC9F@telaviv.ibm.com>
Date: Mon, 18 Mar 2002 23:32:56 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 18/03/2002 23:32:59,
	Serialize complete at 18/03/2002 23:32:59
Content-Type: multipart/alternative; boundary="=_alternative 00736B9BC2256B80_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00736B9BC2256B80_=
Content-Type: text/plain; charset="us-ascii"

That is neither the intent nor good enough.

Status ack may be delayed due to some other hole or no outgoing PDUs. In 
which case the initiator MUST issue the ACK.
The text says that if the initiator decides to issue an ACK it must issue 
it before the status ACK.

The target MUST take a status ACK as an implicit data ACK.

I could rephrase the text as follows:

 For sessions with ErrorRecoveryLevel 1 or higher, the target sets this bit 
to 1 to indicate that it requests a positive acknowledgement from the 
initiator for the data received.  The target should use the A bit 
moderately; it MAY set the A bit to 1 only once every MaxBurstSize bytes 
or on the last Data-In PDU that concludes the entire requested read data 
transfer for the task from the target's perspective, and MUST NOT do so 
more frequently than this. 

On receiving a Data-In PDU with the A bit set to 1, the initiator MUST 
issue a SNACK of type DataACK unless it has received the status and it is 
able to acknowledge the status on some other outgoing PDU (through 
ExpStatSN) in which case sending the SNACK of type DataACK is not 
man-adatory.  If the initiator has detected holes in the input sequence, 
it MUST postpone issuing the SNACK of type DataACK until the holes are 
filled. An initiator MUST NOT send a SNACK of type DataACK for the last 
Data-In PDU for a command after acknowledging the status for com-mand. A 
status acknowledgement for a command that generated Data-In PDUs is 
considered by the target as an implicit acknowledgement of the Data-In 
PDUs if such an acknowledgement was requested by the target.

Julo




"Mallikarjun C." <cbm@rose.hp.com>
18-03-02 19:58
Please respond to "Mallikarjun C."

 
        To:     Julian Satran/Haifa/IBM@IBMIL, John Hufferd/San Jose/IBM@IBMUS
        cc:     <ips@ece.cmu.edu>
        Subject:        Re: iSCSI: Use of the A bit

 

John,

I think you're describing the intent of the wording, though the
paragraph you point out doesn't seem consistent.

Here's what I suggest with a few tweaks -

       On receiving a Data-In PDU with the A bit set to 1, if there are no 
holes 
       in the read data until that Data-In PDU, the initiator MUST issue a 
SNACK 
       of type DataACK , or alternatively MAY acknowledge the status for 
the task 
       immediately via ExpStatSN on other outbound PDUs if the status for 
the task
       is also received.  If the initiator has detected holes in the read 
data until that Data-In 
       PDU, it MUST postpone issuing the SNACK of type DataACK until the 
holes 
       are filled. An initiator also MUST NOT acknowledge the status for 
the task 
       before those holes are filled.  A status acknowledgement for a task 
that generated 
       the Data-In PDUs is considered by the target as an implicit 
acknowledgement 
      of the Data-In PDUs if an acknowledgement was requested by the 
target.

I hope this works better....
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>; <ips@ece.cmu.edu>; 
<owner-ips@ece.cmu.edu>
Sent: Monday, March 18, 2002 9:17 AM
Subject: Re: iSCSI: Use of the A bit


> 
> Julian the following statement is confusing:
> 
>  "An initiator MUST ONLY acknowledge the status for command that 
produced
>  Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
>  acknowledgment is requested by the target.  A status acknowledgement 
for a
>  command that generated Data-In PDUs is considered by the target as an
>  implicit acknowledgement of the Data-In PDUs if such an acknowledgement
>  was requested by the target."
> 
> What did you intend to say.  All commands MUST have t status 
acknowledge,
> via ExpStatSN, so I do not understand the first sentence.  And if the
> Data-In PDUs must be acknowledged (if the A bit is set), what is the
> meaning of the last statement.
> 
> Since I do not believe there is a need to ack the last Data-In PDU, I am
> hoping you agree.  But it is not clear.
> 
> If the Target sets the A bit on the last Data-In PDU, which also has 
good
> status set -- and the Initiator has a PDU ready to send to which it can
> attach the value of ExpStatSN, which will show that the Data-In PDU was
> received -- there should be no reason to send a extra SNACK for the 
Data-In
> PDU.
> 
> Please tell me that is what you intended to say in the above quoted 
text.
> 
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
> 05:52:46 PM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    "Mallikarjun C." <cbm@rose.hp.com>
> cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
> Subject:    Re: iSCSI: Use of the A bit
> 
> 
> 
> Dear all,
> 
> The text for the A bit part (9.7.2) reads now:
> 
>    A (Acknowledge) bit
> 
> 
>        For sessions with ErrorRecoveryLevel 1 or higher, the target sets
>        this bit to 1 to indicate that it requests a positive
>        acknowledgement from the initiator for the data received.  The
>        target should use the A bit moderately; it MAY set the A bit to 1
>        only once every MaxBurstSize bytes or on the last Data-In PDU 
that
>        concludes the entire requested read data transfer for the task 
from
>        the target's perspective, and MUST NOT do so more frequently than
>        this.
> 
>        On receiving a Data-In PDU with the A bit set to 1, the initiator
>        MUST issue a SNACK of type DataACK.  If the initiator has 
detected
>        holes in the input sequence, it MUST postpone issuing the SNACK 
of
>        type DataACK until the holes are filled. An initiator MUST ONLY
>        acknowledge the status for command that produced Data-In PDUs 
after
>        acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
>        requested by the target. A status acknowledgement for a command 
that
>        generated Data-In PDUs is considered by the target as an implicit
>        acknowledgement of the Data-In PDUs if such an acknowledgement 
was
>        requested by the target.
> 
> The ITT mandating text in 9,16.1 will read:
> 
>        For Status SNACK and DataACK, the Initiator Task Tag is reserved. 
In
>        all other cases, the Initiator Task Tag field MUST be set to the
>        Ini-tiator Task Tag of the referenced command.
> 
> 
>        Julo
> 
> 
> 
> 
> 



--=_alternative 00736B9BC2256B80_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">That is neither the intent nor good enough.</font>
<br>
<br><font size=2 face="sans-serif">Status ack may be delayed due to some other hole or no outgoing PDUs. In which case the initiator MUST issue the ACK.</font>
<br><font size=2 face="sans-serif">The text says that if the initiator decides to issue an ACK it must issue it before the status ACK.</font>
<br>
<br><font size=2 face="sans-serif">The target MUST take a status ACK as an implicit data ACK.</font>
<br>
<br><font size=2 face="sans-serif">I could rephrase the text as follows:</font>
<br>
<br><font size=2 face="sans-serif">&nbsp;</font><font size=3 face="Courier New">For sessions with ErrorRecoveryLevel 1 or higher, the target sets this bit to 1 to indicate that it requests a positive acknowledgement from the initiator for the data received. &nbsp;The target should use the A bit moderately; it MAY set the A bit to 1 only once every MaxBurstSize bytes or on the last Data-In PDU that concludes the entire requested read data transfer for the task from the target's perspective, and MUST NOT do so more frequently than this. </font>
<br>
<br><font size=3 face="Courier New">On receiving a Data-In PDU with the A bit set to 1, the initiator MUST issue a SNACK of type DataACK unless it has received the status and it is able to acknowledge the status on some other outgoing PDU (through ExpStatSN) in which case sending the SNACK of type DataACK is not man-adatory. &nbsp;If the initiator has detected holes in the input sequence, it MUST postpone issuing the SNACK of type DataACK until the holes are filled. An initiator MUST NOT send a SNACK of type DataACK for the last Data-In PDU for a command after acknowledging the status for com-mand. A status acknowledgement for a command that generated Data-In PDUs is considered by the target as an implicit acknowledgement of the Data-In PDUs if such an acknowledgement was requested by the target.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</b></font>
<p><font size=1 face="sans-serif">18-03-02 19:58</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Mallikarjun C.&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL, John Hufferd/San Jose/IBM@IBMUS</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">John,<br>
<br>
I think you're describing the intent of the wording, though the<br>
paragraph you point out doesn't seem consistent.<br>
<br>
Here's what I suggest with a few tweaks -<br>
<br>
 &nbsp; &nbsp; &nbsp; On receiving a Data-In PDU with the A bit set to 1, if there are no holes <br>
 &nbsp; &nbsp; &nbsp; in the read data until that Data-In PDU, the initiator MUST issue a SNACK <br>
 &nbsp; &nbsp; &nbsp; of type DataACK , or alternatively MAY acknowledge the status for the task <br>
 &nbsp; &nbsp; &nbsp; immediately via ExpStatSN on other outbound PDUs if the status for the task<br>
 &nbsp; &nbsp; &nbsp; is also received. &nbsp;If the initiator has detected holes in the read data until that Data-In <br>
 &nbsp; &nbsp; &nbsp; PDU, it MUST postpone issuing the SNACK of type DataACK until the holes <br>
 &nbsp; &nbsp; &nbsp; are filled. An initiator also MUST NOT acknowledge the status for the task <br>
 &nbsp; &nbsp; &nbsp; before those holes are filled. &nbsp;A status acknowledgement for a task that generated <br>
 &nbsp; &nbsp; &nbsp; the Data-In PDUs is considered by the target as an implicit acknowledgement <br>
 &nbsp; &nbsp; &nbsp;of the Data-In PDUs if an acknowledgement was requested by the target.<br>
<br>
I hope this works better....<br>
--<br>
Mallikarjun<br>
<br>
Mallikarjun Chadalapaka<br>
Networked Storage Architecture<br>
Network Storage Solutions Organization<br>
Hewlett-Packard MS 5668 <br>
Roseville CA 95747<br>
cbm@rose.hp.com<br>
<br>
----- Original Message ----- <br>
From: &quot;John Hufferd&quot; &lt;hufferd@us.ibm.com&gt;<br>
To: &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;<br>
Cc: &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;; &lt;ips@ece.cmu.edu&gt;; &lt;owner-ips@ece.cmu.edu&gt;<br>
Sent: Monday, March 18, 2002 9:17 AM<br>
Subject: Re: iSCSI: Use of the A bit<br>
<br>
<br>
&gt; <br>
&gt; Julian the following statement is confusing:<br>
&gt; <br>
&gt; &nbsp;&quot;An initiator MUST ONLY acknowledge the status for command that produced<br>
&gt; &nbsp;Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU<br>
&gt; &nbsp;acknowledgment is requested by the target. &nbsp;A status acknowledgement for a<br>
&gt; &nbsp;command that generated Data-In PDUs is considered by the target as an<br>
&gt; &nbsp;implicit acknowledgement of the Data-In PDUs if such an acknowledgement<br>
&gt; &nbsp;was requested by the target.&quot;<br>
&gt; <br>
&gt; What did you intend to say. &nbsp;All commands MUST have t status acknowledge,<br>
&gt; via ExpStatSN, so I do not understand the first sentence. &nbsp;And if the<br>
&gt; Data-In PDUs must be acknowledged (if the A bit is set), what is the<br>
&gt; meaning of the last statement.<br>
&gt; <br>
&gt; Since I do not believe there is a need to ack the last Data-In PDU, I am<br>
&gt; hoping you agree. &nbsp;But it is not clear.<br>
&gt; <br>
&gt; If the Target sets the A bit on the last Data-In PDU, which also has good<br>
&gt; status set -- and the Initiator has a PDU ready to send to which it can<br>
&gt; attach the value of ExpStatSN, which will show that the Data-In PDU was<br>
&gt; received -- there should be no reason to send a extra SNACK for the Data-In<br>
&gt; PDU.<br>
&gt; <br>
&gt; Please tell me that is what you intended to say in the above quoted text.<br>
&gt; <br>
&gt; <br>
&gt; .<br>
&gt; .<br>
&gt; .<br>
&gt; John L. Hufferd<br>
&gt; Senior Technical Staff Member (STSM)<br>
&gt; IBM/SSG San Jose Ca<br>
&gt; Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
&gt; Home Office (408) 997-6136, Cell: (408) 499-9702<br>
&gt; Internet address: hufferd@us.ibm.com<br>
&gt; <br>
&gt; <br>
&gt; &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;@ece.cmu.edu on 03/17/2002<br>
&gt; 05:52:46 PM<br>
&gt; <br>
&gt; Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
&gt; <br>
&gt; </font>
<br><font size=2 face="Courier New">&gt; To: &nbsp; &nbsp;&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
&gt; cc: &nbsp; &nbsp;ips@ece.cmu.edu, owner-ips@ece.cmu.edu<br>
&gt; Subject: &nbsp; &nbsp;Re: iSCSI: Use of the A bit<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Dear all,<br>
&gt; <br>
&gt; The text for the A bit part (9.7.2) reads now:<br>
&gt; <br>
&gt; &nbsp; &nbsp;A (Acknowledge) bit<br>
&gt; <br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;For sessions with ErrorRecoveryLevel 1 or higher, the target sets<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;this bit to 1 to indicate that it requests a positive<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledgement from the initiator for the data received. &nbsp;The<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;target should use the A bit moderately; it MAY set the A bit to 1<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;only once every MaxBurstSize bytes or on the last Data-In PDU that<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;concludes the entire requested read data transfer for the task from<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the target's perspective, and MUST NOT do so more frequently than<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;this.<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;On receiving a Data-In PDU with the A bit set to 1, the initiator<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;MUST issue a SNACK of type DataACK. &nbsp;If the initiator has detected<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;holes in the input sequence, it MUST postpone issuing the SNACK of<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;type DataACK until the holes are filled. An initiator MUST ONLY<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledge the status for command that produced Data-In PDUs after<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledging the Data-In PDUs if Data-In PDU acknowledgment is<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;requested by the target. A status acknowledgement for a command that<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;generated Data-In PDUs is considered by the target as an implicit<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledgement of the Data-In PDUs if such an acknowledgement was<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;requested by the target.<br>
&gt; <br>
&gt; The ITT mandating text in 9,16.1 will read:<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;For Status SNACK and DataACK, the Initiator Task Tag is reserved. In<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;all other cases, the Initiator Task Tag field MUST be set to the<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Ini-tiator Task Tag of the referenced command.<br>
&gt; <br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Julo<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
</font>
<br>
<br>
--=_alternative 00736B9BC2256B80_=--


From owner-ips@ece.cmu.edu  Mon Mar 18 18:11:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA24793
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 18:11:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IMoP512739
	for ips-outgoing; Mon, 18 Mar 2002 17:50:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from hermes.fm.intel.com (fmr01.intel.com [192.55.52.18])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IMQ7w09155
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 17:26:07 -0500 (EST)
Received: from petasus.fm.intel.com (petasus.fm.intel.com [10.1.192.37])
	by hermes.fm.intel.com (8.11.6/8.11.6/d: outer.mc,v 1.36 2002/03/11 23:18:46 root Exp $) with ESMTP id g2IMOqP22554
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 22:24:52 GMT
Received: from fmsmsxvs042.fm.intel.com (fmsmsxv042-1.fm.intel.com [132.233.48.110])
	by petasus.fm.intel.com (8.11.6/8.11.6/d: inner.mc,v 1.14 2002/03/05 23:31:08 root Exp $) with SMTP id g2IMOxL10743
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 22:24:59 GMT
Received: from fmsmsx019.fm.intel.com ([132.233.42.130])
 by fmsmsxvs042.fm.intel.com (NAVGW 2.5.1.16) with SMTP id M2002031814292905187
 for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 14:29:29 -0800
Received: by fmsmsx019.fm.intel.com with Internet Mail Service (5.5.2653.19)
	id <GNFXF6KP>; Mon, 18 Mar 2002 14:26:05 -0800
Message-ID: <F1CE15E08172D4119247009027AE9D5018562E22@FMSMSX37>
From: "Vigil, Travis A" <travis.a.vigil@intel.com>
To: "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>
Subject: iSCSI SANs
Date: Mon, 18 Mar 2002 14:26:01 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi Rick,

Could you give me a short description of your needs and your interest in
iSCSI.  Perhaps we could do a trial SAN if we could write a whitepaper on
it.  I could work with our partners for discounted prices.

TV

Travis Vigil
Intel Corporation
LAN Access Division 
Work: (512) 407-2114
Cell: (512) 633-8859
travis.a.vigil@intel.com


From owner-ips@ece.cmu.edu  Mon Mar 18 18:17:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA24994
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 18:17:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IMqqj12888
	for ips-outgoing; Mon, 18 Mar 2002 17:52:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IMqnw12879
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 17:52:49 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id XAA34990
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 23:52:43 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2IMqgI87952
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 23:52:42 +0100
Subject: RE: iSCSI: Use of the A bit
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF599265DA.9C9C03A5-ONC2256B80.007C70AD@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Tue, 19 Mar 2002 00:39:40 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 19/03/2002 00:52:41
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk



yes - I think that the latest text does just that. Julo


                                                                                                         
                      "Rod Harrison"                                                                     
                      <rod.harrison@win        To:       Julian Satran/Haifa/IBM@IBMIL, John Hufferd/San 
                      driver.com>               Jose/IBM@IBMUS                                           
                                               cc:       "Mallikarjun C." <cbm@rose.hp.com>,             
                      18-03-02 23:29            <ips@ece.cmu.edu>, <owner-ips@ece.cmu.edu>               
                      Please respond to        Subject:  RE: iSCSI: Use of the A bit                     
                      "Rod Harrison"                                                                     
                                                                                                         
                                                                                                         




             Can we explicitly allow the status and data ACKs to be at the
same
time? Otherwise we prevent sending the status ACK (expStatSn) in the
data ACK SNACK PDU.

             - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Monday, March 18, 2002 8:23 PM
To: John Hufferd
Cc: Mallikarjun C.; ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: Re: iSCSI: Use of the A bit



John,

comments in text - JUlo


John Hufferd/San Jose/IBM@IBMUS
18-03-02 19:17
Please respond to John Hufferd

        To:        Julian Satran/Haifa/IBM@IBMIL
        cc:        "Mallikarjun C." <cbm@rose.hp.com>,
ips@ece.cmu.edu, owner-ips@ece.cmu.edu
        Subject:        Re: iSCSI: Use of the A bit





Julian the following statement is confusing:

"An initiator MUST ONLY acknowledge the status for command that
produced
Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
acknowledgment is requested by the target.  A status acknowledgement
for a
command that generated Data-In PDUs is considered by the target as an
implicit acknowledgement of the Data-In PDUs if such an
acknowledgement
was requested by the target."

What did you intend to say.  All commands MUST have t status
acknowledge,
via ExpStatSN, so I do not understand the first sentence.  And if the
Data-In PDUs must be acknowledged (if the A bit is set), what is the
meaning of the last statement.

+++ The first statement says that IF data-ack is requested it MUST be
sent by the initiator before it acknowledges status.
+++

Since I do not believe there is a need to ack the last Data-In PDU, I
am
hoping you agree.  But it is not clear.


+++
In fact the target may want a data ack as the status ack might be
delayed for various reasons.
The second statement says that if the target sees a status ack that is
also an ack for the data

The first statement says that the initiator must send ack if asked -
and send status ack only afterwards.

The second says that when status is received the data are acked and
target should wait no longer (i.e., no recovery action).
+++
If the Target sets the A bit on the last Data-In PDU, which also has
good
status set -- and the Initiator has a PDU ready to send to which it
can
attach the value of ExpStatSN, which will show that the Data-In PDU
was
received -- there should be no reason to send a extra SNACK for the
Data-In
PDU.

Please tell me that is what you intended to say in the above quoted
text.


.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
05:52:46 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Mallikarjun C." <cbm@rose.hp.com>
cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject:    Re: iSCSI: Use of the A bit



Dear all,

The text for the A bit part (9.7.2) reads now:

  A (Acknowledge) bit


      For sessions with ErrorRecoveryLevel 1 or higher, the target
sets
      this bit to 1 to indicate that it requests a positive
      acknowledgement from the initiator for the data received.  The
      target should use the A bit moderately; it MAY set the A bit to
1
      only once every MaxBurstSize bytes or on the last Data-In PDU
that
      concludes the entire requested read data transfer for the task
from
      the target's perspective, and MUST NOT do so more frequently
than
      this.

      On receiving a Data-In PDU with the A bit set to 1, the
initiator
      MUST issue a SNACK of type DataACK.  If the initiator has
detected
      holes in the input sequence, it MUST postpone issuing the SNACK
of
      type DataACK until the holes are filled. An initiator MUST ONLY
      acknowledge the status for command that produced Data-In PDUs
after
      acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
      requested by the target. A status acknowledgement for a command
that
      generated Data-In PDUs is considered by the target as an
implicit
      acknowledgement of the Data-In PDUs if such an acknowledgement
was
      requested by the target.

The ITT mandating text in 9,16.1 will read:

      For Status SNACK and DataACK, the Initiator Task Tag is
reserved. In
       all other cases, the Initiator Task Tag field MUST be set to
the
      Ini-tiator Task Tag of the referenced command.


      Julo









From owner-ips@ece.cmu.edu  Mon Mar 18 18:18:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25041
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 18:18:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IMYFe11828
	for ips-outgoing; Mon, 18 Mar 2002 17:34:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IMYCw11820
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 17:34:13 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP
	id 2B6E5600832; Mon, 18 Mar 2002 14:34:07 -0800 (PST)
Received: from swathi (pal1nai163031.nsr.hp.com [15.244.163.31]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id OAA11858; Mon, 18 Mar 2002 14:35:49 -0800 (PST)
Message-ID: <007201c1cecd$02a28f30$62a3f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Martins Krikis" <mkrikis@yahoo.com>, <ips@ece.cmu.edu>
References: <20020312233705.58629.qmail@web13701.mail.yahoo.com>
Subject: Re: iSCSI:ExpDataSN overload
Date: Mon, 18 Mar 2002 14:34:04 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Martins,

Sorry for the delay in getting to this...

ExpDataSN always means the expected DataSN from some entity's
perspective in some scope.  It may (as in reassign TMF), or may not
(as in write data reception) be communicated to the other entity.  I do
not consider the ExpDataSN for write data as an implementation issue,
iSCSI defines the error recovery protocol  if the ExpDataSN is not 
received.

Regarding 6.1.2, I agree that the wording can be improved - and your
suggestion is a good fit.

Regarding the last two sentences of 6.2:  the text is referring to the 
ExpDataSN of the current burst in a Data-Out sequence.

Regarding the "even when the CmdSN can be ...." wording, you are right - 
I will modify the sentence to imply what you suggested.

Thanks!
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Martins Krikis" <mkrikis@yahoo.com>
To: <ips@ece.cmu.edu>
Sent: Tuesday, March 12, 2002 3:37 PM
Subject: ExpDataSN overload


> Dear list members,
> 
> I've just noticed that ExpDataSN is used to denote
> a lot of different things (all references w.r.t.
> to draft 11):
> 
> 1) the total number of Data-In PDUs that a target
>    has sent to complete a SCSI (read-like) command
>    (2.5.1.2, 9.4.7, 6.6, E.9.2);
> 
> 2) next concecutive input DataSN number expected by
>    the initiator for the referenced command in
> previous
>    execution, used in TASK REASSIGN
>    (6.1.2, 9.5.4);
> 
> 3) internal target variable used to track the next
>    DataSN Expected from the initator or something
>    like that
>    (6.2).
> 
> Regarding use 1: this is the most widespread, and
> there is nothing to object, except perhaps that the
> name ExpDataSN doesn't convey the exact meaning---
> "TotalDataPDUs" or "NumDataPDUs" or something like
> that. Anyway, I can live with this.
> 
> Regarding use 2: the name conveys the meaning, but
> I don't like the wording of this spot in 6.1.2:
> "... for example taking advantage of ExpDataSN in 
> the iSCSI command PDU for read commands...". The
> problem is that "read commands" don't have ExpDataSN
> in the PDU, it's the "Task Management Function
> Request"
> PDUs that do. Task Management Function Request PDUs
> are, of course, "iSCSI command PDUs", but the whole
> thing makes it too easy to make the mistake of
> remembering (the ill-named) ExpDataSN field in 
> SCSI Response PDU, at which point nothing makes sense
> anymore, because that's the other meaning of
> ExpDataSN.
> I would appreciate if somebody could rephrase the
> sentence. I'll even volunteer:
> 
> "In reassigning connection allegiance for a command,
> the targets SHOULD continue the command from its
> current state. For example, when reassigning read
> commands, the targets SHOULD take advantage of the
> ExpDataSN field provided by the Task Management
> Function Request PDU (which must be set to zero
> if there was no data transfer) and bring the command
> to completion by sending (or resending) the status."
> 
> Regarding use 3: I don't understand this. The last
> two sentences of 6.2 seem to be talking about
> Data-Out PDUs, therefore uses 1 and 2 of ExpDataSN
> (that are both Data-In PDU related) don't apply
> here. I'm concluding that these sentences are 
> making some (unwelcome) assumptions about target
> implementation details (e.g., ExpDataSN in the role
> of a variable used to track the DataSN of the next
> Data-Out PDU that a target expects to receive for
> this command). If so, I would like such assumptions
> dropped and no MUSTs (and MAYs) imposed on a target
> implementation. If I'm wrong, somebody please explain
> to me what was meant here.
> 
> "Bonus" :-) problem:
> 
> While we're at 6.1.2, the start of the 3rd paragraph
> also got me thinking and browsing the draft for 
> quite a while. I don't like the "This is true even
> when the CmdSN can be reliably ascertained..."
> phrase. The problem is, I don't see how it could not
> be reliably determined for rejected PDUs. My thinking
> is that the only way to not be able to reliably
> determine CmdSN is in the case of header digest
> errors.
> But in this case, the PDU must be silently dropped,
> and not be answered with a Reject PDU. Am I wrong
> somewhere? If not, can we change the sentence I
> mentioned to something that explains that for rejected
> PDUs, the target will necessarily have a good CmdSN,
> but still must not use it"? 
> 
> Help on these issues will be much appreciated.
> 
>   Martins Krikis, Intel Corp.
> 
> Disclaimer: These opinions are mine only and
>             may not reflect those of my employer.
> 
> 
> 
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Try FREE Yahoo! Mail - the world's greatest free email!
> http://mail.yahoo.com/
>


From owner-ips@ece.cmu.edu  Mon Mar 18 18:19:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25072
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 18:19:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IMQKB09183
	for ips-outgoing; Mon, 18 Mar 2002 17:26:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IMQGw09174
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 17:26:16 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP id 5231CC00194
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 14:26:10 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id OAA00834
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 14:26:04 -0800 (PST)
Message-ID: <3C966A7C.10929E38@cup.hp.com>
Date: Mon, 18 Mar 2002 14:30:20 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: ips@ece.cmu.edu
Subject: Re: iSCSI: New Suggested Wordage to cover TPGTs
References: <OF8C7ADF66.CB4AA4FF-ON88256B80.0073F005@boulder.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hello,

Thanks for addressing this issue. Some comments inline.

Regards,
Santosh


John Hufferd wrote:
> 
> The Naming and Discovery Team (NDT) and Julian, have had meetings on the
> issue
> of TPGT. These meetings were to address the TPGT issue express on this
> reflector.  The following is the recomendation of the extended NDT:
> 
> In section 4.3 (possibly as the last paragraph on page 63 of rev11) -
> 
> The first Login Response PDU during the Login phase from the iSCSI target
> SHOULD return the TargetPortalGroupTag key that contains the tag value of
> the iSCSI portal group servicing the the Login Request PDU. 

Can we alter the above SHOULD to MUST and remove the sentence below ? Is
there any target out there that will not support the addition of a
network portal into a portal group ? (At least the initial configuration
of a target involves the addition of a portal to a portal group ?)

To reduce options and keep the authentication foolproof, it would be
good to mandate that the targets return their TPGT. Not doing so will
expose initiators to the whims of the target implementation.

The authentication is desired by the initiating side and it must have
control over the ability to authenticate. Hence, if we cannot mandate
that targets always send their TPGT in login response, one of the below
2 approaches are possible alternatives, which give the initiator control
over the authentication :

1) Initiators that are interested in authentication send a 
TargetPortalGroupTag=?
in their login request to query the target for its TPGT and authenticate
the response. Target MUST respond with the current TPGT for that network
portal.

2) Initiators send the intended destination TPGT as a part of the login
request and the target MUST authenticate the intended TPGT with the
current TPGT. On an authentication failure, target MUST reject the
login.

Both of the above alternatives allow the initiator to ensure that
authentication is performed, instead of depending on the target to
support sending its TPGT in the login response.

> If the iSCSI
> target implementation supports altering the portal group configuration
> (including adding, deleting, and swapping of portals in a portal group), it
> MUST return the TargetPortalGroupTag key carrying the tag value of the
> servicing portal group. 


> If the reconfiguration of iSCSI portal groups is a
> concern in a given environment, the iSCSI initiator MUST use this key to
> ascertain that it had indeed initiated the Login phase with the intended
> target portal group.

To reduce options and keep the authentication process foolproof, suggest
making this authentication un-conditional. i.e. Remove "If the
reconfiguration of iSCSI portal groups is a concern in a given
environment,"


> 
> In chapter 11 (possibly as section 11.5) -
> 
> 11.5  TargetPortalGroupTag
> 
> Use: IO by target, Declarative
> Senders: Target
> Scope: SW
> 
> TargetPortalGroupTag=<integer-from-0-to-65535>
> 
> Examples:
> TargetPortalGroupTag=1
> 
> Target portal group tag is a 16-bit integer that uniquely identifies a
> portal group within an iSCSI target node.  This key carries the value of
> the
> tag that is servicing the Login request.  The iSCSI target returns this key
> to the initiator in the first Login Response PDU.
> For the complete usage expectations of this key, refer to section 4.3.


-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Mon Mar 18 18:25:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25348
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 18:25:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2IMqqg12890
	for ips-outgoing; Mon, 18 Mar 2002 17:52:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2IMqnw12878;
	Mon, 18 Mar 2002 17:52:49 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id XAA34988;
	Mon, 18 Mar 2002 23:52:42 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2IMqfI87950;
	Mon, 18 Mar 2002 23:52:41 +0100
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: ips@ece.cmu.edu, "John Hufferd" <hufferd@us.ibm.com>,
        owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Use of the A bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF83C259AB.046B1279-ONC2256B80.007C08F8@telaviv.ibm.com>
Date: Tue, 19 Mar 2002 00:52:38 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 19/03/2002 00:52:41,
	Serialize complete at 19/03/2002 00:52:41
Content-Type: multipart/alternative; boundary="=_alternative 007C4286C2256B80_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 007C4286C2256B80_=
Content-Type: text/plain; charset="us-ascii"

Mallikarjun has pointed out to me that the latest text still contains some 
conflicting statements so here is another attempt:

On receiving a Data-In PDU with the A bit set to 1, if there are no holes 
in the read data until that Data-In PDU, the initiator MUST issue a SNACK 
of type DataACK except when it is able to acknowledge the status for the 
task immediately via ExpStatSN on other outbound PDUs if the status for 
the task is also received; in this later case (acknowledgement through 
ExpStatSN) sending a SNACK of type DataACK in response to the A bit is not 
mandatory but if it is done it must not be sent after the status 
acknowledgement through ExpStatSN.  If the initiator has detected holes in 
the read data until that Data-In PDU, it MUST postpone issuing the SNACK 
of type DataACK until the holes are filled. An initiator also MUST NOT 
acknowledge the status for the task before those holes are filled.  A 
status acknowledgement for a task that generated the Data-In PDUs is 
considered by the target as an implicit acknowledgement of the Data-In 
PDUs if such an acknowledge-ment was requested by the target.

Julo




"Mallikarjun C." <cbm@rose.hp.com>
Sent by: owner-ips@ece.cmu.edu
18-03-02 19:58
Please respond to "Mallikarjun C."

 
        To:     Julian Satran/Haifa/IBM@IBMIL, John Hufferd/San Jose/IBM@IBMUS
        cc:     <ips@ece.cmu.edu>
        Subject:        Re: iSCSI: Use of the A bit

 

John,

I think you're describing the intent of the wording, though the
paragraph you point out doesn't seem consistent.

Here's what I suggest with a few tweaks -

       On receiving a Data-In PDU with the A bit set to 1, if there are no 
holes 
       in the read data until that Data-In PDU, the initiator MUST issue a 
SNACK 
       of type DataACK , or alternatively MAY acknowledge the status for 
the task 
       immediately via ExpStatSN on other outbound PDUs if the status for 
the task
       is also received.  If the initiator has detected holes in the read 
data until that Data-In 
       PDU, it MUST postpone issuing the SNACK of type DataACK until the 
holes 
       are filled. An initiator also MUST NOT acknowledge the status for 
the task 
       before those holes are filled.  A status acknowledgement for a task 
that generated 
       the Data-In PDUs is considered by the target as an implicit 
acknowledgement 
      of the Data-In PDUs if an acknowledgement was requested by the 
target.

I hope this works better....
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "John Hufferd" <hufferd@us.ibm.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>; <ips@ece.cmu.edu>; 
<owner-ips@ece.cmu.edu>
Sent: Monday, March 18, 2002 9:17 AM
Subject: Re: iSCSI: Use of the A bit


> 
> Julian the following statement is confusing:
> 
>  "An initiator MUST ONLY acknowledge the status for command that 
produced
>  Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU
>  acknowledgment is requested by the target.  A status acknowledgement 
for a
>  command that generated Data-In PDUs is considered by the target as an
>  implicit acknowledgement of the Data-In PDUs if such an acknowledgement
>  was requested by the target."
> 
> What did you intend to say.  All commands MUST have t status 
acknowledge,
> via ExpStatSN, so I do not understand the first sentence.  And if the
> Data-In PDUs must be acknowledged (if the A bit is set), what is the
> meaning of the last statement.
> 
> Since I do not believe there is a need to ack the last Data-In PDU, I am
> hoping you agree.  But it is not clear.
> 
> If the Target sets the A bit on the last Data-In PDU, which also has 
good
> status set -- and the Initiator has a PDU ready to send to which it can
> attach the value of ExpStatSN, which will show that the Data-In PDU was
> received -- there should be no reason to send a extra SNACK for the 
Data-In
> PDU.
> 
> Please tell me that is what you intended to say in the above quoted 
text.
> 
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> "Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/17/2002
> 05:52:46 PM
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    "Mallikarjun C." <cbm@rose.hp.com>
> cc:    ips@ece.cmu.edu, owner-ips@ece.cmu.edu
> Subject:    Re: iSCSI: Use of the A bit
> 
> 
> 
> Dear all,
> 
> The text for the A bit part (9.7.2) reads now:
> 
>    A (Acknowledge) bit
> 
> 
>        For sessions with ErrorRecoveryLevel 1 or higher, the target sets
>        this bit to 1 to indicate that it requests a positive
>        acknowledgement from the initiator for the data received.  The
>        target should use the A bit moderately; it MAY set the A bit to 1
>        only once every MaxBurstSize bytes or on the last Data-In PDU 
that
>        concludes the entire requested read data transfer for the task 
from
>        the target's perspective, and MUST NOT do so more frequently than
>        this.
> 
>        On receiving a Data-In PDU with the A bit set to 1, the initiator
>        MUST issue a SNACK of type DataACK.  If the initiator has 
detected
>        holes in the input sequence, it MUST postpone issuing the SNACK 
of
>        type DataACK until the holes are filled. An initiator MUST ONLY
>        acknowledge the status for command that produced Data-In PDUs 
after
>        acknowledging the Data-In PDUs if Data-In PDU acknowledgment is
>        requested by the target. A status acknowledgement for a command 
that
>        generated Data-In PDUs is considered by the target as an implicit
>        acknowledgement of the Data-In PDUs if such an acknowledgement 
was
>        requested by the target.
> 
> The ITT mandating text in 9,16.1 will read:
> 
>        For Status SNACK and DataACK, the Initiator Task Tag is reserved. 
In
>        all other cases, the Initiator Task Tag field MUST be set to the
>        Ini-tiator Task Tag of the referenced command.
> 
> 
>        Julo
> 
> 
> 
> 
> 



--=_alternative 007C4286C2256B80_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Mallikarjun has pointed out to me that the latest text still contains some conflicting statements so here is another attempt:</font>
<br>
<br><font size=3 face="Courier New">On receiving a Data-In PDU with the A bit set to 1, if there are no holes in the read data until that Data-In PDU, the initiator MUST issue a SNACK of type DataACK except when it is able to acknowledge the status for the task immediately via ExpStatSN on other outbound PDUs if the status for the task is also received; in this later case (acknowledgement through ExpStatSN) sending a SNACK of type DataACK in response to the A bit is not mandatory but if it is done it must not be sent after the status acknowledgement through ExpStatSN. &nbsp;If the initiator has detected holes in the read data until that Data-In PDU, it MUST postpone issuing the SNACK of type DataACK until the holes are filled. An initiator also MUST NOT acknowledge the status for the task before those holes are filled. &nbsp;A status acknowledgement for a task that generated the Data-In PDUs is considered by the target as an implicit acknowledgement of the Data-In PDUs if su!
ch!
 an acknowledge-ment was requested by the target.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">18-03-02 19:58</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Mallikarjun C.&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL, John Hufferd/San Jose/IBM@IBMUS</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: Use of the A bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">John,<br>
<br>
I think you're describing the intent of the wording, though the<br>
paragraph you point out doesn't seem consistent.<br>
<br>
Here's what I suggest with a few tweaks -<br>
<br>
 &nbsp; &nbsp; &nbsp; On receiving a Data-In PDU with the A bit set to 1, if there are no holes <br>
 &nbsp; &nbsp; &nbsp; in the read data until that Data-In PDU, the initiator MUST issue a SNACK <br>
 &nbsp; &nbsp; &nbsp; of type DataACK , or alternatively MAY acknowledge the status for the task <br>
 &nbsp; &nbsp; &nbsp; immediately via ExpStatSN on other outbound PDUs if the status for the task<br>
 &nbsp; &nbsp; &nbsp; is also received. &nbsp;If the initiator has detected holes in the read data until that Data-In <br>
 &nbsp; &nbsp; &nbsp; PDU, it MUST postpone issuing the SNACK of type DataACK until the holes <br>
 &nbsp; &nbsp; &nbsp; are filled. An initiator also MUST NOT acknowledge the status for the task <br>
 &nbsp; &nbsp; &nbsp; before those holes are filled. &nbsp;A status acknowledgement for a task that generated <br>
 &nbsp; &nbsp; &nbsp; the Data-In PDUs is considered by the target as an implicit acknowledgement <br>
 &nbsp; &nbsp; &nbsp;of the Data-In PDUs if an acknowledgement was requested by the target.<br>
<br>
I hope this works better....<br>
--<br>
Mallikarjun<br>
<br>
Mallikarjun Chadalapaka<br>
Networked Storage Architecture<br>
Network Storage Solutions Organization<br>
Hewlett-Packard MS 5668 <br>
Roseville CA 95747<br>
cbm@rose.hp.com<br>
<br>
----- Original Message ----- <br>
From: &quot;John Hufferd&quot; &lt;hufferd@us.ibm.com&gt;<br>
To: &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;<br>
Cc: &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;; &lt;ips@ece.cmu.edu&gt;; &lt;owner-ips@ece.cmu.edu&gt;<br>
Sent: Monday, March 18, 2002 9:17 AM<br>
Subject: Re: iSCSI: Use of the A bit<br>
<br>
<br>
&gt; <br>
&gt; Julian the following statement is confusing:<br>
&gt; <br>
&gt; &nbsp;&quot;An initiator MUST ONLY acknowledge the status for command that produced<br>
&gt; &nbsp;Data-In PDUs after acknowledging the Data-In PDUs if Data-In PDU<br>
&gt; &nbsp;acknowledgment is requested by the target. &nbsp;A status acknowledgement for a<br>
&gt; &nbsp;command that generated Data-In PDUs is considered by the target as an<br>
&gt; &nbsp;implicit acknowledgement of the Data-In PDUs if such an acknowledgement<br>
&gt; &nbsp;was requested by the target.&quot;<br>
&gt; <br>
&gt; What did you intend to say. &nbsp;All commands MUST have t status acknowledge,<br>
&gt; via ExpStatSN, so I do not understand the first sentence. &nbsp;And if the<br>
&gt; Data-In PDUs must be acknowledged (if the A bit is set), what is the<br>
&gt; meaning of the last statement.<br>
&gt; <br>
&gt; Since I do not believe there is a need to ack the last Data-In PDU, I am<br>
&gt; hoping you agree. &nbsp;But it is not clear.<br>
&gt; <br>
&gt; If the Target sets the A bit on the last Data-In PDU, which also has good<br>
&gt; status set -- and the Initiator has a PDU ready to send to which it can<br>
&gt; attach the value of ExpStatSN, which will show that the Data-In PDU was<br>
&gt; received -- there should be no reason to send a extra SNACK for the Data-In<br>
&gt; PDU.<br>
&gt; <br>
&gt; Please tell me that is what you intended to say in the above quoted text.<br>
&gt; <br>
&gt; <br>
&gt; .<br>
&gt; .<br>
&gt; .<br>
&gt; John L. Hufferd<br>
&gt; Senior Technical Staff Member (STSM)<br>
&gt; IBM/SSG San Jose Ca<br>
&gt; Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
&gt; Home Office (408) 997-6136, Cell: (408) 499-9702<br>
&gt; Internet address: hufferd@us.ibm.com<br>
&gt; <br>
&gt; <br>
&gt; &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;@ece.cmu.edu on 03/17/2002<br>
&gt; 05:52:46 PM<br>
&gt; <br>
&gt; Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
&gt; <br>
&gt; </font>
<br><font size=2 face="Courier New">&gt; To: &nbsp; &nbsp;&quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
&gt; cc: &nbsp; &nbsp;ips@ece.cmu.edu, owner-ips@ece.cmu.edu<br>
&gt; Subject: &nbsp; &nbsp;Re: iSCSI: Use of the A bit<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Dear all,<br>
&gt; <br>
&gt; The text for the A bit part (9.7.2) reads now:<br>
&gt; <br>
&gt; &nbsp; &nbsp;A (Acknowledge) bit<br>
&gt; <br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;For sessions with ErrorRecoveryLevel 1 or higher, the target sets<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;this bit to 1 to indicate that it requests a positive<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledgement from the initiator for the data received. &nbsp;The<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;target should use the A bit moderately; it MAY set the A bit to 1<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;only once every MaxBurstSize bytes or on the last Data-In PDU that<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;concludes the entire requested read data transfer for the task from<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the target's perspective, and MUST NOT do so more frequently than<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;this.<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;On receiving a Data-In PDU with the A bit set to 1, the initiator<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;MUST issue a SNACK of type DataACK. &nbsp;If the initiator has detected<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;holes in the input sequence, it MUST postpone issuing the SNACK of<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;type DataACK until the holes are filled. An initiator MUST ONLY<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledge the status for command that produced Data-In PDUs after<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledging the Data-In PDUs if Data-In PDU acknowledgment is<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;requested by the target. A status acknowledgement for a command that<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;generated Data-In PDUs is considered by the target as an implicit<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;acknowledgement of the Data-In PDUs if such an acknowledgement was<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;requested by the target.<br>
&gt; <br>
&gt; The ITT mandating text in 9,16.1 will read:<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;For Status SNACK and DataACK, the Initiator Task Tag is reserved. In<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;all other cases, the Initiator Task Tag field MUST be set to the<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Ini-tiator Task Tag of the referenced command.<br>
&gt; <br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Julo<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
</font>
<br>
<br>
--=_alternative 007C4286C2256B80_=--


From owner-ips@ece.cmu.edu  Mon Mar 18 19:16:30 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26856
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 19:16:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2INZ7f15261
	for ips-outgoing; Mon, 18 Mar 2002 18:35:07 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop1.snjs.qwest.net (snjspop1.snjs.qwest.net [168.103.24.1])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2INZ5w15257
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 18:35:05 -0500 (EST)
Received: (qmail 37860 invoked from network); 18 Mar 2002 23:35:04 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop1.snjs.qwest.net with SMTP; 18 Mar 2002 23:35:04 -0000
Date: Mon, 18 Mar 2002 13:09:15 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNGEEKCAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: ips@ece.cmu.edu
Subject: LUN or Reserved in R2T packet
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I am guessing that the same rules for the LUN field in Data-In/Data-Out PDUs
applies also to R2T (IOW, if TTT is 0xffffffff, then the LUN is reserved).
Currently, intuition dictates this and not the spec...

Am I correct?

Sincerely
Randy Jennings
Data Transit



From owner-ips@ece.cmu.edu  Mon Mar 18 19:29:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA27153
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 19:29:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2INtMY16444
	for ips-outgoing; Mon, 18 Mar 2002 18:55:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from smtp1.electric.net (smtp1.electric.net [216.129.90.14])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2INtJw16440
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 18:55:20 -0500 (EST)
Received: (qmail 17698 invoked from network); 18 Mar 2002 23:55:19 -0000
Received: from hm1.electric.net (216.129.90.33)
  by virusqueue.electric.net with SMTP; 18 Mar 2002 23:55:19 -0000
Received: from osmtp2.electric.net ([216.129.90.29])
 by hm1.electric.net (NAVGW 2.5.1.19) with SMTP id M2002031815551829849
 ; Mon, 18 Mar 2002 15:55:18 -0800
Received: from [166.63.183.40] (helo=EGRodriguez)
	by osmtp2.electric.net with esmtp (Exim 3.22 #1)
	id 16n6yE-000DOE-04; Mon, 18 Mar 2002 15:55:18 -0800
From: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>
To: <Black_David@emc.com>, <ips@ece.cmu.edu>
Subject: RE: FC Encapsulation WG Last Call comments
Date: Mon, 18 Mar 2002 17:53:43 -0600
Keywords: IETF-IPS
Message-ID: <000001c1ced8$231ebf80$28b73fa6@EGRodriguez>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E029375FE@CORPMX14>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hi David,

	[T] As we've learned from the Class 4 adventure, this table is
subject
	to change/extension.  IANA will need to manage it, and will need
some
	sort of allocation guidelines to remain consistent with whatever
mechanism produced this peculiar set of values.  While we probably
	don't want to allow value recycling, we may want to write some
text
	dealing with retiring values (making them no longer usable).
This
	also applies to the EOF values in Table 2.

I think there is a misconception with the EOF/SOF encodings.
The encodings themselves have been fairly stable for some time. 
The issues that came about recently is identifying which encodings
pertained to Class 4 specifically -- that was not obvious.

In any case, even if the encodings were not stable, SOF/EOF encodings
are in the domain of INCITS and the FC-FS/FC-BB/2 documents.  I do not
see how we can have IANA govern these encodings.

Thanks,

Elizabeth

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu] On Behalf Of
Black_David@emc.com
Sent: Sunday, March 17, 2002 11:31 PM
To: ips@ece.cmu.edu
Subject: FC Encapsulation WG Last Call comments

Comments flagged with [E] for editorial, [T] for technical.

----- FC Encapsulation -06 -----

-- Section 1 - Scope

   The organization responsible for the Fibre Channel standards (NCITS
   Technical Committee T11) has determined that some functions and
   modes of operation are not interoperable to the degree required by
   the IETF. This draft includes applicable T11 interoperability
   determinations in the form of restrictions on the use of this
   encapsulation mechanism.

[E] Is there an official citation for this statement?  It really needs
one
to be published in an archival unchangeable format such as an RFC.

-- Section 2 - Encapsulation Concepts

	FC frames have several possible lengths.

[E] Should read "variable length" or something like that - this implies
several possible choices of fixed length, which is incorrect.

   To facilitate transporting FC frames over TCP the native FC frame
needs
   to be contained in (encapsulated in) a slightly larger structure as
   shown in figure 1.

[E] The use of TCP in this context is overly restrictive.  This
encapsulation
is in principle applicable to any means of transport over IP, including
TCP, SCTP, UDP, and carrier pigeon ;-), even though in practice all the
initial uses will use TCP.

   The format and content of an FC frame is described in the FC

[E] "is" --> "are"

-- Section 3 - The FC Encapsulation Header
-- Section 3.1 - FC Encapsulation Header Format

   The values in the Protocol# field are assigned by
   IANA [8]. The following values are known to be in use:
 
    - FCIP -- TO BE ASSIGNED by IANA
    - iFCP -- TO BE ASSIGNED by IANA
 
[T] Delete the text starting with "The following values" and insert
a forward reference to the IANA Consideration section.

   FC Encapsulation receivers may compare the Protocol# and -Protocol#
   fields as an additional verification that an FC Encapsulation Header
   is being processed.

   FC Encapsulation
   receivers may compare the Version and -Version fields as an
   additional verification that an FC Encapsulation Header is being
   processed.

[T] Those "may"s are misleading.  I think "SHOULD" is appropriate, but I
could
accept "SHOULD"s that only applied when the CRC is not valid.

   Flags (bits 31-26 in word 3): The Flags bits provide information
   about the usage of the FC Encapsulation Header as shown in figure 3.
 
   Note: Implementers are advised to consult the specifications of
   protocols that use this header to determine how each individual
   protocol uses the bits in the Flags field.

[T] The "Note:" paragraph is part of the CRCV issue (see below), and
probably
needs to be deleted as part of resolving that issue.  This paragraph
also
has the additional problem in that it implies that protocol specific
uses
of the reserved flags are allowed, which is not the case.

   Reserved (Flags, bits 31-27 in word 3): These bits are reserved for
   use by future versions of the FC Encapsulation and SHALL be set to
   zero on send. Protocols employing this encapsulation MAY require
   checking for zero on receive, however doing so has the potential to
   create incompatibilities with future versions of this encapsulation.

[E] Second sentence is poorly worded.  Suggested rewrite: Protocols
employing
this encapsulation SHOULD ignore the Reserved bits on receive in order
to avoid creating incompatibilities with possible future versions of
this
encapsulation.  I believe this change is editorial, and it also applies
to the -Flags and -Frame Length fields.

   CRCV (CRC Valid Flag, bit 26 in word 3): A CRCV bit value of one
   indicates that the contents of the CRC field are valid. A CRCV bit
   value of zero indicates that CRC are invalid. Some protocols may
   always check the CRC without regard for the state of this bit. The
   value of the CRCV bit SHALL be constant for all FC Encapsulation
   Headers sent on a given TCP connection.

[T] The "Some protocols may always check the CRC ..." is the CRCV issue
that Mallikarjun also found and that has been problematic in the past.
I believe that what's going on here is that all protocols have to check
the Protocol#, and once that's been checked, the implementation knows
whether there's supposed to be a CRC there and hence doesn't need to
look at CRCV.  In practice this won't cause problems, as including the
CRC when it's not supposed to be there is harmless, and failing to
include it when it should be there will almost certainly cause a CRC
check failure.

I offer a proposal to resolve this by expanding the Protocol
# registry that IANA will create so that each registered protocol
must supply not only its name and an RFC reference, but also whether
the protocol uses (Yes) or does not use (No) the CRC in this header.
The above text could then be revised to make the CRCV check at the
receiver OPTIONAL in all cases because its value can be inferred
from the protocol#.

[E] Also need to generalize away from TCP connection to allow possible
future
use with other transports.

[T] Here or in the description of the Protocol Specific fields, a
warning
to implementers is needed says some sort of error checking redundancy
(e.g., the ones complements found elsewhere in the header) SHOULD (or
MUST)
be used when the CRC is not used.  This warning should be duplicated
in Section 3.2.1.  This is a technical comment, but should not be
controversial.

   Time Stamp [integer] and Time Stamp [fraction] (words 4 and 5): The
   two Time Stamp fields contain time at which the FC Encapsulated
   frame was sent as known to the sender. The format of integer and
   fraction Time Stamp word values is specified in Simple Network Time
   Protocol (SNTP) Version 4 [9]. The contents of the Time Stamp
   [integer] and Time Stamp [fraction] words SHALL be set as described
   in section 4.

[E] For convenience, it might be good to summarize those formats here
with
an indication that [9] is the normative authority.  I don't feel
strongly
about this, though.

[T] We have a problem here - RFC 2030 is Informational, and hence can't
be referenced in a normative fashion from a standards track document.
I'll
talk to Ralph offline about how to get around this.

   CRC (word 6): When the CRCV Flag bit is zero, the CRC field SHALL
   contain zero. When the CRCV Flag bit is one, the CRC field SHALL
   contain a CRC for words 0 to 5 of the FC Encapsulation Header
   computed using the polynomial, initial value, and bit order defined
   for Fibre Channel in FC-FS [3]. Using this algorithm, the bit order
   of the resulting CRC corresponds to that of FC-1 layer. The CRC
   transmitted over the IP network shall correspond to the equivalent
   value converted to FC-2 format as specified in FC-FS.

[E] I realize that FC-FS is the latest and greatest version of the FC
frame standard, BUT, referencing a project in progress for this sort of
basic CRC mechanism is an invitation to procedural problems.  Can this
reference be changed to FC-PH accompanied by a note that FC-FS is
supplanting FC-PH, but will make *no* changes in this area?  Note that
I'm comfortable with the earlier reference to FC-FS for frame contents.

-- Section 3.2.1

[T] The warning that the protocol-specific fields SHOULD (or MUST) be
protected
by redundancy needs to go here.

   Redundancy based header validation can be built from simple logic
   (e.g., XORs and comparisons). Header validation based on redundancy
   also is a step wise process in that the first word is validated,
   then the second, then the third and so on. A decision that a
   candidate header is not valid may be reached before the complete
   header is available.

[E] First sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 3.2.2

   CRC based header validation employs a straight forward algorithm
   (e.g., compute the CRC for all bytes preceding the CRC word and
   compare the results to the CRC word's contents). The number of
   comparisons required to perform CRC validation is exactly one and
   the method for computing the CRC is well known with proven
   implementations.

[E] Last sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 4 - Measuring Fibre Channel frame transit time

   To comply with FC-FS [3], an FC Fabric must specify and limit the
   lifetime of a frame.

[E] Same comment as before about referencing FC-FS.  Can this be changed
to
reference FC-PH with a note that FC-FS won't change this ... or is FC-FS
tinkering with things here?

   When originating an encapsulated frame, an entity that does not
   support transit time calculation SHALL always set the Time Stamp
   [integer] and Time Stamp [fraction] fields to zero. When receiving
   an encapsulated frame, an entity that does not support transit time
   calculation SHALL ignore the contents of the Time Stamp words. The
   protocol SHALL specify whether or not implementation support is
   required.

[T] This is about "MUST/SHOULD/MAY implement".  Need a similar
requirement
on the protocol to specify "MUST/SHOULD/MAY use" and under what
conditions.

   The policy for processing frames while in the Unsynchronized state
   SHALL be defined by the protocol specification, including whether or
   not the entity may continue to send and receive frames from the IP
   network.

[T] On the receive side, this condition appears to be specified in the
wrong direction.  Receiving frames from the IP network cannot possibly
cause
problems, the issues are in forwarding (stale) frames into FC.

   When de-encapsulating a frame, an entity in the Synchronized state
   SHALL:

[E] While the sub-bullets are correct, they leave a reader unfamiliar
with FC somewhat high and dry.  I would include a "for example" in both
a) and b), along the lines of:
 
	a) For example, if a calculated transit time exceeds a value
that
		could cause the frame to violate FC maximum time in
transit
		limits (Time Out Values), the protocol may specify that
the
		frame is to be discarded.
	b) For example, a protocol may specify that frames for which
transit
		time cannot be determined are never to be forwarded over
FC.


[T] At the end of this section, it would be good to warn protocol
designers
that well-designed protocols are unlikely to accomplish useful
communication
when the communicating entities are in different states, and hence
protocol
designers need to consider how to coordinate state transitions,
especially
the Unsynchronized to Synchronized transition on startup and an
unexpected
Synchronized to Unsynchronized transition (e.g., caused by loss of
contact
with an external time service).  This is related to some issues that
Mallikarjun
found.

-- Section 5 - The FC frame
-- Section 5.1 - FC frame content

   As shown in figure 4, the FC frame content is defined as the data
   between the EOF and SOF delimiters (including the FC CRC) after
   conversion from FC-1 to FC-2 format as specified by FC-FS [3].

[E] This needs some more explanation.  The important things that need to
be said are:
	- FC uses the same 8b/10b encoding as Gigabit Ethernet in which
		each 8 bit byte is transmitted using 10 bits on the wire
		for reasons that include redundancy and low level timing
		synchronization between sender and receiver.
	- All discussion of FC frame content in this draft is at the 8b
		level prior to 8b->10b expansion on send or after
10b->8b
		reduction on receive.
The Gigabit Ethernet reference is particularly important in increasing
accessibility of this document to a network-savvy, but new to FC
audience.

-- Section 5.3 - FC SOF and EOF
 
   The FC frame content is composed of 8-bit bytes that can be
   translated directly for transmission over TCP. The FC SOF and EOF
   [3] require 8b/10b special characters that cannot be translated
   directly to 8-bit bytes, encoded values are required.

[E] I think this paragraph needs to be moved to Section 5.1, and
replaced
with a sentence here that refers back to it.  One important editorial
change is "8b/10b special characters that cannot be translated directly
to 8-bit bytes" should be changed to "10b special characters that have
no 8b equivalents" or something like that.

   SOF (bits 31-24 and bits 23-16 in word 0): The SOF fields contain
   the encoded SOF value selected from table 1.

[T] As we've learned from the Class 4 adventure, this table is subject
to change/extension.  IANA will need to manage it, and will need some
sort of allocation guidelines to remain consistent with whatever
mechanism
produced this peculiar set of values.  While we probably don't want to
allow value recycling, we may want to write some text dealing with
retiring values (making them no longer usable).  This also applies to
the
EOF values in Table 2.

   Note: FC-BB-2 [6] lists SOF and EOF codes not shown in table 1 and
   table 2 (e.g., SOFi1 and SOFn1). However, FC-MI [7] identifies these
   codes as not interoperable, so they are not listed in this
   specification.

[T] There are a couple of problems here.  If FC-BB-2 has assigned values
to SOF and EOF encodings that MUST NOT be used with FCIP, then we need
to
instruct IANA to reserve and not allocate those values.  As part of
allocating future values in this table, we need to (1) instruct the
author(s)
of the draft/RFC doing the allocation to ensure that T11.3 review of the
proposed allocation is obtained (2) that the IPS WG chair(s) (if the IPS
WG still exists) and the Transport ADs are informed of this review, and
(3) that IANA allocates the values approved by T11.3 as opposed to
choosing
values.  Since Murali's been appointed as T11's official liaison to
IETF,
I think it's his responsibility to suggest a coordination process.

-- Section 7 - Normative References

I would really like to remove the normative reference to FC-FS,
substituting
FC-PH with a note that FC-FS will replace FC-PH.  I don't object to an
FC-FS
reference where it's really needed, but the portions of FC-FS that this
draft
relies on are sufficiently basic and stable that an FC-PH reference will
make
their stability clear.  The FC-BB-2 and FC-MI references for SOF and EOF
codes
need to become non-normative as part of setting up the IANA registry and
management
process.  The FC-SW-2 reference may not need to be normative here.

RFC 1700 is almost certainly the wrong reference to instruct IANA on
what
procedures to follow.  See RFC 2434 for guidance on this topic, although
it
may
not be necessary to reference it.

-- ANNEX A - Protocol Requirements

[E] I think this should be an Appendix, rather than an Annex.  Some
changes
may be in order here based on the above comments.

-- ANNEX B - IANA Considerations

[T] This needs to be made somewhat more explicit and direct.  IANA is
looking for
simple straightforward instructions roughly of the form "IANA is
instructed
to
do <X>".  in particular, the following sentence is a problem:

   Standards action on this RFC should be accompanied by IANA
   assignment of the following two Protocol# values:

It should read something like:

   In addition to creating the FC Encapsulation Protocol Number
Registry,
   the standards action of this RFC allocates the following
   two values from this registry:

While one normally asks IANA to allocate values, the exception is that
when creating a registry, one can instruct IANA as to what the initial
contents are (i.e., a new registry does not have to be created empty).

[T] Also, earlier comments suggest that the Protocol# registry needs to
be
expanded with a CRC field (Yes/No) and that registries need to be
created
for the SOF and EOF values.

   It is requested that the ips working group chairs or the
   Transport Services area directors be notified when any new Protocol#
   value assignment is requested.

[T] Given that an approved RFC is required, this sentence seems
redundant.
If the intent was notification of the IPS WG chairs and/or ADs when a
an I-D draft is submitted that will cause a Protocol# assignment if/when
approved as an RFC, the language needs to say that and should be
rephrased to require notification of the IP Storage WG chairs (don't
use WG acronyms here) and notification of the Transport ADs instead
in the case that the IPS WG does not exist or is not active.

[T] Also see previous comments about needing to set up an IANA
registry for SOF and EOF values.  I'll work with Ralph on crafting the
right IANA instructions.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------



From owner-ips@ece.cmu.edu  Mon Mar 18 20:11:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA28083
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 20:11:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2J0MXE17879
	for ips-outgoing; Mon, 18 Mar 2002 19:22:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2J0MVw17874
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 19:22:31 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <G9K0BWYH>; Mon, 18 Mar 2002 19:22:15 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F584E@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: MaxCmdSN and the I bit
Date: Mon, 18 Mar 2002 19:22:13 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CEDC.1DE86120"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CEDC.1DE86120
Content-Type: text/plain;
	charset="iso-8859-1"

1) Section 2.2.2.1 Command Numbering and Acknowledging says

    MaxCmdSN - the maximum number to be shipped.
 
But can't anything with the I bit set take on MaxCmdSN+1? If so, should this
say "for non-immediate commands, the maximum number ..."? If so, there are a
couple of other places to update as well (like 9.4.10).
 
2) Is there any reason why the "I" bit would be used with a SCSI Command? I
ask this because all SCSI commands have to pass to the SCSI layer and there
would be no way to throttle them when the "I" bit is set.
 
3) Section 9.4.9 ExpCmdSN - Next Expected CmdSN from this Initiator says: 

    An ExpCmdSN equal to MaxCmdSN+1
    indicates that the target cannot accept new commands.

But it could if the "I" bit was set and your answer to #2 above is "yes",
correct?

Eddy

------_=_NextPart_001_01C1CEDC.1DE86120
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.00.2920.0" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002><FONT color=#0000ff face=Courier size=2>1) Section 
<FONT face=Courier>2.2.2.1 Command Numbering and Acknowledging</FONT> 
says<BR><BR>&nbsp;&nbsp;&nbsp; MaxCmdSN - the maximum number to be 
shipped.</FONT></SPAN></SPAN></FONT></DIV>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002><FONT color=#0000ff 
face=Courier></FONT></SPAN></SPAN></FONT><FONT size=2>&nbsp;</FONT></DIV>
<DIV><SPAN class=153273722-18032002><SPAN class=602433222-18032002><FONT 
color=#0000ff face=Courier size=2>But can't anything<SPAN 
class=428161900-19032002> with t</SPAN><SPAN class=428161900-19032002>he 
I&nbsp;</SPAN><SPAN class=428161900-19032002>bit set</SPAN> take on 
MaxCmdSN+1?&nbsp;If so, should this say "for non-immediate commands, the 
maximum<SPAN class=428161900-19032002> number</SPAN> ..."? If so, there are a 
couple of other places to update as well (like 
9.4.10).</FONT></SPAN></SPAN></DIV>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002><FONT color=#0000ff 
face=Courier></FONT></SPAN></SPAN></FONT><FONT size=2>&nbsp;</FONT></DIV>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002><FONT color=#0000ff face=Courier size=2>2) Is there any 
reason why the "I" bit would be used with a SCSI Command? I ask this 
because&nbsp;all SCSI commands have to pass to the SCSI layer and there would be 
no way to throttle them when the "I" bit is 
set.</FONT></SPAN></SPAN></FONT></DIV>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002></SPAN></SPAN></FONT><FONT size=2>&nbsp;</FONT></DIV>
<DIV><SPAN class=153273722-18032002><SPAN class=602433222-18032002><FONT 
size=2><FONT color=#0000ff face=Courier>3) Section </FONT><FONT 
color=#0000ff><FONT face=Courier>9.4.9 ExpCmdSN - Next Expected CmdSN from this 
Initiator<SPAN class=153273722-18032002> says:</SPAN></FONT></FONT> </FONT>
<P align=left><FONT size=2><FONT color=#0000ff><FONT face=Courier><SPAN 
class=153273722-18032002>&nbsp;&nbsp;&nbsp; </SPAN>An ExpCmdSN equal to 
MaxCmdSN+1<BR><SPAN class=153273722-18032002>&nbsp;&nbsp;&nbsp; </SPAN>indicates 
that the target cannot accept new commands.</FONT></FONT></FONT></P>
<P align=left><FONT color=#0000ff face=Courier size=2><SPAN 
class=153273722-18032002>But it could if the "I" bit was set and your answer to 
#2 above is "yes", correct?</SPAN></FONT></P></SPAN></SPAN></DIV>
<DIV><FONT face=Arial><SPAN class=153273722-18032002><SPAN 
class=602433222-18032002><FONT color=#0000ff face=Courier 
size=2>Eddy</FONT></SPAN></SPAN></FONT></DIV></FONT></DIV></BODY></HTML>

------_=_NextPart_001_01C1CEDC.1DE86120--


From owner-ips@ece.cmu.edu  Mon Mar 18 21:38:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA00031
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 21:38:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2J1rjT22421
	for ips-outgoing; Mon, 18 Mar 2002 20:53:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2J1rhw22416;
	Mon, 18 Mar 2002 20:53:43 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id CAA45680;
	Tue, 19 Mar 2002 02:53:36 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2J1rZI164448;
	Tue, 19 Mar 2002 02:53:36 +0100
To: "Randy Jennings" <randyj@data-transit.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: LUN or Reserved in R2T packet
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF2E47527D.E3345543-ONC2256B81.000946B8@telaviv.ibm.com>
Date: Tue, 19 Mar 2002 03:53:33 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 19/03/2002 03:53:36,
	Serialize complete at 19/03/2002 03:53:36
Content-Type: multipart/alternative; boundary="=_alternative 0009DCAEC2256B81_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0009DCAEC2256B81_=
Content-Type: text/plain; charset="us-ascii"

No sorry - the LUN is mandatory in R2T (ITT and TTT are too).  I fixed the 
figure.

Thanks,
Julo




"Randy Jennings" <randyj@data-transit.com>
Sent by: owner-ips@ece.cmu.edu
18-03-02 23:09
Please respond to "Randy Jennings"

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        LUN or Reserved in R2T packet

 

I am guessing that the same rules for the LUN field in Data-In/Data-Out 
PDUs
applies also to R2T (IOW, if TTT is 0xffffffff, then the LUN is reserved).
Currently, intuition dictates this and not the spec...

Am I correct?

Sincerely
Randy Jennings
Data Transit




--=_alternative 0009DCAEC2256B81_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">No sorry - the LUN is mandatory in R2T (ITT and TTT are too). &nbsp;I fixed the figure.</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Randy Jennings&quot; &lt;randyj@data-transit.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">18-03-02 23:09</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Randy Jennings&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;LUN or Reserved in R2T packet</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">I am guessing that the same rules for the LUN field in Data-In/Data-Out PDUs<br>
applies also to R2T (IOW, if TTT is 0xffffffff, then the LUN is reserved).<br>
Currently, intuition dictates this and not the spec...<br>
<br>
Am I correct?<br>
<br>
Sincerely<br>
Randy Jennings<br>
Data Transit<br>
<br>
</font>
<br>
<br>
--=_alternative 0009DCAEC2256B81_=--


From owner-ips@ece.cmu.edu  Mon Mar 18 21:40:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA00654
	for <ips-archive@lists.ietf.org>; Mon, 18 Mar 2002 21:40:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2J1rvs22437
	for ips-outgoing; Mon, 18 Mar 2002 20:53:57 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mx1.liteontc.com.tw ([210.208.245.15])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2J1rsw22429
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 20:53:54 -0500 (EST)
From: Raymond_Shiu@liteontc.com
To: ips@ece.cmu.edu
Subject: remove
Date: Tue, 19 Mar 2002 09:25:47 +0800
Message-ID: <OF36B4BC37.A64AE334-ON48256B81.0007DAD4@liteontc.com.tw>
X-MIMETrack: Serialize by Router on tpe-smtp/tpe/liteon(Release 5.0.8 |June 18, 2001) at
 2002/03/19 09:53:45 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

remove



From owner-ips@ece.cmu.edu  Tue Mar 19 01:52:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA07615
	for <ips-archive@lists.ietf.org>; Tue, 19 Mar 2002 01:52:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2J69Kl05151
	for ips-outgoing; Tue, 19 Mar 2002 01:09:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2J69Iw05143
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 01:09:18 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id BAA40370;
	Tue, 19 Mar 2002 01:04:21 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2J67Xx189668;
	Mon, 18 Mar 2002 23:07:41 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iSCSI: New Suggested Wordage to cover TPGTs
To: Santosh Rao <santoshr@cup.hp.com>
Cc: ips@ece.cmu.edu, "Mallikarjun C." <cbm@rose.hp.com>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF73F91464.CCFC1590-ON88256B81.001F7333@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Mon, 18 Mar 2002 22:06:47 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/18/2002 11:07:41 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Santosh, (I also omitted the fact that Mallikarjun was also part of the
agreement.)
All these items were examined, in a lot of detail, and we think the wordage
was a reasonable compromise (no one got every thing they wanted).
Especially since many folks did not believe there was a "real" problem (but
we do not want us to dig that up again).  This was a painful deal but, we
have a deal, that we are committed to support.  And unless it is broken, we
do not want to adjust it further.

I you want further explanation, please contact me off the list, and I will
take you through the details (a number of folks have told me today that
they were bored with this topic.)

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Santosh Rao <santoshr@cup.hp.com>@ece.cmu.edu on 03/18/2002 02:30:20 PM

Sent by:    owner-ips@ece.cmu.edu


To:    ips@ece.cmu.edu
cc:
Subject:    Re: iSCSI: New Suggested Wordage to cover TPGTs



Hello,

Thanks for addressing this issue. Some comments inline.

Regards,
Santosh


John Hufferd wrote:
>
> The Naming and Discovery Team (NDT) and Julian, have had meetings on the
> issue
> of TPGT. These meetings were to address the TPGT issue express on this
> reflector.  The following is the recomendation of the extended NDT:
>
> In section 4.3 (possibly as the last paragraph on page 63 of rev11) -
>
> The first Login Response PDU during the Login phase from the iSCSI target
> SHOULD return the TargetPortalGroupTag key that contains the tag value of
> the iSCSI portal group servicing the the Login Request PDU.

Can we alter the above SHOULD to MUST and remove the sentence below ? Is
there any target out there that will not support the addition of a
network portal into a portal group ? (At least the initial configuration
of a target involves the addition of a portal to a portal group ?)

To reduce options and keep the authentication foolproof, it would be
good to mandate that the targets return their TPGT. Not doing so will
expose initiators to the whims of the target implementation.

The authentication is desired by the initiating side and it must have
control over the ability to authenticate. Hence, if we cannot mandate
that targets always send their TPGT in login response, one of the below
2 approaches are possible alternatives, which give the initiator control
over the authentication :

1) Initiators that are interested in authentication send a
TargetPortalGroupTag=?
in their login request to query the target for its TPGT and authenticate
the response. Target MUST respond with the current TPGT for that network
portal.

2) Initiators send the intended destination TPGT as a part of the login
request and the target MUST authenticate the intended TPGT with the
current TPGT. On an authentication failure, target MUST reject the
login.

Both of the above alternatives allow the initiator to ensure that
authentication is performed, instead of depending on the target to
support sending its TPGT in the login response.

> If the iSCSI
> target implementation supports altering the portal group configuration
> (including adding, deleting, and swapping of portals in a portal group),
it
> MUST return the TargetPortalGroupTag key carrying the tag value of the
> servicing portal group.


> If the reconfiguration of iSCSI portal groups is a
> concern in a given environment, the iSCSI initiator MUST use this key to
> ascertain that it had indeed initiated the Login phase with the intended
> target portal group.

To reduce options and keep the authentication process foolproof, suggest
making this authentication un-conditional. i.e. Remove "If the
reconfiguration of iSCSI portal groups is a concern in a given
environment,"


>
> In chapter 11 (possibly as section 11.5) -
>
> 11.5  TargetPortalGroupTag
>
> Use: IO by target, Declarative
> Senders: Target
> Scope: SW
>
> TargetPortalGroupTag=<integer-from-0-to-65535>
>
> Examples:
> TargetPortalGroupTag=1
>
> Target portal group tag is a 16-bit integer that uniquely identifies a
> portal group within an iSCSI target node.  This key carries the value of
> the
> tag that is servicing the Login request.  The iSCSI target returns this
key
> to the initiator in the first Login Response PDU.
> For the complete usage expectations of this key, refer to section 4.3.


--
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################





From owner-ips@ece.cmu.edu  Tue Mar 19 09:45:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA23114
	for <ips-archive@lists.ietf.org>; Tue, 19 Mar 2002 09:45:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JE2DA04685
	for ips-outgoing; Tue, 19 Mar 2002 09:02:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JE2Aw04680;
	Tue, 19 Mar 2002 09:02:10 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id PAA20160;
	Tue, 19 Mar 2002 15:01:31 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2JE12U31058;
	Tue, 19 Mar 2002 15:01:03 +0100
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: MaxCmdSN and the I bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF625275ED.6FF03A9F-ONC2256B81.004A9B68@telaviv.ibm.com>
Date: Tue, 19 Mar 2002 16:00:54 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 19/03/2002 16:01:03,
	Serialize complete at 19/03/2002 16:01:03
Content-Type: multipart/alternative; boundary="=_alternative 004B3B01C2256B81_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004B3B01C2256B81_=
Content-Type: text/plain; charset="us-ascii"

Eddy,

Comments in text.

Julo




Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Sent by: owner-ips@ece.cmu.edu
19-03-02 02:22
Please respond to Eddy Quicksall

 
        To:     "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: MaxCmdSN and the I bit

 

1) Section 2.2.2.1 Command Numbering and Acknowledging says

    MaxCmdSN - the maximum number to be shipped.
 
But can't anything with the I bit set take on MaxCmdSN+1? If so, should 
this say "for non-immediate commands, the maximum number ..."? If so, 
there are a couple of other places to update as well (like 9.4.10).

+++ I'll fix the wording. +++
 
2) Is there any reason why the "I" bit would be used with a SCSI Command? 
I ask this because all SCSI commands have to pass to the SCSI layer and 
there would be no way to throttle them when the "I" bit is set.
 
+++ There is no reason to stop an implementor doing it as long as it know 
that it can neither throttle no recover them.
E.G. a device may require an "urgent mechanical recalibration".  As a rule 
we did not introduce limitation unless they where mandated by the protocol 
logic.
+++

3) Section 9.4.9 ExpCmdSN - Next Expected CmdSN from this Initiator says: 
    An ExpCmdSN equal to MaxCmdSN+1
    indicates that the target cannot accept new commands.
But it could if the "I" bit was set and your answer to #2 above is "yes", 
correct?
+++ correct - I'll say non-immediate commands - +++
Eddy


--=_alternative 004B3B01C2256B81_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Eddy,</font>
<br>
<br><font size=2 face="sans-serif">Comments in text.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Eddy Quicksall &lt;Eddy_Quicksall@ivivity.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">19-03-02 02:22</font>
<br><font size=1 face="sans-serif">Please respond to Eddy Quicksall</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;ips@ece. cmu. edu (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: MaxCmdSN and the I bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 color=blue face="Courier">1) Section 2.2.2.1 Command Numbering and Acknowledging says<br>
<br>
 &nbsp; &nbsp;MaxCmdSN - the maximum number to be shipped.</font>
<br><font size=2 face="Arial">&nbsp;</font>
<br><font size=2 color=blue face="Courier">But can't anything with the I bit set take on MaxCmdSN+1? If so, should this say &quot;for non-immediate commands, the maximum number ...&quot;? If so, there are a couple of other places to update as well (like 9.4.10).</font>
<br>
<br><font size=2 face="Arial">+++ I'll fix the wording. +++</font>
<br><font size=2 face="Arial">&nbsp;</font>
<br><font size=2 color=blue face="Courier">2) Is there any reason why the &quot;I&quot; bit would be used with a SCSI Command? I ask this because all SCSI commands have to pass to the SCSI layer and there would be no way to throttle them when the &quot;I&quot; bit is set.</font>
<br><font size=2 face="Arial">&nbsp;</font>
<br><font size=2 face="Arial">+++ There is no reason to stop an implementor doing it as long as it know that it can neither throttle no recover them.</font>
<br><font size=2 face="Arial">E.G. a device may require an &quot;urgent mechanical recalibration&quot;. &nbsp;As a rule we did not introduce limitation unless they where mandated by the protocol logic.</font>
<br><font size=2 face="Arial">+++</font>
<br>
<br><font size=2 color=blue face="Courier">3) Section 9.4.9 ExpCmdSN - Next Expected CmdSN from this Initiator says:</font><font size=2 face="Arial"> </font>
<p><font size=2 color=blue face="Courier">&nbsp; &nbsp; An ExpCmdSN equal to MaxCmdSN+1<br>
 &nbsp; &nbsp;indicates that the target cannot accept new commands.</font>
<p><font size=2 color=blue face="Courier">But it could if the &quot;I&quot; bit was set and your answer to #2 above is &quot;yes&quot;, correct?</font>
<p><font size=2 color=red face="sans-serif"><b>+++ correct - I'll say non-immediate commands - +++</b></font>
<p><font size=2 color=blue face="Courier">Eddy</font>
<p>
<p>
--=_alternative 004B3B01C2256B81_=--


From owner-ips@ece.cmu.edu  Tue Mar 19 10:57:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA25038
	for <ips-archive@lists.ietf.org>; Tue, 19 Mar 2002 10:57:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JF8KB09045
	for ips-outgoing; Tue, 19 Mar 2002 10:08:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from smtp-send.myrealbox.com (smtp-send.myrealbox.com [192.108.102.143])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2J4tkw01787
	for <ips@ece.cmu.edu>; Mon, 18 Mar 2002 23:55:46 -0500 (EST)
Received: from sanquery [202.56.254.13] by myrealbox.com
	with NIMS ModWeb Module; Tue, 19 Mar 2002 04:55:05 +0000
Subject: Asynchronous events at the target
From: sanquery <sanquery@myrealbox.com>
To: ips@ece.cmu.edu
Date: Tue, 19 Mar 2002 04:55:05 +0000
X-Mailer: NIMS ModWeb Module
X-Sender: sanquery
MIME-Version: 1.0
Message-ID: <1016513705.4c517ff7sanquery@myrealbox.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2J4tkw01790
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Hi all,
  I wanted to know is there any means by which an initiator can be notified of some asynchronous events at the target. 
 According to SAM2(Page 73), Asynchronous Event Reporting takes place when one of the following events occur:
a)An exception condition was encountered after command completion;
b)A newly initialized device is available;
c)Some other type of unit attention condition has occured; or
d)An asynchronous event has occured.

How does the notification for a newly initialized device available at the target go to the Initiator? Is it done by suddenly sending an Asynchronous PDU with an Async Event value of 0 corresponding to Sense Data? Or is there any other means of handling this notification?

Regards,
Sanquery.






From owner-ips@ece.cmu.edu  Tue Mar 19 12:56:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA29019
	for <ips-archive@lists.ietf.org>; Tue, 19 Mar 2002 12:56:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JGlbD16170
	for ips-outgoing; Tue, 19 Mar 2002 11:47:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from lakemtao04.cox.net (lakemtao04.cox.net [68.1.17.241])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JGlYw16164
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 11:47:34 -0500 (EST)
Received: from CX418298C ([68.5.217.92]) by lakemtao04.cox.net
          (InterMail vM.5.01.04.05 201-253-122-122-105-20011231) with SMTP
          id <20020319164728.LWHG10840.lakemtao04.cox.net@CX418298C>;
          Tue, 19 Mar 2002 11:47:28 -0500
From: "Murali Rajagopal" <muralir@cox.net>
To: "Elizabeth G. Rodriguez" <Elizabeth.G.Rodriguez@123mail.net>,
        <Black_David@emc.com>, <ips@ece.cmu.edu>
Subject: RE: FC Encapsulation WG Last Call comments
Date: Tue, 19 Mar 2002 08:48:00 -0800
Keywords: IETF-IPS
Message-ID: <BMEMKGJGDIECPINNKIGEKELKDBAA.muralir@cox.net>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
In-Reply-To: <000001c1ced8$231ebf80$28b73fa6@EGRodriguez>
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


A little background history on SOF/EOF may help ...

SOF/EOF codes were introduced by me in T11/FC-BB about 3 years ago. The
codes were derived from a chip implementation at Gadzoox (and another
company). Since then, a number of implementations exist in the FIELD which
use these byte-encodings. While a large number of these codes were defined,
a number of them were not initially supported in FC-BB. The expectation was
someday they may come into use. An example of this is Class 4 codes. Given
this background, these codes cannot be arbitarily changed or redefined. The
end consumer of these codes lies clearly in the T11 community quite
independent of the Internet. As such, it is not appropriate for IANA to
manage these codes.

Hope this helps.

Murali Rajagopal

FCIP Technical Coordinator
T11/FC-BB-2 Editor

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Elizabeth G. Rodriguez
Sent: Monday, March 18, 2002 3:54 PM
To: Black_David@emc.com; ips@ece.cmu.edu
Subject: RE: FC Encapsulation WG Last Call comments


Hi David,

	[T] As we've learned from the Class 4 adventure, this table is
subject
	to change/extension.  IANA will need to manage it, and will need
some
	sort of allocation guidelines to remain consistent with whatever
mechanism produced this peculiar set of values.  While we probably
	don't want to allow value recycling, we may want to write some
text
	dealing with retiring values (making them no longer usable).
This
	also applies to the EOF values in Table 2.

I think there is a misconception with the EOF/SOF encodings.
The encodings themselves have been fairly stable for some time.
The issues that came about recently is identifying which encodings
pertained to Class 4 specifically -- that was not obvious.

In any case, even if the encodings were not stable, SOF/EOF encodings
are in the domain of INCITS and the FC-FS/FC-BB/2 documents.  I do not
see how we can have IANA govern these encodings.

Thanks,

Elizabeth

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu] On Behalf Of
Black_David@emc.com
Sent: Sunday, March 17, 2002 11:31 PM
To: ips@ece.cmu.edu
Subject: FC Encapsulation WG Last Call comments

Comments flagged with [E] for editorial, [T] for technical.

----- FC Encapsulation -06 -----

-- Section 1 - Scope

   The organization responsible for the Fibre Channel standards (NCITS
   Technical Committee T11) has determined that some functions and
   modes of operation are not interoperable to the degree required by
   the IETF. This draft includes applicable T11 interoperability
   determinations in the form of restrictions on the use of this
   encapsulation mechanism.

[E] Is there an official citation for this statement?  It really needs
one
to be published in an archival unchangeable format such as an RFC.

-- Section 2 - Encapsulation Concepts

	FC frames have several possible lengths.

[E] Should read "variable length" or something like that - this implies
several possible choices of fixed length, which is incorrect.

   To facilitate transporting FC frames over TCP the native FC frame
needs
   to be contained in (encapsulated in) a slightly larger structure as
   shown in figure 1.

[E] The use of TCP in this context is overly restrictive.  This
encapsulation
is in principle applicable to any means of transport over IP, including
TCP, SCTP, UDP, and carrier pigeon ;-), even though in practice all the
initial uses will use TCP.

   The format and content of an FC frame is described in the FC

[E] "is" --> "are"

-- Section 3 - The FC Encapsulation Header
-- Section 3.1 - FC Encapsulation Header Format

   The values in the Protocol# field are assigned by
   IANA [8]. The following values are known to be in use:

    - FCIP -- TO BE ASSIGNED by IANA
    - iFCP -- TO BE ASSIGNED by IANA

[T] Delete the text starting with "The following values" and insert
a forward reference to the IANA Consideration section.

   FC Encapsulation receivers may compare the Protocol# and -Protocol#
   fields as an additional verification that an FC Encapsulation Header
   is being processed.

   FC Encapsulation
   receivers may compare the Version and -Version fields as an
   additional verification that an FC Encapsulation Header is being
   processed.

[T] Those "may"s are misleading.  I think "SHOULD" is appropriate, but I
could
accept "SHOULD"s that only applied when the CRC is not valid.

   Flags (bits 31-26 in word 3): The Flags bits provide information
   about the usage of the FC Encapsulation Header as shown in figure 3.

   Note: Implementers are advised to consult the specifications of
   protocols that use this header to determine how each individual
   protocol uses the bits in the Flags field.

[T] The "Note:" paragraph is part of the CRCV issue (see below), and
probably
needs to be deleted as part of resolving that issue.  This paragraph
also
has the additional problem in that it implies that protocol specific
uses
of the reserved flags are allowed, which is not the case.

   Reserved (Flags, bits 31-27 in word 3): These bits are reserved for
   use by future versions of the FC Encapsulation and SHALL be set to
   zero on send. Protocols employing this encapsulation MAY require
   checking for zero on receive, however doing so has the potential to
   create incompatibilities with future versions of this encapsulation.

[E] Second sentence is poorly worded.  Suggested rewrite: Protocols
employing
this encapsulation SHOULD ignore the Reserved bits on receive in order
to avoid creating incompatibilities with possible future versions of
this
encapsulation.  I believe this change is editorial, and it also applies
to the -Flags and -Frame Length fields.

   CRCV (CRC Valid Flag, bit 26 in word 3): A CRCV bit value of one
   indicates that the contents of the CRC field are valid. A CRCV bit
   value of zero indicates that CRC are invalid. Some protocols may
   always check the CRC without regard for the state of this bit. The
   value of the CRCV bit SHALL be constant for all FC Encapsulation
   Headers sent on a given TCP connection.

[T] The "Some protocols may always check the CRC ..." is the CRCV issue
that Mallikarjun also found and that has been problematic in the past.
I believe that what's going on here is that all protocols have to check
the Protocol#, and once that's been checked, the implementation knows
whether there's supposed to be a CRC there and hence doesn't need to
look at CRCV.  In practice this won't cause problems, as including the
CRC when it's not supposed to be there is harmless, and failing to
include it when it should be there will almost certainly cause a CRC
check failure.

I offer a proposal to resolve this by expanding the Protocol
# registry that IANA will create so that each registered protocol
must supply not only its name and an RFC reference, but also whether
the protocol uses (Yes) or does not use (No) the CRC in this header.
The above text could then be revised to make the CRCV check at the
receiver OPTIONAL in all cases because its value can be inferred
from the protocol#.

[E] Also need to generalize away from TCP connection to allow possible
future
use with other transports.

[T] Here or in the description of the Protocol Specific fields, a
warning
to implementers is needed says some sort of error checking redundancy
(e.g., the ones complements found elsewhere in the header) SHOULD (or
MUST)
be used when the CRC is not used.  This warning should be duplicated
in Section 3.2.1.  This is a technical comment, but should not be
controversial.

   Time Stamp [integer] and Time Stamp [fraction] (words 4 and 5): The
   two Time Stamp fields contain time at which the FC Encapsulated
   frame was sent as known to the sender. The format of integer and
   fraction Time Stamp word values is specified in Simple Network Time
   Protocol (SNTP) Version 4 [9]. The contents of the Time Stamp
   [integer] and Time Stamp [fraction] words SHALL be set as described
   in section 4.

[E] For convenience, it might be good to summarize those formats here
with
an indication that [9] is the normative authority.  I don't feel
strongly
about this, though.

[T] We have a problem here - RFC 2030 is Informational, and hence can't
be referenced in a normative fashion from a standards track document.
I'll
talk to Ralph offline about how to get around this.

   CRC (word 6): When the CRCV Flag bit is zero, the CRC field SHALL
   contain zero. When the CRCV Flag bit is one, the CRC field SHALL
   contain a CRC for words 0 to 5 of the FC Encapsulation Header
   computed using the polynomial, initial value, and bit order defined
   for Fibre Channel in FC-FS [3]. Using this algorithm, the bit order
   of the resulting CRC corresponds to that of FC-1 layer. The CRC
   transmitted over the IP network shall correspond to the equivalent
   value converted to FC-2 format as specified in FC-FS.

[E] I realize that FC-FS is the latest and greatest version of the FC
frame standard, BUT, referencing a project in progress for this sort of
basic CRC mechanism is an invitation to procedural problems.  Can this
reference be changed to FC-PH accompanied by a note that FC-FS is
supplanting FC-PH, but will make *no* changes in this area?  Note that
I'm comfortable with the earlier reference to FC-FS for frame contents.

-- Section 3.2.1

[T] The warning that the protocol-specific fields SHOULD (or MUST) be
protected
by redundancy needs to go here.

   Redundancy based header validation can be built from simple logic
   (e.g., XORs and comparisons). Header validation based on redundancy
   also is a step wise process in that the first word is validated,
   then the second, then the third and so on. A decision that a
   candidate header is not valid may be reached before the complete
   header is available.

[E] First sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 3.2.2

   CRC based header validation employs a straight forward algorithm
   (e.g., compute the CRC for all bytes preceding the CRC word and
   compare the results to the CRC word's contents). The number of
   comparisons required to perform CRC validation is exactly one and
   the method for computing the CRC is well known with proven
   implementations.

[E] Last sentence is superfluous and probably should be deleted as it's
rather hardware-oriented.

-- Section 4 - Measuring Fibre Channel frame transit time

   To comply with FC-FS [3], an FC Fabric must specify and limit the
   lifetime of a frame.

[E] Same comment as before about referencing FC-FS.  Can this be changed
to
reference FC-PH with a note that FC-FS won't change this ... or is FC-FS
tinkering with things here?

   When originating an encapsulated frame, an entity that does not
   support transit time calculation SHALL always set the Time Stamp
   [integer] and Time Stamp [fraction] fields to zero. When receiving
   an encapsulated frame, an entity that does not support transit time
   calculation SHALL ignore the contents of the Time Stamp words. The
   protocol SHALL specify whether or not implementation support is
   required.

[T] This is about "MUST/SHOULD/MAY implement".  Need a similar
requirement
on the protocol to specify "MUST/SHOULD/MAY use" and under what
conditions.

   The policy for processing frames while in the Unsynchronized state
   SHALL be defined by the protocol specification, including whether or
   not the entity may continue to send and receive frames from the IP
   network.

[T] On the receive side, this condition appears to be specified in the
wrong direction.  Receiving frames from the IP network cannot possibly
cause
problems, the issues are in forwarding (stale) frames into FC.

   When de-encapsulating a frame, an entity in the Synchronized state
   SHALL:

[E] While the sub-bullets are correct, they leave a reader unfamiliar
with FC somewhat high and dry.  I would include a "for example" in both
a) and b), along the lines of:

	a) For example, if a calculated transit time exceeds a value
that
		could cause the frame to violate FC maximum time in
transit
		limits (Time Out Values), the protocol may specify that
the
		frame is to be discarded.
	b) For example, a protocol may specify that frames for which
transit
		time cannot be determined are never to be forwarded over
FC.


[T] At the end of this section, it would be good to warn protocol
designers
that well-designed protocols are unlikely to accomplish useful
communication
when the communicating entities are in different states, and hence
protocol
designers need to consider how to coordinate state transitions,
especially
the Unsynchronized to Synchronized transition on startup and an
unexpected
Synchronized to Unsynchronized transition (e.g., caused by loss of
contact
with an external time service).  This is related to some issues that
Mallikarjun
found.

-- Section 5 - The FC frame
-- Section 5.1 - FC frame content

   As shown in figure 4, the FC frame content is defined as the data
   between the EOF and SOF delimiters (including the FC CRC) after
   conversion from FC-1 to FC-2 format as specified by FC-FS [3].

[E] This needs some more explanation.  The important things that need to
be said are:
	- FC uses the same 8b/10b encoding as Gigabit Ethernet in which
		each 8 bit byte is transmitted using 10 bits on the wire
		for reasons that include redundancy and low level timing
		synchronization between sender and receiver.
	- All discussion of FC frame content in this draft is at the 8b
		level prior to 8b->10b expansion on send or after
10b->8b
		reduction on receive.
The Gigabit Ethernet reference is particularly important in increasing
accessibility of this document to a network-savvy, but new to FC
audience.

-- Section 5.3 - FC SOF and EOF

   The FC frame content is composed of 8-bit bytes that can be
   translated directly for transmission over TCP. The FC SOF and EOF
   [3] require 8b/10b special characters that cannot be translated
   directly to 8-bit bytes, encoded values are required.

[E] I think this paragraph needs to be moved to Section 5.1, and
replaced
with a sentence here that refers back to it.  One important editorial
change is "8b/10b special characters that cannot be translated directly
to 8-bit bytes" should be changed to "10b special characters that have
no 8b equivalents" or something like that.

   SOF (bits 31-24 and bits 23-16 in word 0): The SOF fields contain
   the encoded SOF value selected from table 1.

[T] As we've learned from the Class 4 adventure, this table is subject
to change/extension.  IANA will need to manage it, and will need some
sort of allocation guidelines to remain consistent with whatever
mechanism
produced this peculiar set of values.  While we probably don't want to
allow value recycling, we may want to write some text dealing with
retiring values (making them no longer usable).  This also applies to
the
EOF values in Table 2.

   Note: FC-BB-2 [6] lists SOF and EOF codes not shown in table 1 and
   table 2 (e.g., SOFi1 and SOFn1). However, FC-MI [7] identifies these
   codes as not interoperable, so they are not listed in this
   specification.

[T] There are a couple of problems here.  If FC-BB-2 has assigned values
to SOF and EOF encodings that MUST NOT be used with FCIP, then we need
to
instruct IANA to reserve and not allocate those values.  As part of
allocating future values in this table, we need to (1) instruct the
author(s)
of the draft/RFC doing the allocation to ensure that T11.3 review of the
proposed allocation is obtained (2) that the IPS WG chair(s) (if the IPS
WG still exists) and the Transport ADs are informed of this review, and
(3) that IANA allocates the values approved by T11.3 as opposed to
choosing
values.  Since Murali's been appointed as T11's official liaison to
IETF,
I think it's his responsibility to suggest a coordination process.

-- Section 7 - Normative References

I would really like to remove the normative reference to FC-FS,
substituting
FC-PH with a note that FC-FS will replace FC-PH.  I don't object to an
FC-FS
reference where it's really needed, but the portions of FC-FS that this
draft
relies on are sufficiently basic and stable that an FC-PH reference will
make
their stability clear.  The FC-BB-2 and FC-MI references for SOF and EOF
codes
need to become non-normative as part of setting up the IANA registry and
management
process.  The FC-SW-2 reference may not need to be normative here.

RFC 1700 is almost certainly the wrong reference to instruct IANA on
what
procedures to follow.  See RFC 2434 for guidance on this topic, although
it
may
not be necessary to reference it.

-- ANNEX A - Protocol Requirements

[E] I think this should be an Appendix, rather than an Annex.  Some
changes
may be in order here based on the above comments.

-- ANNEX B - IANA Considerations

[T] This needs to be made somewhat more explicit and direct.  IANA is
looking for
simple straightforward instructions roughly of the form "IANA is
instructed
to
do <X>".  in particular, the following sentence is a problem:

   Standards action on this RFC should be accompanied by IANA
   assignment of the following two Protocol# values:

It should read something like:

   In addition to creating the FC Encapsulation Protocol Number
Registry,
   the standards action of this RFC allocates the following
   two values from this registry:

While one normally asks IANA to allocate values, the exception is that
when creating a registry, one can instruct IANA as to what the initial
contents are (i.e., a new registry does not have to be created empty).

[T] Also, earlier comments suggest that the Protocol# registry needs to
be
expanded with a CRC field (Yes/No) and that registries need to be
created
for the SOF and EOF values.

   It is requested that the ips working group chairs or the
   Transport Services area directors be notified when any new Protocol#
   value assignment is requested.

[T] Given that an approved RFC is required, this sentence seems
redundant.
If the intent was notification of the IPS WG chairs and/or ADs when a
an I-D draft is submitted that will cause a Protocol# assignment if/when
approved as an RFC, the language needs to say that and should be
rephrased to require notification of the IP Storage WG chairs (don't
use WG acronyms here) and notification of the Transport ADs instead
in the case that the IPS WG does not exist or is not active.

[T] Also see previous comments about needing to set up an IANA
registry for SOF and EOF values.  I'll work with Ralph on crafting the
right IANA instructions.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------



From owner-ips@ece.cmu.edu  Tue Mar 19 14:20:04 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01168
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 14:20:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JIVP222858
	for ips-outgoing; Tue, 19 Mar 2002 13:31:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JIVJw22847
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 13:31:19 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLGL7L>; Tue, 19 Mar 2002 12:31:13 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631DE@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Rev 11 minor issues
Date: Tue, 19 Mar 2002 12:27:04 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CF73.AB19D4B0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CF73.AB19D4B0
Content-Type: text/plain;
	charset="iso-8859-1"

Just want to verify something.  Is it possible to have multiple Initiator
identities (i.e.: InitiatorName=) on the same session through different
connections?  If not, why is InitiatorName negotiation required on ancillary
connections.  If iSCSI doesn't allow for multiple initiators per session,
then all it's doing is requiring another check for the target; that the same
InitiatorName is given for all connections on the session.

Example .. on the leading session connection, the initiator says:

InitiatorName=Fred

Then on an ancillary connection the initiator says:

InitiatorName=Bob

Now the target would have to trap this and zap the connection.  Why not just
assume the same InitiatorName as the session and let authentication verify
it?  This eliminates the extra negotiation check on the target.


4.3

The initial login request of any connection MUST include the InitiatorName
key=value pair. 


  _____  

8.1.2 & 11

"SW" and "CO" ?  Can the abbreviation be dropped and replaced with the full
description?  "Session-Wide" and "Connection-Wide" should fit on the line.


------_=_NextPart_001_01C1CF73.AB19D4B0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<TITLE></TITLE>

<META content=3D"MSHTML 5.50.4611.1300" name=3DGENERATOR></HEAD>
<BODY>
<P><SPAN class=3D673425220-18032002>Just want to verify =
something.&nbsp; Is it=20
possible to have multiple Initiator identities (i.e.: InitiatorName=3D) =
on the=20
same session through different connections?&nbsp; If not, why is=20
</SPAN>InitiatorName&nbsp;negotiation<SPAN class=3D673425220-18032002> =
required=20
</SPAN>on <SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">ancillary<SPAN=20
class=3D673425220-18032002> </SPAN></SPAN>connections<SPAN=20
class=3D673425220-18032002>.</SPAN><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">&nbsp;<SPAN=20
class=3D673425220-18032002> If iSCSI doesn't allow for multiple =
initiators per=20
session, then&nbsp;all it's doing is requiring another check for the =
target;=20
</SPAN>that the same InitiatorName is given for&nbsp;<SPAN=20
class=3D673425220-18032002>all </SPAN>connection<SPAN=20
class=3D673425220-18032002>s</SPAN> on the session<SPAN=20
class=3D673425220-18032002>.</SPAN></SPAN></P>
<P><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA"><SPAN=20
class=3D673425220-18032002>Example .. </SPAN>on the leading&nbsp;<SPAN=20
class=3D673425220-18032002>session </SPAN>connection, the initiator=20
says:</SPAN></P>
<P><FONT face=3D"Arial Black"><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">InitiatorName=3DFred</SPAN></FONT></P>
<P><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">Then=20
on an <SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">ancillary<SPAN=20
class=3D673425220-18032002> </SPAN></SPAN>connection the initiator=20
says:</SPAN></P>
<P><FONT face=3D"Arial Black"><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA">InitiatorName=3DBob</SPAN></FONT></P>
<P><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: =
'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: =
EN-US; mso-bidi-language: AR-SA"><SPAN=20
class=3D673425220-18032002>Now the target would have to trap this and =
zap the=20
connection.&nbsp; </SPAN>Why not just assume the same =
InitiatorName<SPAN=20
class=3D673425220-18032002> as the session</SPAN>&nbsp;<SPAN=20
class=3D673425220-18032002>and let authentication verify it?&nbsp; This =
eliminates=20
the extra negotiation check on the target.</SPAN></SPAN></P>
<P><FONT size=3D2><FONT face=3DArial size=3D2><SPAN=20
style=3D"FONT-SIZE: 12pt; FONT-FAMILY: 'Times New Roman'; =
mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times=
 New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; =
mso-bidi-language: AR-SA"></SPAN></FONT><FONT=20
face=3DArial></FONT><FONT face=3DArial></FONT><FONT =
face=3DArial></FONT><FONT=20
face=3DArial></FONT><BR>4.3</FONT></P>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <P><FONT size=3D2><U>The initial login request of any connection MUST =
include=20
  the InitiatorName key=3Dvalue pair.</U> </FONT></P></BLOCKQUOTE>
<P dir=3Dltr>
<HR>

<P></P>
<P dir=3Dltr><FONT size=3D2>8.1.2 &amp; 11</FONT></P>
<P dir=3Dltr>"SW" and "CO"&nbsp;<SPAN =
class=3D673425220-18032002>?&nbsp;=20
</SPAN><SPAN class=3D673425220-18032002>Can the =
</SPAN>abbreviation<SPAN=20
class=3D673425220-18032002> be dropped and replaced with the full =
description?=20
</SPAN>&nbsp;"Session-Wide" and "Connection-Wide"<SPAN =
class=3D673425220-18032002>=20
should fit on the line.</SPAN></P>
<P dir=3Dltr></P></BODY></HTML>

------_=_NextPart_001_01C1CF73.AB19D4B0--


From owner-ips@ece.cmu.edu  Tue Mar 19 14:20:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01198
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 14:20:43 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JIpXk24340
	for ips-outgoing; Tue, 19 Mar 2002 13:51:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JIpVw24330
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 13:51:31 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel13.hp.com (Postfix) with ESMTP
	id 1F90640044A; Tue, 19 Mar 2002 10:51:25 -0800 (PST)
Received: from swathi (pal1nai162252.nsr.hp.com [15.244.162.252]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA19987; Tue, 19 Mar 2002 10:53:04 -0800 (PST)
Message-ID: <003201c1cf77$0f8dbe90$12a3f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Randy Jennings" <randyj@data-transit.com>, <ips@ece.cmu.edu>
References: <COEGLIGPOPIONLAIFKDNAEDKCAAA.randyj@data-transit.com>
Subject: Re: Full Feature Phase and Digests
Date: Tue, 19 Mar 2002 10:51:18 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Randy,

Sorry for the delay in responding to this...

> Is there a difference between S5: LOGGED_IN and Full Feature Phase (a.k.a.
> full-feature phase in some parts of the document; it would be nice if they
> were all the same

LOGGED_IN marks the beginning of the full-feature phase, IN_LOGOUT
and LOGOUT_REQUESTED (states S6 and S8) also are full-feature phase
states.  

> If so, and I understand the digest section, neither the logout or login
> PDU's will have digests on them.  I believe this holds even after the first
> connection of the session, because later connections are not yet in Full
> Feature Phase (S5).

Logout may have digests if so negotiated -  please refer section 9.14.

In short, every PDU that is used in FFP (i.e. any PDU other than Login and Login 
Response PDUs) may have digests if so negotiated - section 11.1 clearly states this.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Randy Jennings" <randyj@data-transit.com>
To: <ips@ece.cmu.edu>
Sent: Wednesday, March 13, 2002 9:25 AM
Subject: Full Feature Phase and Digests


> I am not sure if this is the place for me to ask this question, so forgive
> me if I am out of line.
> 
> Is there a difference between S5: LOGGED_IN and Full Feature Phase (a.k.a.
> full-feature phase in some parts of the document; it would be nice if they
> were all the same; I am not a regex guru)?
> 
> If so, and I understand the digest section, neither the logout or login
> PDU's will have digests on them.  I believe this holds even after the first
> connection of the session, because later connections are not yet in Full
> Feature Phase (S5).
> 
> I.e.  Only iSCSI op codes 0x00, 0x01, 0x02, 0x04, 0x05, 0x010, 0x1c-0x1e
> (maybe) for the initiator, and 0x20, 0x21, 0x22, 0x24, 0x25, 0x31, 0x32,
> 0x3c-0x3e (maybe), 0x3f for the target (anything not Logout or Login) will
> have the Digests and they must have them if stated in Login of the session?
> 
> Am I right?
> 
> TIA
> 
> Sincerely,
> Randy Jennings
> Data Transit
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 19 14:23:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01297
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 14:23:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JIpTQ24326
	for ips-outgoing; Tue, 19 Mar 2002 13:51:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JIpRw24321
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 13:51:27 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP
	id 92573C004BD; Tue, 19 Mar 2002 10:51:21 -0800 (PST)
Received: from swathi (pal1nai162252.nsr.hp.com [15.244.162.252]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA19977; Tue, 19 Mar 2002 10:53:02 -0800 (PST)
Message-ID: <003101c1cf77$0ead2290$12a3f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Randy Jennings" <randyj@data-transit.com>, <ips@ece.cmu.edu>
References: <COEGLIGPOPIONLAIFKDNAEDKCAAA.randyj@data-transit.com>
Subject: Re: Full Feature Phase and Digests
Date: Tue, 19 Mar 2002 10:50:45 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Randy,

Sorry for the delay in responding to this...

> Is there a difference between S5: LOGGED_IN and Full Feature Phase (a.k.a.
> full-feature phase in some parts of the document; it would be nice if they
> were all the same

LOGGED_IN marks the beginning of the full-feature phase, IN_LOGOUT
and LOGOUT_REQUESTED (states S6 and S8) also are full-feature phase
states.  

> If so, and I understand the digest section, neither the logout or login
> PDU's will have digests on them.  I believe this holds even after the first
> connection of the session, because later connections are not yet in Full
> Feature Phase (S5).

Logout may have digests if so negotiated -  please refer section 9.14.

In short, every PDU that is used in FFP (i.e. any PDU other than Login and Login 
Response PDUs) may have digests if so negotiated - section 11.1 clearly states this.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Randy Jennings" <randyj@data-transit.com>
To: <ips@ece.cmu.edu>
Sent: Wednesday, March 13, 2002 9:25 AM
Subject: Full Feature Phase and Digests


> I am not sure if this is the place for me to ask this question, so forgive
> me if I am out of line.
> 
> Is there a difference between S5: LOGGED_IN and Full Feature Phase (a.k.a.
> full-feature phase in some parts of the document; it would be nice if they
> were all the same; I am not a regex guru)?
> 
> If so, and I understand the digest section, neither the logout or login
> PDU's will have digests on them.  I believe this holds even after the first
> connection of the session, because later connections are not yet in Full
> Feature Phase (S5).
> 
> I.e.  Only iSCSI op codes 0x00, 0x01, 0x02, 0x04, 0x05, 0x010, 0x1c-0x1e
> (maybe) for the initiator, and 0x20, 0x21, 0x22, 0x24, 0x25, 0x31, 0x32,
> 0x3c-0x3e (maybe), 0x3f for the target (anything not Logout or Login) will
> have the Digests and they must have them if stated in Login of the session?
> 
> Am I right?
> 
> TIA
> 
> Sincerely,
> Randy Jennings
> Data Transit
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 19 15:33:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA03055
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 15:33:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JJgt728305
	for ips-outgoing; Tue, 19 Mar 2002 14:42:55 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop2.snjs.qwest.net (snjspop2.snjs.qwest.net [168.103.24.2])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2JJgmw28288
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 14:42:48 -0500 (EST)
Received: (qmail 22103 invoked from network); 19 Mar 2002 19:42:47 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop2.snjs.qwest.net with SMTP; 19 Mar 2002 19:42:47 -0000
Date: Tue, 19 Mar 2002 09:16:57 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNIEENCAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu
Subject: RE: Full Feature Phase and Digests
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
In-Reply-To: <003101c1cf77$0ead2290$12a3f40f@rose.hp.com>
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Okay, I understand my question now.  Thank you for explaining it to me.

> In short, every PDU that is used in FFP (i.e. any PDU other than
> Login and Login
> Response PDUs) may have digests if so negotiated - section 11.1
> clearly states this.

What you say makes sense.  Take a look at the "Symbolic names for States"
under table 5.1.2 for my confusion on LOGGED_IN.  I think that is its
source.

Also, I searched on full feature phase, full-feature phase, and Full Feature
Phase (Did I miss any?  FullFeaturePhase is a bit name and understandably a
different object.), but I am still having trouble understanding when the
connection leaves Full Feature Phase.

Is it when both sides have sent the TCP FIN bit, or does it end when sending
a certain iSCSI PDU?  I am inclined to believe the former for simplicity's
sake.  The text talks about Full Feature Phase ending as a target/initiator
session attribute, but not Full Feature Phase ending as a connection
attribute as far as I can tell.  (Full Feature Phase is an attribute of the
connection according to the last partial sentence on page 36).

Or is this picking nits?

Sincerely,
Randy Jennings
Data Transit



From owner-ips@ece.cmu.edu  Tue Mar 19 16:19:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA04275
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 16:19:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JKYJm02902
	for ips-outgoing; Tue, 19 Mar 2002 15:34:19 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JKYFw02896
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 15:34:15 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel12.hp.com (Postfix) with ESMTP
	id B3E256003D0; Tue, 19 Mar 2002 12:34:13 -0800 (PST)
Received: from swathi (pal1nai163059.nsr.hp.com [15.244.163.59]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id MAA07815; Tue, 19 Mar 2002 12:35:55 -0800 (PST)
Message-ID: <006701c1cf85$6e00a2e0$12a3f40f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Randy Jennings" <randyj@data-transit.com>, <ips@ece.cmu.edu>
References: <COEGLIGPOPIONLAIFKDNIEENCAAA.randyj@data-transit.com>
Subject: Re: Full Feature Phase and Digests
Date: Tue, 19 Mar 2002 12:34:11 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Randy,

First off, there was a typo in my earlier email -

" LOGGED_IN marks the beginning of the full-feature phase, IN_LOGOUT
  and LOGOUT_REQUESTED (states S6 and S8) .."

I should have typed "S7" instead of "S8" - sorry.

Thanks for pointing out 5.1.2!  I will remove the paranthesized text,
and add the above clarification instead to the text.

You aren't nit-picking - these are the questions we asked earlier ourselves.
I believe the first para on page 37 answers your questions - FFP ends 
right after Logout Response (sent/received based on the role) if Logout did
take place, or else on transport connection removal.

Thanks!
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Randy Jennings" <randyj@data-transit.com>
To: "Mallikarjun C." <cbm@rose.hp.com>; <ips@ece.cmu.edu>
Sent: Tuesday, March 19, 2002 9:16 AM
Subject: RE: Full Feature Phase and Digests


> Okay, I understand my question now.  Thank you for explaining it to me.
> 
> > In short, every PDU that is used in FFP (i.e. any PDU other than
> > Login and Login
> > Response PDUs) may have digests if so negotiated - section 11.1
> > clearly states this.
> 
> What you say makes sense.  Take a look at the "Symbolic names for States"
> under table 5.1.2 for my confusion on LOGGED_IN.  I think that is its
> source.
> 
> Also, I searched on full feature phase, full-feature phase, and Full Feature
> Phase (Did I miss any?  FullFeaturePhase is a bit name and understandably a
> different object.), but I am still having trouble understanding when the
> connection leaves Full Feature Phase.
> 
> Is it when both sides have sent the TCP FIN bit, or does it end when sending
> a certain iSCSI PDU?  I am inclined to believe the former for simplicity's
> sake.  The text talks about Full Feature Phase ending as a target/initiator
> session attribute, but not Full Feature Phase ending as a connection
> attribute as far as I can tell.  (Full Feature Phase is an attribute of the
> connection according to the last partial sentence on page 36).
> 
> Or is this picking nits?
> 
> Sincerely,
> Randy Jennings
> Data Transit
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 19 17:35:56 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06485
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 17:35:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2JLgdL08651
	for ips-outgoing; Tue, 19 Mar 2002 16:42:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from imo-r02.mx.aol.com (imo-r02.mx.aol.com [152.163.225.98])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2JLgYw08635
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 16:42:35 -0500 (EST)
Received: from ISCSIPerson@aol.com
	by imo-r02.mx.aol.com (mail_out_v32.5.) id 3.123.d8a0501 (1322)
	 for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 16:42:11 -0500 (EST)
From: ISCSIPerson@aol.com
Message-ID: <123.d8a0501.29c90ab3@aol.com>
Date: Tue, 19 Mar 2002 16:42:11 EST
Subject: iSCSI Rev 11 - Version Number Conflict
To: ips@ece.cmu.edu
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="part1_123.d8a0501.29c90ab3_boundary"
X-Mailer: AOL 6.0 for Windows US sub 10564
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


--part1_123.d8a0501.29c90ab3_boundary
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit

Folks,

I don't want to start another BIG discussion but ...

As I was looking over iSCSI Rev 11, I noticed that the change log stated that 
the current Version Number is "0x04," but in the Login Request area (9.12.4) 
it says "0x00."

Which one should I pay attention to?

Thanks,

Greg A.


--part1_123.d8a0501.29c90ab3_boundary
Content-Type: text/html; charset="US-ASCII"
Content-Transfer-Encoding: 7bit

<HTML><FONT FACE=arial,helvetica><FONT  SIZE=3>Folks,
<BR>
<BR>I don't want to start another BIG discussion but ...
<BR>
<BR>As I was looking over iSCSI Rev 11, I noticed that the change log stated that the current Version Number is "0x04," but in the Login Request area (9.12.4) it says "0x00."
<BR>
<BR>Which one should I pay attention to?
<BR>
<BR>Thanks,
<BR>
<BR>Greg A.
<BR></FONT></HTML>

--part1_123.d8a0501.29c90ab3_boundary--


From owner-ips@ece.cmu.edu  Tue Mar 19 21:26:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA10594
	for <ips-archive@odin.ietf.org>; Tue, 19 Mar 2002 21:26:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2K1cSj21690
	for ips-outgoing; Tue, 19 Mar 2002 20:38:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop2.snjs.qwest.net (snjspop2.snjs.qwest.net [168.103.24.2])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2K1cPw21685
	for <ips@ece.cmu.edu>; Tue, 19 Mar 2002 20:38:26 -0500 (EST)
Received: (qmail 79592 invoked from network); 20 Mar 2002 01:06:21 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop2.snjs.qwest.net with SMTP; 20 Mar 2002 01:06:21 -0000
Date: Tue, 19 Mar 2002 14:40:27 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNEEEPCAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: ips@ece.cmu.edu
Subject: NOP-In and NOP-Out
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I noticed in NOP-Out on page 175 last paragraph of 9.18.1 that it does not
say if the CmdSN field is reserved if the ITT is valid (not 0xffffffff),
only that the field is CmdSN is good when the ITT is not valid.  The PDU
diagram does not say that it would not be the CmdSN.

Is the CmdSN always valid, or is it reserved some of the time?

I have the exact same question about StatSN (reference pg 177 section
9.19.1).

Sincerely,
Randy Jennings
Data Transit



From owner-ips@ece.cmu.edu  Wed Mar 20 02:58:25 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA25935
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 02:58:24 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2K77mY07588
	for ips-outgoing; Wed, 20 Mar 2002 02:07:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic1.isus.emc.com ([168.159.129.100])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2K77lw07584
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 02:07:47 -0500 (EST)
Received: by mxic1.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <H2MCQLNK>; Wed, 20 Mar 2002 02:07:20 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293760E@CORPMX14>
From: Black_David@emc.com
To: muralir@cox.net, ips@ece.cmu.edu
Subject: RE: FC Encapsulation WG Last Call comments
Date: Wed, 20 Mar 2002 02:07:20 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Murali,

Ralph and I had essentially the same discussion.  Based on the
recent volatility of these codes for some of the IETF IPS uses,
and the fact that work on figuring out which ones to use had
extended back to Orlando, well over a year ago, I was concerned
that these codes were in a sufficient state of flux that
IANA was needed to stabilize the situation.

Given that the codes have normative definitions in FC-BB, and those
definitions are stable (the IETF issues have been merely which
ones to use, and those should [finally] be settled), referencing
FC-BB as the source of these definitions will be fine, and I'm
sure IANA will appreciate one less registry to manage.

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------

> -----Original Message-----
> From: Murali Rajagopal [mailto:muralir@cox.net]
> Sent: Tuesday, March 19, 2002 11:48 AM
> To: Elizabeth G. Rodriguez; Black_David@emc.com; ips@ece.cmu.edu
> Subject: RE: FC Encapsulation WG Last Call comments
> 
> 
> 
> A little background history on SOF/EOF may help ...
> 
> SOF/EOF codes were introduced by me in T11/FC-BB about 3 
> years ago. The
> codes were derived from a chip implementation at Gadzoox (and another
> company). Since then, a number of implementations exist in 
> the FIELD which
> use these byte-encodings. While a large number of these codes 
> were defined,
> a number of them were not initially supported in FC-BB. The 
> expectation was
> someday they may come into use. An example of this is Class 4 
> codes. Given
> this background, these codes cannot be arbitarily changed or 
> redefined. The
> end consumer of these codes lies clearly in the T11 community quite
> independent of the Internet. As such, it is not appropriate 
> for IANA to
> manage these codes.
> 
> Hope this helps.
> 
> Murali Rajagopal
> 
> FCIP Technical Coordinator
> T11/FC-BB-2 Editor
> 
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Elizabeth G. Rodriguez
> Sent: Monday, March 18, 2002 3:54 PM
> To: Black_David@emc.com; ips@ece.cmu.edu
> Subject: RE: FC Encapsulation WG Last Call comments
> 
> 
> Hi David,
> 
> 	[T] As we've learned from the Class 4 adventure, this table is
> subject
> 	to change/extension.  IANA will need to manage it, and will need
> some
> 	sort of allocation guidelines to remain consistent with whatever
> mechanism produced this peculiar set of values.  While we probably
> 	don't want to allow value recycling, we may want to write some
> text
> 	dealing with retiring values (making them no longer usable).
> This
> 	also applies to the EOF values in Table 2.
> 
> I think there is a misconception with the EOF/SOF encodings.
> The encodings themselves have been fairly stable for some time.
> The issues that came about recently is identifying which encodings
> pertained to Class 4 specifically -- that was not obvious.
> 
> In any case, even if the encodings were not stable, SOF/EOF encodings
> are in the domain of INCITS and the FC-FS/FC-BB/2 documents.  I do not
> see how we can have IANA govern these encodings.
> 
> Thanks,
> 
> Elizabeth
> 
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu] On 
> Behalf Of
> Black_David@emc.com
> Sent: Sunday, March 17, 2002 11:31 PM
> To: ips@ece.cmu.edu
> Subject: FC Encapsulation WG Last Call comments
> 
> Comments flagged with [E] for editorial, [T] for technical.
> 
> ----- FC Encapsulation -06 -----
> 
> -- Section 1 - Scope
> 
>    The organization responsible for the Fibre Channel standards (NCITS
>    Technical Committee T11) has determined that some functions and
>    modes of operation are not interoperable to the degree required by
>    the IETF. This draft includes applicable T11 interoperability
>    determinations in the form of restrictions on the use of this
>    encapsulation mechanism.
> 
> [E] Is there an official citation for this statement?  It really needs
> one
> to be published in an archival unchangeable format such as an RFC.
> 
> -- Section 2 - Encapsulation Concepts
> 
> 	FC frames have several possible lengths.
> 
> [E] Should read "variable length" or something like that - 
> this implies
> several possible choices of fixed length, which is incorrect.
> 
>    To facilitate transporting FC frames over TCP the native FC frame
> needs
>    to be contained in (encapsulated in) a slightly larger structure as
>    shown in figure 1.
> 
> [E] The use of TCP in this context is overly restrictive.  This
> encapsulation
> is in principle applicable to any means of transport over IP, 
> including
> TCP, SCTP, UDP, and carrier pigeon ;-), even though in 
> practice all the
> initial uses will use TCP.
> 
>    The format and content of an FC frame is described in the FC
> 
> [E] "is" --> "are"
> 
> -- Section 3 - The FC Encapsulation Header
> -- Section 3.1 - FC Encapsulation Header Format
> 
>    The values in the Protocol# field are assigned by
>    IANA [8]. The following values are known to be in use:
> 
>     - FCIP -- TO BE ASSIGNED by IANA
>     - iFCP -- TO BE ASSIGNED by IANA
> 
> [T] Delete the text starting with "The following values" and insert
> a forward reference to the IANA Consideration section.
> 
>    FC Encapsulation receivers may compare the Protocol# and -Protocol#
>    fields as an additional verification that an FC 
> Encapsulation Header
>    is being processed.
> 
>    FC Encapsulation
>    receivers may compare the Version and -Version fields as an
>    additional verification that an FC Encapsulation Header is being
>    processed.
> 
> [T] Those "may"s are misleading.  I think "SHOULD" is 
> appropriate, but I
> could
> accept "SHOULD"s that only applied when the CRC is not valid.
> 
>    Flags (bits 31-26 in word 3): The Flags bits provide information
>    about the usage of the FC Encapsulation Header as shown in 
> figure 3.
> 
>    Note: Implementers are advised to consult the specifications of
>    protocols that use this header to determine how each individual
>    protocol uses the bits in the Flags field.
> 
> [T] The "Note:" paragraph is part of the CRCV issue (see below), and
> probably
> needs to be deleted as part of resolving that issue.  This paragraph
> also
> has the additional problem in that it implies that protocol specific
> uses
> of the reserved flags are allowed, which is not the case.
> 
>    Reserved (Flags, bits 31-27 in word 3): These bits are reserved for
>    use by future versions of the FC Encapsulation and SHALL be set to
>    zero on send. Protocols employing this encapsulation MAY require
>    checking for zero on receive, however doing so has the potential to
>    create incompatibilities with future versions of this 
> encapsulation.
> 
> [E] Second sentence is poorly worded.  Suggested rewrite: Protocols
> employing
> this encapsulation SHOULD ignore the Reserved bits on receive in order
> to avoid creating incompatibilities with possible future versions of
> this
> encapsulation.  I believe this change is editorial, and it 
> also applies
> to the -Flags and -Frame Length fields.
> 
>    CRCV (CRC Valid Flag, bit 26 in word 3): A CRCV bit value of one
>    indicates that the contents of the CRC field are valid. A CRCV bit
>    value of zero indicates that CRC are invalid. Some protocols may
>    always check the CRC without regard for the state of this bit. The
>    value of the CRCV bit SHALL be constant for all FC Encapsulation
>    Headers sent on a given TCP connection.
> 
> [T] The "Some protocols may always check the CRC ..." is the 
> CRCV issue
> that Mallikarjun also found and that has been problematic in the past.
> I believe that what's going on here is that all protocols 
> have to check
> the Protocol#, and once that's been checked, the implementation knows
> whether there's supposed to be a CRC there and hence doesn't need to
> look at CRCV.  In practice this won't cause problems, as including the
> CRC when it's not supposed to be there is harmless, and failing to
> include it when it should be there will almost certainly cause a CRC
> check failure.
> 
> I offer a proposal to resolve this by expanding the Protocol
> # registry that IANA will create so that each registered protocol
> must supply not only its name and an RFC reference, but also whether
> the protocol uses (Yes) or does not use (No) the CRC in this header.
> The above text could then be revised to make the CRCV check at the
> receiver OPTIONAL in all cases because its value can be inferred
> from the protocol#.
> 
> [E] Also need to generalize away from TCP connection to allow possible
> future
> use with other transports.
> 
> [T] Here or in the description of the Protocol Specific fields, a
> warning
> to implementers is needed says some sort of error checking redundancy
> (e.g., the ones complements found elsewhere in the header) SHOULD (or
> MUST)
> be used when the CRC is not used.  This warning should be duplicated
> in Section 3.2.1.  This is a technical comment, but should not be
> controversial.
> 
>    Time Stamp [integer] and Time Stamp [fraction] (words 4 and 5): The
>    two Time Stamp fields contain time at which the FC Encapsulated
>    frame was sent as known to the sender. The format of integer and
>    fraction Time Stamp word values is specified in Simple Network Time
>    Protocol (SNTP) Version 4 [9]. The contents of the Time Stamp
>    [integer] and Time Stamp [fraction] words SHALL be set as described
>    in section 4.
> 
> [E] For convenience, it might be good to summarize those formats here
> with
> an indication that [9] is the normative authority.  I don't feel
> strongly
> about this, though.
> 
> [T] We have a problem here - RFC 2030 is Informational, and 
> hence can't
> be referenced in a normative fashion from a standards track document.
> I'll
> talk to Ralph offline about how to get around this.
> 
>    CRC (word 6): When the CRCV Flag bit is zero, the CRC field SHALL
>    contain zero. When the CRCV Flag bit is one, the CRC field SHALL
>    contain a CRC for words 0 to 5 of the FC Encapsulation Header
>    computed using the polynomial, initial value, and bit order defined
>    for Fibre Channel in FC-FS [3]. Using this algorithm, the bit order
>    of the resulting CRC corresponds to that of FC-1 layer. The CRC
>    transmitted over the IP network shall correspond to the equivalent
>    value converted to FC-2 format as specified in FC-FS.
> 
> [E] I realize that FC-FS is the latest and greatest version of the FC
> frame standard, BUT, referencing a project in progress for 
> this sort of
> basic CRC mechanism is an invitation to procedural problems.  Can this
> reference be changed to FC-PH accompanied by a note that FC-FS is
> supplanting FC-PH, but will make *no* changes in this area?  Note that
> I'm comfortable with the earlier reference to FC-FS for frame 
> contents.
> 
> -- Section 3.2.1
> 
> [T] The warning that the protocol-specific fields SHOULD (or MUST) be
> protected
> by redundancy needs to go here.
> 
>    Redundancy based header validation can be built from simple logic
>    (e.g., XORs and comparisons). Header validation based on redundancy
>    also is a step wise process in that the first word is validated,
>    then the second, then the third and so on. A decision that a
>    candidate header is not valid may be reached before the complete
>    header is available.
> 
> [E] First sentence is superfluous and probably should be 
> deleted as it's
> rather hardware-oriented.
> 
> -- Section 3.2.2
> 
>    CRC based header validation employs a straight forward algorithm
>    (e.g., compute the CRC for all bytes preceding the CRC word and
>    compare the results to the CRC word's contents). The number of
>    comparisons required to perform CRC validation is exactly one and
>    the method for computing the CRC is well known with proven
>    implementations.
> 
> [E] Last sentence is superfluous and probably should be 
> deleted as it's
> rather hardware-oriented.
> 
> -- Section 4 - Measuring Fibre Channel frame transit time
> 
>    To comply with FC-FS [3], an FC Fabric must specify and limit the
>    lifetime of a frame.
> 
> [E] Same comment as before about referencing FC-FS.  Can this 
> be changed
> to
> reference FC-PH with a note that FC-FS won't change this ... 
> or is FC-FS
> tinkering with things here?
> 
>    When originating an encapsulated frame, an entity that does not
>    support transit time calculation SHALL always set the Time Stamp
>    [integer] and Time Stamp [fraction] fields to zero. When receiving
>    an encapsulated frame, an entity that does not support transit time
>    calculation SHALL ignore the contents of the Time Stamp words. The
>    protocol SHALL specify whether or not implementation support is
>    required.
> 
> [T] This is about "MUST/SHOULD/MAY implement".  Need a similar
> requirement
> on the protocol to specify "MUST/SHOULD/MAY use" and under what
> conditions.
> 
>    The policy for processing frames while in the Unsynchronized state
>    SHALL be defined by the protocol specification, including 
> whether or
>    not the entity may continue to send and receive frames from the IP
>    network.
> 
> [T] On the receive side, this condition appears to be specified in the
> wrong direction.  Receiving frames from the IP network cannot possibly
> cause
> problems, the issues are in forwarding (stale) frames into FC.
> 
>    When de-encapsulating a frame, an entity in the Synchronized state
>    SHALL:
> 
> [E] While the sub-bullets are correct, they leave a reader unfamiliar
> with FC somewhat high and dry.  I would include a "for 
> example" in both
> a) and b), along the lines of:
> 
> 	a) For example, if a calculated transit time exceeds a value
> that
> 		could cause the frame to violate FC maximum time in
> transit
> 		limits (Time Out Values), the protocol may specify that
> the
> 		frame is to be discarded.
> 	b) For example, a protocol may specify that frames for which
> transit
> 		time cannot be determined are never to be forwarded over
> FC.
> 
> 
> [T] At the end of this section, it would be good to warn protocol
> designers
> that well-designed protocols are unlikely to accomplish useful
> communication
> when the communicating entities are in different states, and hence
> protocol
> designers need to consider how to coordinate state transitions,
> especially
> the Unsynchronized to Synchronized transition on startup and an
> unexpected
> Synchronized to Unsynchronized transition (e.g., caused by loss of
> contact
> with an external time service).  This is related to some issues that
> Mallikarjun
> found.
> 
> -- Section 5 - The FC frame
> -- Section 5.1 - FC frame content
> 
>    As shown in figure 4, the FC frame content is defined as the data
>    between the EOF and SOF delimiters (including the FC CRC) after
>    conversion from FC-1 to FC-2 format as specified by FC-FS [3].
> 
> [E] This needs some more explanation.  The important things 
> that need to
> be said are:
> 	- FC uses the same 8b/10b encoding as Gigabit Ethernet in which
> 		each 8 bit byte is transmitted using 10 bits on the wire
> 		for reasons that include redundancy and low level timing
> 		synchronization between sender and receiver.
> 	- All discussion of FC frame content in this draft is at the 8b
> 		level prior to 8b->10b expansion on send or after
> 10b->8b
> 		reduction on receive.
> The Gigabit Ethernet reference is particularly important in increasing
> accessibility of this document to a network-savvy, but new to FC
> audience.
> 
> -- Section 5.3 - FC SOF and EOF
> 
>    The FC frame content is composed of 8-bit bytes that can be
>    translated directly for transmission over TCP. The FC SOF and EOF
>    [3] require 8b/10b special characters that cannot be translated
>    directly to 8-bit bytes, encoded values are required.
> 
> [E] I think this paragraph needs to be moved to Section 5.1, and
> replaced
> with a sentence here that refers back to it.  One important editorial
> change is "8b/10b special characters that cannot be 
> translated directly
> to 8-bit bytes" should be changed to "10b special characters that have
> no 8b equivalents" or something like that.
> 
>    SOF (bits 31-24 and bits 23-16 in word 0): The SOF fields contain
>    the encoded SOF value selected from table 1.
> 
> [T] As we've learned from the Class 4 adventure, this table is subject
> to change/extension.  IANA will need to manage it, and will need some
> sort of allocation guidelines to remain consistent with whatever
> mechanism
> produced this peculiar set of values.  While we probably don't want to
> allow value recycling, we may want to write some text dealing with
> retiring values (making them no longer usable).  This also applies to
> the
> EOF values in Table 2.
> 
>    Note: FC-BB-2 [6] lists SOF and EOF codes not shown in table 1 and
>    table 2 (e.g., SOFi1 and SOFn1). However, FC-MI [7] 
> identifies these
>    codes as not interoperable, so they are not listed in this
>    specification.
> 
> [T] There are a couple of problems here.  If FC-BB-2 has 
> assigned values
> to SOF and EOF encodings that MUST NOT be used with FCIP, then we need
> to
> instruct IANA to reserve and not allocate those values.  As part of
> allocating future values in this table, we need to (1) instruct the
> author(s)
> of the draft/RFC doing the allocation to ensure that T11.3 
> review of the
> proposed allocation is obtained (2) that the IPS WG chair(s) 
> (if the IPS
> WG still exists) and the Transport ADs are informed of this 
> review, and
> (3) that IANA allocates the values approved by T11.3 as opposed to
> choosing
> values.  Since Murali's been appointed as T11's official liaison to
> IETF,
> I think it's his responsibility to suggest a coordination process.
> 
> -- Section 7 - Normative References
> 
> I would really like to remove the normative reference to FC-FS,
> substituting
> FC-PH with a note that FC-FS will replace FC-PH.  I don't object to an
> FC-FS
> reference where it's really needed, but the portions of FC-FS 
> that this
> draft
> relies on are sufficiently basic and stable that an FC-PH 
> reference will
> make
> their stability clear.  The FC-BB-2 and FC-MI references for 
> SOF and EOF
> codes
> need to become non-normative as part of setting up the IANA 
> registry and
> management
> process.  The FC-SW-2 reference may not need to be normative here.
> 
> RFC 1700 is almost certainly the wrong reference to instruct IANA on
> what
> procedures to follow.  See RFC 2434 for guidance on this 
> topic, although
> it
> may
> not be necessary to reference it.
> 
> -- ANNEX A - Protocol Requirements
> 
> [E] I think this should be an Appendix, rather than an Annex.  Some
> changes
> may be in order here based on the above comments.
> 
> -- ANNEX B - IANA Considerations
> 
> [T] This needs to be made somewhat more explicit and direct.  IANA is
> looking for
> simple straightforward instructions roughly of the form "IANA is
> instructed
> to
> do <X>".  in particular, the following sentence is a problem:
> 
>    Standards action on this RFC should be accompanied by IANA
>    assignment of the following two Protocol# values:
> 
> It should read something like:
> 
>    In addition to creating the FC Encapsulation Protocol Number
> Registry,
>    the standards action of this RFC allocates the following
>    two values from this registry:
> 
> While one normally asks IANA to allocate values, the exception is that
> when creating a registry, one can instruct IANA as to what the initial
> contents are (i.e., a new registry does not have to be created empty).
> 
> [T] Also, earlier comments suggest that the Protocol# 
> registry needs to
> be
> expanded with a CRC field (Yes/No) and that registries need to be
> created
> for the SOF and EOF values.
> 
>    It is requested that the ips working group chairs or the
>    Transport Services area directors be notified when any new 
> Protocol#
>    value assignment is requested.
> 
> [T] Given that an approved RFC is required, this sentence seems
> redundant.
> If the intent was notification of the IPS WG chairs and/or ADs when a
> an I-D draft is submitted that will cause a Protocol# 
> assignment if/when
> approved as an RFC, the language needs to say that and should be
> rephrased to require notification of the IP Storage WG chairs (don't
> use WG acronyms here) and notification of the Transport ADs instead
> in the case that the IPS WG does not exist or is not active.
> 
> [T] Also see previous comments about needing to set up an IANA
> registry for SOF and EOF values.  I'll work with Ralph on crafting the
> right IANA instructions.
> 
> Thanks,
> --David
> 
> ---------------------------------------------------
> David L. Black, Senior Technologist
> EMC Corporation, 42 South St., Hopkinton, MA  01748
> +1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
> black_david@emc.com         Cell: +1 (978) 394-7754
> ---------------------------------------------------
> 


From owner-ips@ece.cmu.edu  Wed Mar 20 03:00:44 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA25998
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 03:00:43 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2K72qE07324
	for ips-outgoing; Wed, 20 Mar 2002 02:02:52 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2K72pw07320
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 02:02:51 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <GZ4HY655>; Wed, 20 Mar 2002 01:56:51 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293760D@CORPMX14>
From: Black_David@emc.com
To: ISCSIPerson@aol.com, ips@ece.cmu.edu
Subject: RE: iSCSI Rev 11 - Version Number Conflict
Date: Wed, 20 Mar 2002 02:02:21 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1CFDD.2E3DAB00"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1CFDD.2E3DAB00
Content-Type: text/plain;
	charset="iso-8859-1"

0x00 in Login Request is correct. --David

-----Original Message-----
From: ISCSIPerson@aol.com [mailto:ISCSIPerson@aol.com]
Sent: Tuesday, March 19, 2002 4:42 PM
To: ips@ece.cmu.edu
Subject: iSCSI Rev 11 - Version Number Conflict


Folks, 

I don't want to start another BIG discussion but ... 

As I was looking over iSCSI Rev 11, I noticed that the change log stated
that the current Version Number is "0x04," but in the Login Request area
(9.12.4) it says "0x00." 

Which one should I pay attention to? 

Thanks, 

Greg A. 



------_=_NextPart_001_01C1CFDD.2E3DAB00
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.00.3103.1000" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face="Courier New" size=2><SPAN class=425260207-20032002>0x00 in 
Login Request is correct. --David</SPAN></FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
  <DIV align=left class=OutlookMessageHeader dir=ltr><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> ISCSIPerson@aol.com 
  [mailto:ISCSIPerson@aol.com]<BR><B>Sent:</B> Tuesday, March 19, 2002 4:42 
  PM<BR><B>To:</B> ips@ece.cmu.edu<BR><B>Subject:</B> iSCSI Rev 11 - Version 
  Number Conflict<BR><BR></DIV></FONT><FONT face=arial,helvetica><FONT 
  size=3>Folks, <BR><BR>I don't want to start another BIG discussion but ... 
  <BR><BR>As I was looking over iSCSI Rev 11, I noticed that the change log 
  stated that the current Version Number is "0x04," but in the Login Request 
  area (9.12.4) it says "0x00." <BR><BR>Which one should I pay attention to? 
  <BR><BR>Thanks, <BR><BR>Greg A. <BR></BLOCKQUOTE></FONT></FONT></BODY></HTML>

------_=_NextPart_001_01C1CFDD.2E3DAB00--


From owner-ips@ece.cmu.edu  Wed Mar 20 03:52:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA26581
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 03:52:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2K84U909745
	for ips-outgoing; Wed, 20 Mar 2002 03:04:30 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from wiprom2mx1.wipro.com (wiprom2mx1.wipro.com [203.197.164.41])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2K84Sw09741
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 03:04:28 -0500 (EST)
Received: from m2vwall3.wipro.com (m2vwall3.wipro.com [164.164.29.237])
	by wiprom2mx1.wipro.com (8.11.3/8.11.3) with SMTP id g2K84EG18237
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 13:34:16 +0530 (IST)
Received: from 192.168.2.18 by m2vwall3.wipro.com (InterScan E-Mail VirusWall NT); Wed, 20 Mar 2002 13:33:42 +0530
Received: from wipro.com ([127.0.0.1]) by sarovar.mail.wipro.com
          (Netscape Messaging Server 4.15) with ESMTP id GT9IE000.IUE;
          Wed, 20 Mar 2002 13:33:36 +0530 
From: "Sumit Agarwal" <sumit.agarwal@wipro.com>
To: sanquery <sanquery@myrealbox.com>
Cc: ips@ece.cmu.edu
Message-ID: <4942a49f08.49f084942a@wipro.com>
Date: Wed, 20 Mar 2002 13:03:36 +0500
X-Mailer: Netscape Webmail
MIME-Version: 1.0
Content-Language: en
Subject: Re: Asynchronous events at the target
X-Accept-Language: en
Content-Type: multipart/mixed; boundary="--6e813cc556b81b01"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.

----6e813cc556b81b01
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

AFAIK, there are various ways to dispatch an asynchronous events. They 
can be considered as interrupts. The interrupts can be issued either 
through signals or sending some know packet format for intialization.
1) Signals  - used mostly for directly attached devices
2) Transport Specific routines - fore.g RSCN in FC, A configured RPC 
may be invoked, Hello message can be sent e.t.c

Someone please correct me, if I am wrong.

Thanks,
Sumit

----- Original Message -----
From: sanquery <sanquery@myrealbox.com>
Date: Tuesday, March 19, 2002 10:25 am
Subject: Asynchronous events at the target

> Hi all,
>  I wanted to know is there any means by which an initiator can be 
> notified of some asynchronous events at the target. 
> According to SAM2(Page 73), Asynchronous Event Reporting takes 
> place when one of the following events occur:
> a)An exception condition was encountered after command completion;
> b)A newly initialized device is available;
> c)Some other type of unit attention condition has occured; or
> d)An asynchronous event has occured.
> 
> How does the notification for a newly initialized device available 
> at the target go to the Initiator? Is it done by suddenly sending 
> an Asynchronous PDU with an Async Event value of 0 corresponding 
> to Sense Data? Or is there any other means of handling this 
> notification?
> Regards,
> Sanquery.
> 
> 
> 
> 
> 

----6e813cc556b81b01
Content-Type: text/x-vcard; name="asumit.vcf"; charset=us-ascii
Content-Disposition: attachment; filename="asumit.vc"
Content-Description: Card for Sumit Agarwal <sumit.agarwal@wipro.com>
Content-Transfer-Encoding: 7bit

begin:vcard
n:Agarwal;Sumit
fn:Sumit Agarwal
tel;cell:+919845205210
tel;fax:+91-80-5732696
tel;home:+919845205210
tel;work:+91-805732296 / 93 extn. 5243
url:www.wipro.com
org:Wipro Technologies;SIDC, Embedded and Internet Division
adr:;;Wipro Technologies, Chamundi Complex, No.26, Hosur Main Road, Bommanahalli;Bangalore;Karnataka;560068;INDIA
version:2.1
email;internet:sumit.agarwal@wipro.com
title:Senior Software Engineer
end:vcard



----6e813cc556b81b01
Content-Type: text/plain;
	name="InterScan_Disclaimer.txt"
Content-Disposition: attachment;
	filename="InterScan_Disclaimer.txt"
Content-Transfer-Encoding: 7bit

**************************Disclaimer************************************

Information contained in this E-MAIL being proprietary to Wipro Limited
is 'privileged' and 'confidential' and intended for use only by the
individual or entity to which it is addressed. You are notified that any
use, copying or dissemination of the information contained in the E-MAIL
in any manner whatsoever is strictly prohibited.


 ********************************************************************

----6e813cc556b81b01--



From owner-ips@ece.cmu.edu  Wed Mar 20 10:52:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA02966
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 10:52:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KF8NF07571
	for ips-outgoing; Wed, 20 Mar 2002 10:08:23 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KF8Iw07557;
	Wed, 20 Mar 2002 10:08:18 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id QAA122560;
	Wed, 20 Mar 2002 16:08:10 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2KF89W127368;
	Wed, 20 Mar 2002 16:08:09 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Rev 11 minor issues
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF0CE81E89.DAED7DEB-ONC2256B82.00522AC2@telaviv.ibm.com>
Date: Wed, 20 Mar 2002 17:08:08 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 20/03/2002 17:08:09,
	Serialize complete at 20/03/2002 17:08:09
Content-Type: multipart/alternative; boundary="=_alternative 00526EB6C2256B82_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00526EB6C2256B82_=
Content-Type: text/plain; charset="us-ascii"

To add a connection to an existing session you need to comletely identify 
the session you are attaching to.
A host can use several initiator names and a target can held several 
target names.
The ISID+TPGT are unique only between a pair of names.

JUlo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
19-03-02 20:27
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: Rev 11 minor issues

 

Just want to verify something.  Is it possible to have multiple Initiator 
identities (i.e.: InitiatorName=) on the same session through different 
connections?  If not, why is InitiatorName negotiation required on 
ancillary connections.  If iSCSI doesn't allow for multiple initiators per 
session, then all it's doing is requiring another check for the target; 
that the same InitiatorName is given for all connections on the session.
Example .. on the leading session connection, the initiator says:
InitiatorName=Fred
Then on an ancillary connection the initiator says:
InitiatorName=Bob
Now the target would have to trap this and zap the connection.  Why not 
just assume the same InitiatorName as the session and let authentication 
verify it?  This eliminates the extra negotiation check on the target.

4.3
The initial login request of any connection MUST include the InitiatorName 
key=value pair. 

8.1.2 & 11
"SW" and "CO" ?  Can the abbreviation be dropped and replaced with the 
full description?  "Session-Wide" and "Connection-Wide" should fit on the 
line.


--=_alternative 00526EB6C2256B82_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">To add a connection to an existing session you need to comletely identify the session you are attaching to.</font>
<br><font size=2 face="sans-serif">A host can use several initiator names and a target can held several target names.</font>
<br><font size=2 face="sans-serif">The ISID+TPGT are unique only between a pair of names.</font>
<br>
<br><font size=2 face="sans-serif">JUlo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">19-03-02 20:27</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Rev 11 minor issues</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=3 face="Times New Roman">Just want to verify something. &nbsp;Is it possible to have multiple Initiator identities (i.e.: InitiatorName=) on the same session through different connections? &nbsp;If not, why is InitiatorName negotiation required on ancillary connections. &nbsp;If iSCSI doesn't allow for multiple initiators per session, then all it's doing is requiring another check for the target; that the same InitiatorName is given for all connections on the session.</font>
<p><font size=3 face="Times New Roman">Example .. on the leading session connection, the initiator says:</font>
<p><font size=3 face="Times New Roman">InitiatorName=Fred</font>
<p><font size=3 face="Times New Roman">Then on an ancillary connection the initiator says:</font>
<p><font size=3 face="Times New Roman">InitiatorName=Bob</font>
<p><font size=3 face="Times New Roman">Now the target would have to trap this and zap the connection. &nbsp;Why not just assume the same InitiatorName as the session and let authentication verify it? &nbsp;This eliminates the extra negotiation check on the target.</font>
<p><font size=2 face="Times New Roman"><br>
4.3</font>
<p><font size=2 face="Times New Roman"><u>The initial login request of any connection MUST include the InitiatorName key=value pair.</u> </font>
<p>
<hr>
<p><font size=2 face="Times New Roman">8.1.2 &amp; 11</font>
<p><font size=3 face="Times New Roman">&quot;SW&quot; and &quot;CO&quot; ? &nbsp;Can the abbreviation be dropped and replaced with the full description? &nbsp;&quot;Session-Wide&quot; and &quot;Connection-Wide&quot; should fit on the line.</font>
<p>
<p>
--=_alternative 00526EB6C2256B82_=--


From owner-ips@ece.cmu.edu  Wed Mar 20 10:53:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA02984
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 10:53:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KEKOq04696
	for ips-outgoing; Wed, 20 Mar 2002 09:20:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KEKKw04688;
	Wed, 20 Mar 2002 09:20:20 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id PAA41418;
	Wed, 20 Mar 2002 15:20:12 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2KEK8W142388;
	Wed, 20 Mar 2002 15:20:12 +0100
To: "Randy Jennings" <randyj@data-transit.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: NOP-In and NOP-Out
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFA7F2AA72.D4735376-ONC2256B82.004DA50C@telaviv.ibm.com>
Date: Wed, 20 Mar 2002 16:20:07 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 20/03/2002 16:20:12,
	Serialize complete at 20/03/2002 16:20:12
Content-Type: multipart/alternative; boundary="=_alternative 004DB819C2256B82_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004DB819C2256B82_=
Content-Type: text/plain; charset="us-ascii"

both are always valid - What you will do with them is another question 
Julo




"Randy Jennings" <randyj@data-transit.com>
Sent by: owner-ips@ece.cmu.edu
20-03-02 00:40
Please respond to "Randy Jennings"

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        NOP-In and NOP-Out

 

I noticed in NOP-Out on page 175 last paragraph of 9.18.1 that it does not
say if the CmdSN field is reserved if the ITT is valid (not 0xffffffff),
only that the field is CmdSN is good when the ITT is not valid.  The PDU
diagram does not say that it would not be the CmdSN.

Is the CmdSN always valid, or is it reserved some of the time?

I have the exact same question about StatSN (reference pg 177 section
9.19.1).

Sincerely,
Randy Jennings
Data Transit




--=_alternative 004DB819C2256B82_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">both are always valid - What you will do with them is another question Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Randy Jennings&quot; &lt;randyj@data-transit.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">20-03-02 00:40</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Randy Jennings&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;NOP-In and NOP-Out</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">I noticed in NOP-Out on page 175 last paragraph of 9.18.1 that it does not<br>
say if the CmdSN field is reserved if the ITT is valid (not 0xffffffff),<br>
only that the field is CmdSN is good when the ITT is not valid. &nbsp;The PDU<br>
diagram does not say that it would not be the CmdSN.<br>
<br>
Is the CmdSN always valid, or is it reserved some of the time?<br>
<br>
I have the exact same question about StatSN (reference pg 177 section<br>
9.19.1).<br>
<br>
Sincerely,<br>
Randy Jennings<br>
Data Transit<br>
<br>
</font>
<br>
<br>
--=_alternative 004DB819C2256B82_=--


From owner-ips@ece.cmu.edu  Wed Mar 20 10:54:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA03009
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 10:54:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KDcuk02542
	for ips-outgoing; Wed, 20 Mar 2002 08:38:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KDcqw02533;
	Wed, 20 Mar 2002 08:38:53 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id OAA111904;
	Wed, 20 Mar 2002 14:38:46 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2KDciW94356;
	Wed, 20 Mar 2002 14:38:45 +0100
To: ISCSIPerson@aol.com
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI Rev 11 - Version Number Conflict
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFDE2BBCCA.7DD25BA9-ONC2256B82.004AA4F8@telaviv.ibm.com>
Date: Wed, 20 Mar 2002 15:38:43 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 20/03/2002 15:38:45,
	Serialize complete at 20/03/2002 15:38:45
Content-Type: multipart/alternative; boundary="=_alternative 004ABEA5C2256B82_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004ABEA5C2256B82_=
Content-Type: text/plain; charset="us-ascii"

Dear GregA,

Please go back to the list archive and follow the thread.

Julo




ISCSIPerson@aol.com
Sent by: owner-ips@ece.cmu.edu
19-03-02 23:42
Please respond to ISCSIPerson

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        iSCSI Rev 11 - Version Number Conflict

 

Folks, 

I don't want to start another BIG discussion but ... 

As I was looking over iSCSI Rev 11, I noticed that the change log stated 
that the current Version Number is "0x04," but in the Login Request area 
(9.12.4) it says "0x00." 

Which one should I pay attention to? 

Thanks, 

Greg A. 


--=_alternative 004ABEA5C2256B82_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Dear GregA,</font>
<br>
<br><font size=2 face="sans-serif">Please go back to the list archive and follow the thread.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>ISCSIPerson@aol.com</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">19-03-02 23:42</font>
<br><font size=1 face="sans-serif">Please respond to ISCSIPerson</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI Rev 11 - Version Number Conflict</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=3 face="Arial">Folks, <br>
<br>
I don't want to start another BIG discussion but ... <br>
<br>
As I was looking over iSCSI Rev 11, I noticed that the change log stated that the current Version Number is &quot;0x04,&quot; but in the Login Request area (9.12.4) it says &quot;0x00.&quot; <br>
<br>
Which one should I pay attention to? <br>
<br>
Thanks, <br>
<br>
Greg A. </font>
<br>
<br>
--=_alternative 004ABEA5C2256B82_=--


From owner-ips@ece.cmu.edu  Wed Mar 20 10:56:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA03086
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 10:56:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KDUDp02163
	for ips-outgoing; Wed, 20 Mar 2002 08:30:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from iol.unh.edu (io.iol.unh.edu [132.177.123.82])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KDQRw01998;
	Wed, 20 Mar 2002 08:26:27 -0500 (EST)
Received: from io.iol.unh.edu (localhost.localdomain [127.0.0.1])
	by iol.unh.edu (8.12.2/8.12.2) with ESMTP id g2KDQ4VM014288;
	Wed, 20 Mar 2002 08:26:04 -0500
Received: from localhost (rdr@localhost)
	by io.iol.unh.edu (8.12.2/8.12.1/Submit) with ESMTP id g2KDQ4Gb014285;
	Wed, 20 Mar 2002 08:26:04 -0500
Date: Wed, 20 Mar 2002 08:26:04 -0500 (EST)
From: "Robert D. Russell" <rdr@io.iol.unh.edu>
To: Julian Satran <Julian_Satran@il.ibm.com>
cc: ips@ece.cmu.edu, <owner-ips@ece.cmu.edu>
Subject: iSCSI: ITT field in draft 11
In-Reply-To: <OF625275ED.6FF03A9F-ONC2256B81.004A9B68@telaviv.ibm.com>
Message-ID: <Pine.LNX.4.43.0203200822310.14138-100000@io.iol.unh.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Julian:

One of the changes that came in with draft 11 is that in the
Asynchronous Message PDU and in the Reject PDU the 4-byte field
at offset 16 became:
   16| Reserved -0xffffffff
whereas previously it had just been Reserved.

I believe the reason for explicitly specifying the value 0xffffffff
is because this field in all other PDUs is the Initiator Task Tag,
and for all those other PDUs this value means there is no valid
Initiator Transfer Tag.  This change now makes it possible for an
initiator to find the task associated with each incoming PDU before
looking at the opcode of the PDU.  So far so good.

The problem is that this field cannot be called Reserved due to section
9 which says that receivers MUST ignore reserved fields, thus defeating
the whole purpose of defining a value the initiator can use.

To correct this, the specs for both Asynchronous Message and Reject
should be changed to explicitly include the Initiator Task Tag field
and specify in the descriptions of each of those PDUs that this field
MUST be set to 0xffffffff.

If this is done, then every PDU will contain the Initiator Task Tag field,
and the description of the BHS in section 9.2.1 can be changed from:
  16| Initiator Task Tag or Opcode-specific fields
to
  16| Initiator Task Tag
which would clearly show the consistent meaning of this field over all PDUs.


Also, there are two related minor clarifications that should be made:

1) The 4th paragraph of section 9.16.1 currently says:
      "For Status SNACK, the Initiator Task Tag is reserved."
   It would be better if this said explicitly:
      "For Status SNACK, the Initiator Task Tag MUST be set to the
      reserved value 0xffffffff."

2) The last sentence in section 9.5.3 says:
      "For all the other functions this field is reserved."
   It would be better if this said explicitly:
      "For all the other functions this field MUST be set to the
      reserved value 0xffffffff."
   (Note that the corresponding sentence in section 9.6.2 already
   says this.)


Thanks,

Bob Russell
InterOperability Lab
University of New Hampshire
rdr@iol.unh.edu
603-862-3774


From owner-ips@ece.cmu.edu  Wed Mar 20 12:54:30 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07892
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 12:54:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KH1aE15305
	for ips-outgoing; Wed, 20 Mar 2002 12:01:36 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from magic.adaptec.com (magic.adaptec.com [208.236.45.80])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KH1Xw15298;
	Wed, 20 Mar 2002 12:01:33 -0500 (EST)
Received: from redfish.adaptec.com (redfish.adaptec.com [162.62.50.11])
	by magic.adaptec.com (8.10.2+Sun/8.10.2) with ESMTP id g2KH1Rj05174;
	Wed, 20 Mar 2002 09:01:27 -0800 (PST)
Received: from aimexc07.corp.adaptec.com (aimexc07.corp.adaptec.com [162.62.62.47])
	by redfish.adaptec.com (8.8.8+Sun/8.8.8) with ESMTP id JAA28888;
	Wed, 20 Mar 2002 09:01:26 -0800 (PST)
Received: by aimexc07.corp.adaptec.com with Internet Mail Service (5.5.2653.19)
	id <FC330VHJ>; Wed, 20 Mar 2002 08:59:33 -0800
Message-ID: <E156A23F1885D4119ED800B0D0498A9F01BA5ED2@aimexc07.corp.adaptec.com>
From: "Ranganathan, Deva" <Deva_Ranganathan@adaptec.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        Julian Satran
	 <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject: RE: iSCSI: ITT field in draft 11
Date: Wed, 20 Mar 2002 08:59:26 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Robert,

Is this not implementation related? 

-Deva


-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Wednesday, March 20, 2002 5:26 AM
To: Julian Satran
Cc: ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: iSCSI: ITT field in draft 11


Julian:

One of the changes that came in with draft 11 is that in the
Asynchronous Message PDU and in the Reject PDU the 4-byte field
at offset 16 became:
   16| Reserved -0xffffffff
whereas previously it had just been Reserved.

I believe the reason for explicitly specifying the value 0xffffffff
is because this field in all other PDUs is the Initiator Task Tag,
and for all those other PDUs this value means there is no valid
Initiator Transfer Tag.  This change now makes it possible for an
initiator to find the task associated with each incoming PDU before
looking at the opcode of the PDU.  So far so good.

The problem is that this field cannot be called Reserved due to section
9 which says that receivers MUST ignore reserved fields, thus defeating
the whole purpose of defining a value the initiator can use.

To correct this, the specs for both Asynchronous Message and Reject
should be changed to explicitly include the Initiator Task Tag field
and specify in the descriptions of each of those PDUs that this field
MUST be set to 0xffffffff.

If this is done, then every PDU will contain the Initiator Task Tag field,
and the description of the BHS in section 9.2.1 can be changed from:
  16| Initiator Task Tag or Opcode-specific fields
to
  16| Initiator Task Tag
which would clearly show the consistent meaning of this field over all PDUs.


Also, there are two related minor clarifications that should be made:

1) The 4th paragraph of section 9.16.1 currently says:
      "For Status SNACK, the Initiator Task Tag is reserved."
   It would be better if this said explicitly:
      "For Status SNACK, the Initiator Task Tag MUST be set to the
      reserved value 0xffffffff."

2) The last sentence in section 9.5.3 says:
      "For all the other functions this field is reserved."
   It would be better if this said explicitly:
      "For all the other functions this field MUST be set to the
      reserved value 0xffffffff."
   (Note that the corresponding sentence in section 9.6.2 already
   says this.)


Thanks,

Bob Russell
InterOperability Lab
University of New Hampshire
rdr@iol.unh.edu
603-862-3774


From owner-ips@ece.cmu.edu  Wed Mar 20 15:27:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA13722
	for <ips-archive@lists.ietf.org>; Wed, 20 Mar 2002 15:27:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KJYNH26076
	for ips-outgoing; Wed, 20 Mar 2002 14:34:23 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KJYLw26071
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:34:21 -0500 (EST)
Received: from sponge.cisco.com (sponge.cisco.com [64.101.128.87])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id g2KJYFh12738
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 11:34:15 -0800 (PST)
Received: from DAPW2K3 (dhcp-161-44-68-143.cisco.com [161.44.68.143])
	by sponge.cisco.com (Mirapoint)
	with SMTP id AAP95218;
	Wed, 20 Mar 2002 13:34:13 -0600 (CST)
From: "Dave Peterson" <dap@cisco.com>
To: "Ips@Ece. Cmu. Edu" <ips@ece.cmu.edu>
Subject: iSCSI: items discussed at WG meeting
Date: Wed, 20 Mar 2002 13:34:13 -0600
Message-ID: <EDEKKDKNBFCABNBAAOBBKEEKECAA.dap@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Howdy All,

Here are the items I brought forward at the WG face-to-face...

iSCSI Items

1. Provide (some) guidance for a ULP timeout value that is workable for the
various error detection and recovery scenarios.

2. TPGT handling: spec currently states;

"If a SendTargets response reports an iSCSI address for a target, it SHOULD
also report all other addresses in its portal group in the same response."

This statement brought up the question, what should the initiator do when
two separate SendTargets responses contain the same TargetName with
differing paths? Should the initiator believe the information in the first
response is no longer valid? Or should the initiator simply add the new path
to the target?

dap: consensus was that the information in the first response is no longer
valid. Marjorie to add appropriate text.

3. Text discussing the allocation of TPGT's (i.e. the target "controlling
entity" thingy). It is not common knowledge that such an entity exists on a
target implementation. There is no such entity on an initiator
implementation. Maybe the Naming and discovery doc speaks of this entity?

4. Clause 6.7 SCSI Timeouts: explicitly state that a command retry shouldn't
be performed after a SCSI level timeout.

"An iSCSI initiator MAY attempt to plug a command sequence gap on the target
end (in the absence of an acknowledgement of the command by way of ExpCmdSN)
before the ULP timeout by retrying the unacknowledged command, as described
in Section 6.1 Retry and Reassign in Recovery."

5. Text stating that any data and/or status received for an aborted command
is discarded after sending a TMF=Abort Task. (Clause 6.7)

6. Text stating that a TMF=Abort Task must be issued for each outstanding
command. (Clause 6.7)

7. Targets MUST support the command retry functionality. Don't think this
functionality provides much benefit in its current state.
Consider this case:
a. tape locate command is issued with a 10 second ULP timer
b. command is dropped at the target due to a digest error
c. having seen no status for 8 seconds (for example) the iSCSI initiator
decides to retry the command.

What happens with the timer on the first command? If it is not canceled, and
if status is not received within 2 seconds, an abort for the command will be
issued by the ULP.

dap: a mechanism to initiate error detection/recovery would be beneficial.

8. CRN Processing and behavior: spec currently references SAM-2 for CRN.

Per SAM-2:
Command Reference Number (CRN):
When this argument is used, all sequential commands of an I_T_L nexus shall
include a CRN argument that is incremented by one. The initial, wrap, and
reset CRN values shall be one. The CRN value zero shall be reserved for use
as defined by the SCSI protocol. It is not an error for the application
client to provide this argument when CRN is not supported by the SCSI
protocol or logical unit.

More text specifying the behavior of CRN in the iSCSI realm is needed. In
addition, a method to determine if CRN is being used (or not) is missing.

9. Mode page behavior: for example, an FCP initiator sends a mode page 0x18
(Protocol Specific LUN mode page) to a bridge/gateway. Is the bridge/gateway
allowed to simply forward the mode page into the iSCSI realm? Protocol
Specific Port mode page? Disconnect-Reconnect mode page?

I would expect the answer to be yes, the target can send Check Condition
with an ILLEGAL REQUEST/INVALID FIELD IN CDB.

But, not sure what an FCP initiator will do when this is command is
rejected.

dap: a few (or more) people indicated that a bridge/gateway device should
terminate protocol specific mode pages.



From owner-ips@ece.cmu.edu  Wed Mar 20 15:38:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA14056
	for <ips-archive@lists.ietf.org>; Wed, 20 Mar 2002 15:38:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KJflE26679
	for ips-outgoing; Wed, 20 Mar 2002 14:41:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KJfhw26671
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:41:43 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLG9BS>; Wed, 20 Mar 2002 13:41:37 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631E1@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>,
        "IPS Reflector (E-mail)"
	 <ips@ece.cmu.edu>
Subject: RE: iSCSI: Rev 11 minor issues
Date: Wed, 20 Mar 2002 13:37:31 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D046.ACEFF660"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D046.ACEFF660
Content-Type: text/plain;
	charset="iso-8859-1"

Julian,
 
Thanks for the follow-up.  Forgive me for being slow with this, but I'm
still confused by your statement.  Let me walk you through some of my
thoughts.
 
An initiator is defined to be an "initiator node".  It's identification is
through the initiator port name, which includes the InitiatorName, ISID,
etc.  Each login requires the InitiatorName because although it may be an
additional connection to an existing session, it may not be for the same I_T
nexus.
 
Initiators are added to a session like this:
 
-------------------------------------------------------------------------
   InitiatorName      ISID     CID  TSID TgtName Session I_T Nexus
a1 Fred          010203040506  0000 0001 idisk *   #1     it-1
a2 Bob           010203040506  0001 0001 idisk     #1     it-2
a3 Joe           010203040506  0002 0001 idisk     #1     it-3
a4 Fred          010203040506  0003 0001 idisk     #1     it-1
a5 Ted           010203040506  0000 0001 idisk *   #2     it-4
a6 Fred          010203040506  0000 0001 idisk *   ??
a7 Ted           010203040506  0004 0001 idisk     ??
a8 Ted           010203040506  0001 0001 idisk     ??
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
-------------------------------------------------------------------------
 
Within any single session there will be one or more I_T nexus formed (see
a1, a2, a3, a4).
 
           ISID RULE: Between a given iSCSI Initiator and iSCSI Target
Portal 
           Group (SCSI target port), there can be only one session with a
given 
           value for ISID that identifies the SCSI initiator port. See
Section 
           9.12.5 ISID.

My interpretation: any initiator's attempt to reuse the same ISID for
creating an additional session (TSID = 0000) with the same
target-portal-group breaks the ISID rule; initiators must provide different
ISID values to create new sessions with the same target-portal-group (see
a6, breaks ISID rule).  However, since the "initiator port identifier"
includes InitiatorName, alternate initiators may simultaneously use the same
ISID value (see a5, does not break ISID rule).
 
           TSID RULE: The iSCSI Target SHOULD NOT select a TSID for a given
login 
           request if the resulting SSID is already in use by an existing
session 
           between the target and the requesting iSCSI Initiator. See
Section 
           8.1.1 Conservative Reuse of ISIDs.
 
My interpretation: a target should expect (and accept) initiator attempts to
login with the same ISID and can select the same TSID as long it's from a
different initiator (see a5).  However, if an existing initiator is
identified, then the target should select a TSID that forms a unique SSID
(see b4).  This is confusing because it assumes that the initiator will
break the ISID rule?  Also, does this break session reinstatement?
 
-------------------------------------------------------------------------
   InitiatorName        ISID      CID    TSID    TargetName  Session
b1 Fred            010203040506   0000   0001    idisk *       #1
b2 Bob             010203040506   0000   0001    idisk *       #2
b3 Joe             010203040506   0000   0001    idisk *       #3
b4 Fred            010203040506   0000   0002    idisk *       #4
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
-------------------------------------------------------------------------
 
How does this work with 4.3.5 Session Reinstatement:

           Session reinstatement is the process of initiator logging in with
an 
           ISID that is possibly active from the target's perspective - thus

           implicitly logging out the session state machine corresponding to
the 
           ISID and reinstating a new iSCSI session in its place (with the
same 
           ISID).  Thus, the TSID in the Login PDU MUST be zero to signal
session 
           reinstatement.  All the tasks that were active on the old session
are 
           internally terminated on a session reinstatement.
 
           The initiator session state MUST be FAILED (Section 5.3 Session
State 
           Diagrams) for attempting a session reinstatement.
 
My interpretation (#1 of 2): Session reinstatement only occurs when the
target has identified and authenticated that an existing initiator
(identified by InitiatorName & ISID) has performed a second leading login.
Then and only then can session reinstatement be performed.  Unfortunately,
this assumes that sessions will always have the same initiator performing
the leading login (so in a1->a4, only Fred can perform session reinstatement
for that session.)  That's bad news if that particular initiator is no
longer active.
 
(#2 of 2):  ANY leading login received by the iSCSI target with an existing
and target-perspective active ISID is assumed to be session reinstatement.
This means that the logins described by [ a5 & b1..b4 ] are invalid.
Further, this conflicts with your note saying that the initiator must be
completely identified on every login.
 
Now look at connection reinstatement (4.3.4)

           Connection reinstatement is the process of initiator logging in
with a 
           ISID-TSID-CID combination that is possibly active from the
target's 
           perspective - thus implicitly logging out the connection state 
           machine corresponding to the CID and reinstating a new
full-feature 
           phase iSCSI connection in its place (with the same CID).  Thus,
the 
           TSID in the Login PDU MUST be non-zero and CID does not change
during 
           a connection reinstatement.  The Login command  performs the
logout 
           function of the old connection if an explicit logout was not
performed 
           earlier. In sessions with a single connection, this may imply the

           opening of a second connection with the sole purpose of cleaning
up 
           the first. Targets should support opening a second connection
even 
           when they do not support multiple connections in full feature
phase.  
 
           If the operational ErrorRecoveryLevel is 2, connection
reinstatement 
           enables future task reassignment.  If the operational
ErrorRecovery-
           Level is less than 2, connection reinstatement is the replacement
of 
           the old CID without enabling task reassignment.  In this case,
all the 
           tasks that were active on the old CID are internally terminated.
 
           The initiator connection state MUST be CLEANUP_WAIT (section 5.1)
for 
           attempting a connection reinstatement. 
 
If an iSCSI connection is attempted in which multiple initiator-sessions are
available with the same ISID + TSID, to which session should the iSCSI
target attach it?  In [a7] above, there are two active sessions with the
same SSID, to which should a7 be attached?  Another special case [a8] will
result in either a new connection on session #2 or connection reinstatement
(or possible conflict) with session #1.
 
Thanks for your time on this!
 
 
 
 -----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 20, 2002 9:08 AM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: Rev 11 minor issues




To add a connection to an existing session you need to comletely identify
the session you are attaching to. 
A host can use several initiator names and a target can held several target
names. 
The ISID+TPGT are unique only between a pair of names. 

JUlo 



	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


19-03-02 20:27 
Please respond to Michael Schoberg 


        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: Rev 11 minor issues 

       


Just want to verify something.  Is it possible to have multiple Initiator
identities (i.e.: InitiatorName=) on the same session through different
connections?  If not, why is InitiatorName negotiation required on ancillary
connections.  If iSCSI doesn't allow for multiple initiators per session,
then all it's doing is requiring another check for the target; that the same
InitiatorName is given for all connections on the session. 

Example .. on the leading session connection, the initiator says: 


InitiatorName=Fred 


Then on an ancillary connection the initiator says: 


InitiatorName=Bob 


Now the target would have to trap this and zap the connection.  Why not just
assume the same InitiatorName as the session and let authentication verify
it?  This eliminates the extra negotiation check on the target. 



4.3 


The initial login request of any connection MUST include the InitiatorName
key=value pair. 




  _____  


8.1.2 & 11 


"SW" and "CO" ?  Can the abbreviation be dropped and replaced with the full
description?  "Session-Wide" and "Connection-Wide" should fit on the line. 






------_=_NextPart_001_01C1D046.ACEFF660
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<META content=3D"MSHTML 5.50.4611.1300" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>Julian,</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>Thanks for the follow-up.&nbsp;&nbsp;Forgive me for being slow =
with this,=20
but I'm still confused by your statement.&nbsp; Let me walk you through =
some of=20
my thoughts.</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>An initiator is defined to be an </FONT></SPAN><SPAN=20
class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>"initiator node".&nbsp; It's identification is through the =
initiator port=20
name, which includes the InitiatorName, ISID, etc.&nbsp; Each login =
requires the=20
InitiatorName because although it may be an additional connection to an =
existing=20
session, it may not be for the same I_T nexus.</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>Initiators are added to a session like =
this:</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>---------------------------------------------------------------=
----------</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>&nbsp;&nbsp; InitiatorName&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
ISID&nbsp;&nbsp;&nbsp;&nbsp; CID&nbsp;&nbsp;TSID&nbsp;TgtName Session =
I_T=20
Nexus</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a1=20
Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;01020304=
0506&nbsp;=20
0000&nbsp;0001&nbsp;idisk&nbsp;*&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nbsp;&n=
bsp;=20
it-1</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a2 =
Bob&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
010203040506&nbsp;&nbsp;0001&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;#1&nbsp;&nbsp;&nbsp;&nbsp;=20
it-2</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a3=20
Joe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010=
203040506&nbsp;&nbsp;0002&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;#1&nbsp;&nbsp;&nbsp;&nbsp;=20
it-3</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2>a4=20
Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;01020304=
0506&nbsp;=20
0003&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nb=
sp;&nbsp;=20
it-1</FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN class=3D449362715-20032002>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a5=20
Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010=
203040506&nbsp;&nbsp;0000&nbsp;0001&nbsp;idisk=20
*&nbsp;&nbsp;&nbsp;#2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;it-4</FONT></SPAN></D=
IV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a6=20
Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;01020304=
0506&nbsp;&nbsp;0000&nbsp;0001&nbsp;idisk=20
*&nbsp;&nbsp;&nbsp;??</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>a7=20
Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010=
203040506&nbsp;=20
0004 0001 idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;??</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2>a8=20
Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010=
203040506&nbsp;=20
0001 0001=20
idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;??</FONT></SPAN></SPAN></DIV></SPAN><=
/SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff =
size=3D2></FONT></SPAN></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2><SPAN =
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff size=3D2>*=20
Leading login TSID=3D0000 was sent by initiator, TSID value assigned by =

target.</FONT></SPAN></SPAN></FONT></SPAN></FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff=20
size=3D2>---------------------------------------------------------------=
----------</FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff =
size=3D2></FONT></SPAN></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2>Within any single =
session there will=20
be one or more&nbsp;I_T nexus formed (see a1, a2, a3,=20
a4).</FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff =
size=3D2></FONT></SPAN></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3DArial color=3D#0000ff=20
size=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
ISID RULE:=20
Between a given iSCSI Initiator and iSCSI Target Portal=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Group =
(SCSI=20
target port), there can be only one session with a given=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; value =
for ISID=20
that identifies the SCSI initiator port. See Section=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9.12.5 =

ISID.</FONT></SPAN></SPAN></DIV><SPAN class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><FONT face=3D"Courier New">
<DIV><FONT face=3DArial color=3D#0000ff size=3D2></FONT><FONT =
face=3DArial color=3D#0000ff=20
size=3D2></FONT><FONT face=3DArial color=3D#0000ff =
size=3D2></FONT><BR><FONT=20
face=3D"Lucida Console"><FONT color=3D#0000ff><FONT size=3D2><SPAN=20
class=3D449362715-20032002><SPAN class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2>My=20
interpretation:&nbsp;a</FONT></SPAN>ny&nbsp;initiator's&nbsp;attempt to =
reuse=20
the same ISID for creating an additional session (TSID =3D =
0000)&nbsp;with the=20
same target-portal-group&nbsp;breaks the ISID rule;=20
</SPAN></FONT></FONT></FONT><FONT face=3D"Lucida Console"><FONT=20
color=3D#0000ff><FONT size=3D2><SPAN =
class=3D449362715-20032002>initiators must=20
provide</SPAN><SPAN class=3D449362715-20032002> different ISID =
values&nbsp;to=20
create new sessions with the same target-portal-group (see a6, breaks =
ISID=20
rule).&nbsp; However, since the "initiator port identifier" includes=20
InitiatorName, alternate initiators may simultaneously use the same =
ISID value=20
(see a5, does not break ISID rule).</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
TSID RULE:=20
The iSCSI Target SHOULD NOT select a TSID for a given login=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
request if the=20
resulting SSID is already in use by an existing session=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
between the=20
target and the requesting iSCSI Initiator. See Section=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8.1.1=20
Conservative Reuse of ISIDs.</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>My interpretation:&nbsp;a target should expect (and accept) =
initiator=20
attempts to login with the same ISID and can select the same TSID as =
long=20
it's&nbsp;from a different initiator (see a5).&nbsp; However, if an =
existing=20
initiator is identified, then&nbsp;the target should select a&nbsp;TSID =
that=20
forms a unique SSID (see b4).&nbsp; This is&nbsp;confusing because it =
assumes=20
that the initiator will break the ISID rule?&nbsp; Also, does this =
break session=20
reinstatement?</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2></FONT></SPAN><SPAN class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>---------------------------------------------------------------=
----------</FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>&nbsp; =
&nbsp;InitiatorName&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
ISID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CID&nbsp;&nbsp;&nbsp; =
TSID&nbsp;&nbsp;&nbsp;=20
TargetName&nbsp; Session</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>b1&nbsp;Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp;=20
0000&nbsp;&nbsp;&nbsp;0001&nbsp;&nbsp;&nbsp;=20
idisk&nbsp;*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #1</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>b2&nbsp;Bob&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;=20
010203040506&nbsp;&nbsp;&nbsp;0000&nbsp;&nbsp; 0001&nbsp;&nbsp;&nbsp; =
idisk=20
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #2</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2>b3=20
Joe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;=20
010203040506&nbsp;&nbsp; 0000&nbsp;&nbsp; =
0001&nbsp;&nbsp;&nbsp;&nbsp;idisk=20
*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #3</FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff=20
size=3D2>b4&nbsp;Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp;=20
0000&nbsp;&nbsp;&nbsp;0002&nbsp;&nbsp;&nbsp;=20
idisk&nbsp;*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
#4</FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff=20
size=3D2></FONT></SPAN></SPAN>&nbsp;</DIV></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff size=3D2>* Leading login =
TSID=3D0000 was sent by=20
initiator, TSID value assigned by=20
target.</FONT></SPAN></SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><SPAN class=3D449362715-20032002><FONT=20
face=3D"Lucida Console" color=3D#0000ff=20
size=3D2>---------------------------------------------------------------=
----------</FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002></SPAN></SPAN></SPAN></SPAN></FONT></SPAN>&nb=
sp;</DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><SPAN class=3D449362715-20032002>How does =
this work with=20
4.3.5 Session =
Reinstatement:</SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=3D449362715-20032002><FONT face=3D"Lucida Console" =
color=3D#0000ff=20
size=3D2><SPAN class=3D449362715-20032002><SPAN =
class=3D449362715-20032002><SPAN=20
class=3D449362715-20032002><SPAN class=3D449362715-20032002><FONT=20
face=3DArial></FONT><BR><FONT=20
face=3DArial>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
; Session=20
reinstatement is the process of initiator logging in with an=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID =
that is=20
possibly active from the target's perspective - thus=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
implicitly=20
logging out the session state machine corresponding to the=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID =
and=20
reinstating a new iSCSI session in its place (with the same=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
ISID).&nbsp;=20
Thus, the TSID in the Login PDU MUST be zero to signal session=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
reinstatement.&nbsp; All the tasks that were active on the old session =
are=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
internally=20
terminated on a session reinstatement.</FONT></DIV>
<DIV><FONT face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT=20
face=3DArial>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
; The=20
initiator session state MUST be FAILED (Section 5.3 Session State=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Diagrams) for=20
attempting a session=20
reinstatement.</FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
<DIV><FONT face=3DArial color=3D#0000ff size=3D2></FONT><FONT =
face=3DArial color=3D#0000ff=20
size=3D2></FONT><FONT face=3DArial color=3D#0000ff =
size=3D2></FONT><FONT face=3DArial=20
color=3D#0000ff size=3D2></FONT><FONT face=3DArial color=3D#0000ff =
size=3D2></FONT><FONT=20
face=3DArial color=3D#0000ff size=3D2></FONT><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT><FONT face=3DArial color=3D#0000ff =
size=3D2></FONT>&nbsp;</DIV>
<DIV></FONT><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002>My interpretation (#1 of 2):&nbsp;Session =
reinstatement=20
only occurs when the target has identified and authenticated&nbsp;that =
an=20
existing initiator (identified by InitiatorName &amp; ISID) has =
performed a=20
second&nbsp;leading login.&nbsp; Then and only then can session =
reinstatement be=20
performed.&nbsp; Unfortunately, this assumes that&nbsp;sessions will =
always have=20
the same initiator performing the leading login (so in&nbsp;a1-&gt;a4, =
only Fred=20
can perform session reinstatement for that session.)&nbsp; That's bad =
news if=20
that particular initiator is no longer =
active.</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002>(#2 of =
2):&nbsp;&nbsp;</SPAN></FONT></FONT></FONT><FONT=20
face=3D"Lucida Console"><FONT color=3D#0000ff><FONT size=3D2><SPAN=20
class=3D449362715-20032002>ANY leading login received by the iSCSI =
target with an=20
existing and target-perspective&nbsp;active ISID&nbsp;is&nbsp;assumed =
to be=20
session reinstatement.&nbsp; This means that the logins described by [ =
a5 &amp;=20
b1..b4 ] are invalid.&nbsp; Further, this conflicts with your note =
saying that=20
the initiator must be completely identified on every=20
login.</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console" color=3D#0000ff size=3D2><SPAN=20
class=3D449362715-20032002>Now look at connection reinstatement=20
(4.3.4)</SPAN></FONT></DIV>
<DIV><FONT face=3DArial color=3D#0000ff=20
size=3D2><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;=20
Connection reinstatement is the process of initiator logging in with a=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
ISID-TSID-CID=20
combination that is possibly active from the target's=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
perspective -=20
thus implicitly logging out the connection state=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
machine=20
corresponding to the CID and reinstating a new full-feature=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; phase =
iSCSI=20
connection in its place (with the same CID).&nbsp; Thus, the=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TSID =
in the=20
Login PDU MUST be non-zero and CID does not change during=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a =
connection=20
reinstatement.&nbsp; The Login command&nbsp; performs the logout=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
function of the=20
old connection if an explicit logout was not performed=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
earlier. In=20
sessions with a single connection, this may imply the=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
opening of a=20
second connection with the sole purpose of cleaning up=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the =
first.=20
Targets should support opening a second connection even=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when =
they do=20
not support multiple connections in full feature phase.&nbsp; </DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If =
the=20
operational ErrorRecoveryLevel is 2, connection reinstatement=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
enables future=20
task reassignment.&nbsp; If the operational=20
ErrorRecovery-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;=20
Level is less than 2, connection reinstatement is the replacement of=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the =
old CID=20
without enabling task reassignment.&nbsp; In this case, all the=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; tasks =
that were=20
active on the old CID are internally terminated.</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The =
initiator=20
connection state MUST be CLEANUP_WAIT (section 5.1) for=20
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
attempting a=20
connection reinstatement. </FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002>If an iSCSI connection is attempted in which =
multiple=20
initiator-sessions are available with the same ISID + TSID, to which =
session=20
should the iSCSI target attach it?&nbsp; In [a7] above, there are two =
active=20
sessions with the same SSID,&nbsp;to which should a7 =
be&nbsp;attached?&nbsp;=20
Another special case [a8] will result in either a new connection on =
session #2=20
or connection reinstatement (or possible conflict) with session=20
#1.</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002>Thanks for your time on=20
this!</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002><FONT=20
face=3DArial></FONT></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
face=3DArial=20
size=3D2><SPAN =
class=3D449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Lucida Console"><FONT color=3D#0000ff><FONT =
size=3D2><SPAN=20
class=3D449362715-20032002></SPAN></FONT></FONT></FONT></SPAN></SPAN><FO=
NT=20
face=3DTahoma><FONT size=3D2><SPAN class=3D449362715-20032002><FONT =
face=3DArial=20
color=3D#0000ff>&nbsp;</FONT></SPAN></FONT></FONT></DIV>
<DIV><FONT face=3DTahoma><FONT size=3D2><SPAN=20
class=3D449362715-20032002>&nbsp;</SPAN>-----Original =
Message-----<BR><B>From:</B>=20
Julian Satran [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> =
Wednesday, March=20
20, 2002 9:08 AM<BR><B>To:</B> Michael Schoberg<BR><B>Cc:</B> IPS =
Reflector=20
(E-mail); owner-ips@ece.cmu.edu<BR><B>Subject:</B> Re: iSCSI: Rev 11 =
minor=20
issues<BR><BR></DIV></FONT></FONT>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px"><BR><FONT=20
  face=3Dsans-serif size=3D2>To add a connection to an existing session =
you need to=20
  comletely identify the session you are attaching to.</FONT> <BR><FONT =

  face=3Dsans-serif size=3D2>A host can use several initiator names and =
a target can=20
  held several target names.</FONT> <BR><FONT face=3Dsans-serif =
size=3D2>The=20
  ISID+TPGT are unique only between a pair of names.</FONT> =
<BR><BR><FONT=20
  face=3Dsans-serif size=3D2>JUlo</FONT> <BR><BR><BR>
  <TABLE width=3D"100%">
    <TBODY>
    <TR vAlign=3Dtop>
      <TD>
      <TD><FONT face=3Dsans-serif size=3D1><B>Michael Schoberg=20
        &lt;michael_schoberg@cnt.com&gt;</B></FONT> <BR><FONT =
face=3Dsans-serif=20
        size=3D1>Sent by: owner-ips@ece.cmu.edu</FONT>=20
        <P><FONT face=3Dsans-serif size=3D1>19-03-02 20:27</FONT> =
<BR><FONT=20
        face=3Dsans-serif size=3D1>Please respond to Michael =
Schoberg</FONT>=20
<BR></P>
      <TD><FONT face=3DArial size=3D1>&nbsp; &nbsp; &nbsp; &nbsp; =
</FONT><BR><FONT=20
        face=3Dsans-serif size=3D1>&nbsp; &nbsp; &nbsp; &nbsp; To: =
&nbsp; &nbsp;=20
        &nbsp; &nbsp;"IPS Reflector (E-mail)" =
&lt;ips@ece.cmu.edu&gt;</FONT>=20
        <BR><FONT face=3Dsans-serif size=3D1>&nbsp; &nbsp; &nbsp; =
&nbsp; cc: &nbsp;=20
        &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT face=3Dsans-serif =
size=3D1>&nbsp;=20
        &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: =
Rev 11=20
        minor issues</FONT> <BR><BR><FONT face=3DArial size=3D1>&nbsp; =
&nbsp; &nbsp;=20
        &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face=3D"Times =
New Roman"=20
  size=3D3>Just want to verify something. &nbsp;Is it possible to have =
multiple=20
  Initiator identities (i.e.: InitiatorName=3D) on the same session =
through=20
  different connections? &nbsp;If not, why is InitiatorName negotiation =
required=20
  on ancillary connections. &nbsp;If iSCSI doesn't allow for multiple =
initiators=20
  per session, then all it's doing is requiring another check for the =
target;=20
  that the same InitiatorName is given for all connections on the=20
  session.</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D3>Example .. on the leading =
session=20
  connection, the initiator says:</FONT>=20
  <P><FONT face=3D"Times New Roman" =
size=3D3>InitiatorName=3DFred</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D3>Then on an ancillary =
connection the=20
  initiator says:</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D3>InitiatorName=3DBob</FONT> =

  <P><FONT face=3D"Times New Roman" size=3D3>Now the target would have =
to trap this=20
  and zap the connection. &nbsp;Why not just assume the same =
InitiatorName as=20
  the session and let authentication verify it? &nbsp;This eliminates =
the extra=20
  negotiation check on the target.</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D2><BR>4.3</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D2><U>The initial login =
request of any=20
  connection MUST include the InitiatorName key=3Dvalue pair.</U> =
</FONT>
  <P>
  <HR>

  <P><FONT face=3D"Times New Roman" size=3D2>8.1.2 &amp; 11</FONT>=20
  <P><FONT face=3D"Times New Roman" size=3D3>"SW" and "CO" ? &nbsp;Can =
the=20
  abbreviation be dropped and replaced with the full description?=20
  &nbsp;"Session-Wide" and "Connection-Wide" should fit on the =
line.</FONT>=20
  <P>
  <P></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D046.ACEFF660--


From owner-ips@ece.cmu.edu  Wed Mar 20 16:59:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA16461
	for <ips-archive@lists.ietf.org>; Wed, 20 Mar 2002 16:59:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KL0hI02335
	for ips-outgoing; Wed, 20 Mar 2002 16:00:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KL0fw02331
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 16:00:42 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id WAA58118
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 22:00:35 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2KL0YW98544
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 22:00:34 +0100
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF29B77622.8F7E90D3-ONC2256B82.005D980E@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Wed, 20 Mar 2002 19:05:00 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 20/03/2002 23:00:34
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Dear colleagues,

I suggested using : (colon) to separate values in a range. Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo



From owner-ips@ece.cmu.edu  Wed Mar 20 17:48:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA18074
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 17:48:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KM5jM06696
	for ips-outgoing; Wed, 20 Mar 2002 17:05:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KM5hw06691
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 17:05:43 -0500 (EST)
Received: from nisser.cisco.com (nisser.cisco.com [171.71.176.85])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id g2KM5bd11557
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:05:37 -0800 (PST)
Received: from cisco.com (58509@mbakke-lnx.cisco.com [161.44.68.87]) by nisser.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id OAA26575 for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:05:35 -0800 (PST)
Message-ID: <3C9903FD.9085407D@cisco.com>
Date: Wed, 20 Mar 2002 15:49:49 -0600
From: Mark Bakke <mbakke@cisco.com>
X-Mailer: Mozilla 4.72 [en] (X11; U; Linux 2.2.16-3.uid32 i686)
X-Accept-Language: en, de
MIME-Version: 1.0
To: IPS <ips@ece.cmu.edu>
Subject: IPS: SLP MIB draft
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Here's the SLP MIB draft announcement from the SLP list.  The
object model (extremely simple) is at:

ftp://ftp.pwg.org/pub/pwg/ipp/new_SLP/draft-mcdonald-svrloc-mib-uml-03.pdf

--
Mark

"McDonald, Ira" wrote:
> 
> Copies: "SLP Project" <srvloc-discuss@lists.sourceforge.net>
>         "IETF IPP WG" <ipp@pwg.org>
> 
> Hi folks,                                          Friday (1 March 2002)
> 
> I've just sent a revised draft of 'Definitions of Managed Objects for
> Service Location Protocol (SLP MIB)' to the Internet-Drafts editor and
> posted a copy on the Printer Working Group (PWG) Anonymous FTP server in
> the directory 'ftp://ftp.pwg.org/pub/pwg/ipp/new_SLP/' in the files:
> 
>     <draft-mcdonald-svrloc-mib-03.txt> (1 March 2002) - full I-D
>     <draft-mcdonald-svrloc-mib-03.mib> (1 March 2002) - SMIv2 MIB
> 
> This draft is a minor rewrite to remove all the remaining 'read-write'
> objects, per concensus of the SLP Project mailing list.  The draft-01
> defined 142 objects.  This new draft defines 10 mandatory and 6 optional
> objects.
> 
> My co-editor Mark Bakke (Cisco) will raise the question of a separate
> experimental (or standards track) SLPv2 Configuration MIB during the
> IETF IPS (IP Storage) WG session on Monday (18 March 2002) at IETF 53
> in Minneapolis (iSCSI uses SLPv2 for discovery and requires remote
> configuration capabilities for SLPv2 DAs/SAs).
> 
> Comments?
> 
> Cheers,
> - Ira McDonald (co-editor of SLP MIB)
>   High North Inc
>   imcdonald@sharplabs.com
> 
> ------------------------------------------------------------------------
> 
> 14.  Appendix X - Change Log
> 
>    [to be deleted before publication as an RFC]
> 
>    <draft-mcdonald-svrloc-mib-03.txt> 1 March 2002
>    - added Normative References section, per request of RFC Editor
>    - added Informative References section, per request of RFC Editor
>    - revised Abstract, Introduction, and Security Considerations to
>      state that the SLP MIB supports passive monitoring (but not
>      configuration), per concensus of SLP Project mailing list
>    - deleted Property group (last remaining 'read-write' objects), per
>      concensus of SLP Project mailing list
> 
> ------------------------------------------------------------------------
> 
> Copies: "Internet Drafts Editor" <internet-drafts@ietf.org>
>         "Mark Bakke" <mbakke@cisco.com>
>         "Ira McDonald" <imcdonald@sharplabs.com>
> 
> I-D Editor,                                        Friday (1 March 2002)
> 
> Please place this updated document in the Internet-Drafts repository
> named:
> 
>     <draft-mcdonald-svrloc-mib-03.txt> (1 March 2002)
> 
> It replaces the previous draft:
> 
>     <draft-mcdonald-svrloc-mib-02.txt> (11 February 2002)
> 
> Abstract
> 
>    This memo defines a portion of the Management Information Base (MIB)
>    for use with network management protocols in the Internet community.
>    In particular, it defines as set of managed objects that support
>    monitoring (but not configuration) of Service Location Protocol
>    Version 2 (SLPv2) [RFC2608] [RFC3111] directory agents (DAs), service
>    agents (SAs), and user agents (UAs).
> 
> Thanks very much,
> - Ira McDonald (co-editor of SLP MIB)
>   High North Inc
>   imcdonald@sharplabs.com
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Srvloc-discuss mailing list
> Srvloc-discuss@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/srvloc-discuss

-- 
Mark A. Bakke
Cisco Systems
mbakke@cisco.com
763.398.1054


From owner-ips@ece.cmu.edu  Wed Mar 20 17:49:16 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA18117
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 17:49:16 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KM3f706544
	for ips-outgoing; Wed, 20 Mar 2002 17:03:41 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KM3cw06539
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 17:03:38 -0500 (EST)
Received: from nisser.cisco.com (nisser.cisco.com [171.71.176.85])
	by sj-msg-core-4.cisco.com (8.12.2/8.12.2) with ESMTP id g2KM3Uja019945
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:03:30 -0800 (PST)
Received: from cisco.com (58509@mbakke-lnx.cisco.com [161.44.68.87]) by nisser.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id OAA24289 for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 14:03:14 -0800 (PST)
Message-ID: <3C99036E.C8BB1C08@cisco.com>
Date: Wed, 20 Mar 2002 15:47:26 -0600
From: Mark Bakke <mbakke@cisco.com>
X-Mailer: Mozilla 4.72 [en] (X11; U; Linux 2.2.16-3.uid32 i686)
X-Accept-Language: en, de
MIME-Version: 1.0
To: IPS <ips@ece.cmu.edu>
Subject: iSCSI Auth MIB: Address Family Type Request (22-23)
Content-Type: multipart/mixed;
 boundary="------------756B6A3496F89B5CE79539B5"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multi-part message in MIME format.
--------------756B6A3496F89B5CE79539B5
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit


We had requested that IANA add two new address family
types for FC WWPNs and FC WWNNs for use within the
authentication MIB, and perhaps within other FC-related
MIBs.  They (Michelle) responded very quickly (within
a few days!)  The assignments doc and MIBs have been
updated.

IANA wrote:
> 
> Dear Mark,
> 
> We have assigned the following IANA Address
> Family Numbers with you as the point of contact:
> 
> 22    Fibre Channel World-Wide Port Name                   [Bakke]
> 23    Fibre Channel World-Wide Node Name                   [Bakke]
> 
> [Bakke] Mark Bakke, <mbakke@cisco.com>, March 2002.
> 
> <http://www.iana.org/assignments/address-family-numbers>
> 
> and
> 
> <http://www.iana.org/assignments/ianaaddressfamilynumbers-mib>
> 
> Please notify the IANA if there is a change in contact
> information.
> 
> Thank you,
> 
> Michelle S. Cotton
> IANA Administrator
> 
> ***************************************************************
> Internet Assigned Numbers Authority (IANA)
> 4676 Admiralty Way, Suite 330
> Marina del Rey, California 90292
> 
> Voice: (310) 823-9358
> FAX:   (310) 823-8649
> email: iana@iana.org
> ***************************************************************

-- 
Mark A. Bakke
Cisco Systems
mbakke@cisco.com
763.398.1054
--------------756B6A3496F89B5CE79539B5
Content-Type: message/rfc822
Content-Disposition: inline

Return-Path: iana@icann.org
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by dogwood.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id NAA17976 for <mbakke@dogwood.cisco.com>; Thu, 14 Mar 2002 13:20:37 -0500 (EST)
Received: from sj-msg-av-3.cisco.com (sj-msg-av-3.cisco.com [171.69.17.42])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id g2EIKZT26068;
	Thu, 14 Mar 2002 10:20:36 -0800 (PST)
Received: from proxy2.cisco.com (localhost [127.0.0.1])
	by sj-msg-av-3.cisco.com (8.10.1/8.10.1) with ESMTP id g2EIKZw02535;
	Thu, 14 Mar 2002 10:20:35 -0800 (PST)
Received: from mailhub.icann.org (mailhub.icann.org [192.0.34.33])
	by proxy2.cisco.com (8.11.2/8.11.2) with ESMTP id g2EIKIw05040;
	Thu, 14 Mar 2002 10:20:18 -0800 (PST)
Received: from tarim ([192.0.35.80])
	by mailhub.icann.org (8.9.3/8.9.3) with SMTP id KAA32094;
	Thu, 14 Mar 2002 10:15:43 -0800
From: "IANA" <iana@iana.org>
To: <mbakke@cisco.com>
Cc: "David Black" <Black_David@emc.com>,
        "Elizabeth Rodriguez" <elizabethrodriguez@ieee.org>,
        "Keith McCloghrie" <kzm@cisco.com>
Subject: RE: Address Family Type Request (22-23)
Date: Thu, 14 Mar 2002 10:20:22 -0800
Message-ID: <NFBBLJLIJAJFFGEJDPOGKEAICHAA.iana@icann.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200
Importance: Normal
In-Reply-To: <3C8F7558.8F24A53C@cisco.com>
X-Mozilla-Status2: 00000000
Content-Transfer-Encoding: 7bit

Dear Mark,

We have assigned the following IANA Address 
Family Numbers with you as the point of contact:

22    Fibre Channel World-Wide Port Name                   [Bakke]
23    Fibre Channel World-Wide Node Name                   [Bakke]

[Bakke] Mark Bakke, <mbakke@cisco.com>, March 2002.

<http://www.iana.org/assignments/address-family-numbers>

and

<http://www.iana.org/assignments/ianaaddressfamilynumbers-mib>

Please notify the IANA if there is a change in contact
information.

Thank you,

Michelle S. Cotton
IANA Administrator

***************************************************************
Internet Assigned Numbers Authority (IANA)
4676 Admiralty Way, Suite 330
Marina del Rey, California 90292

Voice: (310) 823-9358
FAX:   (310) 823-8649
email: iana@iana.org
***************************************************************		


--------------756B6A3496F89B5CE79539B5--



From owner-ips@ece.cmu.edu  Wed Mar 20 18:30:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA18935
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 18:30:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KMlO809392
	for ips-outgoing; Wed, 20 Mar 2002 17:47:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from erie.mcdata.com (mcjekyll.mcdata.com [144.49.6.25])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KMlLw09388
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 17:47:22 -0500 (EST)
Received: by erie.mcdata.com with Internet Mail Service (5.5.2653.19)
	id <GYJX15AJ>; Wed, 20 Mar 2002 15:47:16 -0700
Message-ID: <84540A7A9263854CBA6E6F99BA2CE4CE15CC41@380exu01.mcdata.com>
From: Michel Maddux <Michel.Maddux@mcdata.com>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>,
        "'ips@ece.cmu.edu'"
	 <ips@ece.cmu.edu>
Subject: RE: 
Date: Wed, 20 Mar 2002 15:47:15 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

two dots (..) seems clear - you've got my vote. /m.

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 20, 2002 10:05 AM
To: ips@ece.cmu.edu
Subject: 


Dear colleagues,

I suggested using : (colon) to separate values in a range. Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo


From owner-ips@ece.cmu.edu  Wed Mar 20 18:33:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA19023
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 18:33:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2KNB4T10853
	for ips-outgoing; Wed, 20 Mar 2002 18:11:04 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2KNB1w10847;
	Wed, 20 Mar 2002 18:11:01 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id AAA30088;
	Thu, 21 Mar 2002 00:10:54 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2KNArG87682;
	Thu, 21 Mar 2002 00:10:54 +0100
To: Martins Krikis <mkrikis@yahoo.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Importance: High
MIME-Version: 1.0
Subject: Re: ExpDataSN overload
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF437FF611.59CCB0F9-ONC2256B82.007CF260@telaviv.ibm.com>
Date: Thu, 21 Mar 2002 01:10:53 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 21/03/2002 01:10:52,
	Serialize complete at 21/03/2002 01:10:52
Content-Type: multipart/alternative; boundary="=_alternative 007EBE63C2256B82_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 007EBE63C2256B82_=
Content-Type: text/plain; charset="us-ascii"

It has popped now to the top of my stack - comments in text _ Julo




Martins Krikis <mkrikis@yahoo.com>
Sent by: owner-ips@ece.cmu.edu
13-03-02 01:37
Please respond to Martins Krikis

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        ExpDataSN overload

 

Dear list members,

I've just noticed that ExpDataSN is used to denote
a lot of different things (all references w.r.t.
to draft 11):

1) the total number of Data-In PDUs that a target
   has sent to complete a SCSI (read-like) command
   (2.5.1.2, 9.4.7, 6.6, E.9.2);

2) next concecutive input DataSN number expected by
   the initiator for the referenced command in
previous
   execution, used in TASK REASSIGN
   (6.1.2, 9.5.4);

3) internal target variable used to track the next
   DataSN Expected from the initator or something
   like that
   (6.2).

Regarding use 1: this is the most widespread, and
there is nothing to object, except perhaps that the
name ExpDataSN doesn't convey the exact meaning---
"TotalDataPDUs" or "NumDataPDUs" or something like
that. Anyway, I can live with this.

+++ It coveys the name of register it copies into the PDU - +++

Regarding use 2: the name conveys the meaning, but
I don't like the wording of this spot in 6.1.2:
"... for example taking advantage of ExpDataSN in 
the iSCSI command PDU for read commands...". The
problem is that "read commands" don't have ExpDataSN
in the PDU, it's the "Task Management Function
Request"
PDUs that do. Task Management Function Request PDUs
are, of course, "iSCSI command PDUs", but the whole
thing makes it too easy to make the mistake of
remembering (the ill-named) ExpDataSN field in 
SCSI Response PDU, at which point nothing makes sense
anymore, because that's the other meaning of
ExpDataSN.
I would appreciate if somebody could rephrase the
sentence. I'll even volunteer:

"In reassigning connection allegiance for a command,
the targets SHOULD continue the command from its
current state. For example, when reassigning read
commands, the targets SHOULD take advantage of the
ExpDataSN field provided by the Task Management
Function Request PDU (which must be set to zero
if there was no data transfer) and bring the command
to completion by sending (or resending) the status."
+++ I'll fix the wording +++
Regarding use 3: I don't understand this. The last
two sentences of 6.2 seem to be talking about
Data-Out PDUs, therefore uses 1 and 2 of ExpDataSN
(that are both Data-In PDU related) don't apply
here. I'm concluding that these sentences are 
making some (unwelcome) assumptions about target
implementation details (e.g., ExpDataSN in the role
of a variable used to track the DataSN of the next
Data-Out PDU that a target expects to receive for
this command). If so, I would like such assumptions
dropped and no MUSTs (and MAYs) imposed on a target
implementation. If I'm wrong, somebody please explain
to me what was meant here.
+++ will fix text +++
"Bonus" :-) problem:

While we're at 6.1.2, the start of the 3rd paragraph
also got me thinking and browsing the draft for 
quite a while. I don't like the "This is true even
when the CmdSN can be reliably ascertained..."
phrase. The problem is, I don't see how it could not
be reliably determined for rejected PDUs. My thinking
is that the only way to not be able to reliably
determine CmdSN is in the case of header digest
errors.  +++ Yes +++
But in this case, the PDU must be silently dropped,
and not be answered with a Reject PDU. Am I wrong
somewhere? If not, can we change the sentence I
mentioned to something that explains that for rejected
PDUs, the target will necessarily have a good CmdSN,
but still must not use it"? 
+++ because there was a feeling that retrying the whole PDU (even if only 
the immediate data failed was a simpler option +++

Help on these issues will be much appreciated.

  Martins Krikis, Intel Corp.

Disclaimer: These opinions are mine only and
            may not reflect those of my employer.





__________________________________________________
Do You Yahoo!?
Try FREE Yahoo! Mail - the world's greatest free email!
http://mail.yahoo.com/



--=_alternative 007EBE63C2256B82_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">It has popped now to the top of my stack - comments in text _ Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Martins Krikis &lt;mkrikis@yahoo.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">13-03-02 01:37</font>
<br><font size=1 face="sans-serif">Please respond to Martins Krikis</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;ExpDataSN overload</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Dear list members,<br>
<br>
I've just noticed that ExpDataSN is used to denote<br>
a lot of different things (all references w.r.t.<br>
to draft 11):<br>
<br>
1) the total number of Data-In PDUs that a target<br>
 &nbsp; has sent to complete a SCSI (read-like) command<br>
 &nbsp; (2.5.1.2, 9.4.7, 6.6, E.9.2);<br>
<br>
2) next concecutive input DataSN number expected by<br>
 &nbsp; the initiator for the referenced command in<br>
previous<br>
 &nbsp; execution, used in TASK REASSIGN<br>
 &nbsp; (6.1.2, 9.5.4);<br>
<br>
3) internal target variable used to track the next<br>
 &nbsp; DataSN Expected from the initator or something<br>
 &nbsp; like that<br>
 &nbsp; (6.2).<br>
<br>
Regarding use 1: this is the most widespread, and<br>
there is nothing to object, except perhaps that the<br>
name ExpDataSN doesn't convey the exact meaning---<br>
&quot;TotalDataPDUs&quot; or &quot;NumDataPDUs&quot; or something like<br>
that. Anyway, I can live with this.</font>
<br>
<br><font size=2 face="Courier New">+++ It coveys the name of register it copies into the PDU - +++<br>
<br>
Regarding use 2: the name conveys the meaning, but<br>
I don't like the wording of this spot in 6.1.2:<br>
&quot;... for example taking advantage of ExpDataSN in <br>
the iSCSI command PDU for read commands...&quot;. The<br>
problem is that &quot;read commands&quot; don't have ExpDataSN<br>
in the PDU, it's the &quot;Task Management Function<br>
Request&quot;<br>
PDUs that do. Task Management Function Request PDUs<br>
are, of course, &quot;iSCSI command PDUs&quot;, but the whole<br>
thing makes it too easy to make the mistake of<br>
remembering (the ill-named) ExpDataSN field in <br>
SCSI Response PDU, at which point nothing makes sense<br>
anymore, because that's the other meaning of<br>
ExpDataSN.<br>
I would appreciate if somebody could rephrase the<br>
sentence. I'll even volunteer:<br>
<br>
&quot;In reassigning connection allegiance for a command,<br>
the targets SHOULD continue the command from its<br>
current state. For example, when reassigning read<br>
commands, the targets SHOULD take advantage of the<br>
ExpDataSN field provided by the Task Management<br>
Function Request PDU (which must be set to zero<br>
if there was no data transfer) and bring the command<br>
to completion by sending (or resending) the status.&quot;<br>
+++ I'll fix the wording +++<br>
Regarding use 3: I don't understand this. The last<br>
two sentences of 6.2 seem to be talking about<br>
Data-Out PDUs, therefore uses 1 and 2 of ExpDataSN<br>
(that are both Data-In PDU related) don't apply<br>
here. I'm concluding that these sentences are <br>
making some (unwelcome) assumptions about target<br>
implementation details (e.g., ExpDataSN in the role<br>
of a variable used to track the DataSN of the next<br>
Data-Out PDU that a target expects to receive for<br>
this command). If so, I would like such assumptions<br>
dropped and no MUSTs (and MAYs) imposed on a target<br>
implementation. If I'm wrong, somebody please explain<br>
to me what was meant here.<br>
+++ will fix text +++<br>
&quot;Bonus&quot; :-) problem:<br>
<br>
While we're at 6.1.2, the start of the 3rd paragraph<br>
also got me thinking and browsing the draft for <br>
quite a while. I don't like the &quot;This is true even<br>
when the CmdSN can be reliably ascertained...&quot;<br>
phrase. The problem is, I don't see how it could not<br>
be reliably determined for rejected PDUs. My thinking<br>
is that the only way to not be able to reliably<br>
determine CmdSN is in the case of header digest<br>
errors. &nbsp;+++ Yes +++<br>
But in this case, the PDU must be silently dropped,<br>
and not be answered with a Reject PDU. Am I wrong</font>
<br><font size=2 face="Courier New">somewhere? If not, can we change the sentence I<br>
mentioned to something that explains that for rejected<br>
PDUs, the target will necessarily have a good CmdSN,<br>
but still must not use it&quot;? </font>
<br><font size=2 face="Courier New">+++ because there was a feeling that retrying the whole PDU (even if only the immediate data failed was a simpler option +++<br>
<br>
Help on these issues will be much appreciated.<br>
<br>
 &nbsp;Martins Krikis, Intel Corp.<br>
<br>
Disclaimer: These opinions are mine only and<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;may not reflect those of my employer.<br>
<br>
<br>
<br>
<br>
<br>
__________________________________________________<br>
Do You Yahoo!?<br>
Try FREE Yahoo! Mail - the world's greatest free email!<br>
http://mail.yahoo.com/<br>
</font>
<br>
<br>
--=_alternative 007EBE63C2256B82_=--


From owner-ips@ece.cmu.edu  Wed Mar 20 19:48:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA20367
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 19:48:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2L059K14190
	for ips-outgoing; Wed, 20 Mar 2002 19:05:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2L056w14184
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 19:05:06 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id QAA28134;
	Wed, 20 Mar 2002 16:04:25 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>, <ips@ece.cmu.edu>
Subject: RE: 
Date: Thu, 21 Mar 2002 00:04:51 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMEEFNDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <OF29B77622.8F7E90D3-ONC2256B82.005D980E@telaviv.ibm.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


	I would prefer one character. I don't care what it is, any character
will do, but having only one there is slightly easier to parse that
having two.

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo



From owner-ips@ece.cmu.edu  Wed Mar 20 19:49:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA20386
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 19:49:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2L0MEJ15210
	for ips-outgoing; Wed, 20 Mar 2002 19:22:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2L0MBw15201
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 19:22:11 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP
	id D0C03600953; Wed, 20 Mar 2002 16:22:05 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id QAA05600;
	Wed, 20 Mar 2002 16:21:59 -0800 (PST)
Message-ID: <3C9928AC.9708B6B9@cup.hp.com>
Date: Wed, 20 Mar 2002 16:26:20 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: Re: iSCSI: Rev 11 minor issues
References: <3C7122FAF06DD5118ED60050047336482631E1@esply01.cnt.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Michael,

I don't believe the individual connections that comprise a session can
use different iscsi initiator names. The initiator name is intended to
be the node name of that initiator. A session cannot span multiple
nodes.

Also, there is a one to one correspondence b/n an I-T nexus and an iscsi
session. Hence, the following does'nt seem quite right to me :

> Each login requires the InitiatorName because although 
> it may be an additional connection to an existing session, 
> it may not be for the same I_T nexus.

and, since a session can't involve multiple initiator names, this
does'nt seem right either :

> -------------------------------------------------------------------------
>  InitiatorName      ISID     CID  TSID TgtName Session I_T Nexus
> a1 Fred          010203040506  0000 0001 idisk *   #1     it-1
> a2 Bob           010203040506  0001 0001 idisk     #1     it-2
> a3 Joe           010203040506  0002 0001 idisk     #1     it-3
> a4 Fred          010203040506  0003 0001 idisk     #1     it-1


In the above example, if Fred, Bob & Joe belong to a single node, then,
they need to use a single iscsi initiator name, and only then, can they
share a session.

Thanks,
Santosh





Julian,
 
Thanks for the follow-up.  Forgive me for being slow with this, but I'm
still confused by your statement.  Let me walk
you through some of my thoughts.
 
An initiator is defined to be an "initiator node".  It's identification
is through the initiator port name, which
includes the InitiatorName, ISID, etc.  Each login requires the
InitiatorName because although it may be an additional
connection to an existing session, it may not be for the same I_T nexus.
 
Initiators are added to a session like this:
 
-------------------------------------------------------------------------
   InitiatorName      ISID     CID  TSID TgtName Session I_T Nexus
a1 Fred          010203040506  0000 0001 idisk *   #1     it-1
a2 Bob           010203040506  0001 0001 idisk     #1     it-2
a3 Joe           010203040506  0002 0001 idisk     #1     it-3
a4 Fred          010203040506  0003 0001 idisk     #1     it-1
a5 Ted           010203040506  0000 0001 idisk *   #2     it-4
a6 Fred          010203040506  0000 0001 idisk *   ??
a7 Ted           010203040506  0004 0001 idisk     ??
a8 Ted           010203040506  0001 0001 idisk     ??
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
-------------------------------------------------------------------------
 
Within any single session there will be one or more I_T nexus formed
(see a1, a2, a3, a4).
 
           ISID RULE: Between a given iSCSI Initiator and iSCSI Target
Portal 
           Group (SCSI target port), there can be only one session with
a given 
           value for ISID that identifies the SCSI initiator port. See
Section 
           9.12.5 ISID.

My interpretation: any initiator's attempt to reuse the same ISID for
creating an additional session (TSID = 0000) with
the same target-portal-group breaks the ISID rule; initiators must
provide different ISID values to create new sessions
with the same target-portal-group (see a6, breaks ISID rule).  However,
since the "initiator port identifier" includes
InitiatorName, alternate initiators may simultaneously use the same ISID
value (see a5, does not break ISID rule).
 
           TSID RULE: The iSCSI Target SHOULD NOT select a TSID for a
given login 
           request if the resulting SSID is already in use by an
existing session 
           between the target and the requesting iSCSI Initiator. See
Section 
           8.1.1 Conservative Reuse of ISIDs.
 
My interpretation: a target should expect (and accept) initiator
attempts to login with the same ISID and can select the
same TSID as long it's from a different initiator (see a5).  However, if
an existing initiator is identified, then the
target should select a TSID that forms a unique SSID (see b4).  This is
confusing because it assumes that the initiator
will break the ISID rule?  Also, does this break session reinstatement?
 
-------------------------------------------------------------------------
   InitiatorName        ISID      CID    TSID    TargetName  Session
b1 Fred            010203040506   0000   0001    idisk *       #1
b2 Bob             010203040506   0000   0001    idisk *       #2
b3 Joe             010203040506   0000   0001    idisk *       #3
b4 Fred            010203040506   0000   0002    idisk *       #4
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
-------------------------------------------------------------------------
 
How does this work with 4.3.5 Session Reinstatement:

           Session reinstatement is the process of initiator logging in
with an 
           ISID that is possibly active from the target's perspective -
thus 
           implicitly logging out the session state machine
corresponding to the 
           ISID and reinstating a new iSCSI session in its place (with
the same 
           ISID).  Thus, the TSID in the Login PDU MUST be zero to
signal session 
           reinstatement.  All the tasks that were active on the old
session are 
           internally terminated on a session reinstatement.
 
           The initiator session state MUST be FAILED (Section 5.3
Session State 
           Diagrams) for attempting a session reinstatement.
 
My interpretation (#1 of 2): Session reinstatement only occurs when the
target has identified and authenticated that an
existing initiator (identified by InitiatorName & ISID) has performed a
second leading login.  Then and only then can
session reinstatement be performed.  Unfortunately, this assumes that
sessions will always have the same initiator
performing the leading login (so in a1->a4, only Fred can perform
session reinstatement for that session.)  That's bad
news if that particular initiator is no longer active.
 
(#2 of 2):  ANY leading login received by the iSCSI target with an
existing and target-perspective active ISID is assumed
to be session reinstatement.  This means that the logins described by [
a5 & b1..b4 ] are invalid.  Further, this
conflicts with your note saying that the initiator must be completely
identified on every login.
 
Now look at connection reinstatement (4.3.4)

           Connection reinstatement is the process of initiator logging
in with a 
           ISID-TSID-CID combination that is possibly active from the
target's 
           perspective - thus implicitly logging out the connection
state 
           machine corresponding to the CID and reinstating a new
full-feature 
           phase iSCSI connection in its place (with the same CID). 
Thus, the 
           TSID in the Login PDU MUST be non-zero and CID does not
change during 
           a connection reinstatement.  The Login command  performs the
logout 
           function of the old connection if an explicit logout was not
performed 
           earlier. In sessions with a single connection, this may imply
the 
           opening of a second connection with the sole purpose of
cleaning up 
           the first. Targets should support opening a second connection
even 
           when they do not support multiple connections in full feature
phase.  
 
           If the operational ErrorRecoveryLevel is 2, connection
reinstatement 
           enables future task reassignment.  If the operational
ErrorRecovery-
           Level is less than 2, connection reinstatement is the
replacement of 
           the old CID without enabling task reassignment.  In this
case, all the 
           tasks that were active on the old CID are internally
terminated.
 
           The initiator connection state MUST be CLEANUP_WAIT (section
5.1) for 
           attempting a connection reinstatement. 
 
If an iSCSI connection is attempted in which multiple initiator-sessions
are available with the same ISID + TSID, to
which session should the iSCSI target attach it?  In [a7] above, there
are two active sessions with the same SSID, to
which should a7 be attached?  Another special case [a8] will result in
either a new connection on session #2 or
connection reinstatement (or possible conflict) with session #1.
 
Thanks for your time on this!
 
-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Wed Mar 20 20:05:24 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA20581
	for <ips-archive@odin.ietf.org>; Wed, 20 Mar 2002 20:05:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2L0Fx214851
	for ips-outgoing; Wed, 20 Mar 2002 19:15:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2L0Fkw14837
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 19:15:47 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 6566CC00172; Wed, 20 Mar 2002 16:15:39 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id QAA04790;
	Wed, 20 Mar 2002 16:15:33 -0800 (PST)
Message-ID: <3C99272B.B78D3BE7@cup.hp.com>
Date: Wed, 20 Mar 2002 16:19:55 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: Dave Peterson <dap@cisco.com>
Cc: "Ips@Ece. Cmu. Edu" <ips@ece.cmu.edu>
Subject: Re: iSCSI: items discussed at WG meeting
References: <EDEKKDKNBFCABNBAAOBBKEEKECAA.dap@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Dave,

Some queries inline.

Regards,
Santosh

Dave Peterson wrote:


> 4. Clause 6.7 SCSI Timeouts: explicitly state that a command retry shouldn't
> be performed after a SCSI level timeout.
> 
> "An iSCSI initiator MAY attempt to plug a command sequence gap on the target
> end (in the absence of an acknowledgement of the command by way of ExpCmdSN)
> before the ULP timeout by retrying the unacknowledged command, as described
> in Section 6.1 Retry and Reassign in Recovery."

Why would a scsi transport protocol be required to specify this ? Since
a ULP timeout is O.S. specific and is not an externally observable
value, either on the wire, or communicated to the target, why should
iscsi specify this ?

Different O.S. drivers may apply different timeout policies, with some
drivers allowing for some grace time to attempt to complete the I/O
after a timeout. 
 
IMO, the iscsi spec can be silent on what an O.S. specific driver does
when its O.S. specific ULP timeout expires. This is O.S. dependent.


> 6. Text stating that a TMF=Abort Task must be issued for each outstanding
> command. (Clause 6.7)

What does this mean (?). Could you elaborate further on this. 6.7
defines what action should be taken by an initiator on a SCSI timeout,
which occurs on a per-command basis and is dealt with individually for
each command.

Where do the remaining outstanding commands come into the picture,
unless, you're proposing that something like the FC second level error
recovery be performed, on failure of the abort (?).

> 
> 7. Targets MUST support the command retry functionality. Don't think this
> functionality provides much benefit in its current state.
> Consider this case:
> a. tape locate command is issued with a 10 second ULP timer
> b. command is dropped at the target due to a digest error
> c. having seen no status for 8 seconds (for example) the iSCSI initiator
> decides to retry the command.
> 
> What happens with the timer on the first command? If it is not canceled, and
> if status is not received within 2 seconds, an abort for the command will be
> issued by the ULP.

Agreed. This is an issue in some cases, since not enough I/O time would
be available for the retry. However, the selection of the initial
command retry timeout value (when the initiator determines that the
cmdsn has not been acknowledged for a long enough period and decides to
retry the command) and the decision on whether to retry should be taken
by the initiator driver, based on how much ULP time remains for that
I/O.

(Again, this logic is mostly O.S. driver specific.)

> 
> dap: a mechanism to initiate error detection/recovery would be beneficial.

Could you expand on this some more ?

> 
> 8. CRN Processing and behavior: spec currently references SAM-2 for CRN.
> 
> Per SAM-2:
> Command Reference Number (CRN):
> When this argument is used, all sequential commands of an I_T_L nexus shall
> include a CRN argument that is incremented by one. The initial, wrap, and
> reset CRN values shall be one. The CRN value zero shall be reserved for use
> as defined by the SCSI protocol. It is not an error for the application
> client to provide this argument when CRN is not supported by the SCSI
> protocol or logical unit.
> 
> More text specifying the behavior of CRN in the iSCSI realm is needed. In
> addition, a method to determine if CRN is being used (or not) is missing.

We went through this discussion several months ago in another ips
thread. CRN really belongs to the SCSI ULP and any mechanism to check if
the device server supports CRN should be in a SCSI ULP mode page (like
the Control Mode Page).

As far as iscsi is concerned, both the iscsi initiator and target
implementations MUST support CRN, since it is defined in iscsi command
pdu. 

Why is such a method required at the SCSI LLP layer ?


-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Thu Mar 21 00:14:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA26550
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 00:14:06 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2L4T2A27756
	for ips-outgoing; Wed, 20 Mar 2002 23:29:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from siaar2ab.compuserve.com (siaar2ab.compuserve.com [149.174.40.138])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2L4Sxw27749
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 23:28:59 -0500 (EST)
Received: (from mailgate@localhost)
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) id XAA10959
	for ips@ece.cmu.edu; Wed, 20 Mar 2002 23:28:53 -0500 (EST)
Received: from compuserve.com (dal-tgn-tkk-vty41.as.wcom.net [206.175.239.41])
	by siaar2ab.compuserve.com (8.9.3/8.9.3/SUN-REL-1.3) with ESMTP id XAA10940
	for <ips@ece.cmu.edu>; Wed, 20 Mar 2002 23:28:45 -0500 (EST)
Message-ID: <3C9962F1.27A3FC95@compuserve.com>
Date: Wed, 20 Mar 2002 22:34:57 -0600
From: Ralph Weber <ralphoweber@compuserve.com>
Reply-To: roweber@acm.org
X-Mailer: Mozilla 4.7 [en]C-CCK-MCD NSCPCD47  (Win95; I)
X-Accept-Language: en,pdf
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: Bit numbering I-D nit
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...




From owner-ips@ece.cmu.edu  Thu Mar 21 02:42:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA06325
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 02:42:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2L6r6a04828
	for ips-outgoing; Thu, 21 Mar 2002 01:53:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from fep03-mail.bloor.is.net.cable.rogers.com (fep03-mail.bloor.is.net.cable.rogers.com [66.185.86.73])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2L6r4w04823
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 01:53:05 -0500 (EST)
Received: from splentec.com ([24.43.3.134])
          by fep03-mail.bloor.is.net.cable.rogers.com
          (InterMail vM.5.01.04.06 201-253-122-122-106-20020109) with ESMTP
          id <20020321065300.BJXG4474.fep03-mail.bloor.is.net.cable.rogers.com@splentec.com>;
          Thu, 21 Mar 2002 01:53:00 -0500
Message-ID: <3C998343.6080305@splentec.com>
Date: Thu, 21 Mar 2002 01:52:51 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.4) Gecko/20011126 Netscape6/6.2.1
X-Accept-Language: en-us
MIME-Version: 1.0
To: Rod Harrison <rod.harrison@windriver.com>
CC: Julian Satran <Julian_Satran@il.ibm.com>, ips@ece.cmu.edu
Subject: Re: 
References: <NEBBKMMOEMCINPLCHKGMEEFNDDAA.rod.harrison@windriver.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep03-mail.bloor.is.net.cable.rogers.com from [24.43.3.134] using ID <tluben@rogers.com> at Thu, 21 Mar 2002 01:53:00 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Rod Harrison wrote:

> 	I would prefer one character. I don't care what it is, any character
> will do, but having only one there is slightly easier to parse that
> having two.


I strongly agree.

A single character, anyone indeed.

Maybe a dash/minus ``-'' (0x2d).

I don't think we'd ever need to pass
arithmetic expressions, so a minus would do...

-- 
Luben




From owner-ips@ece.cmu.edu  Thu Mar 21 08:24:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA10121
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 08:24:11 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LCddg29588
	for ips-outgoing; Thu, 21 Mar 2002 07:39:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LCdbw29584
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 07:39:38 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFB7C>; Thu, 21 Mar 2002 07:39:22 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F589A@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com,
        Rod Harrison
	 <rod.harrison@windriver.com>
Cc: Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
Date: Thu, 21 Mar 2002 07:39:20 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

A dash is also used for negative numbers (we don't have any yet but could in
the future).

It doesn't look cool but how about the semi-colon?

Eddy

-----Original Message-----
From: Luben Tuikov [mailto:luben@splentec.com]
Sent: Thursday, March 21, 2002 1:53 AM
To: Rod Harrison
Cc: Julian Satran; ips@ece.cmu.edu
Subject: Re: 


Rod Harrison wrote:

> 	I would prefer one character. I don't care what it is, any character
> will do, but having only one there is slightly easier to parse that
> having two.


I strongly agree.

A single character, anyone indeed.

Maybe a dash/minus ``-'' (0x2d).

I don't think we'd ever need to pass
arithmetic expressions, so a minus would do...

-- 
Luben



From owner-ips@ece.cmu.edu  Thu Mar 21 11:00:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA14618
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:00:24 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFa9a09988
	for ips-outgoing; Thu, 21 Mar 2002 10:36:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from erie.mcdata.com (mcjekyll.mcdata.com [144.49.6.25])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFa7w09984
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:36:07 -0500 (EST)
Received: by erie.mcdata.com with Internet Mail Service (5.5.2653.19)
	id <GYJXFAHD>; Thu, 21 Mar 2002 08:35:58 -0700
Message-ID: <84540A7A9263854CBA6E6F99BA2CE4CE15CC44@380exu01.mcdata.com>
From: Michel Maddux <Michel.Maddux@mcdata.com>
To: "'iSCSI'" <ips@ece.cmu.edu>, "'luben@splentec.com'" <luben@splentec.com>,
        Rod Harrison <rod.harrison@windriver.com>
Cc: Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
Date: Thu, 21 Mar 2002 08:35:50 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I disagree; a range of values has long been denoted by (..)

ASCII being limited, using a minus (-) sign will get into 
character overloading and ambiguity. thanks ./m.

-----Original Message-----
From: Luben Tuikov [mailto:luben@splentec.com]
Sent: Wednesday, March 20, 2002 11:53 PM
To: Rod Harrison
Cc: Julian Satran; ips@ece.cmu.edu
Subject: Re: 


Rod Harrison wrote:

> 	I would prefer one character. I don't care what it is, any character
> will do, but having only one there is slightly easier to parse that
> having two.


I strongly agree.

A single character, anyone indeed.

Maybe a dash/minus ``-'' (0x2d).

I don't think we'd ever need to pass
arithmetic expressions, so a minus would do...

-- 
Luben



From owner-ips@ece.cmu.edu  Thu Mar 21 11:00:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA14639
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:00:42 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LF8Bb08183
	for ips-outgoing; Thu, 21 Mar 2002 10:08:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2LF86w08177
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:08:07 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2LF7u004754
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:07:56 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2LF7sK04745;
	Thu, 21 Mar 2002 10:07:54 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2LF7s315523;
	Thu, 21 Mar 2002 10:07:54 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15513.63306.446436.598026@pkoning.dev.equallogic.com>
Date: Thu, 21 Mar 2002 10:07:54 -0500
From: Paul Koning <ni1d@arrl.net>
To: rod.harrison@windriver.com
Cc: ips@ece.cmu.edu
Subject: RE: 
References: <OF29B77622.8F7E90D3-ONC2256B82.005D980E@telaviv.ibm.com>
	<NEBBKMMOEMCINPLCHKGMEEFNDDAA.rod.harrison@windriver.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Rod" == Rod Harrison <rod.harrison@windriver.com> writes:

 Rod> I would prefer one character. I don't care what it is, any
 Rod> character will do, but having only one there is slightly easier
 Rod> to parse that having two.

I agree.

Colon will serve fine, unless we expect to have IPv6 address ranges in
login negotiations at some point.  Dash should work fine too.  But no
double-character tokens, please.

	 paul



From owner-ips@ece.cmu.edu  Thu Mar 21 11:01:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA14675
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:01:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFeuJ10262
	for ips-outgoing; Thu, 21 Mar 2002 10:40:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFeqw10254
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:40:52 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 7A8C530715; Thu, 21 Mar 2002 10:40:48 -0500 (EST)
Date: Thu, 21 Mar 2002 07:36:31 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.ietf53.cw.net>
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
In-Reply-To: <25369470B6F0D41194820002B328BDD22F589A@ATLOPS>
Message-ID: <Pine.NEB.4.33.0203210720120.355-100000@candlekeep.ietf53.cw.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Eddy Quicksall wrote:

> A dash is also used for negative numbers (we don't have any yet but could in
> the future).

True, but is that a concern here? For a range, you have to have two
numbers with the dash/minus between them. "-number" would not be a
valid range. So even if we ever get negative numbers, ranges should be
readily different.

The only point of confusion would be if we ever permitted algebraic
expressions, when the '-' would look like subtraction. But I think that
would neither be sensible nor likely.

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 11:23:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA15668
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:23:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFium10534
	for ips-outgoing; Thu, 21 Mar 2002 10:44:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFisw10526
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:44:54 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFB01>; Thu, 21 Mar 2002 10:44:53 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F58A9@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Bill Studenmund <wrstuden@wasabisystems.com>,
        Eddy Quicksall
	 <Eddy_Quicksall@ivivity.com>
Cc: iSCSI <ips@ece.cmu.edu>, luben@splentec.com,
        Rod Harrison
	 <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
Date: Thu, 21 Mar 2002 10:44:45 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

That would be ok for something like an expression parser but our parser
should be very simple minded and it is better if it is not context
sensitive. It is the same idea as "don't use two characters".

Also, the "looks" of it is not very important.

Eddy

-----Original Message-----
From: Bill Studenmund [mailto:wrstuden@wasabisystems.com]
Sent: Thursday, March 21, 2002 10:37 AM
To: Eddy Quicksall
Cc: iSCSI; luben@splentec.com; Rod Harrison; Julian Satran
Subject: RE: 


On Thu, 21 Mar 2002, Eddy Quicksall wrote:

> A dash is also used for negative numbers (we don't have any yet but could
in
> the future).

True, but is that a concern here? For a range, you have to have two
numbers with the dash/minus between them. "-number" would not be a
valid range. So even if we ever get negative numbers, ranges should be
readily different.

The only point of confusion would be if we ever permitted algebraic
expressions, when the '-' would look like subtraction. But I think that
would neither be sensible nor likely.

Take care,

Bill


From owner-ips@ece.cmu.edu  Thu Mar 21 11:36:25 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16082
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:36:25 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LG4Jf12075
	for ips-outgoing; Thu, 21 Mar 2002 11:04:19 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2LG4Ew12068
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:04:15 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2LG45005312
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:04:05 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2LG45K05303;
	Thu, 21 Mar 2002 11:04:05 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2LG44F18182;
	Thu, 21 Mar 2002 11:04:04 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15514.1140.622421.720310@pkoning.dev.equallogic.com>
Date: Thu, 21 Mar 2002 11:04:04 -0500
From: Paul Koning <ni1d@arrl.net>
To: roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: Re: Bit numbering I-D nit
References: <3C9962F1.27A3FC95@compuserve.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Ralph" == Ralph Weber <ralphoweber@compuserve.com> writes:

 Ralph> I am getting serious flack from the Fibre Channel community
 Ralph> over the bit numbering requirement in
 Ralph> http://www.ietf.org/ID-nits.html.

I can see why... I didn't realize that the requirement is for the
confusing old IMB-360 style bit ordering rather than the "powers of
two" bit ordering that's generally used.  Yuck.

 Ralph> The problem is that Fibre Channel uses the other bit numbering
 Ralph> scheme and interoperability woes seem certain unless something
 Ralph> gets documented in the IETF RFCs.

 Ralph> Everybody agrees that the body of the FC Frame Encapsulation
 Ralph> and FCIP drafts can have the IETF bit numbering in the
 Ralph> figures.

 Ralph> What they all want is an appendix, or some such thing in the
 Ralph> drafts/RFCs that translates it all back to the Fibre Channel
 Ralph> view of reality.

 Ralph> Such a thing seems destined to make waves in the IETF review
 Ralph> process, and possibly even be a target for the RFC Editor's
 Ralph> ax.

I would say an appendix that documents the mapping to other standards
is the right thing.  If that gives the RFC editor and/or IESG
heartburn, it's worth a battle.  Bit order is far too important an
interop issue to be left undiscussed, and if bureaucratic rules stand
in the way, those rules MUST change.

If those sound like strong words, so be it.  I've been burned far too
many times by bit order confusion to take this sort of thing lightly. 
If there exist two conventions in the community, it's mandatory to
document that explicitly and clearly state the mapping between the two
notations, or things will never work.

   paul



From owner-ips@ece.cmu.edu  Thu Mar 21 11:39:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16202
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:39:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LG4vg12128
	for ips-outgoing; Thu, 21 Mar 2002 11:04:57 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LG4tw12122
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:04:55 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id LAA62660;
	Thu, 21 Mar 2002 11:01:33 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2LG4rR127566;
	Thu, 21 Mar 2002 09:04:53 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: Bit numbering I-D nit
To: roweber@acm.org
Cc: IPS Reflector <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF00E01B88.3D72A935-ON88256B83.00580387@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 21 Mar 2002 08:04:16 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/21/2002 09:04:52 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Ralph,
I may have looked at this wrong, but though we have to change the way we
present (print) the bit numbering, the bits on the link are the same way it
was, or at least that is the way I read the RFC requirement.  What do you
think is the issue?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 03/20/2002 08:34:57
PM

Please respond to roweber@acm.org

Sent by:    owner-ips@ece.cmu.edu


To:    IPS Reflector <ips@ece.cmu.edu>
cc:
Subject:    Bit numbering I-D nit



I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...







From owner-ips@ece.cmu.edu  Thu Mar 21 11:39:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16214
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:39:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFpGl11015
	for ips-outgoing; Thu, 21 Mar 2002 10:51:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFpFw11011
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:51:15 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id C4E5630715; Thu, 21 Mar 2002 10:51:14 -0500 (EST)
Date: Thu, 21 Mar 2002 07:47:00 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.ietf53.cw.net>
To: <roweber@acm.org>
Cc: IPS Reflector <ips@ece.cmu.edu>
Subject: Re: Bit numbering I-D nit
In-Reply-To: <3C9962F1.27A3FC95@compuserve.com>
Message-ID: <Pine.NEB.4.33.0203210736580.355-100000@candlekeep.ietf53.cw.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Wed, 20 Mar 2002, Ralph Weber wrote:

> I am getting serious flack from the Fibre Channel
> community over the bit numbering requirement
> in http://www.ietf.org/ID-nits.html.
>
> The problem is that Fibre Channel uses the
> other bit numbering scheme and interoperability
> woes seem certain unless something gets
> documented in the IETF RFCs.
>
> Everybody agrees that the body of the FC
> Frame Encapsulation and FCIP drafts can
> have the IETF bit numbering in the figures.
>
> What they all want is an appendix, or some
> such thing in the drafts/RFCs that translates
> it all back to the Fibre Channel view of
> reality.
>
> Such a thing seems destined to make waves
> in the IETF review process, and possibly
> even be a target for the RFC Editor's ax.
>
> Should I just jump of the top of the Hilton
> now, or is there a way out of this mess?

Add it as an appendix, and see what happens. Does the Fibre Channel
community have a standard dictating how they lay out bit numbers? If so,
label it a translation to that standard. :-)

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 11:40:30 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16298
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:40:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LGKXN13307
	for ips-outgoing; Thu, 21 Mar 2002 11:20:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LGKUw13299
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:20:30 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 6AAA2B940; Thu, 21 Mar 2002 09:20:29 -0700 (MST)
Received: from axcsbh1.cos.agilent.com (axcsbh1.cos.agilent.com [130.29.152.143])
	by msgrel1.cos.agilent.com (Postfix) with ESMTP
	id 4EBBC436; Thu, 21 Mar 2002 09:20:29 -0700 (MST)
Received: by axcsbh1.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <HA1BSF7F>; Thu, 21 Mar 2002 09:20:29 -0700
Message-ID: <9F8400020EC5D311AF62009027C3961605F2693F@axcs09.cos.agilent.com>
From: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu
Subject: RE: Range Seperator
Date: Thu, 21 Mar 2002 09:20:27 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I do not like the ';' but I would prefer a single character. There have been
objections to using the comma or colon, then my third choice is the ".."
 
I really don't see any conflict using either the comma or colon.
 
Using comma is already used to separate list values. Colon being used in
addresses is irrelevant because those are different parameters. I certainly
keep track of which one we are working on.
 
Kevin Lemay
 
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Thursday, March 21, 2002 7:47 AM
To: Rod Harrison
Cc: ips@ece.cmu.edu
Subject: RE:



I was looking at what would be appropriate (and perhaps familiar to
programmers - double dot is used in Pascal for ranges).  (- or +) may come
handy later for other things. And BTW double characters are already there in
addresses. 
We could use semicolon(;) (I for some reason do not like it). 

So we have 2 proposals: 

1) .. (2 votes) 
2); (1 vote?) 

The tally is on! (untill tomorrow) 

Julo 





	"Rod Harrison" <rod.harrison@windriver.com> 


21-03-02 02:04 
Please respond to "Rod Harrison" 


        
        To:        Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu> 
        cc:         
        Subject:        RE: 

       



                I would prefer one character. I don't care what it is, any
character
will do, but having only one there is slightly easier to parse that
having two.

                - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo






From owner-ips@ece.cmu.edu  Thu Mar 21 11:40:56 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16311
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:40:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFlLp10721
	for ips-outgoing; Thu, 21 Mar 2002 10:47:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFlKw10717
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 10:47:20 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id QAA149766;
	Thu, 21 Mar 2002 16:47:12 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2LFlBc21892;
	Thu, 21 Mar 2002 16:47:12 +0100
To: "Rod Harrison" <rod.harrison@windriver.com>
Cc: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE:
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF1011C40A.DBED9683-ONC2256B83.0055AA02@telaviv.ibm.com>
Date: Thu, 21 Mar 2002 17:47:11 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 21/03/2002 17:47:12,
	Serialize complete at 21/03/2002 17:47:12
Content-Type: multipart/alternative; boundary="=_alternative 00567952C2256B83_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00567952C2256B83_=
Content-Type: text/plain; charset="us-ascii"

I was looking at what would be appropriate (and perhaps familiar to 
programmers - double dot is used in Pascal for ranges).  (- or +) may come 
handy later for other things. And BTW double characters are already there 
in addresses. 
We could use semicolon(;) (I for some reason do not like it).

So we have 2 proposals:

1) .. (2 votes)
2); (1 vote?)

The tally is on! (untill tomorrow)

Julo






"Rod Harrison" <rod.harrison@windriver.com>
21-03-02 02:04
Please respond to "Rod Harrison"

 
        To:     Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu>
        cc: 
        Subject:        RE:

 


                 I would prefer one character. I don't care what it is, 
any character
will do, but having only one there is slightly easier to parse that
having two.

                 - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo




--=_alternative 00567952C2256B83_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">I was looking at what would be appropriate (and perhaps familiar to programmers - double dot is used in Pascal for ranges). &nbsp;(- or +) may come handy later for other things. And BTW double characters are already there in addresses. </font>
<br><font size=2 face="sans-serif">We could use semicolon(;) (I for some reason do not like it).</font>
<br>
<br><font size=2 face="sans-serif">So we have 2 proposals:</font>
<br>
<br><font size=2 face="sans-serif">1) .. (2 votes)</font>
<br><font size=2 face="sans-serif">2); (1 vote?)</font>
<br>
<br><font size=2 face="sans-serif">The tally is on! (untill tomorrow)</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Rod Harrison&quot; &lt;rod.harrison@windriver.com&gt;</b></font>
<p><font size=1 face="sans-serif">21-03-02 02:04</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Rod Harrison&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL, &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE:</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New"><br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; I would prefer one character. I don't care what it is, any character<br>
will do, but having only one there is slightly easier to parse that<br>
having two.<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - Rod<br>
<br>
-----Original Message-----<br>
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of<br>
Julian Satran<br>
Sent: Wednesday, March 20, 2002 5:05 PM<br>
To: ips@ece.cmu.edu<br>
Subject:<br>
<br>
<br>
Dear colleagues,<br>
<br>
I suggested using : (colon) to separate values in a range.<br>
Unfortunately :<br>
is overused (in addresses and in names).<br>
I suggest we use the (old) two dots (..) to mark a range.<br>
<br>
Comments?<br>
Julo<br>
<br>
</font>
<br>
<br>
--=_alternative 00567952C2256B83_=--


From owner-ips@ece.cmu.edu  Thu Mar 21 11:41:12 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16370
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:41:12 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LG9kp12503
	for ips-outgoing; Thu, 21 Mar 2002 11:09:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LG9iw12499
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:09:44 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFB0T>; Thu, 21 Mar 2002 11:09:43 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F58AB@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Michel Maddux <Michel.Maddux@mcdata.com>, "'iSCSI'" <ips@ece.cmu.edu>,
        "'luben@splentec.com'" <luben@splentec.com>,
        Rod Harrison
	 <rod.harrison@windriver.com>
Cc: Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
Date: Thu, 21 Mar 2002 11:09:39 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Whatever is done, the parsing should be kept simple. Double characters and
context sensitive parsing has not been necessary to date. Let's just move
ahead with some unique (non overloaded) single character.

Eddy

-----Original Message-----
From: Michel Maddux [mailto:Michel.Maddux@mcdata.com]
Sent: Thursday, March 21, 2002 10:36 AM
To: 'iSCSI'; 'luben@splentec.com'; Rod Harrison
Cc: Julian Satran
Subject: RE: 


I disagree; a range of values has long been denoted by (..)

ASCII being limited, using a minus (-) sign will get into 
character overloading and ambiguity. thanks ./m.

-----Original Message-----
From: Luben Tuikov [mailto:luben@splentec.com]
Sent: Wednesday, March 20, 2002 11:53 PM
To: Rod Harrison
Cc: Julian Satran; ips@ece.cmu.edu
Subject: Re: 


Rod Harrison wrote:

> 	I would prefer one character. I don't care what it is, any character
> will do, but having only one there is slightly easier to parse that
> having two.


I strongly agree.

A single character, anyone indeed.

Maybe a dash/minus ``-'' (0x2d).

I don't think we'd ever need to pass
arithmetic expressions, so a minus would do...

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 11:42:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16473
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 11:42:43 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LFxu211713
	for ips-outgoing; Thu, 21 Mar 2002 10:59:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LFxow11699;
	Thu, 21 Mar 2002 10:59:51 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id QAA126942;
	Thu, 21 Mar 2002 16:59:29 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2LFxKc160792;
	Thu, 21 Mar 2002 16:59:29 +0100
To: Santosh Rao <santoshr@cup.hp.com>
Cc: Dave Peterson <dap@cisco.com>, "Ips@Ece. Cmu. Edu" <ips@ece.cmu.edu>,
        owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: items discussed at WG meeting
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFF791A71A.D3E7A7F5-ONC2256B83.0056A905@telaviv.ibm.com>
Date: Thu, 21 Mar 2002 17:59:19 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 21/03/2002 17:59:29,
	Serialize complete at 21/03/2002 17:59:29
Content-Type: multipart/alternative; boundary="=_alternative 00573432C2256B83_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00573432C2256B83_=
Content-Type: text/plain; charset="us-ascii"

Santosh,

my comments in text - Julo




Santosh Rao <santoshr@cup.hp.com>
Sent by: owner-ips@ece.cmu.edu
21-03-02 02:19
Please respond to Santosh Rao

 
        To:     Dave Peterson <dap@cisco.com>
        cc:     "Ips@Ece. Cmu. Edu" <ips@ece.cmu.edu>
        Subject:        Re: iSCSI: items discussed at WG meeting

 

Dave,

Some queries inline.

Regards,
Santosh

Dave Peterson wrote:


> 4. Clause 6.7 SCSI Timeouts: explicitly state that a command retry 
shouldn't
> be performed after a SCSI level timeout.
> 
> "An iSCSI initiator MAY attempt to plug a command sequence gap on the 
target
> end (in the absence of an acknowledgement of the command by way of 
ExpCmdSN)
> before the ULP timeout by retrying the unacknowledged command, as 
described
> in Section 6.1 Retry and Reassign in Recovery."

Why would a scsi transport protocol be required to specify this ? Since
a ULP timeout is O.S. specific and is not an externally observable
value, either on the wire, or communicated to the target, why should
iscsi specify this ?

Different O.S. drivers may apply different timeout policies, with some
drivers allowing for some grace time to attempt to complete the I/O
after a timeout. 
 
IMO, the iscsi spec can be silent on what an O.S. specific driver does
when its O.S. specific ULP timeout expires. This is O.S. dependent.


> 6. Text stating that a TMF=Abort Task must be issued for each 
outstanding
> command. (Clause 6.7)

What does this mean (?). Could you elaborate further on this. 6.7
defines what action should be taken by an initiator on a SCSI timeout,
which occurs on a per-command basis and is dealt with individually for
each command.

Where do the remaining outstanding commands come into the picture,
unless, you're proposing that something like the FC second level error
recovery be performed, on failure of the abort (?).


+++ Santosh - Dave asked for some advisory statements and we can make some 
about the ISCSI part. We can add some statements to the implementor notes 
I will make the available to the list soon. +++
> 
> 7. Targets MUST support the command retry functionality. Don't think 
this
> functionality provides much benefit in its current state.
> Consider this case:
> a. tape locate command is issued with a 10 second ULP timer
> b. command is dropped at the target due to a digest error
> c. having seen no status for 8 seconds (for example) the iSCSI initiator
> decides to retry the command.
> 
> What happens with the timer on the first command? If it is not canceled, 
and
> if status is not received within 2 seconds, an abort for the command 
will be
> issued by the ULP.

Agreed. This is an issue in some cases, since not enough I/O time would
be available for the retry. However, the selection of the initial
command retry timeout value (when the initiator determines that the
cmdsn has not been acknowledged for a long enough period and decides to
retry the command) and the decision on whether to retry should be taken
by the initiator driver, based on how much ULP time remains for that
I/O.

(Again, this logic is mostly O.S. driver specific.)

> 
> dap: a mechanism to initiate error detection/recovery would be 
beneficial.

Could you expand on this some more ?

> 
> 8. CRN Processing and behavior: spec currently references SAM-2 for CRN.
> 
> Per SAM-2:
> Command Reference Number (CRN):
> When this argument is used, all sequential commands of an I_T_L nexus 
shall
> include a CRN argument that is incremented by one. The initial, wrap, 
and
> reset CRN values shall be one. The CRN value zero shall be reserved for 
use
> as defined by the SCSI protocol. It is not an error for the application
> client to provide this argument when CRN is not supported by the SCSI
> protocol or logical unit.
> 
> More text specifying the behavior of CRN in the iSCSI realm is needed. 
In
> addition, a method to determine if CRN is being used (or not) is 
missing.
+++ we made clear that CRN is a SCSI issue. The only think that we might 
do is the clearing but even there I am not sure that we should not call a 
"generic SCSI function" and let T10 define what the function will do for 
different devices - certainly after defining it+++
We went through this discussion several months ago in another ips
thread. CRN really belongs to the SCSI ULP and any mechanism to check if
the device server supports CRN should be in a SCSI ULP mode page (like
the Control Mode Page).

As far as iscsi is concerned, both the iscsi initiator and target
implementations MUST support CRN, since it is defined in iscsi command
pdu. 

Why is such a method required at the SCSI LLP layer ?


-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################



--=_alternative 00573432C2256B83_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Santosh,</font>
<br>
<br><font size=2 face="sans-serif">my comments in text - Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Santosh Rao &lt;santoshr@cup.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">21-03-02 02:19</font>
<br><font size=1 face="sans-serif">Please respond to Santosh Rao</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Dave Peterson &lt;dap@cisco.com&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&quot;Ips@Ece. Cmu. Edu&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: items discussed at WG meeting</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Dave,<br>
<br>
Some queries inline.<br>
<br>
Regards,<br>
Santosh<br>
<br>
Dave Peterson wrote:<br>
<br>
<br>
&gt; 4. Clause 6.7 SCSI Timeouts: explicitly state that a command retry shouldn't<br>
&gt; be performed after a SCSI level timeout.<br>
&gt; <br>
&gt; &quot;An iSCSI initiator MAY attempt to plug a command sequence gap on the target<br>
&gt; end (in the absence of an acknowledgement of the command by way of ExpCmdSN)<br>
&gt; before the ULP timeout by retrying the unacknowledged command, as described<br>
&gt; in Section 6.1 Retry and Reassign in Recovery.&quot;<br>
<br>
Why would a scsi transport protocol be required to specify this ? Since<br>
a ULP timeout is O.S. specific and is not an externally observable<br>
value, either on the wire, or communicated to the target, why should<br>
iscsi specify this ?<br>
<br>
Different O.S. drivers may apply different timeout policies, with some<br>
drivers allowing for some grace time to attempt to complete the I/O<br>
after a timeout. <br>
 <br>
IMO, the iscsi spec can be silent on what an O.S. specific driver does<br>
when its O.S. specific ULP timeout expires. This is O.S. dependent.<br>
<br>
<br>
&gt; 6. Text stating that a TMF=Abort Task must be issued for each outstanding<br>
&gt; command. (Clause 6.7)<br>
<br>
What does this mean (?). Could you elaborate further on this. 6.7<br>
defines what action should be taken by an initiator on a SCSI timeout,<br>
which occurs on a per-command basis and is dealt with individually for<br>
each command.<br>
<br>
Where do the remaining outstanding commands come into the picture,<br>
unless, you're proposing that something like the FC second level error<br>
recovery be performed, on failure of the abort (?).<br>
</font>
<br>
<br><font size=2 face="Courier New">+++ Santosh - Dave asked for some advisory statements and we can make some about the ISCSI part. We can add some statements to the implementor notes I will make the available to the list soon. +++<br>
&gt; <br>
&gt; 7. Targets MUST support the command retry functionality. Don't think this<br>
&gt; functionality provides much benefit in its current state.<br>
&gt; Consider this case:<br>
&gt; a. tape locate command is issued with a 10 second ULP timer<br>
&gt; b. command is dropped at the target due to a digest error<br>
&gt; c. having seen no status for 8 seconds (for example) the iSCSI initiator<br>
&gt; decides to retry the command.<br>
&gt; <br>
&gt; What happens with the timer on the first command? If it is not canceled, and<br>
&gt; if status is not received within 2 seconds, an abort for the command will be<br>
&gt; issued by the ULP.<br>
<br>
Agreed. This is an issue in some cases, since not enough I/O time would<br>
be available for the retry. However, the selection of the initial<br>
command retry timeout value (when the initiator determines that the<br>
cmdsn has not been acknowledged for a long enough period and decides to<br>
retry the command) and the decision on whether to retry should be taken<br>
by the initiator driver, based on how much ULP time remains for that<br>
I/O.<br>
<br>
(Again, this logic is mostly O.S. driver specific.)<br>
<br>
&gt; <br>
&gt; dap: a mechanism to initiate error detection/recovery would be beneficial.<br>
<br>
Could you expand on this some more ?<br>
<br>
&gt; <br>
&gt; 8. CRN Processing and behavior: spec currently references SAM-2 for CRN.<br>
&gt; <br>
&gt; Per SAM-2:<br>
&gt; Command Reference Number (CRN):<br>
&gt; When this argument is used, all sequential commands of an I_T_L nexus shall<br>
&gt; include a CRN argument that is incremented by one. The initial, wrap, and<br>
&gt; reset CRN values shall be one. The CRN value zero shall be reserved for use<br>
&gt; as defined by the SCSI protocol. It is not an error for the application</font>
<br><font size=2 face="Courier New">&gt; client to provide this argument when CRN is not supported by the SCSI<br>
&gt; protocol or logical unit.<br>
&gt; <br>
&gt; More text specifying the behavior of CRN in the iSCSI realm is needed. In<br>
&gt; addition, a method to determine if CRN is being used (or not) is missing.<br>
+++ we made clear that CRN is a SCSI issue. The only think that we might do is the clearing but even there I am not sure that we should not call a &quot;generic SCSI function&quot; and let T10 define what the function will do for different devices - certainly after defining it+++<br>
We went through this discussion several months ago in another ips<br>
thread. CRN really belongs to the SCSI ULP and any mechanism to check if<br>
the device server supports CRN should be in a SCSI ULP mode page (like<br>
the Control Mode Page).<br>
<br>
As far as iscsi is concerned, both the iscsi initiator and target<br>
implementations MUST support CRN, since it is defined in iscsi command<br>
pdu. <br>
<br>
Why is such a method required at the SCSI LLP layer ?<br>
<br>
<br>
-- <br>
##################################<br>
Santosh Rao<br>
Software Design Engineer,<br>
HP-UX iSCSI Driver Team,<br>
Hewlett Packard, Cupertino.<br>
email : santoshr@cup.hp.com<br>
Phone : 408-447-3751<br>
##################################<br>
</font>
<br>
<br>
--=_alternative 00573432C2256B83_=--


From owner-ips@ece.cmu.edu  Thu Mar 21 12:12:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA17995
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:12:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LGWlB14133
	for ips-outgoing; Thu, 21 Mar 2002 11:32:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LGWiw14125
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:32:44 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFCAK>; Thu, 21 Mar 2002 11:32:43 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F58AF@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Paul Koning <ni1d@arrl.net>, rod.harrison@windriver.com
Cc: ips@ece.cmu.edu
Subject: RE: 
Date: Thu, 21 Mar 2002 11:32:37 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Tilde (~) is another choice.

Eddy

-----Original Message-----
From: Paul Koning [mailto:ni1d@arrl.net]
Sent: Thursday, March 21, 2002 10:08 AM
To: rod.harrison@windriver.com
Cc: ips@ece.cmu.edu
Subject: RE: 


>>>>> "Rod" == Rod Harrison <rod.harrison@windriver.com> writes:

 Rod> I would prefer one character. I don't care what it is, any
 Rod> character will do, but having only one there is slightly easier
 Rod> to parse that having two.

I agree.

Colon will serve fine, unless we expect to have IPv6 address ranges in
login negotiations at some point.  Dash should work fine too.  But no
double-character tokens, please.

	 paul


From owner-ips@ece.cmu.edu  Thu Mar 21 12:15:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18140
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:15:25 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LGtj415806
	for ips-outgoing; Thu, 21 Mar 2002 11:55:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LGthw15802
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:55:43 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id LAA81208
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:52:20 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2LGtdP28806;
	Thu, 21 Mar 2002 09:55:39 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE:
To: "Julian Satran" <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFBE473AAD.80025A65-ON88256B83.005C69FE@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Thu, 21 Mar 2002 08:50:50 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/21/2002 09:55:38 AM
MIME-Version: 1.0
Content-type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2LGthw15803
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit


What about using the ~ (tittle) symbol.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/21/2002
07:47:11 AM

Sent by:    owner-ips@ece.cmu.edu


To:    "Rod Harrison" <rod.harrison@windriver.com>
cc:    ips@ece.cmu.edu
Subject:    RE:




I was looking at what would be appropriate (and perhaps familiar to
programmers - double dot is used in Pascal for ranges).  (- or +) may come
handy later for other things. And BTW double characters are already there
in addresses.
We could use semicolon(;) (I for some reason do not like it).

So we have 2 proposals:

1) .. (2 votes)
2); (1 vote?)

The tally is on! (untill tomorrow)

Julo




                                                                           
      "Rod Harrison"                                                       
      <rod.harrison@windriver.               To:        Julian             
      com>                           Satran/Haifa/IBM@IBMIL,               
                                     <ips@ece.cmu.edu>                     
      21-03-02 02:04                         cc:                           
      Please respond to "Rod                 Subject:        RE:           
      Harrison"                                                            
                                                                           
                                                                           




                I would prefer one character. I don't care what it is, any
character
will do, but having only one there is slightly easier to parse that
having two.

                - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo









From owner-ips@ece.cmu.edu  Thu Mar 21 12:21:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18378
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:21:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LGfCF14725
	for ips-outgoing; Thu, 21 Mar 2002 11:41:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mx01-a.netapp.com (mx01-a.netapp.com [198.95.226.53])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LGf9w14715
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 11:41:09 -0500 (EST)
Received: from frejya.corp.netapp.com (frejya [10.10.20.91])
	by mx01-a.netapp.com (8.11.1/8.11.1/NTAP-1.2) with ESMTP id g2LGf3302481;
	Thu, 21 Mar 2002 08:41:03 -0800 (PST)
Received: from tahoe.corp.netapp.com (localhost [127.0.0.1])
	by frejya.corp.netapp.com (8.12.2/8.12.2/NTAP-1.4) with ESMTP id g2LGf2x4010501;
	Thu, 21 Mar 2002 08:41:03 -0800 (PST)
Received: by tahoe.corp.netapp.com with Internet Mail Service (5.5.2650.21)
	id <HFA1A58F>; Thu, 21 Mar 2002 08:38:26 -0800
Message-ID: <02740A3D0809D5118C7C00034707E9F30155485C@ussvlexc10.corp.netapp.com>
From: "Pittman, Joseph" <Joseph.Pittman@netapp.com>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu
Subject: RE: 
Date: Thu, 21 Mar 2002 08:41:01 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

How about the tilde character, '~'?
--
Joe Pittman
jpittman@netapp.com <mailto:jpittman@netapp.com> 
 
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Thursday, March 21, 2002 10:47 AM
To: Rod Harrison
Cc: ips@ece.cmu.edu
Subject: RE:



I was looking at what would be appropriate (and perhaps familiar to programmers
- double dot is used in Pascal for ranges).  (- or +) may come handy later for
other things. And BTW double characters are already there in addresses. 
We could use semicolon(;) (I for some reason do not like it). 

So we have 2 proposals: 

1) .. (2 votes) 
2); (1 vote?) 

The tally is on! (untill tomorrow) 

Julo 





	"Rod Harrison" <rod.harrison@windriver.com> 


21-03-02 02:04 
Please respond to "Rod Harrison" 


        
        To:        Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu> 
        cc:         
        Subject:        RE: 

       



                I would prefer one character. I don't care what it is, any
character
will do, but having only one there is slightly easier to parse that
having two.

                - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo






From owner-ips@ece.cmu.edu  Thu Mar 21 12:23:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18480
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:23:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LH0FU16116
	for ips-outgoing; Thu, 21 Mar 2002 12:00:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas2.cos.agilent.com (msgbas2x.cos.agilent.com [192.25.240.37])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LH09w16103;
	Thu, 21 Mar 2002 12:00:09 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas2.cos.agilent.com (Postfix) with ESMTP
	id 72255D1F; Thu, 21 Mar 2002 10:00:08 -0700 (MST)
Received: from axcsbh2.cos.agilent.com (axcsbh2.cos.agilent.com [130.29.152.144])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id D49BC436; Thu, 21 Mar 2002 10:00:07 -0700 (MST)
Received: from 130.29.152.144 by axcsbh2.cos.agilent.com (InterScan E-Mail VirusWall NT); Thu, 21 Mar 2002 10:00:07 -0700
Received: by axcsbh2.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <HMA0DQ55>; Thu, 21 Mar 2002 10:00:07 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00ADA261E@axcs04.cos.agilent.com>
From: "THALER,PAT (A-Roseville,ex1)" <pat_thaler@agilent.com>
To: "Ranganathan, Deva" <Deva_Ranganathan@adaptec.com>,
        "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        Julian Satran <Julian_Satran@il.ibm.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
Subject: RE: iSCSI: ITT field in draft 11
Date: Thu, 21 Mar 2002 10:00:03 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Deva,

An implementation can only rely on the field to always hold an ITT if it is
specified to do so. Currently, the BHS shows the field holding ITT "or
Opcode specific fields". Therefore, an implementation must check the Opcode
before it can use the field as an ITT.

The change Robert suggests isn't quite sufficient to accomplish allowing an
implementation to use the ITT before it checks the Opcode. To do that, we
would need to also need to change the BHS definition adding ITT to the list
of fields that always appear in the BHS and change the figure to reflect
that. Otherwise, vendor specific Opcodes and Opcodes defined in the future
might use that space in the BHS for something else.

Regards,
Pat

-----Original Message-----
From: Ranganathan, Deva [mailto:Deva_Ranganathan@adaptec.com]
Sent: Wednesday, March 20, 2002 8:59 AM
To: 'Robert D. Russell'; Julian Satran
Cc: ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: RE: iSCSI: ITT field in draft 11


Robert,

Is this not implementation related? 

-Deva


-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Wednesday, March 20, 2002 5:26 AM
To: Julian Satran
Cc: ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: iSCSI: ITT field in draft 11


Julian:

One of the changes that came in with draft 11 is that in the
Asynchronous Message PDU and in the Reject PDU the 4-byte field
at offset 16 became:
   16| Reserved -0xffffffff
whereas previously it had just been Reserved.

I believe the reason for explicitly specifying the value 0xffffffff
is because this field in all other PDUs is the Initiator Task Tag,
and for all those other PDUs this value means there is no valid
Initiator Transfer Tag.  This change now makes it possible for an
initiator to find the task associated with each incoming PDU before
looking at the opcode of the PDU.  So far so good.

The problem is that this field cannot be called Reserved due to section
9 which says that receivers MUST ignore reserved fields, thus defeating
the whole purpose of defining a value the initiator can use.

To correct this, the specs for both Asynchronous Message and Reject
should be changed to explicitly include the Initiator Task Tag field
and specify in the descriptions of each of those PDUs that this field
MUST be set to 0xffffffff.

If this is done, then every PDU will contain the Initiator Task Tag field,
and the description of the BHS in section 9.2.1 can be changed from:
  16| Initiator Task Tag or Opcode-specific fields
to
  16| Initiator Task Tag
which would clearly show the consistent meaning of this field over all PDUs.


Also, there are two related minor clarifications that should be made:

1) The 4th paragraph of section 9.16.1 currently says:
      "For Status SNACK, the Initiator Task Tag is reserved."
   It would be better if this said explicitly:
      "For Status SNACK, the Initiator Task Tag MUST be set to the
      reserved value 0xffffffff."

2) The last sentence in section 9.5.3 says:
      "For all the other functions this field is reserved."
   It would be better if this said explicitly:
      "For all the other functions this field MUST be set to the
      reserved value 0xffffffff."
   (Note that the corresponding sentence in section 9.6.2 already
   says this.)


Thanks,

Bob Russell
InterOperability Lab
University of New Hampshire
rdr@iol.unh.edu
603-862-3774


From owner-ips@ece.cmu.edu  Thu Mar 21 12:26:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18569
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:26:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LH6cF16592
	for ips-outgoing; Thu, 21 Mar 2002 12:06:38 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.wrs.com (unknown-1-11.windriver.com [147.11.1.11])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LH6Xw16584
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 12:06:34 -0500 (EST)
Received: from london (vpn10-95-10-3.wrsec.fr [10.95.10.3])
	by mail.wrs.com (8.9.3/8.9.1) with SMTP id JAA21500;
	Thu, 21 Mar 2002 09:05:50 -0800 (PST)
From: "Rod Harrison" <rod.harrison@windriver.com>
To: "LEMAY,KEVIN (A-Roseville,ex1)" <kevin_lemay@agilent.com>,
        "'Julian Satran'" <Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>
Subject: RE: iSCSI: Range Seperator
Date: Thu, 21 Mar 2002 17:06:15 -0000
Message-ID: <NEBBKMMOEMCINPLCHKGMCEGFDDAA.rod.harrison@windriver.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <9F8400020EC5D311AF62009027C3961605F2693F@axcs09.cos.agilent.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit


	I don't care what the character is since the focus is to make this
easy to parse, and not human readable. So to that end consider my vote
to be for whichever of the single characters is nearest to winning.
;-)

	However, if we do have to pay some mind to aesthetics then how about
the < character? So we would have MyKey=3<65,93<123

	- Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
LEMAY,KEVIN (A-Roseville,ex1)
Sent: Thursday, March 21, 2002 4:20 PM
To: 'Julian Satran'
Cc: ips@ece.cmu.edu
Subject: RE: Range Seperator


I do not like the ';' but I would prefer a single character. There
have been
objections to using the comma or colon, then my third choice is the
".."

I really don't see any conflict using either the comma or colon.

Using comma is already used to separate list values. Colon being used
in
addresses is irrelevant because those are different parameters. I
certainly
keep track of which one we are working on.

Kevin Lemay

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Thursday, March 21, 2002 7:47 AM
To: Rod Harrison
Cc: ips@ece.cmu.edu
Subject: RE:



I was looking at what would be appropriate (and perhaps familiar to
programmers - double dot is used in Pascal for ranges).  (- or +) may
come
handy later for other things. And BTW double characters are already
there in
addresses.
We could use semicolon(;) (I for some reason do not like it).

So we have 2 proposals:

1) .. (2 votes)
2); (1 vote?)

The tally is on! (untill tomorrow)

Julo





	"Rod Harrison" <rod.harrison@windriver.com>


21-03-02 02:04
Please respond to "Rod Harrison"



        To:        Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu>
        cc:
        Subject:        RE:





                I would prefer one character. I don't care what it is,
any
character
will do, but having only one there is slightly easier to parse that
having two.

                - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo






From owner-ips@ece.cmu.edu  Thu Mar 21 12:28:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18652
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:28:43 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LH6gu16602
	for ips-outgoing; Thu, 21 Mar 2002 12:06:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from magic.adaptec.com (magic.adaptec.com [208.236.45.80])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LH6dw16595
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 12:06:39 -0500 (EST)
Received: from redfish.adaptec.com (redfish.adaptec.com [162.62.50.11])
	by magic.adaptec.com (8.10.2+Sun/8.10.2) with ESMTP id g2LH6Xj03269;
	Thu, 21 Mar 2002 09:06:33 -0800 (PST)
Received: from aimexc07.corp.adaptec.com (aimexc07.corp.adaptec.com [162.62.62.47])
	by redfish.adaptec.com (8.8.8+Sun/8.8.8) with ESMTP id JAA02442;
	Thu, 21 Mar 2002 09:06:33 -0800 (PST)
Received: by aimexc07.corp.adaptec.com with Internet Mail Service (5.5.2653.19)
	id <FC330WX1>; Thu, 21 Mar 2002 09:04:38 -0800
Message-ID: <E156A23F1885D4119ED800B0D0498A9F01BA5EDD@aimexc07.corp.adaptec.com>
From: "Ranganathan, Deva" <Deva_Ranganathan@adaptec.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>
Cc: "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>
Subject: RE: iSCSI: ITT field in draft 11
Date: Thu, 21 Mar 2002 09:04:38 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Robert,

I agree with you that we need to have a consistent format defined for
efficient 
implementation. As Pat suggests, ITT  needs to,probably, be defined in BHS. 

Thanks

Deva

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Thursday, March 21, 2002 3:19 AM
To: Ranganathan, Deva
Cc: ips@ece.cmu.edu; owner-ips@ece.cmu.edu
Subject: RE: iSCSI: ITT field in draft 11


Deva:

I don't think so.  The target action must not be implementation
dependent because then initiators would not be able to
reliably use the value in the ITT field, which is the whole point.

Bob Russell


On Wed, 20 Mar 2002, Ranganathan, Deva wrote:

> Robert,
>
> Is this not implementation related?
>
> -Deva
>
>
> -----Original Message-----
> From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
> Sent: Wednesday, March 20, 2002 5:26 AM
> To: Julian Satran
> Cc: ips@ece.cmu.edu; owner-ips@ece.cmu.edu
> Subject: iSCSI: ITT field in draft 11
>
>
> Julian:
>
> One of the changes that came in with draft 11 is that in the
> Asynchronous Message PDU and in the Reject PDU the 4-byte field
> at offset 16 became:
>    16| Reserved -0xffffffff
> whereas previously it had just been Reserved.
>
> I believe the reason for explicitly specifying the value 0xffffffff
> is because this field in all other PDUs is the Initiator Task Tag,
> and for all those other PDUs this value means there is no valid
> Initiator Transfer Tag.  This change now makes it possible for an
> initiator to find the task associated with each incoming PDU before
> looking at the opcode of the PDU.  So far so good.
>
> The problem is that this field cannot be called Reserved due to section
> 9 which says that receivers MUST ignore reserved fields, thus defeating
> the whole purpose of defining a value the initiator can use.
>
> To correct this, the specs for both Asynchronous Message and Reject
> should be changed to explicitly include the Initiator Task Tag field
> and specify in the descriptions of each of those PDUs that this field
> MUST be set to 0xffffffff.
>
> If this is done, then every PDU will contain the Initiator Task Tag field,
> and the description of the BHS in section 9.2.1 can be changed from:
>   16| Initiator Task Tag or Opcode-specific fields
> to
>   16| Initiator Task Tag
> which would clearly show the consistent meaning of this field over all
PDUs.
>
>
> Also, there are two related minor clarifications that should be made:
>
> 1) The 4th paragraph of section 9.16.1 currently says:
>       "For Status SNACK, the Initiator Task Tag is reserved."
>    It would be better if this said explicitly:
>       "For Status SNACK, the Initiator Task Tag MUST be set to the
>       reserved value 0xffffffff."
>
> 2) The last sentence in section 9.5.3 says:
>       "For all the other functions this field is reserved."
>    It would be better if this said explicitly:
>       "For all the other functions this field MUST be set to the
>       reserved value 0xffffffff."
>    (Note that the corresponding sentence in section 9.6.2 already
>    says this.)
>
>
> Thanks,
>
> Bob Russell
> InterOperability Lab
> University of New Hampshire
> rdr@iol.unh.edu
> 603-862-3774
>


From owner-ips@ece.cmu.edu  Thu Mar 21 12:35:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA18953
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 12:35:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LH83d16683
	for ips-outgoing; Thu, 21 Mar 2002 12:08:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LH81w16677
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 12:08:01 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id E59B03070C; Thu, 21 Mar 2002 12:08:00 -0500 (EST)
Date: Thu, 21 Mar 2002 09:03:43 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.ietf53.cw.net>
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: RE: 
In-Reply-To: <25369470B6F0D41194820002B328BDD22F58A9@ATLOPS>
Message-ID: <Pine.NEB.4.33.0203210748190.355-100000@candlekeep.ietf53.cw.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Eddy Quicksall wrote:

> That would be ok for something like an expression parser but our parser
> should be very simple minded and it is better if it is not context
> sensitive. It is the same idea as "don't use two characters".

While I agree simple is good, there has to be some sort of context
senstivity. I mean you have to figure out if you have one value or a
range, don't you? How do you do that? Don't you parse one number and then
look at the next character to decide if you have a range or not? If the
next character is the range-indicating character, you remove it from the
stream and then call the number parser again, don't you? Given that, how
is using a '-' a problem? It's the exact same code (hardware or software)
as using ';', just a different constant.

Since I really doubt algebraic expressions will ever be valid, the
sequence " ... number '-' number ... " can never mean anything other than
a range. So how is that hard for even a simple parser to deal with?

Also, I think you've assumed that: 1) we should use '-' either for
negative numbers or for ranges not both, and 2) that we would rather use
'-' for negative numbers than for ranges. While I don't care much about
the first assumption, if we have to choose between ranges using '-' and
negative numbers, ranges seem to make more sense to me here. Most programs
accept them, and it's a rather intuitive way to express them.

Also, are we really ever going to need negative numbers? SCSI doesn't have
them. IP doesn't. TCP does not.  Since those protocols use unsigned
numbers, why would we need signed?

> Also, the "looks" of it is not very important.

I think you took my use of "look" at too simplistic a level. I did not say
aesthetics. :-) My use of "look" reflects parsability of text. If
something "looks" like something else, I'm saying it's more difficult to
distinguish the two interpretations in a parser (you need extra context
which we both agree is usually bad). If things "look" like each other,
it's harder to tell them apart. We don't want that, in order to keep the
parser simple as you mentioned above. Thus "looks" are important.

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 13:36:24 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA20977
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 13:36:24 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LI1gF20308
	for ips-outgoing; Thu, 21 Mar 2002 13:01:42 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from Kairos.dsa.uqam.ca (kairos.dsa.uqam.ca [132.208.43.57])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LI1dw20300
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 13:01:39 -0500 (EST)
Received: from localhost (bill@localhost)
	by Kairos.dsa.uqam.ca (8.11.4/8.11.4) with ESMTP id g2LHwOu27416;
	Thu, 21 Mar 2002 12:58:24 -0500
Date: Thu, 21 Mar 2002 12:58:24 -0500 (EST)
From: Bill Strahm <bill@strahm.net>
X-X-Sender:  <bill@Kairos.dsa.uqam.ca>
To: John Hufferd <hufferd@us.ibm.com>
cc: Julian Satran <Julian_Satran@il.ibm.com>, <ips@ece.cmu.edu>
Subject: RE:
In-Reply-To: <OFBE473AAD.80025A65-ON88256B83.005C69FE@boulder.ibm.com>
Message-ID: <Pine.LNX.4.33.0203211257500.27318-100000@Kairos.dsa.uqam.ca>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=X-UNKNOWN
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from QUOTED-PRINTABLE to 8bit by ece.cmu.edu id g2LI1ew20301
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

I wonder if this is how Ray Tomlinson felt when he had to select a
seperator... Hmmmm this one doesn't seem to be used for much, lets use it

Bill

On Thu, 21 Mar 2002, John Hufferd wrote:

>
> What about using the ~ (tittle) symbol.
>
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
>
>
> "Julian Satran" <Julian_Satran@il.ibm.com>@ece.cmu.edu on 03/21/2002
> 07:47:11 AM
>
> Sent by:    owner-ips@ece.cmu.edu
>
>
> To:    "Rod Harrison" <rod.harrison@windriver.com>
> cc:    ips@ece.cmu.edu
> Subject:    RE:
>
>
>
>
> I was looking at what would be appropriate (and perhaps familiar to
> programmers - double dot is used in Pascal for ranges).  (- or +) may come
> handy later for other things. And BTW double characters are already there
> in addresses.
> We could use semicolon(;) (I for some reason do not like it).
>
> So we have 2 proposals:
>
> 1) .. (2 votes)
> 2); (1 vote?)
>
> The tally is on! (untill tomorrow)
>
> Julo
>
>
>
>
>
>       "Rod Harrison"
>       <rod.harrison@windriver.               To:        Julian
>       com>                           Satran/Haifa/IBM@IBMIL,
>                                      <ips@ece.cmu.edu>
>       21-03-02 02:04                         cc:
>       Please respond to "Rod                 Subject:        RE:
>       Harrison"
>
>
>
>
>
>
>                 I would prefer one character. I don't care what it is, any
> character
> will do, but having only one there is slightly easier to parse that
> having two.
>
>                 - Rod
>
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Julian Satran
> Sent: Wednesday, March 20, 2002 5:05 PM
> To: ips@ece.cmu.edu
> Subject:
>
>
> Dear colleagues,
>
> I suggested using : (colon) to separate values in a range.
> Unfortunately :
> is overused (in addresses and in names).
> I suggest we use the (old) two dots (..) to mark a range.
>
> Comments?
> Julo
>
>
>
>
>
>
>



From owner-ips@ece.cmu.edu  Thu Mar 21 13:37:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA20991
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 13:37:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LHmsV19425
	for ips-outgoing; Thu, 21 Mar 2002 12:48:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LHmpw19417
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 12:48:51 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id EBCEB3070C; Thu, 21 Mar 2002 12:48:50 -0500 (EST)
Date: Thu, 21 Mar 2002 09:44:35 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.ietf53.cw.net>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: Rod Harrison <rod.harrison@windriver.com>, <ips@ece.cmu.edu>
Subject: RE:
In-Reply-To: <OF1011C40A.DBED9683-ONC2256B83.0055AA02@telaviv.ibm.com>
Message-ID: <Pine.NEB.4.33.0203210936560.330-100000@candlekeep.ietf53.cw.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Julian Satran wrote:

> I was looking at what would be appropriate (and perhaps familiar to
> programmers - double dot is used in Pascal for ranges).  (- or +) may come
> handy later for other things. And BTW double characters are already there
> in addresses.
>
> We could use semicolon(;) (I for some reason do not like it).
>
> So we have 2 proposals:

I think actually we have three proposals, don't we?

> 1) .. (2 votes)
> 2); (1 vote?)

3) '-', and it seems to have at least two supporters. :-)

> The tally is on! (untill tomorrow)

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 13:39:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA21079
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 13:39:44 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LHt9R19839
	for ips-outgoing; Thu, 21 Mar 2002 12:55:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from lakemtao03.cox.net (lakemtao03.cox.net [68.1.17.242])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LHt6w19833
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 12:55:06 -0500 (EST)
Received: from CX418298C ([68.5.217.92]) by lakemtao03.cox.net
          (InterMail vM.5.01.04.05 201-253-122-122-105-20011231) with SMTP
          id <20020321175501.KCEU18064.lakemtao03.cox.net@CX418298C>;
          Thu, 21 Mar 2002 12:55:01 -0500
From: "Murali Rajagopal" <muralir@cox.net>
To: "Paul Koning" <ni1d@arrl.net>, <roweber@acm.org>
Cc: <ips@ece.cmu.edu>
Subject: RE: Bit numbering I-D nit
Date: Thu, 21 Mar 2002 09:55:34 -0800
Message-ID: <BMEMKGJGDIECPINNKIGEOEMPDBAA.muralir@cox.net>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
In-Reply-To: <15514.1140.622421.720310@pkoning.dev.equallogic.com>
X-MIMEOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul/Ralph:

Clearly it appears that putting something an appendix is reaching a high
degree of consensus.
One might also, via an example in the appendix alert the reader to this
mapping. I would find
it hard that any RFC editor would argue with this informative example.

-Murali

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Paul Koning
Sent: Thursday, March 21, 2002 8:04 AM
To: roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: Re: Bit numbering I-D nit


>>>>> "Ralph" == Ralph Weber <ralphoweber@compuserve.com> writes:

 Ralph> I am getting serious flack from the Fibre Channel community
 Ralph> over the bit numbering requirement in
 Ralph> http://www.ietf.org/ID-nits.html.

I can see why... I didn't realize that the requirement is for the
confusing old IMB-360 style bit ordering rather than the "powers of
two" bit ordering that's generally used.  Yuck.

 Ralph> The problem is that Fibre Channel uses the other bit numbering
 Ralph> scheme and interoperability woes seem certain unless something
 Ralph> gets documented in the IETF RFCs.

 Ralph> Everybody agrees that the body of the FC Frame Encapsulation
 Ralph> and FCIP drafts can have the IETF bit numbering in the
 Ralph> figures.

 Ralph> What they all want is an appendix, or some such thing in the
 Ralph> drafts/RFCs that translates it all back to the Fibre Channel
 Ralph> view of reality.

 Ralph> Such a thing seems destined to make waves in the IETF review
 Ralph> process, and possibly even be a target for the RFC Editor's
 Ralph> ax.

I would say an appendix that documents the mapping to other standards
is the right thing.  If that gives the RFC editor and/or IESG
heartburn, it's worth a battle.  Bit order is far too important an
interop issue to be left undiscussed, and if bureaucratic rules stand
in the way, those rules MUST change.

If those sound like strong words, so be it.  I've been burned far too
many times by bit order confusion to take this sort of thing lightly.
If there exist two conventions in the community, it's mandatory to
document that explicitly and clearly state the mapping between the two
notations, or things will never work.

   paul




From owner-ips@ece.cmu.edu  Thu Mar 21 14:26:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22491
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 14:26:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LJ3Kq25295
	for ips-outgoing; Thu, 21 Mar 2002 14:03:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ariel.nishansystems.com (goretex.nishansystems.com [216.217.36.167] (may be forged))
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LJ3Iw25291
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 14:03:18 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <G52NT8KY>; Thu, 21 Mar 2002 11:03:03 -0800
Message-ID: <B300BD9620BCD411A366009027C21D9BE86AAF@ariel.nishansystems.com>
From: Charles Monia <cmonia@NishanSystems.com>
To: "'Murali Rajagopal'" <muralir@cox.net>, Paul Koning <ni1d@arrl.net>,
        roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: RE: Bit numbering I-D nit
Date: Thu, 21 Mar 2002 11:02:52 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi Folks:

In my opinion, the overriding consideration must be to achieve clarity. In
that regard, I think the following guidelines should apply to the fibre
channel related drafts:

1.  The specification should have one and only one convention for
representing bits in a structure.

2. When a fibre channel construct is referenced in the spec, including a
reference to specific bit positions, the conventions for representing the
structure and the corresponding textual reference to specific fields or bits
within it should correspond to the normative fibre channel spec in which the
structure is defined.

I would suggest an informative appendix showing the mapping between the
fibre channel convention and that shown in the 'nits' document cited by
Ralph.

thanks,
Charles

> -----Original Message-----
> From: Murali Rajagopal [mailto:muralir@cox.net]
> Sent: Thursday, March 21, 2002 9:56 AM
> To: Paul Koning; roweber@acm.org
> Cc: ips@ece.cmu.edu
> Subject: RE: Bit numbering I-D nit
> 
> 
> Paul/Ralph:
> 
> Clearly it appears that putting something an appendix is 
> reaching a high
> degree of consensus.
> One might also, via an example in the appendix alert the 
> reader to this
> mapping. I would find
> it hard that any RFC editor would argue with this informative example.
> 
> -Murali
> 
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Paul Koning
> Sent: Thursday, March 21, 2002 8:04 AM
> To: roweber@acm.org
> Cc: ips@ece.cmu.edu
> Subject: Re: Bit numbering I-D nit
> 
> 
> >>>>> "Ralph" == Ralph Weber <ralphoweber@compuserve.com> writes:
> 
>  Ralph> I am getting serious flack from the Fibre Channel community
>  Ralph> over the bit numbering requirement in
>  Ralph> http://www.ietf.org/ID-nits.html.
> 
> I can see why... I didn't realize that the requirement is for the
> confusing old IMB-360 style bit ordering rather than the "powers of
> two" bit ordering that's generally used.  Yuck.
> 
>  Ralph> The problem is that Fibre Channel uses the other bit numbering
>  Ralph> scheme and interoperability woes seem certain unless something
>  Ralph> gets documented in the IETF RFCs.
> 
>  Ralph> Everybody agrees that the body of the FC Frame Encapsulation
>  Ralph> and FCIP drafts can have the IETF bit numbering in the
>  Ralph> figures.
> 
>  Ralph> What they all want is an appendix, or some such thing in the
>  Ralph> drafts/RFCs that translates it all back to the Fibre Channel
>  Ralph> view of reality.
> 
>  Ralph> Such a thing seems destined to make waves in the IETF review
>  Ralph> process, and possibly even be a target for the RFC Editor's
>  Ralph> ax.
> 
> I would say an appendix that documents the mapping to other standards
> is the right thing.  If that gives the RFC editor and/or IESG
> heartburn, it's worth a battle.  Bit order is far too important an
> interop issue to be left undiscussed, and if bureaucratic rules stand
> in the way, those rules MUST change.
> 
> If those sound like strong words, so be it.  I've been burned far too
> many times by bit order confusion to take this sort of thing lightly.
> If there exist two conventions in the community, it's mandatory to
> document that explicitly and clearly state the mapping between the two
> notations, or things will never work.
> 
>    paul
> 
> 


From owner-ips@ece.cmu.edu  Thu Mar 21 14:27:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22545
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 14:27:49 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LJIM926460
	for ips-outgoing; Thu, 21 Mar 2002 14:18:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LJIJw26453
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 14:18:19 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2LJHO220492;
	Thu, 21 Mar 2002 14:17:24 -0500
Message-ID: <3C9A31E9.3DF85391@splentec.com>
Date: Thu, 21 Mar 2002 14:18:01 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Julian Satran <Julian_Satran@il.ibm.com>
CC: Rod Harrison <rod.harrison@windriver.com>, ips@ece.cmu.edu
Subject: Re: 
References: <OF1011C40A.DBED9683-ONC2256B83.0055AA02@telaviv.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> 1) .. (2 votes)
> 2); (1 vote?)

Note that the complexity is between 1 and N (N > 1)
character as you'll have to ``put back'' those
characters in the buffer/IO stream if they don't
match, and going about it with a single char
is so much easy...

Hmm, why do we need a _different_
character for ranges? Don't we have the
variable context already?

As Bill pointed out, even if we use dash/minus,
allowing negative numbers in ranges is NO problem.

You can see this for yourselves by either
writing down the context free grammar rules for it,
or equivalently an automata for parsing it.

If we decide on ``..'', then this _is_equivalent_
to ``range'', i.e.
              OFMarkInt=1..10
parses as
              OFMarkInt=1range10

since you'll have to get to _another_ state upon
parsing the second ``.'', the only difference
is that you need more states for ``range''.

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 14:28:15 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22572
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 14:28:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LIn4c24092
	for ips-outgoing; Thu, 21 Mar 2002 13:49:04 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LIn0w24088
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 13:49:01 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2LImC220346;
	Thu, 21 Mar 2002 13:48:12 -0500
Message-ID: <3C9A2B12.2930B6FE@splentec.com>
Date: Thu, 21 Mar 2002 13:48:50 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
CC: Bill Studenmund <wrstuden@wasabisystems.com>, iSCSI <ips@ece.cmu.edu>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: iSCSI: Re: range separator
References: <25369470B6F0D41194820002B328BDD22F58A9@ATLOPS>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Eddy Quicksall wrote:
> 
> That would be ok for something like an expression parser but our parser
> should be very simple minded and it is better if it is not context
> sensitive. It is the same idea as "don't use two characters".

Context: are you parsing ``MaxConnections=3''
or ``3''. You see, your parser is already
context sensitive.

As iSCSI grows, undoubtedly each parameter/variable
will be handled by it's own string value parser,
and _THEN_ you'd abstractize into
 integer value, or
 string value, or
 range.

Note, that a range is
a string (we know this already) of
<integer><range symbol><integer> to use context
free grammar (stripped down version :-).

Philosophically, the debate is whether to use
1 character or many.

I vote for just a single char. Anywhich one.

Using a different character to tell us that
this string denotes a range is not quite a
solution here. E.g.:

MaxConnections=3<your range symbol here>10

So the Target will know that it is a range,
but it doesn't matter... it will have to check
the context anyway...

That is, the context really matters! (AI anyone?)

P.S. It would also be nice to see keys' values
in context free grammar (EBNF will do the trick,
or even BNF)... Then everything will be easier. :-)

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 14:31:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22756
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 14:31:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LJ2Fc25232
	for ips-outgoing; Thu, 21 Mar 2002 14:02:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LJ2Cw25222
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 14:02:12 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2LJ1S220413;
	Thu, 21 Mar 2002 14:01:28 -0500
Message-ID: <3C9A2E2D.1B4C01B3@splentec.com>
Date: Thu, 21 Mar 2002 14:02:05 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Michel Maddux <Michel.Maddux@mcdata.com>
CC: "'iSCSI'" <ips@ece.cmu.edu>, Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: 
References: <84540A7A9263854CBA6E6F99BA2CE4CE15CC44@380exu01.mcdata.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Michel Maddux wrote:
> 
> I disagree; a range of values has long been denoted by (..)

Really? In which context? Pascal programming language?

Math uses comma. We can use that too.
Regular expressions use dash/minus. We can use that too.

Why don't we use dash/minus which most of us know
from regular expressions and from school...

Regarding ``simplicity'':

If we are trying to keep it
simple, then why are we using variables like
MaxRecvPDULength and OFMarkInt case sensitive
on top of that????

Isn't this a low level protocol that will not be looked
at by humans.

How about "4=2"? ;-)

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 15:21:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24119
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 15:21:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LJXeC27733
	for ips-outgoing; Thu, 21 Mar 2002 14:33:40 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LJXbw27726
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 14:33:37 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2LJWm220573;
	Thu, 21 Mar 2002 14:32:48 -0500
Message-ID: <3C9A3586.316C3BAE@splentec.com>
Date: Thu, 21 Mar 2002 14:33:26 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: pat_thaler@agilent.com
CC: wrstuden@wasabisystems.com, Eddy_Quicksall@ivivity.com, ips@ece.cmu.edu,
        rod.harrison@windriver.com, Julian_Satran@il.ibm.com
Subject: Question? Re: iSCSI range separator
References: <1BEBA5E8600DD4119A50009027AF54A00ADA26A8@axcs04.cos.agilent.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

pat_thaler@agilent.com wrote:
> 
> Bill,
> 
> We are trying to avoid overloading characters.

Pat, why are we trying to avoid overloading of characters?

Given that a context for each variable already exists
and we cannot avoid it.

We already know what a variable takes, so then
we can just parse for THAT particular thing.

How about this (BNF) (Just an example, just an example):

IFMarkInt=<RangeValue>
OFMarkInt=<RangeValue>

<RangeValue> ::= <integer>
<RangeValue> ::= <integer><RS><integer>
<RangeValue> ::= <RangeValue>,<RangeValue>
<RS> ::= : | - | ~

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 15:27:26 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA22583
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 14:28:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LIjp223806
	for ips-outgoing; Thu, 21 Mar 2002 13:45:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LIjkw23794
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 13:45:46 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 1D972BADC; Thu, 21 Mar 2002 11:45:46 -0700 (MST)
Received: from axcsbh4.cos.agilent.com (axcsbh4.cos.agilent.com [130.29.152.145])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 7D2B819F6; Thu, 21 Mar 2002 11:45:45 -0700 (MST)
Received: from 130.29.152.145 by axcsbh4.cos.agilent.com (InterScan E-Mail VirusWall NT); Thu, 21 Mar 2002 11:45:45 -0700
Received: by axcsbh4.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <HBV11RC4>; Thu, 21 Mar 2002 11:45:45 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00ADA26A8@axcs04.cos.agilent.com>
From: pat_thaler@agilent.com
To: wrstuden@wasabisystems.com, Eddy_Quicksall@ivivity.com
Cc: ips@ece.cmu.edu, luben@splentec.com, rod.harrison@windriver.com,
        Julian_Satran@il.ibm.com
Subject: RE: iSCSI range separater
Date: Thu, 21 Mar 2002 11:45:42 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Bill,

We are trying to avoid overloading characters. If we were willing to
overload, we could use : (colon) which is used by some applications as a
range separater. I don't think we should overload the minus sign.

If we are not overloading, I vote for tilde.
If we are willing to overload, I vote for colon.

Pat

-----Original Message-----
From: Bill Studenmund [mailto:wrstuden@wasabisystems.com]
Sent: Thursday, March 21, 2002 7:37 AM
To: Eddy Quicksall
Cc: iSCSI; luben@splentec.com; Rod Harrison; Julian Satran
Subject: RE: 


On Thu, 21 Mar 2002, Eddy Quicksall wrote:

> A dash is also used for negative numbers (we don't have any yet but could
in
> the future).

True, but is that a concern here? For a range, you have to have two
numbers with the dash/minus between them. "-number" would not be a
valid range. So even if we ever get negative numbers, ranges should be
readily different.

The only point of confusion would be if we ever permitted algebraic
expressions, when the '-' would look like subtraction. But I think that
would neither be sensible nor likely.

Take care,

Bill


From owner-ips@ece.cmu.edu  Thu Mar 21 15:33:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24490
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 15:33:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LK8b601235
	for ips-outgoing; Thu, 21 Mar 2002 15:08:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cheetah.istor-networks.com (h-66-134-214-26.LSANCA54.covad.net [66.134.214.26])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LK8Yw01230
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 15:08:34 -0500 (EST)
X-MimeOLE: Produced By Microsoft Exchange V6.0.4417.0
content-class: urn:content-classes:message
Subject: Model for iSCSI over DDP or RDMA (iWarp)?
Date: Thu, 21 Mar 2002 12:09:20 -0800
Message-ID: <EFEFE40A8C80574D8A2A5C3876C2BCEE021818@cheetah.istor-networks.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Thread-Topic: Model for iSCSI over DDP or RDMA (iWarp)?
Thread-Index: AcHRFEj14OTATiPvTk68iyMuZWwFzg==
From: "Andy Kraslavsky" <akraslavsky@istor-networks.com>
To: "IPS Reflector" <ips@ece.cmu.edu>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2LK8Zw01231
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Good day,

Sorry if I missed this in an earlier posting but, is there a document 
I can get at which describes how iSCSI transactions would be best 
conducted via DDP (DDPP) or RDMA (iWarp)?

Thank you,

-- Andrew Kraslavsky
   iStor Networks 
 


From owner-ips@ece.cmu.edu  Thu Mar 21 15:35:30 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24526
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 15:35:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LKESH01904
	for ips-outgoing; Thu, 21 Mar 2002 15:14:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LKEPw01899
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 15:14:25 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id E42F23070C; Thu, 21 Mar 2002 15:14:24 -0500 (EST)
Date: Thu, 21 Mar 2002 12:10:09 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep>
To: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>
Cc: Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: iSCSI: Re: range separator
In-Reply-To: <3C9A2B12.2930B6FE@splentec.com>
Message-ID: <Pine.NEB.4.33.0203211206230.374-100000@candlekeep>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Luben Tuikov wrote:

> Eddy Quicksall wrote:
> >
> > That would be ok for something like an expression parser but our parser
> > should be very simple minded and it is better if it is not context
> > sensitive. It is the same idea as "don't use two characters".
>
> Context: are you parsing ``MaxConnections=3''
> or ``3''. You see, your parser is already
> context sensitive.
>
> As iSCSI grows, undoubtedly each parameter/variable
> will be handled by it's own string value parser,

Well, there probably won't be that many parsers. One set-of-numbers parser
can be used for all the number-expecting cases.

> and _THEN_ you'd abstractize into
>  integer value, or
>  string value, or
>  range.
>
> Note, that a range is
> a string (we know this already) of
> <integer><range symbol><integer> to use context
> free grammar (stripped down version :-).
>
> Philosophically, the debate is whether to use
> 1 character or many.
>
> I vote for just a single char. Anywhich one.

Agreed.

> Using a different character to tell us that
> this string denotes a range is not quite a
> solution here. E.g.:
>
> MaxConnections=3<your range symbol here>10
>
> So the Target will know that it is a range,
> but it doesn't matter... it will have to check
> the context anyway...

Won't the parser already have to have figured out the context anyway? We
have to know if the key is: 1) valid, and 2) appropriate for this phase
already, don't we? After figuring that out, is it hard to know if we
expect a string or one or more numbers?

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 15:35:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24538
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 15:35:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LKKAV02568
	for ips-outgoing; Thu, 21 Mar 2002 15:20:10 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LKK7w02558
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 15:20:07 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 86F9A3070C; Thu, 21 Mar 2002 15:20:07 -0500 (EST)
Date: Thu, 21 Mar 2002 12:15:51 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: Rod Harrison <rod.harrison@windriver.com>, <ips@ece.cmu.edu>
Subject: RE:
In-Reply-To: <OF1011C40A.DBED9683-ONC2256B83.0055AA02@telaviv.ibm.com>
Message-ID: <Pine.NEB.4.33.0203211212320.374-100000@candlekeep>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Julian Satran wrote:

> I was looking at what would be appropriate (and perhaps familiar to
> programmers - double dot is used in Pascal for ranges).  (- or +) may come
> handy later for other things. And BTW double characters are already there
> in addresses.

One thing I would like to suggest also in choosing a value is to pick one
that will make sense to more than just programmers. One of the advantages
of using a text-based negotiation is that in case of negotiation problems,
an administrator could read the negotiation transcript and hopefully
figure out what was wrong. My suggestion is that we pick something that
will make sense to administrators also.

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 16:14:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25757
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 16:14:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LKgIO04768
	for ips-outgoing; Thu, 21 Mar 2002 15:42:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LKgFw04763
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 15:42:15 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 2912E3070C; Thu, 21 Mar 2002 15:42:15 -0500 (EST)
Date: Thu, 21 Mar 2002 12:37:44 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep>
To: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>
Cc: Michel Maddux <Michel.Maddux@mcdata.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: 
In-Reply-To: <3C9A2E2D.1B4C01B3@splentec.com>
Message-ID: <Pine.NEB.4.33.0203211235520.374-100000@candlekeep>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Luben Tuikov wrote:

> Michel Maddux wrote:
> >
> > I disagree; a range of values has long been denoted by (..)
>
> Really? In which context? Pascal programming language?
>
> Math uses comma. We can use that too.
> Regular expressions use dash/minus. We can use that too.
>
> Why don't we use dash/minus which most of us know
> from regular expressions and from school...

:-)

> Regarding ``simplicity'':
>
> If we are trying to keep it
> simple, then why are we using variables like
> MaxRecvPDULength and OFMarkInt case sensitive
> on top of that????
>
> Isn't this a low level protocol that will not be looked
> at by humans.

I think readability should be thought about. While rare, I think it will
help to let admins be able to watch a login transcript if they think
something is wrong.

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 16:26:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA26012
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 16:26:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LKrA105771
	for ips-outgoing; Thu, 21 Mar 2002 15:53:10 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from emulex.emulex.com (emulex.emulex.com [138.239.112.1])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LKr8w05764
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 15:53:08 -0500 (EST)
Received: from xbl.ad.emulex.com (xbl.ma.emulex.com [172.16.12.11])
	by emulex.emulex.com (8.9.1a/8.9.1) with ESMTP id MAA09915;
	Thu, 21 Mar 2002 12:53:01 -0800 (PST)
Received: by xbl.ad.emulex.com with Internet Mail Service (5.5.2653.19)
	id <GFHTPBHD>; Thu, 21 Mar 2002 15:53:02 -0500
Received: from rome.emulex.com (rome.ma.emulex.com [172.16.14.140]) by xbl.ad.emulex.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id GFHTPBHC; Thu, 21 Mar 2002 15:52:50 -0500
From: "Kleinman, Barry" <Barry.Kleinman@emulex.com>
To: Julian Satran <Julian_Satran@il.ibm.com>,
        Rod Harrison
	 <rod.harrison@windriver.com>
Cc: ips@ece.cmu.edu
Message-Id: <4.3.2.7.2.20020321155102.01b7ebb0@xbl>
X-Sender: barry@xbl
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Thu, 21 Mar 2002 15:52:50 -0500
Subject: RE:
In-Reply-To: <OF1011C40A.DBED9683-ONC2256B83.0055AA02@telaviv.ibm.com>
Mime-Version: 1.0
Content-Type: multipart/alternative;
	boundary="=====================_1821877250==_.ALT"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--=====================_1821877250==_.ALT
Content-Type: text/plain; charset="us-ascii"

At 05:47 PM 3/21/2002 +0200, Julian Satran wrote:



I was looking at what would be appropriate (and perhaps familiar to
programmers - double dot is used in Pascal for ranges).  (- or +) may
come handy later for other things. And BTW double characters are already
there in addresses. 
We could use semicolon(;) (I for some reason do not like it). 

So we have 2 proposals: 

1) .. (2 votes) 
2); (1 vote?) 


How about underscore?  Looks sort of like a dash, never used in
arithmetic or floating point numbers.



-- Barry

--=====================_1821877250==_.ALT
Content-Type: text/html; charset="us-ascii"

<html>
At 05:47 PM 3/21/2002 +0200, Julian Satran wrote:<br>
<br>
<blockquote type=cite cite><font size=2>I was looking at what would be
appropriate (and perhaps familiar to programmers - double dot is used in
Pascal for ranges).&nbsp; (- or +) may come handy later for other things.
And BTW double characters are already there in addresses. </font><br>
<font size=2>We could use semicolon(;) (I for some reason do not like
it).</font> <br>
<br>
<font size=2>So we have 2 proposals:</font> <br>
<br>
<font size=2>1) .. (2 votes)</font> <br>
<font size=2>2); (1 vote?)</font> </blockquote><br>
How about underscore?&nbsp; Looks sort of like a dash, never used in
arithmetic or floating point numbers.<br>
<br>
<br>
<div>-- Barry</div>
</html>

--=====================_1821877250==_.ALT--


From owner-ips@ece.cmu.edu  Thu Mar 21 17:17:12 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27246
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 17:17:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LLjT110652
	for ips-outgoing; Thu, 21 Mar 2002 16:45:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LLjNw10632
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 16:45:23 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 9B5D93070C; Thu, 21 Mar 2002 16:45:22 -0500 (EST)
Date: Thu, 21 Mar 2002 13:40:43 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep>
To: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>
Cc: Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: iSCSI: Re: range separator
In-Reply-To: <3C9A51E7.93C9F70F@splentec.com>
Message-ID: <Pine.NEB.4.33.0203211339230.374-100000@candlekeep>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Luben Tuikov wrote:

> Bill Studenmund wrote:
>
> > Won't the parser already have to have figured out the context anyway? We
> > have to know if the key is: 1) valid, and 2) appropriate for this phase
> > already, don't we? After figuring that out, is it hard to know if we
> > expect a string or one or more numbers?
>
> Yes, of course. I was merely trying to show that
> we cannot escape from the variable's context.

Ahhh.... Ok.

> Once we all recognize this fact we'd see that
> we could overload certain symbols to denote
> ranges. I mean certain, since overloading the comma
> will not be that wise as in the _future_ we may
> want to have a list of ranges (e.g. for choosing
> a bit as in ``OurBitRange=1-4,13-16'').

Agreed, ',' would be bad.

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 17:19:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27294
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 17:19:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LLYdw09643
	for ips-outgoing; Thu, 21 Mar 2002 16:34:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LLYWw09626
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 16:34:32 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2LLXr221553;
	Thu, 21 Mar 2002 16:33:53 -0500
Message-ID: <3C9A51E7.93C9F70F@splentec.com>
Date: Thu, 21 Mar 2002 16:34:31 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, luben@splentec.com
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Bill Studenmund <wrstuden@wasabisystems.com>
CC: iSCSI <ips@ece.cmu.edu>, Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: iSCSI: Re: range separator
References: <Pine.NEB.4.33.0203211206230.374-100000@candlekeep>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Bill Studenmund wrote:
> 
> Well, there probably won't be that many parsers. One set-of-numbers parser
> can be used for all the number-expecting cases.

Yes, that's why I was mentioning contex-free
grammars to describe the values which the
variables can take, since then it is really easy
to see what the terminals are (aka tokens, primitives),
and one would need to have an integer, and string
parser, the rest is left to the key's handler/negotiator.

As in:
> 
> > and _THEN_ you'd abstractize into
> >  integer value, or
> >  string value, or
> >  range.
> >
> > Note, that a range is
> > a string (we know this already) of
> > <integer><range symbol><integer> to use context
> > free grammar (stripped down version :-).

[cut]
> > So the Target will know that it is a range,
> > but it doesn't matter... it will have to check
> > the context anyway...
> 
> Won't the parser already have to have figured out the context anyway? We
> have to know if the key is: 1) valid, and 2) appropriate for this phase
> already, don't we? After figuring that out, is it hard to know if we
> expect a string or one or more numbers?

Yes, of course. I was merely trying to show that
we cannot escape from the variable's context.

Once we all recognize this fact we'd see that
we could overload certain symbols to denote
ranges. I mean certain, since overloading the comma
will not be that wise as in the _future_ we may
want to have a list of ranges (e.g. for choosing
a bit as in ``OurBitRange=1-4,13-16'').

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 21 18:54:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA00506
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 18:54:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LN6fV17916
	for ips-outgoing; Thu, 21 Mar 2002 18:06:41 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LN6dw17905
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 18:06:39 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFCKJ>; Thu, 21 Mar 2002 18:06:38 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F58D9@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Bill Studenmund <wrstuden@wasabisystems.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: 
Date: Thu, 21 Mar 2002 18:06:29 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

You missed the tilde (~) there are 3 votes for that.

Eddy

-----Original Message-----
From: Bill Studenmund [mailto:wrstuden@wasabisystems.com]
Sent: Thursday, March 21, 2002 12:45 PM
To: Julian Satran
Cc: Rod Harrison; ips@ece.cmu.edu
Subject: RE:


On Thu, 21 Mar 2002, Julian Satran wrote:

> I was looking at what would be appropriate (and perhaps familiar to
> programmers - double dot is used in Pascal for ranges).  (- or +) may come
> handy later for other things. And BTW double characters are already there
> in addresses.
>
> We could use semicolon(;) (I for some reason do not like it).
>
> So we have 2 proposals:

I think actually we have three proposals, don't we?

> 1) .. (2 votes)
> 2); (1 vote?)

3) '-', and it seems to have at least two supporters. :-)

> The tally is on! (untill tomorrow)

Take care,

Bill


From owner-ips@ece.cmu.edu  Thu Mar 21 18:54:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA00544
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 18:54:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2LNFLS18634
	for ips-outgoing; Thu, 21 Mar 2002 18:15:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2LNFIw18623
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 18:15:18 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 01AFD3070C; Thu, 21 Mar 2002 18:15:17 -0500 (EST)
Date: Thu, 21 Mar 2002 15:10:38 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep>
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: speed, was RE: 
In-Reply-To: <25369470B6F0D41194820002B328BDD22F58D9@ATLOPS>
Message-ID: <Pine.NEB.4.33.0203211509430.374-100000@candlekeep>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, 21 Mar 2002, Eddy Quicksall wrote:

> You missed the tilde (~) there are 3 votes for that.

Is the list usually this slow? I sent that note a few hours ago, and at
the time my in-box didn't have the other messages. :-)

Take care,

Bill



From owner-ips@ece.cmu.edu  Thu Mar 21 21:12:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA02983
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 21:12:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2M1vrf01724
	for ips-outgoing; Thu, 21 Mar 2002 20:57:53 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2M1vpw01720
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 20:57:51 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 21D3A3071A; Thu, 21 Mar 2002 20:57:51 -0500 (EST)
Date: Thu, 21 Mar 2002 17:53:27 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.ietf53.cw.net>
To: iSCSI <ips@ece.cmu.edu>, <luben@splentec.com>
Cc: Eddy Quicksall <Eddy_Quicksall@ivivity.com>,
        Rod Harrison <rod.harrison@windriver.com>,
        Julian Satran <Julian_Satran@il.ibm.com>
Subject: Re: slowness, was Re: range separator
In-Reply-To: <Pine.NEB.4.33.0203211339230.374-100000@candlekeep>
Message-ID: <Pine.NEB.4.33.0203211522220.727-100000@candlekeep.ietf53.cw.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Is something wrong with the mailing list? (Does it have anything to do
with orbs going away?) Here's part of the log for one message I sent to
the list.

Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
        by mononoke.wasabisystems.com (Postfix) with ESMTP id 4A41130710
        for <wrstuden@wasabisystems.com>; Thu, 21 Mar 2002 18:12:54 -0500 (EST)
Received: (from majordom@localhost)
        by ece.cmu.edu (8.11.0/8.10.2) id g2LLjT110652
        for ips-outgoing; Thu, 21 Mar 2002 16:45:29 -0500 (EST)

Those headers show that the message sat on the mail server for 90 minutes.

Looking at one of the messages Eddie sent me, I see:

Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
        by mononoke.wasabisystems.com (Postfix) with ESMTP id 3132230715
        for <wrstuden@wasabisystems.com>; Thu, 21 Mar 2002 19:40:39 -0500 (EST)
Received: (from majordom@localhost)
        by ece.cmu.edu (8.11.0/8.10.2) id g2LN6fV17916
        for ips-outgoing; Thu, 21 Mar 2002 18:06:41 -0500 (EST)

Does anyone know what's up? I figure everyone else is seeing it.

Take care,

Bill





From owner-ips@ece.cmu.edu  Thu Mar 21 21:28:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA03338
	for <ips-archive@odin.ietf.org>; Thu, 21 Mar 2002 21:28:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2M1VSK29684
	for ips-outgoing; Thu, 21 Mar 2002 20:31:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2M1VQw29680
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 20:31:26 -0500 (EST)
Received: from xparelay1.corp.hp.com (xparelay1.corp.hp.com [15.58.136.173])
	by palrel13.hp.com (Postfix) with ESMTP
	id BE43B40045A; Thu, 21 Mar 2002 17:31:20 -0800 (PST)
Received: from xpabh4.corp.hp.com (xpabh4.corp.hp.com [15.58.136.1])
	by xparelay1.corp.hp.com (Postfix) with ESMTP
	id B5A28E000B6; Thu, 21 Mar 2002 17:31:20 -0800 (PST)
Received: by xpabh4.corp.hp.com with Internet Mail Service (5.5.2653.19)
	id <HKTY4S81>; Thu, 21 Mar 2002 17:31:20 -0800
Message-ID: <6BD67FFB937FD411A04F00D0B74FE87805CCF495@xrose06.rose.hp.com>
From: "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie_krueger@hp.com>
To: "'Michael Schoberg'" <michael_schoberg@cnt.com>,
        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Rev 11 minor issues
Date: Thu, 21 Mar 2002 17:31:19 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D141.44B1B1A0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D141.44B1B1A0
Content-Type: text/plain;
	charset="iso-8859-1"

You've stated some serious misconceptions, I suggest you re-read section 2,
in particular section 2.4 of the draft.  The term I_T nexus comes from SCSI
(SAM2) and a nexus is between two SCSI ports.  There can only be one nexus
between a pair of SCSI ports.  We've defined the session as providing the
"virtual cable" between iSCSI SCSI ports (provides the nexus).  Therefore
there can only be one session between iSCSI ports.  iSCSI ports are iSCSI
node name + (TPG or ISID).  So by lemma, there can only be one port name at
each end of a session (no matter how many connections comprise the session).
 
Why does a "non-leading" login need to contain the node name?  For
identifying the correct session, and for authentication - each connection
must pass the same authentication exchange.
 
Perhaps the presentation title "SAM2-iSCSI model slides" on
 <http://storage-arch.hp.com/> http://storage-arch.hp.com/ will help.  Also,
search the IPS archives, John Hufferd has also provided a set of slides that
illustrate the iSCSI port concept.
 
Some comments in-line:
 
 
-----Original Message-----
From: Michael Schoberg [mailto:michael_schoberg@cnt.com]
Sent: Wednesday, March 20, 2002 11:38 AM
To: 'Julian Satran'; IPS Reflector (E-mail)
Subject: RE: iSCSI: Rev 11 minor issues



Julian,
 
Thanks for the follow-up.  Forgive me for being slow with this, but I'm
still confused by your statement.  Let me walk you through some of my
thoughts.
 
An initiator is defined to be an "initiator node".  It's identification is
through the initiator port name, which includes the InitiatorName, ISID,
etc.  Each login requires the InitiatorName because although it may be an
additional connection to an existing session, it may not be for the same I_T
nexus.
 
Initiator name is required for authentication, and to identify the correct
session (along with ISID, TSID, TPG, and CID).
 
Initiators are added to a session like this:
 
-------------------------------------------------------------------------
   InitiatorName      ISID     CID  TSID TgtName Session I_T Nexus
a1 Fred          010203040506  0000 0001 idisk *   #1     it-1
a2 Bob           010203040506  0001 0001 idisk     #1     it-2
a3 Joe           010203040506  0002 0001 idisk     #1     it-3
a4 Fred          010203040506  0003 0001 idisk     #1     it-1

a5 Ted           010203040506  0000 0001 idisk *   #2     it-4
a6 Fred          010203040506  0000 0001 idisk *   ??
a7 Ted           010203040506  0004 0001 idisk     ??
a8 Ted           010203040506  0001 0001 idisk     ??
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
-------------------------------------------------------------------------
 
This table is invalid, if the initiator names are different, then they MUST
be different sessions.
 
 
Within any single session there will be one or more I_T nexus formed (see
a1, a2, a3, a4).
 

No, a session forms a nexus.  There can't be more than one nexus in a nexus
(at least not in any universe I'm familiar with).
 
           ISID RULE: Between a given iSCSI Initiator and iSCSI Target
Portal 
           Group (SCSI target port), there can be only one session with a
given 
           value for ISID that identifies the SCSI initiator port. See
Section 
           9.12.5 ISID.


My interpretation: any initiator's attempt to reuse the same ISID for
creating an additional session (TSID = 0000) with the same
target-portal-group breaks the ISID rule; initiators must provide different
ISID values to create new sessions with the same target-portal-group (see
a6, breaks ISID rule).  However, since the "initiator port identifier"
includes InitiatorName, alternate initiators may simultaneously use the same
ISID value (see a5, does not break ISID rule).
 
           TSID RULE: The iSCSI Target SHOULD NOT select a TSID for a given
login 
           request if the resulting SSID is already in use by an existing
session 
           between the target and the requesting iSCSI Initiator. See
Section 
           8.1.1 Conservative Reuse of ISIDs.
 
My interpretation: a target should expect (and accept) initiator attempts to
login with the same ISID and can select the same TSID as long it's from a
different initiator (see a5).  However, if an existing initiator is
identified, then the target should select a TSID that forms a unique SSID
(see b4).  This is confusing because it assumes that the initiator will
break the ISID rule?  Also, does this break session reinstatement? 
 

Don't know how you got so confused, so I'm not sure what will untangle you.
The target doesn't "expect" anything regarding ISID, it merely used ISID to
enforce "no parallel nexus between port pairs" rule.  The TSID rule just
says that the TSID provides the "unique SSID" between an initiator and
target node, since initiator are to treat ISID's as "static port numbers".
It doesn't "assume the initiator will break the ISID rule",  it just assists
the target in detecting initiator errors.
 
 
-------------------------------------------------------------------------

   InitiatorName        ISID      CID    TSID    TargetName  Session
b1 Fred            010203040506   0000   0001    idisk *       #1
b2 Bob             010203040506   0000   0001    idisk *       #2
b3 Joe             010203040506   0000   0001    idisk *       #3
b4 Fred            010203040506   0000   0002    idisk *       #4
 
* Leading login TSID=0000 was sent by initiator, TSID value assigned by
target.
------------------------------------------------------------------------- 
 

Where's TPG?  If these are all sessions to the same TPG, then "b4" would be
rejected by the target as a leading login, cause he already has an active
session with this initiator port (session #1)
 
 
How does this work with 4.3.5 Session Reinstatement:

           Session reinstatement is the process of initiator logging in with
an 
           ISID that is possibly active from the target's perspective - thus

           implicitly logging out the session state machine corresponding to
the 
           ISID and reinstating a new iSCSI session in its place (with the
same 
           ISID).  Thus, the TSID in the Login PDU MUST be zero to signal
session 
           reinstatement.  All the tasks that were active on the old session
are 
           internally terminated on a session reinstatement.
 
           The initiator session state MUST be FAILED (Section 5.3 Session
State 
           Diagrams) for attempting a session reinstatement.
 
My interpretation (#1 of 2): Session reinstatement only occurs when the
target has identified and authenticated that an existing initiator
(identified by InitiatorName & ISID) has performed a second leading login.
Then and only then can session reinstatement be performed.  Unfortunately,
this assumes that sessions will always have the same initiator performing
the leading login (so in a1->a4, only Fred can perform session reinstatement
for that session.)  That's bad news if that particular initiator is no
longer active. 
 

If the initiator's no longer active, then it can't be performing session
reinstatement (??)
 
 
(#2 of 2):  ANY leading login received by the iSCSI target with an existing
and target-perspective active ISID is assumed to be session reinstatement.
This means that the logins described by [ a5 & b1..b4 ] are invalid.
Further, this conflicts with your note saying that the initiator must be
completely identified on every login.
 
Now look at connection reinstatement (4.3.4)

           Connection reinstatement is the process of initiator logging in
with a 
           ISID-TSID-CID combination that is possibly active from the
target's 
           perspective - thus implicitly logging out the connection state 
           machine corresponding to the CID and reinstating a new
full-feature 
           phase iSCSI connection in its place (with the same CID).  Thus,
the 
           TSID in the Login PDU MUST be non-zero and CID does not change
during 
           a connection reinstatement.  The Login command  performs the
logout 
           function of the old connection if an explicit logout was not
performed 
           earlier. In sessions with a single connection, this may imply the

           opening of a second connection with the sole purpose of cleaning
up 
           the first. Targets should support opening a second connection
even 
           when they do not support multiple connections in full feature
phase.  
 
           If the operational ErrorRecoveryLevel is 2, connection
reinstatement 
           enables future task reassignment.  If the operational
ErrorRecovery-
           Level is less than 2, connection reinstatement is the replacement
of 
           the old CID without enabling task reassignment.  In this case,
all the 
           tasks that were active on the old CID are internally terminated.
 
           The initiator connection state MUST be CLEANUP_WAIT (section 5.1)
for 
           attempting a connection reinstatement. 
 
If an iSCSI connection is attempted in which multiple initiator-sessions are
available with the same ISID + TSID, to which session should the iSCSI
target attach it?  In [a7] above, there are two active sessions with the
same SSID, to which should a7 be attached?  Another special case [a8] will
result in either a new connection on session #2 or connection reinstatement
(or possible conflict) with session #1. 
  


------_=_NextPart_001_01C1D141.44B1B1A0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face="Courier New" size=2><SPAN class=338254900-22032002>You've 
stated some serious misconceptions, I suggest you re-read section 2, in 
particular section 2.4 of the draft.&nbsp; The term I_T nexus comes from SCSI 
(SAM2) and a nexus is between two SCSI ports.&nbsp; There can only be one nexus 
between a pair of SCSI ports.&nbsp; We've defined the session as providing the 
"virtual cable" between iSCSI SCSI ports (provides the nexus).&nbsp; Therefore 
there can only be one session between iSCSI ports.&nbsp; iSCSI ports are iSCSI 
node name + (TPG or ISID).&nbsp; So by lemma, there can only be one port name at 
each end of a session (no matter how many connections comprise the 
session).</SPAN></FONT></DIV>
<DIV><FONT face="Courier New" size=2><SPAN 
class=338254900-22032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face="Courier New" size=2><SPAN class=338254900-22032002>Why does a 
"non-leading" login need to contain the node name?&nbsp; For identifying the 
correct session, and for authentication - each connection must pass the same 
authentication exchange.</SPAN></FONT></DIV>
<DIV><FONT face="Courier New" size=2></FONT>&nbsp;</DIV>
<DIV><SPAN class=338254900-22032002><FONT face="Courier New" size=2>Perhaps the 
presentation title "SAM2-iSCSI model slides" on</FONT></SPAN></DIV>
<DIV><SPAN class=338254900-22032002><FONT face="Courier New" size=2><A 
href="http://storage-arch.hp.com/"><FONT 
color=#000000>http://storage-arch.hp.com/</FONT></A>&nbsp;will help.&nbsp; Also, 
search the IPS archives, John Hufferd has also provided a set of slides that 
illustrate the iSCSI port concept.</FONT></SPAN></DIV>
<DIV><SPAN class=338254900-22032002><FONT face="Courier New" 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=338254900-22032002><FONT face="Courier New" size=2>Some 
comments in-line:</FONT></SPAN></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><SPAN class=338254900-22032002><FONT size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=338254900-22032002></SPAN><FONT face=Tahoma 
size=2>-----Original Message-----<BR><B>From:</B> Michael Schoberg 
[mailto:michael_schoberg@cnt.com]<BR><B>Sent:</B> Wednesday, March 20, 2002 
11:38 AM<BR><B>To:</B> 'Julian Satran'; IPS Reflector 
(E-mail)<BR><B>Subject:</B> RE: iSCSI: Rev 11 minor issues<BR><BR></DIV></FONT>
<BLOCKQUOTE dir=ltr 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>Julian,</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>Thanks for the follow-up.&nbsp;&nbsp;Forgive me for being slow with 
  this, but I'm still confused by your statement.&nbsp; Let me walk you through 
  some of my thoughts.</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>An initiator is defined to be an </FONT></SPAN><SPAN 
  class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>"initiator node".&nbsp; It's identification is through the initiator 
  port name, which includes the InitiatorName, ISID, etc.&nbsp; Each login 
  requires the InitiatorName because although it may be an additional connection 
  to an existing session, it may not be for the same I_T 
  nexus.</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Courier New" color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Futura Bk" color=#ff0000><SPAN 
  class=338254900-22032002>Initiator name is required for authentication, and to 
  identify the correct session (along with ISID, TSID, TPG, and 
  CID).</SPAN></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Futura Bk" 
  color=#ff0000></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>Initiators are added to a session like this:</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>-------------------------------------------------------------------------</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>&nbsp;&nbsp; InitiatorName&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  ISID&nbsp;&nbsp;&nbsp;&nbsp; CID&nbsp;&nbsp;TSID&nbsp;TgtName Session I_T 
  Nexus</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a1 
  Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp; 
  0000&nbsp;0001&nbsp;idisk&nbsp;*&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nbsp;&nbsp; 
  it-1</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a2 Bob&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  010203040506&nbsp;&nbsp;0001&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nbsp;&nbsp; 
  it-2</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a3 
  Joe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp;0002&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nbsp;&nbsp; 
  it-3</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>a4 
  Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp; 
  0003&nbsp;0001&nbsp;idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;#1&nbsp;&nbsp;&nbsp;&nbsp; 
  it-1</FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a5 
  Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp;0000&nbsp;0001&nbsp;idisk 
  *&nbsp;&nbsp;&nbsp;#2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;it-4</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a6 
  Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp;0000&nbsp;0001&nbsp;idisk 
  *&nbsp;&nbsp;&nbsp;??</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>a7 
  Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp; 
  0004 0001 idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;??</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>a8 
  Ted&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp; 
  0001 0001 
  idisk&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;??</FONT></SPAN></SPAN></DIV></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2></FONT></SPAN></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2><SPAN 
  class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>* Leading login TSID=0000 was sent 
  by initiator, TSID value assigned by 
  target.</FONT></SPAN></SPAN></FONT></SPAN></FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff 
  size=2>-------------------------------------------------------------------------</FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2></FONT></SPAN></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000><SPAN class=338254900-22032002>This table is 
  invalid, if the initiator names are different, then they MUST be different 
  sessions.</SPAN></FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2></FONT></SPAN></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2></FONT></SPAN></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>Within any single session there 
  will be one or more&nbsp;I_T nexus formed (see a1, a2, a3, 
  a4).</FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2></FONT></SPAN></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000 size=3><SPAN class=338254900-22032002>No, a 
  session forms a nexus.&nbsp; There can't be more than one nexus in a nexus (at 
  least not in any universe I'm familiar 
with).</SPAN></FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000><SPAN 
  class=338254900-22032002></SPAN></FONT></SPAN></SPAN>&nbsp;</DIV></FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face=Arial color=#0000ff 
  size=2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID RULE: 
  Between a given iSCSI Initiator and iSCSI Target Portal 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Group (SCSI 
  target port), there can be only one session with a given 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; value for 
  ISID that identifies the SCSI initiator port. See Section 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9.12.5 
  ISID.</FONT></SPAN></SPAN></DIV><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><FONT face="Courier New">
  <DIV><FONT face=Arial color=#0000ff size=2></FONT><FONT face=Arial 
  color=#0000ff size=2></FONT><FONT face=Arial color=#0000ff 
  size=2></FONT><BR><FONT face="Lucida Console"><FONT color=#0000ff><FONT 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>My 
  interpretation:&nbsp;a</FONT></SPAN>ny&nbsp;initiator's&nbsp;attempt to reuse 
  the same ISID for creating an additional session (TSID = 0000)&nbsp;with the 
  same target-portal-group&nbsp;breaks the ISID rule; 
  </SPAN></FONT></FONT></FONT><FONT face="Lucida Console"><FONT 
  color=#0000ff><FONT size=2><SPAN class=449362715-20032002>initiators must 
  provide</SPAN><SPAN class=449362715-20032002> different ISID values&nbsp;to 
  create new sessions with the same target-portal-group (see a6, breaks ISID 
  rule).&nbsp; However, since the "initiator port identifier" includes 
  InitiatorName, alternate initiators may simultaneously use the same ISID value 
  (see a5, does not break ISID rule).</SPAN></FONT></FONT></FONT></DIV>
  <DIV><FONT face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face=Arial color=#0000ff 
  size=2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TSID RULE: 
  The iSCSI Target SHOULD NOT select a TSID for a given login 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; request if 
  the resulting SSID is already in use by an existing session 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; between the 
  target and the requesting iSCSI Initiator. See Section 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8.1.1 
  Conservative Reuse of ISIDs.</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face=Arial color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><FONT 
  color=#0000ff><FONT size=2>My interpretation:&nbsp;a target should expect (and 
  accept) initiator attempts to login with the same ISID and can select the same 
  TSID as long it's&nbsp;from a different initiator (see a5).&nbsp; However, if 
  an existing initiator is identified, then&nbsp;the target should select 
  a&nbsp;TSID that forms a unique SSID (see b4).&nbsp; This is&nbsp;confusing 
  because it assumes that the initiator will break the ISID rule?&nbsp; Also, 
  does this break session reinstatement?<SPAN class=338254900-22032002><FONT 
  face="Courier New">&nbsp;</FONT></SPAN></FONT></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><FONT 
  color=#0000ff><FONT size=2><SPAN 
  class=338254900-22032002></SPAN></FONT></FONT></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><FONT 
  color=#0000ff><FONT size=2><SPAN class=338254900-22032002>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000 size=3><SPAN class=338254900-22032002>Don't 
  know how you got so confused, so I'm not sure what will untangle you.&nbsp; 
  The target doesn't "expect" anything regarding ISID, it merely used ISID to 
  enforce "no parallel nexus between port pairs" rule.&nbsp; The TSID rule just 
  says that the TSID provides the "unique SSID" between an initiator and target 
  node, since initiator are to treat ISID's as "static port numbers".&nbsp; 
  It&nbsp;doesn't "assume the initiator will&nbsp;break the ISID rule",&nbsp; it 
  just assists the target in detecting initiator 
  errors.</SPAN></FONT></SPAN></SPAN></DIV>&nbsp;</SPAN></FONT></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>-------------------------------------------------------------------------</FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>&nbsp; &nbsp;InitiatorName&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  ISID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CID&nbsp;&nbsp;&nbsp; 
  TSID&nbsp;&nbsp;&nbsp; TargetName&nbsp; Session</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>b1&nbsp;Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp; 
  0000&nbsp;&nbsp;&nbsp;0001&nbsp;&nbsp;&nbsp; 
  idisk&nbsp;*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #1</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>b2&nbsp;Bob&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  010203040506&nbsp;&nbsp;&nbsp;0000&nbsp;&nbsp; 0001&nbsp;&nbsp;&nbsp; idisk 
  *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #2</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2>b3 
  Joe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  010203040506&nbsp;&nbsp; 0000&nbsp;&nbsp; 0001&nbsp;&nbsp;&nbsp;&nbsp;idisk 
  *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #3</FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff 
  size=2>b4&nbsp;Fred&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;010203040506&nbsp;&nbsp; 
  0000&nbsp;&nbsp;&nbsp;0002&nbsp;&nbsp;&nbsp; 
  idisk&nbsp;*&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; #4</FONT></SPAN></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff 
  size=2></FONT></SPAN></SPAN>&nbsp;</DIV></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console" color=#0000ff size=2>* Leading login TSID=0000 was sent 
  by initiator, TSID value assigned by 
  target.</FONT></SPAN></SPAN></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console"><FONT color=#0000ff><FONT 
  size=2>-------------------------------------------------------------------------<SPAN 
  class=338254900-22032002><FONT 
  face="Courier New">&nbsp;</FONT></SPAN></FONT></FONT></FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=338254900-22032002></SPAN></FONT></FONT></FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console"><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=338254900-22032002>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000 size=3><SPAN class=338254900-22032002>Where's 
  TPG?&nbsp; If these are all sessions to the same TPG, then "b4" would be 
  rejected by the target as a leading login, cause he already has an active 
  session with this initiator port (session 
  #1)</SPAN></FONT></SPAN></SPAN></DIV>&nbsp;</SPAN></FONT></FONT></FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN 
  class=449362715-20032002></SPAN></SPAN></SPAN></SPAN></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002>How does this work 
  with 4.3.5 Session 
  Reinstatement:</SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
  <DIV><SPAN class=449362715-20032002><FONT face="Lucida Console" color=#0000ff 
  size=2><SPAN class=449362715-20032002><SPAN class=449362715-20032002><SPAN 
  class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face=Arial></FONT><FONT face=Arial></FONT><BR><FONT 
  face=Arial>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  Session reinstatement is the process of initiator logging in with an 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID that is 
  possibly active from the target's perspective - thus 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; implicitly 
  logging out the session state machine corresponding to the 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID and 
  reinstating a new iSCSI session in its place (with the same 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID).&nbsp; 
  Thus, the TSID in the Login PDU MUST be zero to signal session 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  reinstatement.&nbsp; All the tasks that were active on the old session are 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; internally 
  terminated on a session reinstatement.</FONT></DIV>
  <DIV><FONT face=Arial></FONT>&nbsp;</DIV>
  <DIV><FONT 
  face=Arial>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The 
  initiator session state MUST be FAILED (Section 5.3 Session State 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Diagrams) for 
  attempting a session 
  reinstatement.</FONT></SPAN></SPAN></SPAN></SPAN></FONT></SPAN></DIV>
  <DIV><FONT face=Arial color=#0000ff size=2></FONT><FONT face=Arial 
  color=#0000ff size=2></FONT><FONT face=Arial color=#0000ff size=2></FONT><FONT 
  face=Arial color=#0000ff size=2></FONT><FONT face=Arial color=#0000ff 
  size=2></FONT><FONT face=Arial color=#0000ff size=2></FONT><FONT face=Arial 
  color=#0000ff size=2></FONT><FONT face=Arial color=#0000ff 
  size=2></FONT>&nbsp;</DIV>
  <DIV></FONT><FONT face="Lucida Console"><SPAN class=449362715-20032002><FONT 
  color=#0000ff><FONT size=2>My interpretation (#1 of 2):&nbsp;Session 
  reinstatement only occurs when the target has identified and 
  authenticated&nbsp;that an existing initiator (identified by InitiatorName 
  &amp; ISID) has performed a second&nbsp;leading login.&nbsp; Then and only 
  then can session reinstatement be performed.&nbsp; Unfortunately, this assumes 
  that&nbsp;sessions will always have the same initiator performing the leading 
  login (so in&nbsp;a1-&gt;a4, only Fred can perform session reinstatement for 
  that session.)&nbsp; That's bad news if that particular initiator is no longer 
  active.<SPAN class=338254900-22032002><FONT 
  face="Courier New">&nbsp;</FONT></SPAN></FONT></FONT></SPAN></FONT></DIV>
  <DIV><FONT face="Lucida Console"><SPAN class=449362715-20032002><FONT 
  color=#0000ff><FONT size=2><SPAN 
  class=338254900-22032002></SPAN></FONT></FONT></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT face="Lucida Console"><SPAN class=449362715-20032002><FONT 
  color=#0000ff><FONT size=2><SPAN class=338254900-22032002>
  <DIV><SPAN class=449362715-20032002><SPAN class=449362715-20032002><FONT 
  face="Futura Hv" color=#ff0000 size=3><SPAN class=338254900-22032002>If the 
  initiator's no longer active, then it can't be performing session 
  reinstatement 
  (??)</SPAN></FONT></SPAN></SPAN></DIV>&nbsp;</SPAN></FONT></FONT></SPAN></FONT></DIV>
  <DIV><FONT face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
  <DIV><FONT face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=449362715-20032002>(#2 of 
  2):&nbsp;&nbsp;</SPAN></FONT></FONT></FONT><FONT face="Lucida Console"><FONT 
  color=#0000ff><FONT size=2><SPAN class=449362715-20032002>ANY leading login 
  received by the iSCSI target with an existing and 
  target-perspective&nbsp;active ISID&nbsp;is&nbsp;assumed to be session 
  reinstatement.&nbsp; This means that the logins described by [ a5 &amp; b1..b4 
  ] are invalid.&nbsp; Further, this conflicts with your note saying that the 
  initiator must be completely identified on every 
  login.</SPAN></FONT></FONT></FONT></DIV>
  <DIV><FONT face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
  <DIV><FONT face="Lucida Console" color=#0000ff size=2><SPAN 
  class=449362715-20032002>Now look at connection reinstatement 
  (4.3.4)</SPAN></FONT></DIV>
  <DIV><FONT face=Arial color=#0000ff size=2><FONT 
  face="Courier New"></FONT><BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  Connection reinstatement is the process of initiator logging in with a 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ISID-TSID-CID 
  combination that is possibly active from the target's 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; perspective - 
  thus implicitly logging out the connection state 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; machine 
  corresponding to the CID and reinstating a new full-feature 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; phase iSCSI 
  connection in its place (with the same CID).&nbsp; Thus, the 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TSID in the 
  Login PDU MUST be non-zero and CID does not change during 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a connection 
  reinstatement.&nbsp; The Login command&nbsp; performs the logout 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; function of 
  the old connection if an explicit logout was not performed 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; earlier. In 
  sessions with a single connection, this may imply the 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; opening of a 
  second connection with the sole purpose of cleaning up 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the first. 
  Targets should support opening a second connection even 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; when they do 
  not support multiple connections in full feature phase.&nbsp; </DIV>
  <DIV>&nbsp;</DIV>
  <DIV>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; If the 
  operational ErrorRecoveryLevel is 2, connection reinstatement 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; enables 
  future task reassignment.&nbsp; If the operational 
  ErrorRecovery-<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  Level is less than 2, connection reinstatement is the replacement of 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the old CID 
  without enabling task reassignment.&nbsp; In this case, all the 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; tasks that 
  were active on the old CID are internally terminated.</DIV>
  <DIV>&nbsp;</DIV>
  <DIV>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The 
  initiator connection state MUST be CLEANUP_WAIT (section 5.1) for 
  <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; attempting a 
  connection reinstatement. </FONT></DIV>
  <DIV><FONT face="Lucida Console"><FONT color=#0000ff><FONT size=2><SPAN 
  class=449362715-20032002></SPAN></FONT></FONT></FONT>&nbsp;</DIV>
  <DIV><FONT face="Lucida Console"><SPAN class=449362715-20032002><FONT 
  color=#0000ff><FONT size=2>If an iSCSI connection is attempted in which 
  multiple initiator-sessions are available with the same ISID + TSID, to which 
  session should the iSCSI target attach it?&nbsp; In [a7] above, there are two 
  active sessions with the same SSID,&nbsp;to which should a7 
  be&nbsp;attached?&nbsp; Another special case [a8] will result in either a new 
  connection on session #2 or connection reinstatement (or possible conflict) 
  with session #1.<SPAN class=338254900-22032002><FONT 
  face="Courier New">&nbsp;</FONT></SPAN></FONT></FONT></SPAN></FONT></DIV>
  <DIV><FONT face="Lucida Console"><SPAN class=449362715-20032002><FONT 
  color=#0000ff><FONT size=2><SPAN 
  class=338254900-22032002>&nbsp;</SPAN></FONT></FONT></SPAN></FONT><FONT 
  face="Lucida Console"><SPAN class=449362715-20032002><FONT color=#0000ff><FONT 
  size=2><SPAN 
  class=338254900-22032002>&nbsp;</SPAN></FONT></FONT></SPAN></FONT></SPAN></SPAN></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D141.44B1B1A0--


From owner-ips@ece.cmu.edu  Fri Mar 22 08:38:05 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21028
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 08:38:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2M7SXo26687
	for ips-outgoing; Fri, 22 Mar 2002 02:28:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dcmtechdom.dcmtech.co.in ([203.190.136.130])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2M7STw26680
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 02:28:30 -0500 (EST)
Received: by DCMTECHDOM with Internet Mail Service (5.5.2653.19)
	id <HMHGS5SY>; Fri, 22 Mar 2002 13:02:53 +0530
Message-ID: <FAC3A691B116D6119AA6000629A85D1A18BFA4@DCMTECHDOM>
From: Rahul Gupta <Rahul.gupta@dcmtech.co.in>
To: "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>
Subject: iSCSI using IPSEC
Date: Fri, 22 Mar 2002 13:02:51 +0530
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi all,
I am new developer on iscsi & ipsec . I have a small basic query. 

1) Does Ipsec needs to be developed at the iscsi level and incorporated as a
part of iscsi or it is a standalone entity ???

2) How does iscsi utilizes the ipsec functionality ..?? ( Since Ipsec is
between TCP and IP in the stack while iscsi is above TCP...)

Regards
Rahul Gupta





From owner-ips@ece.cmu.edu  Fri Mar 22 09:27:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21030
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 08:38:05 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2M7RkN26637
	for ips-outgoing; Fri, 22 Mar 2002 02:27:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dcmtechdom.dcmtech.co.in ([203.190.136.130])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2M7RXw26619
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 02:27:41 -0500 (EST)
Received: by DCMTECHDOM with Internet Mail Service (5.5.2653.19)
	id <HMHGS5SV>; Fri, 22 Mar 2002 13:01:49 +0530
Message-ID: <FAC3A691B116D6119AA6000629A85D1A18E007@DCMTECHDOM>
From: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
To: "Ips (E-mail)" <ips@ece.cmu.edu>
Subject: iScsi: Param Negotiation
Date: Fri, 22 Mar 2002 13:01:48 +0530
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I have a query that is it possible that Target sends its own key-value pairs
that are supposed to 
be negotiated in addition to the negotiated key-value pairs that were sent
in the Login or Text Request
in the same Login or Text Response... 

Or will target wait for the T bit to be set in the Login or 
Text Request & send a response with T bit 0 to tell the initiator it has its
own keys to negotiate 
and after the initiator sends a Login or Text Request then it will start
sending its own key-value 
pairs...

- Nitin


From owner-ips@ece.cmu.edu  Fri Mar 22 09:28:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA22354
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 09:28:28 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MDfI802840
	for ips-outgoing; Fri, 22 Mar 2002 08:41:18 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MDfFw02834
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 08:41:15 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id OAA16422
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 14:41:08 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2MDf7l155440
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 14:41:07 +0100
Subject: RE: iSCSI: Range Separator
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OF2013183F.32D88D05-ONC2256B84.0046D921@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Fri, 22 Mar 2002 15:35:25 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 22/03/2002 15:41:07
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


... and the winner is tilde (0x7e) - Julo

End-of-Thread (hopefully!)


                                                                                                                
                      "Rod Harrison"                                                                            
                      <rod.harrison@win        To:       "LEMAY,KEVIN (A-Roseville,ex1)"                        
                      driver.com>               <kevin_lemay@agilent.com>, Julian Satran/Haifa/IBM@IBMIL        
                                               cc:       <ips@ece.cmu.edu>                                      
                      21-03-02 19:06           Subject:  RE: iSCSI: Range Seperator                             
                      Please respond to                                                                         
                      "Rod Harrison"                                                                            
                                                                                                                
                                                                                                                




             I don't care what the character is since the focus is to make
this
easy to parse, and not human readable. So to that end consider my vote
to be for whichever of the single characters is nearest to winning.
;-)

             However, if we do have to pay some mind to aesthetics then how
about
the < character? So we would have MyKey=3<65,93<123

             - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
LEMAY,KEVIN (A-Roseville,ex1)
Sent: Thursday, March 21, 2002 4:20 PM
To: 'Julian Satran'
Cc: ips@ece.cmu.edu
Subject: RE: Range Seperator


I do not like the ';' but I would prefer a single character. There
have been
objections to using the comma or colon, then my third choice is the
".."

I really don't see any conflict using either the comma or colon.

Using comma is already used to separate list values. Colon being used
in
addresses is irrelevant because those are different parameters. I
certainly
keep track of which one we are working on.

Kevin Lemay

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Thursday, March 21, 2002 7:47 AM
To: Rod Harrison
Cc: ips@ece.cmu.edu
Subject: RE:



I was looking at what would be appropriate (and perhaps familiar to
programmers - double dot is used in Pascal for ranges).  (- or +) may
come
handy later for other things. And BTW double characters are already
there in
addresses.
We could use semicolon(;) (I for some reason do not like it).

So we have 2 proposals:

1) .. (2 votes)
2); (1 vote?)

The tally is on! (untill tomorrow)

Julo





             "Rod Harrison" <rod.harrison@windriver.com>


21-03-02 02:04
Please respond to "Rod Harrison"



        To:        Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu>
        cc:
        Subject:        RE:





                I would prefer one character. I don't care what it is,
any
character
will do, but having only one there is slightly easier to parse that
having two.

                - Rod

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Julian Satran
Sent: Wednesday, March 20, 2002 5:05 PM
To: ips@ece.cmu.edu
Subject:


Dear colleagues,

I suggested using : (colon) to separate values in a range.
Unfortunately :
is overused (in addresses and in names).
I suggest we use the (old) two dots (..) to mark a range.

Comments?
Julo










From owner-ips@ece.cmu.edu  Fri Mar 22 10:29:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA23692
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 10:29:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MEgEV07906
	for ips-outgoing; Fri, 22 Mar 2002 09:42:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from bla-nsc05.satyam.com ([208.220.245.72])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2M3wtw11150
	for <ips@ece.cmu.edu>; Thu, 21 Mar 2002 22:58:56 -0500 (EST)
Received: from 208.220.245.70 by bla-nsc05.satyam.com (InterScan E-Mail VirusWall NT); Fri, 22 Mar 2002 09:29:42 +0530
Received: by bla.satyam.com with Internet Mail Service (5.5.2653.19)
	id <HKD87RBK>; Fri, 22 Mar 2002 09:26:35 +0530
Message-ID: <A56BCCA3A5C2D411B18A00508BDE9C9B02FA1416@bla.satyam.com>
From: Rajeshkumar_Gupta <Rajeshkumar_Gupta@Satyam.com>
To: ips@ece.cmu.edu
Subject: Interworking of iSCSI and SCSI
Date: Fri, 22 Mar 2002 09:26:35 +0530
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi

Can anyone help me to understand the interworking of SCSI and iSCSI ? 
How SCSI will talk to iSCSI?
The present SAM does talk about iSCSI as transport protocol !

Thanks

Rajesh Kumar Gupta

************************************************************************** 
This email (including any attachments) is intended for the sole use of the
intended recipient/s and may contain material that is CONFIDENTIAL AND
PRIVATE COMPANY INFORMATION. Any review or reliance by others or copying or
distribution or forwarding of any or all of the contents in this message is
STRICTLY PROHIBITED. If you are not the intended recipient, please contact
the sender by email and delete all copies; your cooperation in this regard
is appreciated.
**************************************************************************


From owner-ips@ece.cmu.edu  Fri Mar 22 10:29:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA23705
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 10:29:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MEgpc08003
	for ips-outgoing; Fri, 22 Mar 2002 09:42:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mailFA7.rediffmail.com ([202.54.124.152])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2M6a1w23044
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 01:36:02 -0500 (EST)
Received: (qmail 5588 invoked by uid 510); 22 Mar 2002 06:34:44 -0000
Date: 22 Mar 2002 06:34:44 -0000
Message-ID: <20020322063444.5587.qmail@mailFA7.rediffmail.com>
Received: from unknown (203.190.136.155) by rediffmail.com via HTTP; 22 Mar 2002 06:34:44 -0000
MIME-Version: 1.0
From: "fefefe  dwed" <johnny_denver@rediffmail.com>
Reply-To: "fefefe  dwed" <johnny_denver@rediffmail.com>
To: ips@ece.cmu.edu
Subject: iscsi using ipsec
Content-type: text/plain;
	format=flowed
Content-Disposition: inline
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi all,
I am new to iscsi/ipsec. I have a small query regarding the 
same..
Does Ipsec needs to be implemented with the iscsi for 
security/encrytpion of its Data....
If Ipsec is a standalone entity how does iscsi utilizes the Ipsec 
functionality ...
and does the iscsi draft mandates development of IPSEC( for 
security) along with iscsi ???


TIA
DENVER


From owner-ips@ece.cmu.edu  Fri Mar 22 12:07:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA26194
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 12:07:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MGPch17468
	for ips-outgoing; Fri, 22 Mar 2002 11:25:38 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2MGPUw17449
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 11:25:34 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2MFWK015932
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 10:33:01 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2MFW0K15923;
	Fri, 22 Mar 2002 10:32:00 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2MFW0309628;
	Fri, 22 Mar 2002 10:32:00 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15515.20079.162989.265680@pkoning.dev.equallogic.com>
Date: Fri, 22 Mar 2002 10:31:59 -0500
From: Paul Koning <ni1d@arrl.net>
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: Re: slowness, was Re: range separator
References: <Pine.NEB.4.33.0203211339230.374-100000@candlekeep>
	<Pine.NEB.4.33.0203211522220.727-100000@candlekeep.ietf53.cw.net>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Bill" == Bill Studenmund <wrstuden@wasabisystems.com> writes:

 Bill> Is something wrong with the mailing list? 

I've rarely seen it be any faster than a multi-hour latency.

     paul



From owner-ips@ece.cmu.edu  Fri Mar 22 12:36:42 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA26961
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 12:36:42 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MHESD22260
	for ips-outgoing; Fri, 22 Mar 2002 12:14:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snjspop1.snjs.qwest.net (snjspop1.snjs.qwest.net [168.103.24.1])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2MHEPw22249
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 12:14:25 -0500 (EST)
Received: (qmail 42253 invoked from network); 22 Mar 2002 17:14:23 -0000
Received: from 168-103-215-183.dslgw2.snva.qwest.net (HELO theglowmonster) (168.103.215.183)
  by snjspop1.snjs.qwest.net with SMTP; 22 Mar 2002 17:14:23 -0000
Date: Fri, 22 Mar 2002 06:48:11 -0800
Message-ID: <COEGLIGPOPIONLAIFKDNMEFICAAA.randyj@data-transit.com>
From: "Randy Jennings" <randyj@data-transit.com>
To: "Nitin Dhingra" <nitin.dhingra@dcmtech.co.in>, ips@ece.cmu.edu
Subject: RE: iScsi: Param Negotiation
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
In-Reply-To: <FAC3A691B116D6119AA6000629A85D1A18E007@DCMTECHDOM>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

See pg 60 of the iSCSI spec, 1st paragraph.  As far as I can see, setting
the T bit is controlled by the desire to send key=value pairs, not sending
key=value pairs being controlled by the T bit.  IOW, I do not think it
matters when the target starts sending its own required key=value pairs.

HTH,
Randy Jennings
Data Transit

> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Nitin Dhingra
> Sent: Thursday, March 21, 2002 11:32 PM
> To: Ips (E-mail)
> Subject: iScsi: Param Negotiation
>
>
> I have a query that is it possible that Target sends its own
> key-value pairs
> that are supposed to
> be negotiated in addition to the negotiated key-value pairs that were sent
> in the Login or Text Request
> in the same Login or Text Response...
>
> Or will target wait for the T bit to be set in the Login or
> Text Request & send a response with T bit 0 to tell the initiator
> it has its
> own keys to negotiate
> and after the initiator sends a Login or Text Request then it will start
> sending its own key-value
> pairs...
>
> - Nitin



From owner-ips@ece.cmu.edu  Fri Mar 22 12:40:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27074
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 12:40:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MH1D020965
	for ips-outgoing; Fri, 22 Mar 2002 12:01:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MH1Bw20961
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 12:01:12 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id SAA77246
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 18:01:05 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2MH14J51356
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 18:01:04 +0100
Subject: Re: iSCSI using IPSEC
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
Message-ID: <OFB0A51C54.C5CF305E-ONC2256B84.005AA6B5@telaviv.ibm.com>
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Date: Fri, 22 Mar 2002 18:33:40 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 22/03/2002 19:01:04
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


iSCSI can use  any IPsec implementation. Obviously iSCSI will not be
implemented at iSCSI level as it sits somewhere else in the stack.  The
coordination between IPsec and iSCSI is by administrative means and some
things that should or should not be done (key negotiations, SA use) are
specified in the IPS security draft.

Julo


                                                                                                                
                      Rahul Gupta                                                                               
                      <Rahul.gupta@dcmt        To:       "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>                  
                      ech.co.in>               cc:                                                              
                      Sent by:                 Subject:  iSCSI using IPSEC                                      
                      owner-ips@ece.cmu                                                                         
                      .edu                                                                                      
                                                                                                                
                                                                                                                
                      22-03-02 09:32                                                                            
                      Please respond to                                                                         
                      Rahul Gupta                                                                               
                                                                                                                
                                                                                                                



Hi all,
I am new developer on iscsi & ipsec . I have a small basic query.

1) Does Ipsec needs to be developed at the iscsi level and incorporated as
a
part of iscsi or it is a standalone entity ???

2) How does iscsi utilizes the ipsec functionality ..?? ( Since Ipsec is
between TCP and IP in the stack while iscsi is above TCP...)

Regards
Rahul Gupta









From owner-ips@ece.cmu.edu  Fri Mar 22 13:19:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27898
	for <ips-archive@lists.ietf.org>; Fri, 22 Mar 2002 13:19:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MHdPW24456
	for ips-outgoing; Fri, 22 Mar 2002 12:39:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from demetrius.hosting.pacbell.net (demetrius.hosting.pacbell.net [216.100.99.31])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MHdKw24452
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 12:39:20 -0500 (EST)
Received: from somesh ([65.172.158.93])
	by demetrius.hosting.pacbell.net
	id MAA26977; Fri, 22 Mar 2002 12:38:38 -0500 (EST)
	[ConcentricHost SMTP Relay 1.14]
Reply-To: <somesh_gupta@silverbacksystems.com>
From: "Somesh Gupta" <somesh_gupta@silverbacksystems.com>
To: "Julian Satran" <Julian_Satran@il.ibm.com>, <ips@ece.cmu.edu>
Subject: RE: iSCSI: Range Separator
Date: Fri, 22 Mar 2002 09:38:38 -0800
Message-ID: <NMEALCLOIBCHBDHLCMIJEELACLAA.somesh_gupta@silverbacksystems.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
In-Reply-To: <OF2013183F.32D88D05-ONC2256B84.0046D921@telaviv.ibm.com>
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

We must really be close to getting done!!

> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Julian Satran
> Sent: Friday, March 22, 2002 5:35 AM
> To: ips@ece.cmu.edu
> Subject: RE: iSCSI: Range Separator
>
>
>
> ... and the winner is tilde (0x7e) - Julo
>
> End-of-Thread (hopefully!)
>
>
>
>
>                       "Rod Harrison"
>
>                       <rod.harrison@win        To:
> "LEMAY,KEVIN (A-Roseville,ex1)"
>                       driver.com>
> <kevin_lemay@agilent.com>, Julian Satran/Haifa/IBM@IBMIL
>                                                cc:
> <ips@ece.cmu.edu>
>                       21-03-02 19:06           Subject:  RE:
> iSCSI: Range Seperator
>                       Please respond to
>
>                       "Rod Harrison"
>
>
>
>
>
>
>
>
>
>              I don't care what the character is since the focus is to make
> this
> easy to parse, and not human readable. So to that end consider my vote
> to be for whichever of the single characters is nearest to winning.
> ;-)
>
>              However, if we do have to pay some mind to
> aesthetics then how
> about
> the < character? So we would have MyKey=3<65,93<123
>
>              - Rod
>
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> LEMAY,KEVIN (A-Roseville,ex1)
> Sent: Thursday, March 21, 2002 4:20 PM
> To: 'Julian Satran'
> Cc: ips@ece.cmu.edu
> Subject: RE: Range Seperator
>
>
> I do not like the ';' but I would prefer a single character. There
> have been
> objections to using the comma or colon, then my third choice is the
> ".."
>
> I really don't see any conflict using either the comma or colon.
>
> Using comma is already used to separate list values. Colon being used
> in
> addresses is irrelevant because those are different parameters. I
> certainly
> keep track of which one we are working on.
>
> Kevin Lemay
>
> -----Original Message-----
> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
> Sent: Thursday, March 21, 2002 7:47 AM
> To: Rod Harrison
> Cc: ips@ece.cmu.edu
> Subject: RE:
>
>
>
> I was looking at what would be appropriate (and perhaps familiar to
> programmers - double dot is used in Pascal for ranges).  (- or +) may
> come
> handy later for other things. And BTW double characters are already
> there in
> addresses.
> We could use semicolon(;) (I for some reason do not like it).
>
> So we have 2 proposals:
>
> 1) .. (2 votes)
> 2); (1 vote?)
>
> The tally is on! (untill tomorrow)
>
> Julo
>
>
>
>
>
>              "Rod Harrison" <rod.harrison@windriver.com>
>
>
> 21-03-02 02:04
> Please respond to "Rod Harrison"
>
>
>
>         To:        Julian Satran/Haifa/IBM@IBMIL, <ips@ece.cmu.edu>
>         cc:
>         Subject:        RE:
>
>
>
>
>
>                 I would prefer one character. I don't care what it is,
> any
> character
> will do, but having only one there is slightly easier to parse that
> having two.
>
>                 - Rod
>
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Julian Satran
> Sent: Wednesday, March 20, 2002 5:05 PM
> To: ips@ece.cmu.edu
> Subject:
>
>
> Dear colleagues,
>
> I suggested using : (colon) to separate values in a range.
> Unfortunately :
> is overused (in addresses and in names).
> I suggest we use the (old) two dots (..) to mark a range.
>
> Comments?
> Julo
>
>
>
>
>
>
>
>
>



From owner-ips@ece.cmu.edu  Fri Mar 22 14:11:25 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29047
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 14:11:25 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MIKld28208
	for ips-outgoing; Fri, 22 Mar 2002 13:20:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MIKjw28201
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 13:20:45 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLH786>; Fri, 22 Mar 2002 12:20:39 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631E7@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Login after FFP
Date: Fri, 22 Mar 2002 12:16:31 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This should be quick.  

Is it compliant for an iSCSI initiator to send a LOGIN request on a
connection already in FFP?  I couldn't find anything in the draft that
explicitly said this was allowed or not.  How should a target handle this?


From owner-ips@ece.cmu.edu  Fri Mar 22 15:03:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00426
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 15:03:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MJJPl03708
	for ips-outgoing; Fri, 22 Mar 2002 14:19:25 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MJJMw03700
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 14:19:22 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2MJIW226967;
	Fri, 22 Mar 2002 14:18:32 -0500
Message-ID: <3C9B83B0.5429AFDC@splentec.com>
Date: Fri, 22 Mar 2002 14:19:12 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Paul Koning <ni1d@arrl.net>
CC: wrstuden@wasabisystems.com, ips@ece.cmu.edu
Subject: Re: slowness, was Re: range separator
References: <Pine.NEB.4.33.0203211339230.374-100000@candlekeep>
		<Pine.NEB.4.33.0203211522220.727-100000@candlekeep.ietf53.cw.net> <15515.20079.162989.265680@pkoning.dev.equallogic.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul Koning wrote:
> 
> >>>>> "Bill" == Bill Studenmund <wrstuden@wasabisystems.com> writes:
> 
>  Bill> Is something wrong with the mailing list?
> 
> I've rarely seen it be any faster than a multi-hour latency.

I've also seen it drop messages...

What is the reason and/or can it be fixed?

-- 
Luben


From owner-ips@ece.cmu.edu  Fri Mar 22 19:17:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA04741
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 19:16:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2MNPmh24204
	for ips-outgoing; Fri, 22 Mar 2002 18:25:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2MNPkw24199
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 18:25:46 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id B39CFBAAF; Fri, 22 Mar 2002 16:25:45 -0700 (MST)
Received: from axcsbh4.cos.agilent.com (axcsbh4.cos.agilent.com [130.29.152.145])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 8BA05212; Fri, 22 Mar 2002 16:25:45 -0700 (MST)
Received: from 130.29.152.145 by axcsbh4.cos.agilent.com (InterScan E-Mail VirusWall NT); Fri, 22 Mar 2002 16:25:45 -0700
Received: by axcsbh4.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <HNGYG426>; Fri, 22 Mar 2002 16:25:45 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00AFD8704@axcs04.cos.agilent.com>
From: pat_thaler@agilent.com
To: hufferd@us.ibm.com, roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: RE: Bit numbering I-D nit
Date: Fri, 22 Mar 2002 16:25:44 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

John,

The bits would be on the wire the same way we present the bit numbering.
Both specs use the same position in a word as the most significant, but they
name the bits differently. This can lead to human confusion and
interoperabillity problems. It is important to let the reader know that
there are two different naming schemes applied to the bits by the different
standards they are dealing with. We have had to handle a very similar
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig
Ethernet work. 

We should let the reader know about the bit labeling with a brief
description before the header diagrams. For instance, in the iSCSI draft, we
could add something like the following to the text of clause 9:

"Note that SCSI and IETF documents use different conventions for labeling
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 with
7 being the most significant bit. SCSI documents label the bytes with byte 0
being the first byte. IETF documents label the bits of each word from 0 to
31 with 0 being the most significant bit. Therefore, SCSI would label the
first bit of the first word as bit 7 of byte 0 and IETF would label the same
bit as bit 0. This document labels bits following the IETF conventions. This
is a difference in labeling convention and does not represent a difference
in placement of bits or fields."

For the Fibre Channel related documents, the paragraph could be: 

"Note that Fibre Channel and IETF documents use different conventions for
labeling bits. Fibre channel documents label the bits of each word from 0 to
31 with 31 being the most significant bit. IETF documents label the bits of
each word from 0 to 31 with 0 being the most significant bit. Therefore,
Fibre Channel would label the most significant bit of a word as bit 31 and
IETF would label the same bit as bit 0. This document labels bits following
the IETF conventions. This is a difference in labeling convention and does
not represent a difference in placement of bits or fields."

An alternative place for this would be under Conventions used in this
document, but I think it is better to put the information in the section
with the headers. This could be in addition to an Annex if people feel an
Annex necessary.

Pat


-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 21, 2002 8:04 AM
To: roweber@acm.org
Cc: IPS Reflector
Subject: Re: Bit numbering I-D nit



Ralph,
I may have looked at this wrong, but though we have to change the way we
present (print) the bit numbering, the bits on the link are the same way it
was, or at least that is the way I read the RFC requirement.  What do you
think is the issue?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 03/20/2002 08:34:57
PM

Please respond to roweber@acm.org

Sent by:    owner-ips@ece.cmu.edu


To:    IPS Reflector <ips@ece.cmu.edu>
cc:
Subject:    Bit numbering I-D nit



I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...






From owner-ips@ece.cmu.edu  Fri Mar 22 20:17:51 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05254
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:17:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N0Vxt28252
	for ips-outgoing; Fri, 22 Mar 2002 19:31:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N0Vvw28247
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 19:31:57 -0500 (EST)
Received: from hq-ex-c2.brocade.com (hq-ex-c2 [192.168.126.35])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id QAA27371;
	Fri, 22 Mar 2002 16:31:16 -0800 (PST)
Received: by hq-ex-c2.brocade.com with Internet Mail Service (5.5.2653.19)
	id <G5JYV5VV>; Fri, 22 Mar 2002 16:31:16 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D11A1A@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: "'pat_thaler@agilent.com'" <pat_thaler@agilent.com>, hufferd@us.ibm.com,
        roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: RE: Bit numbering I-D nit
Date: Fri, 22 Mar 2002 16:31:15 -0800
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Note that the IETF mapping we are looking at is not an
Ethernet or an IP mapping, but rather a TCP mapping.  The
mapping from TCP to IP to Ethernet is fortunately not
relevant to this discussion.

The FC frames we are looking at are actually two mappings,
one being the memory mapping of the bytes in the payload,
the other being the related mapping of the bytes in the
headers and trailers and payload onto the FC wire stream.

A simple table structure can express all those relationships,
making it nice and clear for people.  Because it is
a mandatory convention, it must reside in the introductory
text of the FC Encapsulation.  It should be either referenced
or replicated in all protocols that derive from that
encapsulation so that people don't make any inadvertent
and incorrect simplifications based on IETF-only or FC-only
knowledge.

Bob Snively                        e-mail:    rsnively@brocade.com
Brocade Communications Systems     phone:  408 487 8135
1745 Technology Drive
San Jose, CA 95110



> -----Original Message-----
> From: pat_thaler@agilent.com [mailto:pat_thaler@agilent.com]
> Sent: Friday, March 22, 2002 3:26 PM
> To: hufferd@us.ibm.com; roweber@acm.org
> Cc: ips@ece.cmu.edu
> Subject: RE: Bit numbering I-D nit
> 
> 
> John,
> 
> The bits would be on the wire the same way we present the bit 
> numbering.
> Both specs use the same position in a word as the most 
> significant, but they
> name the bits differently. This can lead to human confusion and
> interoperabillity problems. It is important to let the reader 
> know that
> there are two different naming schemes applied to the bits by 
> the different
> standards they are dealing with. We have had to handle a very similar
> problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig
> Ethernet work. 
> 
> We should let the reader know about the bit labeling with a brief
> description before the header diagrams. For instance, in the 
> iSCSI draft, we
> could add something like the following to the text of clause 9:
> 
> "Note that SCSI and IETF documents use different conventions 
> for labeling
> bits and bytes. SCSI documents label the bits of each byte 
> from 0 to 7 with
> 7 being the most significant bit. SCSI documents label the 
> bytes with byte 0
> being the first byte. IETF documents label the bits of each 
> word from 0 to
> 31 with 0 being the most significant bit. Therefore, SCSI 
> would label the
> first bit of the first word as bit 7 of byte 0 and IETF would 
> label the same
> bit as bit 0. This document labels bits following the IETF 
> conventions. This
> is a difference in labeling convention and does not represent 
> a difference
> in placement of bits or fields."
> 
> For the Fibre Channel related documents, the paragraph could be: 
> 
> "Note that Fibre Channel and IETF documents use different 
> conventions for
> labeling bits. Fibre channel documents label the bits of each 
> word from 0 to
> 31 with 31 being the most significant bit. IETF documents 
> label the bits of
> each word from 0 to 31 with 0 being the most significant bit. 
> Therefore,
> Fibre Channel would label the most significant bit of a word 
> as bit 31 and
> IETF would label the same bit as bit 0. This document labels 
> bits following
> the IETF conventions. This is a difference in labeling 
> convention and does
> not represent a difference in placement of bits or fields."
> 
> An alternative place for this would be under Conventions used in this
> document, but I think it is better to put the information in 
> the section
> with the headers. This could be in addition to an Annex if 
> people feel an
> Annex necessary.
> 
> Pat
> 
> 
> -----Original Message-----
> From: John Hufferd [mailto:hufferd@us.ibm.com]
> Sent: Thursday, March 21, 2002 8:04 AM
> To: roweber@acm.org
> Cc: IPS Reflector
> Subject: Re: Bit numbering I-D nit
> 
> 
> 
> Ralph,
> I may have looked at this wrong, but though we have to change 
> the way we
> present (print) the bit numbering, the bits on the link are 
> the same way it
> was, or at least that is the way I read the RFC requirement.  
> What do you
> think is the issue?
> 
> .
> .
> .
> John L. Hufferd
> Senior Technical Staff Member (STSM)
> IBM/SSG San Jose Ca
> Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
> Home Office (408) 997-6136, Cell: (408) 499-9702
> Internet address: hufferd@us.ibm.com
> 
> 
> Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 
> 03/20/2002 08:34:57
> PM
> 
> Please respond to roweber@acm.org
> 
> Sent by:    owner-ips@ece.cmu.edu
> 
> 
> To:    IPS Reflector <ips@ece.cmu.edu>
> cc:
> Subject:    Bit numbering I-D nit
> 
> 
> 
> I am getting serious flack from the Fibre Channel
> community over the bit numbering requirement
> in http://www.ietf.org/ID-nits.html.
> 
> The problem is that Fibre Channel uses the
> other bit numbering scheme and interoperability
> woes seem certain unless something gets
> documented in the IETF RFCs.
> 
> Everybody agrees that the body of the FC
> Frame Encapsulation and FCIP drafts can
> have the IETF bit numbering in the figures.
> 
> What they all want is an appendix, or some
> such thing in the drafts/RFCs that translates
> it all back to the Fibre Channel view of
> reality.
> 
> Such a thing seems destined to make waves
> in the IETF review process, and possibly
> even be a target for the RFC Editor's ax.
> 
> Should I just jump of the top of the Hilton
> now, or is there a way out of this mess?
> 
> Thanks.
> 
> Ralph...
> 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Fri Mar 22 20:17:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05266
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:17:57 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N0bjX28628
	for ips-outgoing; Fri, 22 Mar 2002 19:37:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N0bgw28618;
	Fri, 22 Mar 2002 19:37:42 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id BAA135872;
	Sat, 23 Mar 2002 01:37:02 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2N0b2J118550;
	Sat, 23 Mar 2002 01:37:02 +0100
To: pat_thaler@agilent.com
Cc: ips@ece.cmu.edu, "John Hufferd" <hufferd@us.ibm.com>,
        owner-ips@ece.cmu.edu, roweber@acm.org
MIME-Version: 1.0
Subject: RE: Bit numbering I-D nit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFED500A87.072356E8-ONC2256B85.0001A12A@telaviv.ibm.com>
Date: Sat, 23 Mar 2002 02:36:55 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 23/03/2002 02:37:02,
	Serialize complete at 23/03/2002 02:37:02
Content-Type: multipart/alternative; boundary="=_alternative 000229EBC2256B85_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 000229EBC2256B85_=
Content-Type: text/plain; charset="us-ascii"

Pat,

The "nits" document requires a certain numbering from the MSB to the LSB 
but not necesarily 0 to 31 (that is an example).
I did already the changes in the iSCSI document to fulfill this 
requirement. Now our "presentation" and SCSI are similar.
Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 
7 gets out first and the same holds for the CRC calculation (somewhat 
arbitrary).


Julo




pat_thaler@agilent.com
Sent by: owner-ips@ece.cmu.edu
23-03-02 01:25
Please respond to pat_thaler

 
        To:     John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org
        cc:     ips@ece.cmu.edu
        Subject:        RE: Bit numbering I-D nit

 

John,

The bits would be on the wire the same way we present the bit numbering.
Both specs use the same position in a word as the most significant, but 
they
name the bits differently. This can lead to human confusion and
interoperabillity problems. It is important to let the reader know that
there are two different naming schemes applied to the bits by the 
different
standards they are dealing with. We have had to handle a very similar
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig
Ethernet work. 

We should let the reader know about the bit labeling with a brief
description before the header diagrams. For instance, in the iSCSI draft, 
we
could add something like the following to the text of clause 9:

"Note that SCSI and IETF documents use different conventions for labeling
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 
with
7 being the most significant bit. SCSI documents label the bytes with byte 
0
being the first byte. IETF documents label the bits of each word from 0 to
31 with 0 being the most significant bit. Therefore, SCSI would label the
first bit of the first word as bit 7 of byte 0 and IETF would label the 
same
bit as bit 0. This document labels bits following the IETF conventions. 
This
is a difference in labeling convention and does not represent a difference
in placement of bits or fields."

For the Fibre Channel related documents, the paragraph could be: 

"Note that Fibre Channel and IETF documents use different conventions for
labeling bits. Fibre channel documents label the bits of each word from 0 
to
31 with 31 being the most significant bit. IETF documents label the bits 
of
each word from 0 to 31 with 0 being the most significant bit. Therefore,
Fibre Channel would label the most significant bit of a word as bit 31 and
IETF would label the same bit as bit 0. This document labels bits 
following
the IETF conventions. This is a difference in labeling convention and does
not represent a difference in placement of bits or fields."

An alternative place for this would be under Conventions used in this
document, but I think it is better to put the information in the section
with the headers. This could be in addition to an Annex if people feel an
Annex necessary.

Pat


-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 21, 2002 8:04 AM
To: roweber@acm.org
Cc: IPS Reflector
Subject: Re: Bit numbering I-D nit



Ralph,
I may have looked at this wrong, but though we have to change the way we
present (print) the bit numbering, the bits on the link are the same way 
it
was, or at least that is the way I read the RFC requirement.  What do you
think is the issue?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 03/20/2002 
08:34:57
PM

Please respond to roweber@acm.org

Sent by:    owner-ips@ece.cmu.edu


To:    IPS Reflector <ips@ece.cmu.edu>
cc:
Subject:    Bit numbering I-D nit



I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...







--=_alternative 000229EBC2256B85_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Pat,</font>
<br>
<br><font size=2 face="sans-serif">The &quot;nits&quot; document requires a certain numbering from the MSB to the LSB but not necesarily 0 to 31 (that is an example).</font>
<br><font size=2 face="sans-serif">I did already the changes in the iSCSI document to fulfill this requirement. Now our &quot;presentation&quot; and SCSI are similar.</font>
<br><font size=2 face="sans-serif">Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 7 gets out first and the same holds for the CRC calculation (somewhat arbitrary).</font>
<br>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>pat_thaler@agilent.com</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">23-03-02 01:25</font>
<br><font size=1 face="sans-serif">Please respond to pat_thaler</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: Bit numbering I-D nit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">John,<br>
<br>
The bits would be on the wire the same way we present the bit numbering.<br>
Both specs use the same position in a word as the most significant, but they<br>
name the bits differently. This can lead to human confusion and<br>
interoperabillity problems. It is important to let the reader know that<br>
there are two different naming schemes applied to the bits by the different<br>
standards they are dealing with. We have had to handle a very similar<br>
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig<br>
Ethernet work. <br>
<br>
We should let the reader know about the bit labeling with a brief<br>
description before the header diagrams. For instance, in the iSCSI draft, we<br>
could add something like the following to the text of clause 9:<br>
<br>
&quot;Note that SCSI and IETF documents use different conventions for labeling<br>
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 with<br>
7 being the most significant bit. SCSI documents label the bytes with byte 0<br>
being the first byte. IETF documents label the bits of each word from 0 to<br>
31 with 0 being the most significant bit. Therefore, SCSI would label the<br>
first bit of the first word as bit 7 of byte 0 and IETF would label the same<br>
bit as bit 0. This document labels bits following the IETF conventions. This<br>
is a difference in labeling convention and does not represent a difference<br>
in placement of bits or fields.&quot;<br>
<br>
For the Fibre Channel related documents, the paragraph could be: <br>
<br>
&quot;Note that Fibre Channel and IETF documents use different conventions for<br>
labeling bits. Fibre channel documents label the bits of each word from 0 to<br>
31 with 31 being the most significant bit. IETF documents label the bits of<br>
each word from 0 to 31 with 0 being the most significant bit. Therefore,<br>
Fibre Channel would label the most significant bit of a word as bit 31 and<br>
IETF would label the same bit as bit 0. This document labels bits following<br>
the IETF conventions. This is a difference in labeling convention and does<br>
not represent a difference in placement of bits or fields.&quot;<br>
<br>
An alternative place for this would be under Conventions used in this<br>
document, but I think it is better to put the information in the section<br>
with the headers. This could be in addition to an Annex if people feel an<br>
Annex necessary.<br>
<br>
Pat<br>
<br>
<br>
-----Original Message-----<br>
From: John Hufferd [mailto:hufferd@us.ibm.com]<br>
Sent: Thursday, March 21, 2002 8:04 AM<br>
To: roweber@acm.org<br>
Cc: IPS Reflector<br>
Subject: Re: Bit numbering I-D nit<br>
<br>
<br>
<br>
Ralph,<br>
I may have looked at this wrong, but though we have to change the way we<br>
present (print) the bit numbering, the bits on the link are the same way it<br>
was, or at least that is the way I read the RFC requirement. &nbsp;What do you<br>
think is the issue?<br>
<br>
.<br>
.<br>
.<br>
John L. Hufferd<br>
Senior Technical Staff Member (STSM)<br>
IBM/SSG San Jose Ca<br>
Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
Home Office (408) 997-6136, Cell: (408) 499-9702<br>
Internet address: hufferd@us.ibm.com<br>
<br>
<br>
Ralph Weber &lt;ralphoweber@compuserve.com&gt;@ece.cmu.edu on 03/20/2002 08:34:57<br>
PM<br>
<br>
Please respond to roweber@acm.org<br>
<br>
Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
<br>
<br>
To: &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;<br>
cc:</font>
<br><font size=2 face="Courier New">Subject: &nbsp; &nbsp;Bit numbering I-D nit<br>
<br>
<br>
<br>
I am getting serious flack from the Fibre Channel<br>
community over the bit numbering requirement<br>
in http://www.ietf.org/ID-nits.html.<br>
<br>
The problem is that Fibre Channel uses the<br>
other bit numbering scheme and interoperability<br>
woes seem certain unless something gets<br>
documented in the IETF RFCs.<br>
<br>
Everybody agrees that the body of the FC<br>
Frame Encapsulation and FCIP drafts can<br>
have the IETF bit numbering in the figures.<br>
<br>
What they all want is an appendix, or some<br>
such thing in the drafts/RFCs that translates<br>
it all back to the Fibre Channel view of<br>
reality.<br>
<br>
Such a thing seems destined to make waves<br>
in the IETF review process, and possibly<br>
even be a target for the RFC Editor's ax.<br>
<br>
Should I just jump of the top of the Hilton<br>
now, or is there a way out of this mess?<br>
<br>
Thanks.<br>
<br>
Ralph...<br>
<br>
<br>
<br>
<br>
</font>
<br>
<br>
--=_alternative 000229EBC2256B85_=--


From owner-ips@ece.cmu.edu  Fri Mar 22 20:18:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05278
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:18:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N0vG829758
	for ips-outgoing; Fri, 22 Mar 2002 19:57:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N0vEw29754
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 19:57:14 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 2FD7B3070A; Fri, 22 Mar 2002 19:57:14 -0500 (EST)
Date: Fri, 22 Mar 2002 16:52:32 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Cc: Julian Satran <Julian_Satran@il.ibm.com>, <ips@ece.cmu.edu>
Subject: Re: iSCSI using IPSEC
In-Reply-To: <OFB0A51C54.C5CF305E-ONC2256B84.005AA6B5@telaviv.ibm.com>
Message-ID: <Pine.NEB.4.33.0203221648080.402-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Fri, 22 Mar 2002, Julian Satran wrote:

>
> iSCSI can use  any IPsec implementation. Obviously iSCSI will not be
                                                     IPsec :-)

> implemented at iSCSI level as it sits somewhere else in the stack.  The
> coordination between IPsec and iSCSI is by administrative means and some
> things that should or should not be done (key negotiations, SA use) are
> specified in the IPS security draft.

Put another way, the admin configures iSCSI between two machines. As a
seperate, independant step, the admin configures IPsec between those two
machines. When iSCSI starts up, since it is a TCP protocol, it will use
the IPsec settings between the two machines.

Take care,

Bill




From owner-ips@ece.cmu.edu  Fri Mar 22 20:19:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05303
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:19:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N10S329948
	for ips-outgoing; Fri, 22 Mar 2002 20:00:28 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from msgbas1.cos.agilent.com (msgbas1x.cos.agilent.com [192.25.240.36])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N10Rw29943;
	Fri, 22 Mar 2002 20:00:27 -0500 (EST)
Received: from msgrel1.cos.agilent.com (msgrel1.cos.agilent.com [130.29.152.77])
	by msgbas1.cos.agilent.com (Postfix) with ESMTP
	id 58BF4B3AC; Fri, 22 Mar 2002 18:00:26 -0700 (MST)
Received: from axcsbh4.cos.agilent.com (axcsbh4.cos.agilent.com [130.29.152.145])
	by msgrel1.cos.agilent.com (Postfix) with SMTP
	id 0F2F05AD; Fri, 22 Mar 2002 18:00:26 -0700 (MST)
Received: from 130.29.152.145 by axcsbh4.cos.agilent.com (InterScan E-Mail VirusWall NT); Fri, 22 Mar 2002 18:00:25 -0700
Received: by axcsbh4.cos.agilent.com with Internet Mail Service (5.5.2653.19)
	id <HNGYGYBQ>; Fri, 22 Mar 2002 18:00:25 -0700
Message-ID: <1BEBA5E8600DD4119A50009027AF54A00AFD871E@axcs04.cos.agilent.com>
From: pat_thaler@agilent.com
To: Julian_Satran@il.ibm.com, pat_thaler@agilent.com
Cc: ips@ece.cmu.edu, hufferd@us.ibm.com, owner-ips@ece.cmu.edu,
        roweber@acm.org
Subject: RE: Bit numbering I-D nit
Date: Fri, 22 Mar 2002 18:00:25 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/mixed;
	boundary="------------InterScan_NT_MIME_Boundary"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--------------InterScan_NT_MIME_Boundary
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D206.1DB08930"

------_=_NextPart_001_01C1D206.1DB08930
Content-Type: text/plain;
	charset="iso-8859-1"

Julian,
 
The nits document specifically says that bit zero is the most significant
bit in a word or field. SCSI labels the most significant bit of the byte as
7 so I don't see how we can comply with the nits document and be similar to
SCSI labeling. When you say you already did the changes, do you mean you
have already renumbered tables for the next draft or are you referring to
Draft 11?  Draft 11 shows bit 7 as the MSB of each byte which is consistant
with SCSI and not with the nit. 
 
Or do you mean that our next draft is similar to SCSI in that you number
bits within a byte rather than within a word though the bits are numbered in
opposite order? If so, I think it would be useful to the reader to point out
the difference. 
 
Regards,
Pat
 
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Friday, March 22, 2002 4:37 PM
To: pat_thaler@agilent.com
Cc: ips@ece.cmu.edu; John Hufferd; owner-ips@ece.cmu.edu; roweber@acm.org
Subject: RE: Bit numbering I-D nit



Pat, 

The "nits" document requires a certain numbering from the MSB to the LSB but
not necesarily 0 to 31 (that is an example). 
I did already the changes in the iSCSI document to fulfill this requirement.
Now our "presentation" and SCSI are similar. 
Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 7
gets out first and the same holds for the CRC calculation (somewhat
arbitrary). 


Julo 



	pat_thaler@agilent.com 
Sent by: owner-ips@ece.cmu.edu 


23-03-02 01:25 
Please respond to pat_thaler 


        
        To:        John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org 
        cc:        ips@ece.cmu.edu 
        Subject:        RE: Bit numbering I-D nit 

       


John,

The bits would be on the wire the same way we present the bit numbering.
Both specs use the same position in a word as the most significant, but they
name the bits differently. This can lead to human confusion and
interoperabillity problems. It is important to let the reader know that
there are two different naming schemes applied to the bits by the different
standards they are dealing with. We have had to handle a very similar
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig
Ethernet work. 

We should let the reader know about the bit labeling with a brief
description before the header diagrams. For instance, in the iSCSI draft, we
could add something like the following to the text of clause 9:

"Note that SCSI and IETF documents use different conventions for labeling
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 with
7 being the most significant bit. SCSI documents label the bytes with byte 0
being the first byte. IETF documents label the bits of each word from 0 to
31 with 0 being the most significant bit. Therefore, SCSI would label the
first bit of the first word as bit 7 of byte 0 and IETF would label the same
bit as bit 0. This document labels bits following the IETF conventions. This
is a difference in labeling convention and does not represent a difference
in placement of bits or fields."

For the Fibre Channel related documents, the paragraph could be: 

"Note that Fibre Channel and IETF documents use different conventions for
labeling bits. Fibre channel documents label the bits of each word from 0 to
31 with 31 being the most significant bit. IETF documents label the bits of
each word from 0 to 31 with 0 being the most significant bit. Therefore,
Fibre Channel would label the most significant bit of a word as bit 31 and
IETF would label the same bit as bit 0. This document labels bits following
the IETF conventions. This is a difference in labeling convention and does
not represent a difference in placement of bits or fields."

An alternative place for this would be under Conventions used in this
document, but I think it is better to put the information in the section
with the headers. This could be in addition to an Annex if people feel an
Annex necessary.

Pat


-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 21, 2002 8:04 AM
To: roweber@acm.org
Cc: IPS Reflector
Subject: Re: Bit numbering I-D nit



Ralph,
I may have looked at this wrong, but though we have to change the way we
present (print) the bit numbering, the bits on the link are the same way it
was, or at least that is the way I read the RFC requirement.  What do you
think is the issue?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 03/20/2002 08:34:57
PM

Please respond to roweber@acm.org

Sent by:    owner-ips@ece.cmu.edu


To:    IPS Reflector <ips@ece.cmu.edu>
cc: 
Subject:    Bit numbering I-D nit



I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...








------_=_NextPart_001_01C1D206.1DB08930
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.50.4807.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2>Julian,</FONT></SPAN></DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial size=2>The nits document 
specifically says that&nbsp;bit zero is the most significant bit in a word or 
field. SCSI labels the most significant bit of the byte as 7 so I don't see how 
we can comply with the nits document and be similar to SCSI labeling. When you 
say you already did the changes, do you mean you have already renumbered tables 
for the next draft or are you referring to Draft 11?&nbsp; Draft 11 shows bit 7 
as the MSB of each byte which is consistant with SCSI and not with the nit. 
</FONT></SPAN></DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial size=2>Or do you mean that 
our next&nbsp;draft is similar to SCSI in that you number bits within a byte 
rather than within a word though the bits are numbered in opposite order? If so, 
I think it would be useful to the reader to point out the difference. 
</FONT></SPAN></DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2>Regards,</FONT></SPAN></DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2>Pat</FONT></SPAN></DIV>
<DIV><SPAN class=214574400-23032002><FONT face=Arial 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
[mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Friday, March 22, 2002 4:37 
PM<BR><B>To:</B> pat_thaler@agilent.com<BR><B>Cc:</B> ips@ece.cmu.edu; John 
Hufferd; owner-ips@ece.cmu.edu; roweber@acm.org<BR><B>Subject:</B> RE: Bit 
numbering I-D nit<BR><BR></FONT></DIV><BR><FONT face=sans-serif 
size=2>Pat,</FONT> <BR><BR><FONT face=sans-serif size=2>The "nits" document 
requires a certain numbering from the MSB to the LSB but not necesarily 0 to 31 
(that is an example).</FONT> <BR><FONT face=sans-serif size=2>I did already the 
changes in the iSCSI document to fulfill this requirement. Now our 
"presentation" and SCSI are similar.</FONT> <BR><FONT face=sans-serif 
size=2>Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 
7 gets out first and the same holds for the CRC calculation (somewhat 
arbitrary).</FONT> <BR><BR><BR><FONT face=sans-serif size=2>Julo</FONT> 
<BR><BR><BR>
<TABLE width="100%">
  <TBODY>
  <TR vAlign=top>
    <TD>
    <TD><FONT face=sans-serif size=1><B>pat_thaler@agilent.com</B></FONT> 
      <BR><FONT face=sans-serif size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
      <P><FONT face=sans-serif size=1>23-03-02 01:25</FONT> <BR><FONT 
      face=sans-serif size=1>Please respond to pat_thaler</FONT> <BR></P>
    <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
      face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
      &nbsp; &nbsp;John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org</FONT> 
      <BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; 
      &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</FONT> <BR><FONT face=sans-serif 
      size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: 
      Bit numbering I-D nit</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; 
      &nbsp; &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" 
size=2>John,<BR><BR>The bits would be on the wire the same way we present the 
bit numbering.<BR>Both specs use the same position in a word as the most 
significant, but they<BR>name the bits differently. This can lead to human 
confusion and<BR>interoperabillity problems. It is important to let the reader 
know that<BR>there are two different naming schemes applied to the bits by the 
different<BR>standards they are dealing with. We have had to handle a very 
similar<BR>problem in mapping Ethernet payloads into a Sonet frame for the 10 
Gig<BR>Ethernet work. <BR><BR>We should let the reader know about the bit 
labeling with a brief<BR>description before the header diagrams. For instance, 
in the iSCSI draft, we<BR>could add something like the following to the text of 
clause 9:<BR><BR>"Note that SCSI and IETF documents use different conventions 
for labeling<BR>bits and bytes. SCSI documents label the bits of each byte from 
0 to 7 with<BR>7 being the most significant bit. SCSI documents label the bytes 
with byte 0<BR>being the first byte. IETF documents label the bits of each word 
from 0 to<BR>31 with 0 being the most significant bit. Therefore, SCSI would 
label the<BR>first bit of the first word as bit 7 of byte 0 and IETF would label 
the same<BR>bit as bit 0. This document labels bits following the IETF 
conventions. This<BR>is a difference in labeling convention and does not 
represent a difference<BR>in placement of bits or fields."<BR><BR>For the Fibre 
Channel related documents, the paragraph could be: <BR><BR>"Note that Fibre 
Channel and IETF documents use different conventions for<BR>labeling bits. Fibre 
channel documents label the bits of each word from 0 to<BR>31 with 31 being the 
most significant bit. IETF documents label the bits of<BR>each word from 0 to 31 
with 0 being the most significant bit. Therefore,<BR>Fibre Channel would label 
the most significant bit of a word as bit 31 and<BR>IETF would label the same 
bit as bit 0. This document labels bits following<BR>the IETF conventions. This 
is a difference in labeling convention and does<BR>not represent a difference in 
placement of bits or fields."<BR><BR>An alternative place for this would be 
under Conventions used in this<BR>document, but I think it is better to put the 
information in the section<BR>with the headers. This could be in addition to an 
Annex if people feel an<BR>Annex necessary.<BR><BR>Pat<BR><BR><BR>-----Original 
Message-----<BR>From: John Hufferd [mailto:hufferd@us.ibm.com]<BR>Sent: 
Thursday, March 21, 2002 8:04 AM<BR>To: roweber@acm.org<BR>Cc: IPS 
Reflector<BR>Subject: Re: Bit numbering I-D nit<BR><BR><BR><BR>Ralph,<BR>I may 
have looked at this wrong, but though we have to change the way we<BR>present 
(print) the bit numbering, the bits on the link are the same way it<BR>was, or 
at least that is the way I read the RFC requirement. &nbsp;What do you<BR>think 
is the issue?<BR><BR>.<BR>.<BR>.<BR>John L. Hufferd<BR>Senior Technical Staff 
Member (STSM)<BR>IBM/SSG San Jose Ca<BR>Main Office (408) 256-0403, Tie: 
276-0403, &nbsp;eFax: (408) 904-4688<BR>Home Office (408) 997-6136, Cell: (408) 
499-9702<BR>Internet address: hufferd@us.ibm.com<BR><BR><BR>Ralph Weber 
&lt;ralphoweber@compuserve.com&gt;@ece.cmu.edu on 03/20/2002 
08:34:57<BR>PM<BR><BR>Please respond to roweber@acm.org<BR><BR>Sent by: &nbsp; 
&nbsp;owner-ips@ece.cmu.edu<BR><BR><BR>To: &nbsp; &nbsp;IPS Reflector 
&lt;ips@ece.cmu.edu&gt;<BR>cc:</FONT> <BR><FONT face="Courier New" 
size=2>Subject: &nbsp; &nbsp;Bit numbering I-D nit<BR><BR><BR><BR>I am getting 
serious flack from the Fibre Channel<BR>community over the bit numbering 
requirement<BR>in http://www.ietf.org/ID-nits.html.<BR><BR>The problem is that 
Fibre Channel uses the<BR>other bit numbering scheme and 
interoperability<BR>woes seem certain unless something gets<BR>documented in the 
IETF RFCs.<BR><BR>Everybody agrees that the body of the FC<BR>Frame 
Encapsulation and FCIP drafts can<BR>have the IETF bit numbering in the 
figures.<BR><BR>What they all want is an appendix, or some<BR>such thing in the 
drafts/RFCs that translates<BR>it all back to the Fibre Channel view 
of<BR>reality.<BR><BR>Such a thing seems destined to make waves<BR>in the IETF 
review process, and possibly<BR>even be a target for the RFC Editor's 
ax.<BR><BR>Should I just jump of the top of the Hilton<BR>now, or is there a way 
out of this 
mess?<BR><BR>Thanks.<BR><BR>Ralph...<BR><BR><BR><BR><BR></FONT><BR><BR></BODY></HTML>

------_=_NextPart_001_01C1D206.1DB08930--

--------------InterScan_NT_MIME_Boundary--



From owner-ips@ece.cmu.edu  Fri Mar 22 20:20:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05332
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:20:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N0QVj27949
	for ips-outgoing; Fri, 22 Mar 2002 19:26:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N0QTw27945
	for <ips@ece.cmu.edu>; Fri, 22 Mar 2002 19:26:29 -0500 (EST)
Received: from hq-ex-c3.brocade.com (hq-ex-c3 [192.168.126.211])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id QAA27114;
	Fri, 22 Mar 2002 16:25:48 -0800 (PST)
Received: by hq-ex-c3.brocade.com with Internet Mail Service (5.5.2653.19)
	id <G5J4LBRW>; Fri, 22 Mar 2002 16:25:28 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D11A19@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: "'Murali Rajagopal'" <muralir@cox.net>, Paul Koning <ni1d@arrl.net>,
        roweber@acm.org
Cc: ips@ece.cmu.edu
Subject: RE: Bit numbering I-D nit
Date: Fri, 22 Mar 2002 16:25:47 -0800
X-Mailer: Internet Mail Service (5.5.2653.19)
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

No.

I believe it must be in the text of the FC Encapsulation
document.  It is a necessary definition of the conventions
applied to the FC bit stream.

What is really required is a simple mapping table that may
be used by both FC folks and IP folks to map back and forth
between the conventions.  That way no one will be confused.

Bob

> -----Original Message-----
> From: Murali Rajagopal [mailto:muralir@cox.net]
> Sent: Thursday, March 21, 2002 9:56 AM
> To: Paul Koning; roweber@acm.org
> Cc: ips@ece.cmu.edu
> Subject: RE: Bit numbering I-D nit
> 
> 
> Paul/Ralph:
> 
> Clearly it appears that putting something an appendix is 
> reaching a high
> degree of consensus.
> One might also, via an example in the appendix alert the 
> reader to this
> mapping. I would find
> it hard that any RFC editor would argue with this informative example.
> 
> -Murali
> 
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Paul Koning
> Sent: Thursday, March 21, 2002 8:04 AM
> To: roweber@acm.org
> Cc: ips@ece.cmu.edu
> Subject: Re: Bit numbering I-D nit
> 
> 
> >>>>> "Ralph" == Ralph Weber <ralphoweber@compuserve.com> writes:
> 
>  Ralph> I am getting serious flack from the Fibre Channel community
>  Ralph> over the bit numbering requirement in
>  Ralph> http://www.ietf.org/ID-nits.html.
> 
> I can see why... I didn't realize that the requirement is for the
> confusing old IMB-360 style bit ordering rather than the "powers of
> two" bit ordering that's generally used.  Yuck.
> 
>  Ralph> The problem is that Fibre Channel uses the other bit numbering
>  Ralph> scheme and interoperability woes seem certain unless something
>  Ralph> gets documented in the IETF RFCs.
> 
>  Ralph> Everybody agrees that the body of the FC Frame Encapsulation
>  Ralph> and FCIP drafts can have the IETF bit numbering in the
>  Ralph> figures.
> 
>  Ralph> What they all want is an appendix, or some such thing in the
>  Ralph> drafts/RFCs that translates it all back to the Fibre Channel
>  Ralph> view of reality.
> 
>  Ralph> Such a thing seems destined to make waves in the IETF review
>  Ralph> process, and possibly even be a target for the RFC Editor's
>  Ralph> ax.
> 
> I would say an appendix that documents the mapping to other standards
> is the right thing.  If that gives the RFC editor and/or IESG
> heartburn, it's worth a battle.  Bit order is far too important an
> interop issue to be left undiscussed, and if bureaucratic rules stand
> in the way, those rules MUST change.
> 
> If those sound like strong words, so be it.  I've been burned far too
> many times by bit order confusion to take this sort of thing lightly.
> If there exist two conventions in the community, it's mandatory to
> document that explicitly and clearly state the mapping between the two
> notations, or things will never work.
> 
>    paul
> 
> 
> 


From owner-ips@ece.cmu.edu  Fri Mar 22 20:21:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA05344
	for <ips-archive@odin.ietf.org>; Fri, 22 Mar 2002 20:21:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2N0qYL29437
	for ips-outgoing; Fri, 22 Mar 2002 19:52:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2N0qVw29424;
	Fri, 22 Mar 2002 19:52:31 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id BAA80664;
	Sat, 23 Mar 2002 01:52:24 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2N0qNl114274;
	Sat, 23 Mar 2002 01:52:24 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Login after FFP
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF54464258.AF0C331B-ONC2256B85.00045B0C@telaviv.ibm.com>
Date: Sat, 23 Mar 2002 02:52:20 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 23/03/2002 02:52:24,
	Serialize complete at 23/03/2002 02:52:24
Content-Type: multipart/alternative; boundary="=_alternative 000471EAC2256B85_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 000471EAC2256B85_=
Content-Type: text/plain; charset="us-ascii"

No the target should reject it. If the text does not say it I will add the 
text.

Thanks,
Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
22-03-02 20:16
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: Login after FFP

 

This should be quick. 

Is it compliant for an iSCSI initiator to send a LOGIN request on a
connection already in FFP?  I couldn't find anything in the draft that
explicitly said this was allowed or not.  How should a target handle this?



--=_alternative 000471EAC2256B85_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">No the target should reject it. If the text does not say it I will add the text.</font>
<br>
<br><font size=2 face="sans-serif">Thanks,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">22-03-02 20:16</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Login after FFP</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">This should be quick. &nbsp;<br>
<br>
Is it compliant for an iSCSI initiator to send a LOGIN request on a<br>
connection already in FFP? &nbsp;I couldn't find anything in the draft that<br>
explicitly said this was allowed or not. &nbsp;How should a target handle this?<br>
</font>
<br>
<br>
--=_alternative 000471EAC2256B85_=--


From owner-ips@ece.cmu.edu  Sat Mar 23 10:24:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA22297
	for <ips-archive@odin.ietf.org>; Sat, 23 Mar 2002 10:24:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2NEO1s17817
	for ips-outgoing; Sat, 23 Mar 2002 09:24:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2NENww17812;
	Sat, 23 Mar 2002 09:23:58 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id PAA39038;
	Sat, 23 Mar 2002 15:23:18 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2NENEY75506;
	Sat, 23 Mar 2002 15:23:14 +0100
To: pat_thaler@agilent.com
Cc: ips@ece.cmu.edu, "John Hufferd" <hufferd@us.ibm.com>,
        owner-ips@ece.cmu.edu, pat_thaler@agilent.com, roweber@acm.org
MIME-Version: 1.0
Subject: RE: Bit numbering I-D nit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF084DFF31.1B6C87C9-ONC2256B85.004E513B@telaviv.ibm.com>
Date: Sat, 23 Mar 2002 16:23:05 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 23/03/2002 16:23:18,
	Serialize complete at 23/03/2002 16:23:18
Content-Type: multipart/alternative; boundary="=_alternative 004E8591C2256B85_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 004E8591C2256B85_=
Content-Type: text/plain; charset="us-ascii"

Pat,

For draft 12 I renumbered the bits within bytes by not not the bytes 
within a word (the byte numbering is compliant with the nit draft
as far I understand it). 

Regards,
Julo




pat_thaler@agilent.com
23-03-02 03:00
Please respond to pat_thaler

 
        To:     Julian Satran/Haifa/IBM@IBMIL, pat_thaler@agilent.com
        cc:     ips@ece.cmu.edu, John Hufferd/San Jose/IBM@IBMUS, owner-ips@ece.cmu.edu, 
roweber@acm.org
        Subject:        RE: Bit numbering I-D nit

 

Julian,
 
The nits document specifically says that bit zero is the most significant 
bit in a word or field. SCSI labels the most significant bit of the byte 
as 7 so I don't see how we can comply with the nits document and be 
similar to SCSI labeling. When you say you already did the changes, do you 
mean you have already renumbered tables for the next draft or are you 
referring to Draft 11?  Draft 11 shows bit 7 as the MSB of each byte which 
is consistant with SCSI and not with the nit. 
 
Or do you mean that our next draft is similar to SCSI in that you number 
bits within a byte rather than within a word though the bits are numbered 
in opposite order? If so, I think it would be useful to the reader to 
point out the difference. 
 
Regards,
Pat
 
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Friday, March 22, 2002 4:37 PM
To: pat_thaler@agilent.com
Cc: ips@ece.cmu.edu; John Hufferd; owner-ips@ece.cmu.edu; roweber@acm.org
Subject: RE: Bit numbering I-D nit


Pat, 

The "nits" document requires a certain numbering from the MSB to the LSB 
but not necesarily 0 to 31 (that is an example). 
I did already the changes in the iSCSI document to fulfill this 
requirement. Now our "presentation" and SCSI are similar. 
Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 
7 gets out first and the same holds for the CRC calculation (somewhat 
arbitrary). 


Julo 



pat_thaler@agilent.com 
Sent by: owner-ips@ece.cmu.edu 
23-03-02 01:25 
Please respond to pat_thaler 
        
        To:        John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org 
        cc:        ips@ece.cmu.edu 
        Subject:        RE: Bit numbering I-D nit 

 


John,

The bits would be on the wire the same way we present the bit numbering.
Both specs use the same position in a word as the most significant, but 
they
name the bits differently. This can lead to human confusion and
interoperabillity problems. It is important to let the reader know that
there are two different naming schemes applied to the bits by the 
different
standards they are dealing with. We have had to handle a very similar
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig
Ethernet work. 

We should let the reader know about the bit labeling with a brief
description before the header diagrams. For instance, in the iSCSI draft, 
we
could add something like the following to the text of clause 9:

"Note that SCSI and IETF documents use different conventions for labeling
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 
with
7 being the most significant bit. SCSI documents label the bytes with byte 
0
being the first byte. IETF documents label the bits of each word from 0 to
31 with 0 being the most significant bit. Therefore, SCSI would label the
first bit of the first word as bit 7 of byte 0 and IETF would label the 
same
bit as bit 0. This document labels bits following the IETF conventions. 
This
is a difference in labeling convention and does not represent a difference
in placement of bits or fields."

For the Fibre Channel related documents, the paragraph could be: 

"Note that Fibre Channel and IETF documents use different conventions for
labeling bits. Fibre channel documents label the bits of each word from 0 
to
31 with 31 being the most significant bit. IETF documents label the bits 
of
each word from 0 to 31 with 0 being the most significant bit. Therefore,
Fibre Channel would label the most significant bit of a word as bit 31 and
IETF would label the same bit as bit 0. This document labels bits 
following
the IETF conventions. This is a difference in labeling convention and does
not represent a difference in placement of bits or fields."

An alternative place for this would be under Conventions used in this
document, but I think it is better to put the information in the section
with the headers. This could be in addition to an Annex if people feel an
Annex necessary.

Pat


-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Thursday, March 21, 2002 8:04 AM
To: roweber@acm.org
Cc: IPS Reflector
Subject: Re: Bit numbering I-D nit



Ralph,
I may have looked at this wrong, but though we have to change the way we
present (print) the bit numbering, the bits on the link are the same way 
it
was, or at least that is the way I read the RFC requirement.  What do you
think is the issue?

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Ralph Weber <ralphoweber@compuserve.com>@ece.cmu.edu on 03/20/2002 
08:34:57
PM

Please respond to roweber@acm.org

Sent by:    owner-ips@ece.cmu.edu


To:    IPS Reflector <ips@ece.cmu.edu>
cc: 
Subject:    Bit numbering I-D nit



I am getting serious flack from the Fibre Channel
community over the bit numbering requirement
in http://www.ietf.org/ID-nits.html.

The problem is that Fibre Channel uses the
other bit numbering scheme and interoperability
woes seem certain unless something gets
documented in the IETF RFCs.

Everybody agrees that the body of the FC
Frame Encapsulation and FCIP drafts can
have the IETF bit numbering in the figures.

What they all want is an appendix, or some
such thing in the drafts/RFCs that translates
it all back to the Fibre Channel view of
reality.

Such a thing seems destined to make waves
in the IETF review process, and possibly
even be a target for the RFC Editor's ax.

Should I just jump of the top of the Hilton
now, or is there a way out of this mess?

Thanks.

Ralph...








--=_alternative 004E8591C2256B85_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Pat,</font>
<br>
<br><font size=2 face="sans-serif">For draft 12 I renumbered the bits within bytes by not not the bytes within a word (the byte numbering is compliant with the nit draft</font>
<br><font size=2 face="sans-serif">as far I understand it). &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>pat_thaler@agilent.com</b></font>
<p><font size=1 face="sans-serif">23-03-02 03:00</font>
<br><font size=1 face="sans-serif">Please respond to pat_thaler</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL, pat_thaler@agilent.com</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu, John Hufferd/San Jose/IBM@IBMUS, owner-ips@ece.cmu.edu, roweber@acm.org</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: Bit numbering I-D nit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Arial">Julian,</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 face="Arial">The nits document specifically says that bit zero is the most significant bit in a word or field. SCSI labels the most significant bit of the byte as 7 so I don't see how we can comply with the nits document and be similar to SCSI labeling. When you say you already did the changes, do you mean you have already renumbered tables for the next draft or are you referring to Draft 11? &nbsp;Draft 11 shows bit 7 as the MSB of each byte which is consistant with SCSI and not with the nit. </font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 face="Arial">Or do you mean that our next draft is similar to SCSI in that you number bits within a byte rather than within a word though the bits are numbered in opposite order? If so, I think it would be useful to the reader to point out the difference. </font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 face="Arial">Regards,</font>
<br><font size=2 face="Arial">Pat</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 face="Tahoma">-----Original Message-----<b><br>
From:</b> Julian Satran [mailto:Julian_Satran@il.ibm.com]<b><br>
Sent:</b> Friday, March 22, 2002 4:37 PM<b><br>
To:</b> pat_thaler@agilent.com<b><br>
Cc:</b> ips@ece.cmu.edu; John Hufferd; owner-ips@ece.cmu.edu; roweber@acm.org<b><br>
Subject:</b> RE: Bit numbering I-D nit<br>
</font>
<br><font size=2 face="sans-serif"><br>
Pat,</font><font size=3 face="Times New Roman"> <br>
</font><font size=2 face="sans-serif"><br>
The &quot;nits&quot; document requires a certain numbering from the MSB to the LSB but not necesarily 0 to 31 (that is an example).</font><font size=3 face="Times New Roman"> </font><font size=2 face="sans-serif"><br>
I did already the changes in the iSCSI document to fulfill this requirement. Now our &quot;presentation&quot; and SCSI are similar.</font><font size=3 face="Times New Roman"> </font><font size=2 face="sans-serif"><br>
Obviously when sent on an Ethernet (but that is 1000 layers away :-)) bit 7 gets out first and the same holds for the CRC calculation (somewhat arbitrary).</font><font size=3 face="Times New Roman"> <br>
<br>
</font><font size=2 face="sans-serif"><br>
Julo</font><font size=3 face="Times New Roman"> <br>
<br>
</font>
<table width=100%>
<tr valign=top>
<td width=2%>
<td width=32%><font size=1 face="sans-serif"><b>pat_thaler@agilent.com</b></font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
Sent by: owner-ips@ece.cmu.edu</font><font size=3 face="Times New Roman"> </font>
<p><font size=1 face="sans-serif">23-03-02 01:25</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
Please respond to pat_thaler</font><font size=3 face="Times New Roman"> </font>
<td width=65%><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;To: &nbsp; &nbsp; &nbsp; &nbsp;John Hufferd/San Jose/IBM@IBMUS, roweber@acm.org</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: Bit numbering I-D nit</font><font size=3 face="Times New Roman"> <br>
</font><font size=1 face="Arial"><br>
 &nbsp; &nbsp; &nbsp; </font></table>
<br><font size=3 face="Times New Roman"><br>
</font><font size=2 face="Courier New"><br>
John,<br>
<br>
The bits would be on the wire the same way we present the bit numbering.<br>
Both specs use the same position in a word as the most significant, but they<br>
name the bits differently. This can lead to human confusion and<br>
interoperabillity problems. It is important to let the reader know that<br>
there are two different naming schemes applied to the bits by the different<br>
standards they are dealing with. We have had to handle a very similar<br>
problem in mapping Ethernet payloads into a Sonet frame for the 10 Gig<br>
Ethernet work. <br>
<br>
We should let the reader know about the bit labeling with a brief<br>
description before the header diagrams. For instance, in the iSCSI draft, we<br>
could add something like the following to the text of clause 9:<br>
<br>
&quot;Note that SCSI and IETF documents use different conventions for labeling<br>
bits and bytes. SCSI documents label the bits of each byte from 0 to 7 with<br>
7 being the most significant bit. SCSI documents label the bytes with byte 0<br>
being the first byte. IETF documents label the bits of each word from 0 to<br>
31 with 0 being the most significant bit. Therefore, SCSI would label the<br>
first bit of the first word as bit 7 of byte 0 and IETF would label the same<br>
bit as bit 0. This document labels bits following the IETF conventions. This<br>
is a difference in labeling convention and does not represent a difference<br>
in placement of bits or fields.&quot;<br>
<br>
For the Fibre Channel related documents, the paragraph could be: <br>
<br>
&quot;Note that Fibre Channel and IETF documents use different conventions for<br>
labeling bits. Fibre channel documents label the bits of each word from 0 to<br>
31 with 31 being the most significant bit. IETF documents label the bits of<br>
each word from 0 to 31 with 0 being the most significant bit. Therefore,<br>
Fibre Channel would label the most significant bit of a word as bit 31 and<br>
IETF would label the same bit as bit 0. This document labels bits following<br>
the IETF conventions. This is a difference in labeling convention and does<br>
not represent a difference in placement of bits or fields.&quot;<br>
<br>
An alternative place for this would be under Conventions used in this<br>
document, but I think it is better to put the information in the section<br>
with the headers. This could be in addition to an Annex if people feel an<br>
Annex necessary.<br>
<br>
Pat<br>
<br>
<br>
-----Original Message-----<br>
From: John Hufferd [mailto:hufferd@us.ibm.com]<br>
Sent: Thursday, March 21, 2002 8:04 AM<br>
To: roweber@acm.org<br>
Cc: IPS Reflector<br>
Subject: Re: Bit numbering I-D nit<br>
<br>
<br>
<br>
Ralph,<br>
I may have looked at this wrong, but though we have to change the way we<br>
present (print) the bit numbering, the bits on the link are the same way it<br>
was, or at least that is the way I read the RFC requirement. &nbsp;What do you<br>
think is the issue?<br>
<br>
.<br>
.<br>
.<br>
John L. Hufferd<br>
Senior Technical Staff Member (STSM)<br>
IBM/SSG San Jose Ca<br>
Main Office (408) 256-0403, Tie: 276-0403, &nbsp;eFax: (408) 904-4688<br>
Home Office (408) 997-6136, Cell: (408) 499-9702<br>
Internet address: hufferd@us.ibm.com<br>
<br>
<br>
Ralph Weber &lt;ralphoweber@compuserve.com&gt;@ece.cmu.edu on 03/20/2002 08:34:57<br>
PM<br>
<br>
Please respond to roweber@acm.org<br>
<br>
Sent by: &nbsp; &nbsp;owner-ips@ece.cmu.edu<br>
<br>
<br>
To: &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;<br>
cc:</font><font size=3 face="Times New Roman"> </font><font size=2 face="Courier New"><br>
Subject: &nbsp; &nbsp;Bit numbering I-D nit<br>
<br>
<br>
<br>
I am getting serious flack from the Fibre Channel<br>
community over the bit numbering requirement<br>
in http://www.ietf.org/ID-nits.html.<br>
<br>
The problem is that Fibre Channel uses the<br>
other bit numbering scheme and interoperability<br>
woes seem certain unless something gets<br>
documented in the IETF RFCs.<br>
<br>
Everybody agrees that the body of the FC<br>
Frame Encapsulation and FCIP drafts can<br>
have the IETF bit numbering in the figures.<br>
<br>
What they all want is an appendix, or some<br>
such thing in the drafts/RFCs that translates<br>
it all back to the Fibre Channel view of<br>
reality.<br>
<br>
Such a thing seems destined to make waves<br>
in the IETF review process, and possibly<br>
even be a target for the RFC Editor's ax.<br>
<br>
Should I just jump of the top of the Hilton<br>
now, or is there a way out of this mess?<br>
<br>
Thanks.<br>
<br>
Ralph...<br>
<br>
<br>
<br>
</font><font size=3 face="Times New Roman"><br>
<br>
</font>
<br>
<br>
--=_alternative 004E8591C2256B85_=--


From owner-ips@ece.cmu.edu  Sat Mar 23 11:43:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22969
	for <ips-archive@odin.ietf.org>; Sat, 23 Mar 2002 11:43:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2NFosS22010
	for ips-outgoing; Sat, 23 Mar 2002 10:50:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2NFopw22003;
	Sat, 23 Mar 2002 10:50:51 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <HH5FFC7S>; Sat, 23 Mar 2002 10:50:51 -0500
Message-ID: <25369470B6F0D41194820002B328BDD2116497@ATLOPS>
From: Sanjay Goyal <sanjay_goyal@ivivity.com>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
Subject: RE: iSCSI: Login after FFP
Date: Sat, 23 Mar 2002 10:50:50 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D282.816054C0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D282.816054C0
Content-Type: text/plain;
	charset="iso-8859-1"

The text does say it.
   

2.5.3.2 Login Request and Login Response

Login Requests and Responses are used exclusively during the login phase of
each connection to set up the session and connection parame- ters (the login
phase consists of a sequence of login requests and responses carrying the
same Initiator Task Tag).

 

Regards 
Sanjay G 

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Friday, March 22, 2002 7:52 PM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: Login after FFP



No the target should reject it. If the text does not say it I will add the
text. 

Thanks, 
Julo 



	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


22-03-02 20:16 
Please respond to Michael Schoberg 


        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: Login after FFP 

       


This should be quick.  

Is it compliant for an iSCSI initiator to send a LOGIN request on a
connection already in FFP?  I couldn't find anything in the draft that
explicitly said this was allowed or not.  How should a target handle this?





------_=_NextPart_001_01C1D282.816054C0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=056405115-23032002><FONT face=Arial color=#0000ff size=2>The 
text does say it.</FONT></SPAN></DIV>
<DIV><SPAN class=056405115-23032002><FONT face=Arial color=#0000ff 
size=2>&nbsp;&nbsp; <FONT size=2>
<P>2.5.3.2 Login Request and Login Response</P>
<P>Login Requests and Responses are used exclusively during the login phase of 
each connection to set up the session and connection parame- ters (the login 
phase consists of a sequence of login requests and responses carrying the same 
Initiator Task Tag).</P>
<P>&nbsp;</P>
<P><FONT face=Arial size=2>Regards</FONT> <BR><FONT face=Arial size=2>Sanjay 
G</FONT> </P></FONT></FONT></SPAN></DIV>
<BLOCKQUOTE>
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Friday, March 22, 2002 7:52 
  PM<BR><B>To:</B> Michael Schoberg<BR><B>Cc:</B> IPS Reflector (E-mail); 
  owner-ips@ece.cmu.edu<BR><B>Subject:</B> Re: iSCSI: Login after 
  FFP<BR><BR></FONT></DIV><BR><FONT face=sans-serif size=2>No the target should 
  reject it. If the text does not say it I will add the text.</FONT> 
  <BR><BR><FONT face=sans-serif size=2>Thanks,</FONT> <BR><FONT face=sans-serif 
  size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Michael Schoberg 
        &lt;michael_schoberg@cnt.com&gt;</B></FONT> <BR><FONT face=sans-serif 
        size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
        <P><FONT face=sans-serif size=1>22-03-02 20:16</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Michael Schoberg</FONT> 
<BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;"IPS Reflector (E-mail)" &lt;ips@ece.cmu.edu&gt;</FONT> 
        <BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; 
        &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
        &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Login 
        after FFP</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; 
        &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" size=2>This 
  should be quick. &nbsp;<BR><BR>Is it compliant for an iSCSI initiator to send 
  a LOGIN request on a<BR>connection already in FFP? &nbsp;I couldn't find 
  anything in the draft that<BR>explicitly said this was allowed or not. 
  &nbsp;How should a target handle 
this?<BR></FONT><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D282.816054C0--


From owner-ips@ece.cmu.edu  Mon Mar 25 09:08:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA10904
	for <ips-archive@lists.ietf.org>; Mon, 25 Mar 2002 09:08:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PDEEl05596
	for ips-outgoing; Mon, 25 Mar 2002 08:14:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PD6Vw05241
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 08:06:31 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA08177;
	Mon, 25 Mar 2002 08:06:29 -0500 (EST)
Message-Id: <200203251306.IAA08177@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-iscsi-reqmts-06.txt
Date: Mon, 25 Mar 2002 08:06:28 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: iSCSI Requirements and Design Considerations
	Author(s)	: M. Krueger et al.
	Filename	: draft-ietf-ips-iscsi-reqmts-06.txt
	Pages		: 24
	Date		: 21-Mar-02
	
The IP Storage Working group is chartered with developing 
comprehensive technology to transport block storage data over IP 
protocols.  This effort includes a protocol to transport the Small 
Computer Systems Interface (SCSI) protocol over the Internet 
(iSCSI).  The initial version of the iSCSI protocol will define a 
mapping of SCSI transport protocol over TCP/IP so that SCSI storage 
controllers (principally disk and tape arrays and libraries) can be 
attached to IP networks, notably Gigabit Ethernet (GbE) and 10 
Gigabit Ethernet (10 GbE).

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-iscsi-reqmts-06.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-iscsi-reqmts-06.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-iscsi-reqmts-06.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020325080111.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-iscsi-reqmts-06.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-iscsi-reqmts-06.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020325080111.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Mon Mar 25 09:13:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA11103
	for <ips-archive@lists.ietf.org>; Mon, 25 Mar 2002 09:12:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PDE8305583
	for ips-outgoing; Mon, 25 Mar 2002 08:14:08 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PD6Rw05232
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 08:06:32 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA08159;
	Mon, 25 Mar 2002 08:06:24 -0500 (EST)
Message-Id: <200203251306.IAA08159@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ips@ece.cmu.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ips-fcip-slp-02.txt
Date: Mon, 25 Mar 2002 08:06:24 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Finding FCIP Entities Using SLP
	Author(s)	: D. Peterson
	Filename	: draft-ietf-ips-fcip-slp-02.txt
	Pages		: 12
	Date		: 20-Mar-02
	
The FCIP protocol [FCIP] provides a method for the tunneling of Fibre
Channel  frames  over an IP network. This document defines the use of
Service Location Protocol,  version  2  (SLPv2)  [RFC2608],  by  FCIP
Entities  to  discover  one  another,  and  provides  the appropriate
templates describing their services.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-fcip-slp-02.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-fcip-slp-02.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-fcip-slp-02.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20020325080100.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-fcip-slp-02.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ips-fcip-slp-02.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20020325080100.I-D@ietf.org>

--OtherAccess--

--NextPart--



From owner-ips@ece.cmu.edu  Mon Mar 25 11:59:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19901
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 11:59:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PGEje17786
	for ips-outgoing; Mon, 25 Mar 2002 11:14:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cisco.com (cypher.cisco.com [171.69.11.18])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PGEhw17780
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 11:14:43 -0500 (EST)
Received: (from kzm@localhost)
	by cisco.com (8.8.8/2.6/Cisco List Logging/8.8.8) id IAA19897
	for ips@ece.cmu.edu; Mon, 25 Mar 2002 08:14:37 -0800 (PST)
From: Keith McCloghrie <kzm@cisco.com>
Message-Id: <200203251614.IAA19897@cisco.com>
Subject: Fwd: [Entmib] WG Last Call: draft-ietf-entmib-sensor-mib-00.txt
To: ips@ece.cmu.edu
Date: Mon, 25 Mar 2002 08:14:37 -0800 (PST)
X-Mailer: ELM [version 2.5 PL1]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

You'll remember that we removed the sensor objects from the FC
Management MIB because they belonged in their own MIB, a MIB which
would not be specific to Fibre Channel, and we encouraged the Entity
MIB WG into starting work in that area.

Here's your chance to comment on the work they have done.

Keith.
------------
Forwarded message:
> From entmib-admin@ietf.org Mon Mar 25 07:57:45 2002
> Message-Id: <4.2.2.20020325105257.03415a90@mail.windriver.com>
> Date: Mon, 25 Mar 2002 10:58:14 -0500
> To: entmib@ietf.org
> From: Margaret Wasserman <mrw@windriver.com>
> Subject: [Entmib] WG Last Call: draft-ietf-entmib-sensor-mib-00.txt
> 
> Hi All,
> 
> Having received no objections from the list, I'd like
> to officially start the WG last call for moving the
> Entity Senor MIB to Proposed Standard.  The WG last
> call period will be open through Sunday, April 7th.
> 
> Current text of the MIB can be found at:
> 
> http://www.ietf.org/internet-drafts/draft-ietf-entmib-sensor-mib-00.txt
> 
> Comments should be addressed to the list, to me and/or
> to the author, Andy Bierman (abierman@cisco.com).
> 
> Thanks,
> Margaret
> 
> _______________________________________________
> Entmib mailing list
> Entmib@ietf.org
> https://www1.ietf.org/mailman/listinfo/entmib
> 



From owner-ips@ece.cmu.edu  Mon Mar 25 12:04:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA20205
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 12:04:11 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PGfDK19976
	for ips-outgoing; Mon, 25 Mar 2002 11:41:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from erie.mcdata.com (mcjekyll.mcdata.com [144.49.6.25])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PGf6w19964
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 11:41:06 -0500 (EST)
Received: from erie.mcdata.com ([172.18.1.35]) by erie.mcdata.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id GYJXGA1F; Mon, 25 Mar 2002 09:41:00 -0700
Received: from 144.49.154.169 by erie.mcdata.com (InterScan E-Mail VirusWall NT); Mon, 25 Mar 2002 09:41:00 -0700
Received: by grizzly.mcdata.com with Internet Mail Service (5.5.2653.19)
	id <ZVVL5AZB>; Mon, 25 Mar 2002 11:39:57 -0500
Message-ID: <1B8A58D6C376FE4DB329408E2701384250CA7C@grizzly.mcdata.com>
From: Ernest Dainow <Ernest.Dainow@mcdata.com>
To: "'Joshua Tseng'" <jtseng@NishanSystems.com>
Cc: ips@ece.cmu.edu
Subject: iSNS scalability
Date: Mon, 25 Mar 2002 11:39:57 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


A major motive for the use of iSNS is to provide scalability in a storage
network. While many of the proposed features of iSNS do provide this, it
falls short in a few areas.

An organization with storage at several locations should have the option for
local management by each site, with an easy method to share storage between
sites. This is also required for sharing resources between organizations,
such as between business partners or between a Storage Service Provider and
customers. 

iSNS (draft 8) addresses this somewhat in Section 3.7, "Transfer of iSNS
Database Records between iSNS Servers". However, the mechanism suggested for
doing this may not be straight forward to automate and may require manual
intervention between sites to keep multiple iSNS servers synchronized. In
addition, since the mechanisms are suggested and not standardized, there
will probably not be a high degree of interoperabilty between different
implementations of iSNS.

The best example of a well-proven, scalable architecture to address this is
the Internet Domain Name Services (DNS). DNS scales from single-site to
multi-site to the global Internet. The key DNS concept lacking in iSNS is
that of local authority (i.e. ownership). With DNS, a site has authority for
its own domains. Requests for information about its domain are supplied by
its own servers (primary or secondary). When a server's domain name records
are modified, its database does not need to be replicated or synchronized
with external DNS servers. 

So, for example, in an organizaton global.com, there might be subdomains
partitioned and managed by different regions of the company, such as
us.global.com and europe.global.com. A region can further partition its
domain if desired,  into say london.europe.global.com,
rome.europe.global.com, etc. 

The concept of local authority, as used in DNS, could be applied to iSNS
objects such as Storage Nodes and Discovery Domains. That is, only one iSNS
server would maintain authoritative records for a particular object. A
hierarchical iSNS with local authority would add significantly to the
scalability of IP storage.






From owner-ips@ece.cmu.edu  Mon Mar 25 13:39:43 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25321
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 13:39:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PHld525313
	for ips-outgoing; Mon, 25 Mar 2002 12:47:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PHlcw25308
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 12:47:38 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DL2XNQ>; Mon, 25 Mar 2002 11:47:33 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631E8@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: SNACK RunLength
Date: Mon, 25 Mar 2002 11:43:24 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Am I just not reading this or can this paragraph use some help?  Can someone
give an interpretation? 

   9.16.3  RunLength
		...

           The first data SNACK, issued after initiator's MaxRecvPDULength 
           decreased, for a command issued on the same connection before the

           change in MaxRecvPDULength, MUST use RunLength "0" to request 
           retransmission of any number of PDUs (including one).  The number
of 
           retransmitted PDUs in this case, may or may not be the same as
the 
           original transmission, depending on whether loss was before or
after 
           the MaxRecvPDULength was changed at the target.


Does this refer to something like:

For connections with unacknowledged PDUs that undergo MaxRecvPDULength
negotiation ...



From owner-ips@ece.cmu.edu  Mon Mar 25 14:35:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28514
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 14:35:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PJA3s01919
	for ips-outgoing; Mon, 25 Mar 2002 14:10:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web12503.mail.yahoo.com (web12503.mail.yahoo.com [216.136.173.195])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2PJ3Iw01355
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 14:03:18 -0500 (EST)
Message-ID: <20020325190317.57074.qmail@web12503.mail.yahoo.com>
Received: from [66.122.195.194] by web12503.mail.yahoo.com via HTTP; Mon, 25 Mar 2002 11:03:17 PST
Date: Mon, 25 Mar 2002 11:03:17 -0800 (PST)
From: Sukanta ganguly <sganguly@yahoo.com>
Subject: Re: iSNS scalability
To: Ernest Dainow <Ernest.Dainow@mcdata.com>,
        "'Joshua Tseng'" <jtseng@NishanSystems.com>
Cc: ips@ece.cmu.edu
In-Reply-To: <1B8A58D6C376FE4DB329408E2701384250CA7C@grizzly.mcdata.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi All,
  Since so much of DNS like features are required in
the iSNS, wouldn't it be better the to add this as a
new RR in the DNS server itself. The near-persistent
data can stay in the DNS server, i.e in BIND database.
  The iSNS client processing can be defined in the
iSNS spec and the server can be dissolved.
  What do you guys think ?

SG

--- Ernest Dainow <Ernest.Dainow@mcdata.com> wrote:
> 
> A major motive for the use of iSNS is to provide
> scalability in a storage
> network. While many of the proposed features of iSNS
> do provide this, it
> falls short in a few areas.
> 
> An organization with storage at several locations
> should have the option for
> local management by each site, with an easy method
> to share storage between
> sites. This is also required for sharing resources
> between organizations,
> such as between business partners or between a
> Storage Service Provider and
> customers. 
> 
> iSNS (draft 8) addresses this somewhat in Section
> 3.7, "Transfer of iSNS
> Database Records between iSNS Servers". However, the
> mechanism suggested for
> doing this may not be straight forward to automate
> and may require manual
> intervention between sites to keep multiple iSNS
> servers synchronized. In
> addition, since the mechanisms are suggested and not
> standardized, there
> will probably not be a high degree of
> interoperabilty between different
> implementations of iSNS.
> 
> The best example of a well-proven, scalable
> architecture to address this is
> the Internet Domain Name Services (DNS). DNS scales
> from single-site to
> multi-site to the global Internet. The key DNS
> concept lacking in iSNS is
> that of local authority (i.e. ownership). With DNS,
> a site has authority for
> its own domains. Requests for information about its
> domain are supplied by
> its own servers (primary or secondary). When a
> server's domain name records
> are modified, its database does not need to be
> replicated or synchronized
> with external DNS servers. 
> 
> So, for example, in an organizaton global.com, there
> might be subdomains
> partitioned and managed by different regions of the
> company, such as
> us.global.com and europe.global.com. A region can
> further partition its
> domain if desired,  into say
> london.europe.global.com,
> rome.europe.global.com, etc. 
> 
> The concept of local authority, as used in DNS,
> could be applied to iSNS
> objects such as Storage Nodes and Discovery Domains.
> That is, only one iSNS
> server would maintain authoritative records for a
> particular object. A
> hierarchical iSNS with local authority would add
> significantly to the
> scalability of IP storage.
> 
> 
> 
> 


__________________________________________________
Do You Yahoo!?
Yahoo! Movies - coverage of the 74th Academy Awards®
http://movies.yahoo.com/


From owner-ips@ece.cmu.edu  Mon Mar 25 14:38:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28809
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 14:38:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PIn0200058
	for ips-outgoing; Mon, 25 Mar 2002 13:49:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ariel.nishansystems.com (goretex.nishansystems.com [216.217.36.167] (may be forged))
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PImww00053
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 13:48:58 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <H3RL1HFK>; Mon, 25 Mar 2002 10:48:47 -0800
Message-ID: <B300BD9620BCD411A366009027C21D9BA98B60@ariel.nishansystems.com>
From: Joshua Tseng <jtseng@NishanSystems.com>
To: "'Ernest Dainow'" <Ernest.Dainow@mcdata.com>
Cc: ips@ece.cmu.edu
Subject: RE: iSNS scalability
Date: Mon, 25 Mar 2002 10:48:46 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Hi Ernest,

Thanks for your comments.  I understand your observations
and conclusions.  This has been a past topic of discussion
among the coauthors the iSNS implementers we've been working
with.

Note that the scope of this iSNS document is meant to
address the interaction between iSNS clients and the iSNS
server.  Interaction among multiple iSNS servers is
something to be addressed by future standards work, or by
individual implementations using proprietary or standards-
based mechanisms.  Perhaps I need to make that more clear
about that in the document abstract.  But I understand your
comments and would be open to addressing them in a separate
draft.

Comparison with DNS, while interesting and useful, needs to
take into consideration significant differences between DNS
and iSNS functionality.  Note the following:

1)  DNS does not support dynamic addition, deletion, or
updates of records by its clients.  Although zone transfers
and the distribution of DNS record information is standardized,
the process of changing and updating of the DNS records
themselves is done administratively, outside of the DNS
protocol mechanisms.  That really simplifies the job for DNS.
For iSNS, dynamic updates of records is an integral part of the
iSNS protocol.  The heirarchical model works well for DNS
because database updates only need to flow in one direction--
down the heirarchy.  With iSNS, updates and notifications will
need to flow in both directions, because there will be updates
done by iSNS clients at the lowest levels of the heirarchy.

2)  The concept of authority--Who is authoritative?  In DNS,
it's very simple.  Since we're only talking about names, the
authority is imbedded in the name itself.  However, for
discovery and management of storage devices, the authority is
not necessarily related to the name, and the name of the device
may have no relationship to its authority.  And I would be
reluctant to delegate authority for my storage devices to "root"
iSNS servers somewhere out there in the Internet.

3)  Security:  DNS has limited control over what information
is propagated down the heirarchy.  iSNS requires much stricter,
granular control.

Because of the above and especially because of 2), we felt that
existing standards-based tools such as LDAP and SNMP would be
sufficient for now.  Yes, as you point out it requires more
manual intervention, but the feeling is that this is a GOOD thing
since most administrators don't want discovery of their storage
arrays to take place on the Public Internet without their
knowledge, which is what happens with DNS all the time.

That being said, I would be open to working with anyone interested
in a new draft specifying interactions among iSNS servers.  If
anyone is interested, please send me an e-mail.

Josh
 
> 
> A major motive for the use of iSNS is to provide scalability 
> in a storage
> network. While many of the proposed features of iSNS do 
> provide this, it
> falls short in a few areas.
> 
> An organization with storage at several locations should have 
> the option for
> local management by each site, with an easy method to share 
> storage between
> sites. This is also required for sharing resources between 
> organizations,
> such as between business partners or between a Storage 
> Service Provider and
> customers. 
> 
> iSNS (draft 8) addresses this somewhat in Section 3.7, 
> "Transfer of iSNS
> Database Records between iSNS Servers". However, the 
> mechanism suggested for
> doing this may not be straight forward to automate and may 
> require manual
> intervention between sites to keep multiple iSNS servers 
> synchronized. In
> addition, since the mechanisms are suggested and not 
> standardized, there
> will probably not be a high degree of interoperabilty between 
> different
> implementations of iSNS.
> 
> The best example of a well-proven, scalable architecture to 
> address this is
> the Internet Domain Name Services (DNS). DNS scales from 
> single-site to
> multi-site to the global Internet. The key DNS concept 
> lacking in iSNS is
> that of local authority (i.e. ownership). With DNS, a site 
> has authority for
> its own domains. Requests for information about its domain 
> are supplied by
> its own servers (primary or secondary). When a server's 
> domain name records
> are modified, its database does not need to be replicated or 
> synchronized
> with external DNS servers. 
> 
> So, for example, in an organizaton global.com, there might be 
> subdomains
> partitioned and managed by different regions of the company, such as
> us.global.com and europe.global.com. A region can further 
> partition its
> domain if desired,  into say london.europe.global.com,
> rome.europe.global.com, etc. 
> 
> The concept of local authority, as used in DNS, could be 
> applied to iSNS
> objects such as Storage Nodes and Discovery Domains. That is, 
> only one iSNS
> server would maintain authoritative records for a particular object. A
> hierarchical iSNS with local authority would add significantly to the
> scalability of IP storage.
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Mon Mar 25 16:51:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA05006
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 16:51:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PL8te11615
	for ips-outgoing; Mon, 25 Mar 2002 16:08:55 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PL8qw11608
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 16:08:52 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DL2569>; Mon, 25 Mar 2002 15:08:46 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631EC@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: Login after FFP
Date: Mon, 25 Mar 2002 15:04:37 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D440.ABFF3830"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D440.ABFF3830
Content-Type: text/plain;
	charset="iso-8859-1"

This was mainly to track down a bug in an initiator and I just wanted to
verify that it was not valid.  I was wondering if there was wording that
prevents a connection in FFP from re-entering login negotiation mode to
attempt to form a new session, attach to a different session, or offer a new
CID or other parameters.  The wording I was hunting for would say that Login
negotiation is a one time event per TCP connection; renegotiation (re-login)
is not possible after entering FFP.  

-----Original Message-----
From: Sanjay Goyal [mailto:sanjay_goyal@ivivity.com]
Sent: Saturday, March 23, 2002 9:51 AM
To: 'Julian Satran'
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: RE: iSCSI: Login after FFP


The text does say it.
   

2.5.3.2 Login Request and Login Response

Login Requests and Responses are used exclusively during the login phase of
each connection to set up the session and connection parame- ters (the login
phase consists of a sequence of login requests and responses carrying the
same Initiator Task Tag).

 

Regards 
Sanjay G 

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Friday, March 22, 2002 7:52 PM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: Login after FFP



No the target should reject it. If the text does not say it I will add the
text. 

Thanks, 
Julo 



	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


22-03-02 20:16 
Please respond to Michael Schoberg 


        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: Login after FFP 

       	


This should be quick.  

Is it compliant for an iSCSI initiator to send a LOGIN request on a
connection already in FFP?  I couldn't find anything in the draft that
explicitly said this was allowed or not.  How should a target handle this?





------_=_NextPart_001_01C1D440.ABFF3830
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.50.4611.1300" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=323075720-25032002>This 
was mainly to track down a bug in an initiator and I just wanted to verify that 
it was not valid.&nbsp; I was wondering if there was wording that prevents a 
connection in FFP from re-entering&nbsp;login negotiation mode to attempt to 
form a new session, attach to a different session, or&nbsp;offer a new CID or 
other parameters.&nbsp; The wording I was hunting for would say that Login 
negotiation is a one time event per TCP connection; renegotiation (re-login) is 
not possible after entering FFP.&nbsp; </SPAN></FONT></DIV>
<BLOCKQUOTE dir=ltr 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Sanjay Goyal 
  [mailto:sanjay_goyal@ivivity.com]<BR><B>Sent:</B> Saturday, March 23, 2002 
  9:51 AM<BR><B>To:</B> 'Julian Satran'<BR><B>Cc:</B> IPS Reflector (E-mail); 
  owner-ips@ece.cmu.edu<BR><B>Subject:</B> RE: iSCSI: Login after 
  FFP<BR><BR></FONT></DIV>
  <DIV><SPAN class=056405115-23032002><FONT face=Arial color=#0000ff size=2>The 
  text does say it.</FONT></SPAN></DIV>
  <DIV><SPAN class=056405115-23032002><FONT face=Arial color=#0000ff 
  size=2>&nbsp;&nbsp; <FONT size=2>
  <P>2.5.3.2 Login Request and Login Response</P>
  <P>Login Requests and Responses are used exclusively during the login phase of 
  each connection to set up the session and connection parame- ters (the login 
  phase consists of a sequence of login requests and responses carrying the same 
  Initiator Task Tag).</P>
  <P>&nbsp;</P>
  <P><FONT face=Arial size=2>Regards</FONT> <BR><FONT face=Arial size=2>Sanjay 
  G</FONT> </P></FONT></FONT></SPAN></DIV>
  <BLOCKQUOTE>
    <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
    size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
    [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Friday, March 22, 2002 
    7:52 PM<BR><B>To:</B> Michael Schoberg<BR><B>Cc:</B> IPS Reflector (E-mail); 
    owner-ips@ece.cmu.edu<BR><B>Subject:</B> Re: iSCSI: Login after 
    FFP<BR><BR></FONT></DIV><BR><FONT face=sans-serif size=2>No the target 
    should reject it. If the text does not say it I will add the text.</FONT> 
    <BR><BR><FONT face=sans-serif size=2>Thanks,</FONT> <BR><FONT 
    face=sans-serif size=2>Julo</FONT> <BR><BR><BR>
    <TABLE width="100%">
      <TBODY>
      <TR vAlign=top>
        <TD>
        <TD><FONT face=sans-serif size=1><B>Michael Schoberg 
          &lt;michael_schoberg@cnt.com&gt;</B></FONT> <BR><FONT face=sans-serif 
          size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
          <P><FONT face=sans-serif size=1>22-03-02 20:16</FONT> <BR><FONT 
          face=sans-serif size=1>Please respond to Michael Schoberg</FONT> 
          <BR></P>
        <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          </FONT><BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          To: &nbsp; &nbsp; &nbsp; &nbsp;"IPS Reflector (E-mail)" 
          &lt;ips@ece.cmu.edu&gt;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
          &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT 
          face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; 
          &nbsp; &nbsp; &nbsp;iSCSI: Login after FFP</FONT> <BR><BR><FONT 
          face=Arial size=1>&nbsp; &nbsp; &nbsp; 
    &nbsp;</FONT></TD></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" 
    size=2>This should be quick. &nbsp;<BR><BR>Is it compliant for an iSCSI 
    initiator to send a LOGIN request on a<BR>connection already in FFP? &nbsp;I 
    couldn't find anything in the draft that<BR>explicitly said this was allowed 
    or not. &nbsp;How should a target handle 
this?<BR></FONT><BR><BR></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D440.ABFF3830--


From owner-ips@ece.cmu.edu  Mon Mar 25 18:17:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA07615
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 18:17:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PMPM517827
	for ips-outgoing; Mon, 25 Mar 2002 17:25:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PMPKw17822
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 17:25:20 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <H4LPL4HN>; Mon, 25 Mar 2002 17:19:16 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293763D@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: iSCSI: SRP status
Date: Mon, 25 Mar 2002 17:24:45 -0500
Importance: high
X-Priority: 1
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

It's been an "interesting" week on this topic.  This is an
attempt to (coherently) summarize the current situation in which
the WG finds itself and what is being done.  This message is a
mixture of technical and procedural material - technical queries
and follow-ups should be sent to the list, but I would ask that
procedural queries and follow-ups be sent directly to me to avoid
procedural discussions on the list.  I promise to post the
(inevitable) clarifications.

-- Disclaimer

- I am NOT a lawyer.
- This message does NOT contain legal advice.
- If you need legal advice, you need to talk to a lawyer.
- If actions or decisions based on information in this message
	have legal consequences, those consequences are YOUR
	responsibility.
	- The IETF and yours truly disclaim all responsibility

On the subject of Intellectual Property Rights, the attention of all
IETF participants is directed to Section 10 of RFC 2026.

-- Patents

While the IETF disclaims responsibility for performing patent
searches (see Section 10 of RFC 2026), the following patents have
been identified to the IPS WG as being of concern with respect to SRP:

(1) An SRP patent application filed by Stanford University [The SRP patent]
(2) US 6226383 held by Phoenix [The SPEKE patent)
(3) US 5241599 and US 5440635, held by Lucent [The EKE patents]

-- Enquiries and Responses

Enquiries have been made of the above patent holders, who have responded
as follows:

(1) Stanford has a license to their pending SRP patent available on the web
	at http://otl.stanford.edu/pdf/97006.pdf.  There is no cost to
obtain
	the license.  No payments are due to Stanford under the license and
	the license does not contain any reciprocal grant of rights back to
	Stanford.
(2) Phoenix has written to the IETF to say that the SPEKE patent may apply
	to SRP and has committed to make licenses available on reasonable
	and non-discriminatory terms.  The Phoenix letter containing these
	statements will be sent to the list shortly and will also appear in
	the Intellectual Property Rights Notices area of the IETF web site
in
	the near future.
(3) After initially promising to do so, Lucent has decided not to make any
	statement about applicability of the EKE patents to SRP.  Lucent has
	orally pledged to license the EKE patents in accordance with normal
	Lucent licensing practices, but these practices do not involve
	"reasonable and non-discriminatory" terms.

These responses have been summarized in this message for brevity and
clarity.
For more details on (1), see the license at the URL above.  For (2), see
the forthcoming message and/or the IETF web site.  For (3), see the text
on this topic contained in the message at:
http://www.pdl.cmu.edu/mailinglists/ips/mail/msg08716.html . 

-- IETF Standards Process

The IETF standards process places some emphasis on commitments to
reasonable and non-discriminatory licensing terms (see Section 10 of
RFC 2026).  Commitments to license on openly specified, reasonable and
non-discriminatory terms are neither strictly necessary nor sufficient
for the IESG to approve use of technology that is covered by patents,
but the absence of such commitments makes IESG approval both
less likely to occur and more difficult to obtain.

In all cases, it is up to the WG to determine the best technical
solutions to the problems it is solving, and to make the case to the
IESG that the nature of the problem and available technology justifies
the use of technology covered by patents.  The IESG will analyze each
individual case on its own merits.  This position was reaffirmed by
the IESG during the IESG plenary last Thursday evening.

-- iSCSI 

The IPS WG considered this situation at its meeting last week and
determined that rough consensus no longer exists for a "MUST implement"
requirement for SRP in iSCSI.  As things currently stand, that requirement
will be weakened to "MAY" and the WG is obligated to designate some
other inband authentication protocol as "MUST implement" for
interoperability.

Based on my discussions with some of the Transport and Security Area
Directors, an approach based on using CHAP instead of SRP appears to
be acceptable, but the WG should consider whether to adopt a version
of CHAP enhanced by adding a Diffie-Hellman key exchange that would make
the protocol resist passive attacks (e.g., packet sniffer captures CHAP
traffic, adversary tries the dictionary of passwords off-line).  The
WG is *not* being instructed to adopt this approach; the request is
simply to consider it.

In no particular order of priority and/or importance, the following
activities are underway to deal with the SRP situation:
- The iSCSI security design team has been asked to take another look
	at authentication mechanisms.
- Work is underway with cryptographers to consider how to add a DH
	exchange and/or mutual authentication to CHAP (the latter because
	SRP is capable of mutual authentication).
- A requirements discussion for the above two bullets will take place
	on this list in the near future.  The reason for delaying this
	discussion is to gather information on the consequences of
	requirements decisions, rather than hold a discussion in the
abstract.
- Lucent continues to be approached with requests to be more cooperative.
	Lucent's actions (or lack thereof) are the primary cause of this
	delay to iSCSI.

iSCSI progress has been delayed by this situation.  We were
originally hoping to start a WG Last Call on the next (-12) version
of iSCSI within the next week or so.  That is not possible with this
technical issue open - a Mock WG Last Call will be conducted on the
next version of the iSCSI draft with the goal of reaching closure on
most of its text, but the actual WG Last Call will have to await
resolution of this issue.  I am hopeful that this resolution can
be achieved in the next month or two.

Thanks,
--David (IP Storage WG co-chair)

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Mon Mar 25 19:25:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA09180
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 19:25:06 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PNw5N24536
	for ips-outgoing; Mon, 25 Mar 2002 18:58:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PNw4w24531
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 18:58:04 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <GZSJT57H>; Mon, 25 Mar 2002 18:57:33 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937643@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: Phoenix Patent Letter
Date: Mon, 25 Mar 2002 18:57:30 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

As promised.  --David

To: Internet Engineering Task Force
Date: March 18, 2002

This is to advise the IETF that Phoenix Technologies Ltd.
("Phoenix") has U.S. Patent Number 6,226,383 that may
relate to the IETF document RFC 2945 titled "The SRP
Authentication and Key Exchange System".

To the extent that this patent assigned to Phoenix is
necessary for implementation of RFC 2945 or any related
IETF standard, Phoenix will provide, upon written request,
to implementers of the relevant standard, a non-exclusive
license under reasonable and non-discriminatory terms.

Phoenix has licensed this technology to companies, and
accepts inquiries regarding licensing or evaluating the
SPEKE technology. For these inquiries, please contact our
security products department at:

Katherine_Stolz@phoenix.com
Vice President, Security Products
Phoenix Technologies

Any questions or issues regarding this communication should
be directed to the Phoenix Technologies Legal Department. 

Scott_Taylor@phoenix.com
Associate General Counsel
Phoenix Technologies Ltd
411 E. Plumeria Drive
San Jose, CA 95134



From owner-ips@ece.cmu.edu  Mon Mar 25 19:26:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA09206
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 19:26:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2PNZ3123029
	for ips-outgoing; Mon, 25 Mar 2002 18:35:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ariel.nishansystems.com (goretex.nishansystems.com [216.217.36.167] (may be forged))
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2PNZ1w23022
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 18:35:01 -0500 (EST)
Received: by ariel.nishansystems.com with Internet Mail Service (5.5.2653.19)
	id <H3RL1257>; Mon, 25 Mar 2002 15:34:55 -0800
Message-ID: <B300BD9620BCD411A366009027C21D9BA98B64@ariel.nishansystems.com>
From: Joshua Tseng <jtseng@NishanSystems.com>
To: "'Sukanta ganguly'" <sganguly@yahoo.com>
Cc: ips@ece.cmu.edu
Subject: RE: iSNS scalability
Date: Mon, 25 Mar 2002 15:34:55 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2PNZ1w23023
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Sukanta,

I hope my previous message addressed your question.
In a nutshell, information in iSNS is dynamic and
not persistent.  While DNS is more or less a static
database, iSNS information can be dynamically updated
by client devices.  The approach you suggested would
require the storage administrator to call the DNS
admin to add or change the RR whenever a storage
device is added, removed, or re-zoned.  My experience
in working with IT departments is that network and
storage admins don't talk very often, if at all, so
I don't think this is a very promising approach.

Josh

> -----Original Message-----
> From: Sukanta ganguly [mailto:sganguly@yahoo.com]
> Sent: Monday, March 25, 2002 11:03 AM
> To: Ernest Dainow; 'Joshua Tseng'
> Cc: ips@ece.cmu.edu
> Subject: Re: iSNS scalability
> 
> 
> Hi All,
>   Since so much of DNS like features are required in
> the iSNS, wouldn't it be better the to add this as a
> new RR in the DNS server itself. The near-persistent
> data can stay in the DNS server, i.e in BIND database.
>   The iSNS client processing can be defined in the
> iSNS spec and the server can be dissolved.
>   What do you guys think ?
> 
> SG
> 
> --- Ernest Dainow <Ernest.Dainow@mcdata.com> wrote:
> > 
> > A major motive for the use of iSNS is to provide
> > scalability in a storage
> > network. While many of the proposed features of iSNS
> > do provide this, it
> > falls short in a few areas.
> > 
> > An organization with storage at several locations
> > should have the option for
> > local management by each site, with an easy method
> > to share storage between
> > sites. This is also required for sharing resources
> > between organizations,
> > such as between business partners or between a
> > Storage Service Provider and
> > customers. 
> > 
> > iSNS (draft 8) addresses this somewhat in Section
> > 3.7, "Transfer of iSNS
> > Database Records between iSNS Servers". However, the
> > mechanism suggested for
> > doing this may not be straight forward to automate
> > and may require manual
> > intervention between sites to keep multiple iSNS
> > servers synchronized. In
> > addition, since the mechanisms are suggested and not
> > standardized, there
> > will probably not be a high degree of
> > interoperabilty between different
> > implementations of iSNS.
> > 
> > The best example of a well-proven, scalable
> > architecture to address this is
> > the Internet Domain Name Services (DNS). DNS scales
> > from single-site to
> > multi-site to the global Internet. The key DNS
> > concept lacking in iSNS is
> > that of local authority (i.e. ownership). With DNS,
> > a site has authority for
> > its own domains. Requests for information about its
> > domain are supplied by
> > its own servers (primary or secondary). When a
> > server's domain name records
> > are modified, its database does not need to be
> > replicated or synchronized
> > with external DNS servers. 
> > 
> > So, for example, in an organizaton global.com, there
> > might be subdomains
> > partitioned and managed by different regions of the
> > company, such as
> > us.global.com and europe.global.com. A region can
> > further partition its
> > domain if desired,  into say
> > london.europe.global.com,
> > rome.europe.global.com, etc. 
> > 
> > The concept of local authority, as used in DNS,
> > could be applied to iSNS
> > objects such as Storage Nodes and Discovery Domains.
> > That is, only one iSNS
> > server would maintain authoritative records for a
> > particular object. A
> > hierarchical iSNS with local authority would add
> > significantly to the
> > scalability of IP storage.
> > 
> > 
> > 
> > 
> 
> 
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Movies - coverage of the 74th Academy Awards®
> http://movies.yahoo.com/
> 


From owner-ips@ece.cmu.edu  Mon Mar 25 20:24:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA10300
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 20:24:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2Q0kjj27494
	for ips-outgoing; Mon, 25 Mar 2002 19:46:45 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail03.ztx.compaq.com (ztxmail03.ztx.compaq.com [161.114.1.207])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2Q0khw27489
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 19:46:43 -0500 (EST)
Received: from cceexg13.americas.cpqcorp.net (cceexg13.americas.cpqcorp.net [16.110.250.119])
	by ztxmail03.ztx.compaq.com (Postfix) with ESMTP id A4D4B3F00
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 18:46:37 -0600 (CST)
Received: from cceexc17.americas.cpqcorp.net ([16.110.250.84]) by cceexg13.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 25 Mar 2002 18:46:37 -0600
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
Subject: RE: iSCSI: items discussed at WG meeting
Date: Mon, 25 Mar 2002 18:46:37 -0600
Message-ID: <78AF3C342AEAEF4BA33B35A8A15668C6019E2202@cceexc17.americas.cpqcorp.net>
Thread-Topic: iSCSI: items discussed at WG meeting
Thread-Index: AcHQbc9qyiDm6je6SXOm7ahHLuOnOAD7hHRw
From: "Elliott, Robert" <Robert.Elliott@compaq.com>
To: <ips@ece.cmu.edu>
X-OriginalArrivalTime: 26 Mar 2002 00:46:37.0555 (UTC) FILETIME=[AF908430:01C1D45F]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2Q0khw27490
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit



> -----Original Message-----
> From: Santosh Rao [mailto:santoshr@cup.hp.com]
> Sent: Wednesday, March 20, 2002 6:20 PM
> Subject: Re: iSCSI: items discussed at WG meeting
> 
> Dave Peterson wrote:
> > 8. CRN Processing and behavior: spec currently references 
> > SAM-2 for CRN.
> > 
> > Per SAM-2:
> > Command Reference Number (CRN):
> > When this argument is used, all sequential commands of an 
> > I_T_L nexus shall include a CRN argument that is incremented 
> > by one. The initial, wrap, and reset CRN values shall be one. 
> > The CRN value zero shall be reserved for use
> > as defined by the SCSI protocol. It is not an error for the 
> > application client to provide this argument when CRN is not 
> > supported by the SCSI protocol or logical unit.
> > 
> > More text specifying the behavior of CRN in the iSCSI realm 
> > is needed. In addition, a method to determine if CRN is being 
> > used (or not) is missing.
> 
> We went through this discussion several months ago in another ips
> thread. CRN really belongs to the SCSI ULP and any mechanism 
> to check if the device server supports CRN should be in a SCSI ULP 
> mode page (like the Control Mode Page).

I agree this bit fits better there, but to date there is no such 
bit in the Control mode page and no proposals on the T10 CAP 
agenda to add one.

In the only protocol supporting this feature (FCP-2), the bit is
in the Protocol-Specific Logical Unit Control mode page.  If a 
bit is added to the Control mode page for iSCSI and future
protocols, it makes FCP-2 targets non-compliant. I'm not sure 
that there are any implementations of CRN yet that would care. 

> As far as iscsi is concerned, both the iscsi initiator and target
> implementations MUST support CRN, since it is defined in iscsi
> command pdu. 
>
> Why is such a method required at the SCSI LLP layer ?

iSCSI defers too much to SAM-2:
"9.3.2 CRN
 SCSI command reference number - if present in the SCSI 
 execute command arguments (according to [SAM2])."

To depend on the CRN in its Execute Command() remote
procedure call, an application needs to know:
a) the initiator port supports sending CRN;
b) if there are any protocol bridges/gateways in the service 
delivery subsystem, all the protocols between the initiator
port and target port support CRN;
c) the target port supports CRN; and
d) the logical unit supports and honors CRN.

Presumably the initiator's API will reject the RPC
if a) is not honored.  

Applications currently detect and set c) and d) with 
the Protocol-Specific Logical Unit Control mode page.
Moving to the Control mode page would be a change
but is certainly possible.  iSCSI needs to provide
this information/control somehow.

For b), bridges need to be able to report that CRN is not 
available over iSCSI because they're bridging to a protocol
that doesn't support it.

A text key would work pretty well, but this capability 
is logical unit based, not target-based.  This leaves 
intercepting mode page accesses and modifying the mode 
page data.

---
Rob Elliott, Compaq Server Storage
Robert.Elliott@compaq.com



From owner-ips@ece.cmu.edu  Mon Mar 25 22:07:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA13087
	for <ips-archive@odin.ietf.org>; Mon, 25 Mar 2002 22:07:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2Q2H0A03108
	for ips-outgoing; Mon, 25 Mar 2002 21:17:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2Q2Gxw03104
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 21:16:59 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP id EC1426003AA
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 18:16:49 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id SAA25897
	for <ips@ece.cmu.edu>; Mon, 25 Mar 2002 18:16:44 -0800 (PST)
Message-ID: <3C9FDB20.18CAE2FE@cup.hp.com>
Date: Mon, 25 Mar 2002 18:21:20 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: [Fwd: iSCSI: items discussed at WG meeting]
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Rob,

FCP-2's EPDC bit really ought to be considered a SCSI LLP peer to peer
mechanism to check and enable CRN support in FCP_CMD, since FCP did not
support CRN in the FCP_CMD IU.

There should be a seperate SCSI ULP peer to peer mechanism which
involves the application client testing and enabling CRN support in the
device servers being accessed.

Only legacy scsi transports should require the former, due to early
versions of such legacy scsi transports not having supported CRN.

Future SCSI transports (iscsi, srp, etc) ought to only need the later
SCSI ULP peer to peer mechanism to test and enable CRN in the peer SCSI
ULPs.

It would be a better preservation of layering to require a change in 
CAP which provides an enable_crn bit in the control mode page, than to
further propagate the violation of layering that FCP-2 seems to have
created with its EPDC bit testing both the SCSI LLP and ULP
capabilities.

Regards,
Santosh




"Elliott, Robert" wrote:
> 
> > -----Original Message-----
> > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > Sent: Wednesday, March 20, 2002 6:20 PM
> > Subject: Re: iSCSI: items discussed at WG meeting
> >
> > Dave Peterson wrote:
> > > 8. CRN Processing and behavior: spec currently references
> > > SAM-2 for CRN.
> > >
> > > Per SAM-2:
> > > Command Reference Number (CRN):
> > > When this argument is used, all sequential commands of an
> > > I_T_L nexus shall include a CRN argument that is incremented
> > > by one. The initial, wrap, and reset CRN values shall be one.
> > > The CRN value zero shall be reserved for use
> > > as defined by the SCSI protocol. It is not an error for the
> > > application client to provide this argument when CRN is not
> > > supported by the SCSI protocol or logical unit.
> > >
> > > More text specifying the behavior of CRN in the iSCSI realm
> > > is needed. In addition, a method to determine if CRN is being
> > > used (or not) is missing.
> >
> > We went through this discussion several months ago in another ips
> > thread. CRN really belongs to the SCSI ULP and any mechanism
> > to check if the device server supports CRN should be in a SCSI ULP
> > mode page (like the Control Mode Page).
> 
> I agree this bit fits better there, but to date there is no such
> bit in the Control mode page and no proposals on the T10 CAP
> agenda to add one.
> 
> In the only protocol supporting this feature (FCP-2), the bit is
> in the Protocol-Specific Logical Unit Control mode page.  If a
> bit is added to the Control mode page for iSCSI and future
> protocols, it makes FCP-2 targets non-compliant. I'm not sure
> that there are any implementations of CRN yet that would care.
> 
> > As far as iscsi is concerned, both the iscsi initiator and target
> > implementations MUST support CRN, since it is defined in iscsi
> > command pdu.
> >
> > Why is such a method required at the SCSI LLP layer ?
> 
> iSCSI defers too much to SAM-2:
> "9.3.2 CRN
>  SCSI command reference number - if present in the SCSI
>  execute command arguments (according to [SAM2])."
> 
> To depend on the CRN in its Execute Command() remote
> procedure call, an application needs to know:
> a) the initiator port supports sending CRN;
> b) if there are any protocol bridges/gateways in the service
> delivery subsystem, all the protocols between the initiator
> port and target port support CRN;
> c) the target port supports CRN; and
> d) the logical unit supports and honors CRN.
> 
> Presumably the initiator's API will reject the RPC
> if a) is not honored.
> 
> Applications currently detect and set c) and d) with
> the Protocol-Specific Logical Unit Control mode page.
> Moving to the Control mode page would be a change
> but is certainly possible.  iSCSI needs to provide
> this information/control somehow.
> 
> For b), bridges need to be able to report that CRN is not
> available over iSCSI because they're bridging to a protocol
> that doesn't support it.
> 
> A text key would work pretty well, but this capability
> is logical unit based, not target-based.  This leaves
> intercepting mode page accesses and modifying the mode
> page data.
> 
> ---
> Rob Elliott, Compaq Server Storage
> Robert.Elliott@compaq.com

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Tue Mar 26 02:54:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA26824
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 02:54:03 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2Q6psm19986
	for ips-outgoing; Tue, 26 Mar 2002 01:51:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2Q6ppw19981;
	Tue, 26 Mar 2002 01:51:52 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id HAA14100;
	Tue, 26 Mar 2002 07:51:35 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2Q6pX7157942;
	Tue, 26 Mar 2002 07:51:34 +0100
To: Santosh Rao <santoshr@cup.hp.com>
Cc: IPS Reflector <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF34E31952.5A331484-ONC2256B88.00252D23@telaviv.ibm.com>
Date: Tue, 26 Mar 2002 08:51:30 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 08:51:33,
	Serialize complete at 26/03/2002 08:51:33
Content-Type: multipart/alternative; boundary="=_alternative 00254582C2256B88_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00254582C2256B88_=
Content-Type: text/plain; charset="us-ascii"

I agree.  It would also relieve us from having to maintain per-LU 
information in iSCSI (we have none today).

Julo




Santosh Rao <santoshr@cup.hp.com>
Sent by: owner-ips@ece.cmu.edu
26-03-02 04:21
Please respond to Santosh Rao

 
        To:     IPS Reflector <ips@ece.cmu.edu>
        cc: 
        Subject:        [Fwd: iSCSI: items discussed at WG meeting]

 

Rob,

FCP-2's EPDC bit really ought to be considered a SCSI LLP peer to peer
mechanism to check and enable CRN support in FCP_CMD, since FCP did not
support CRN in the FCP_CMD IU.

There should be a seperate SCSI ULP peer to peer mechanism which
involves the application client testing and enabling CRN support in the
device servers being accessed.

Only legacy scsi transports should require the former, due to early
versions of such legacy scsi transports not having supported CRN.

Future SCSI transports (iscsi, srp, etc) ought to only need the later
SCSI ULP peer to peer mechanism to test and enable CRN in the peer SCSI
ULPs.

It would be a better preservation of layering to require a change in 
CAP which provides an enable_crn bit in the control mode page, than to
further propagate the violation of layering that FCP-2 seems to have
created with its EPDC bit testing both the SCSI LLP and ULP
capabilities.

Regards,
Santosh




"Elliott, Robert" wrote:
> 
> > -----Original Message-----
> > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > Sent: Wednesday, March 20, 2002 6:20 PM
> > Subject: Re: iSCSI: items discussed at WG meeting
> >
> > Dave Peterson wrote:
> > > 8. CRN Processing and behavior: spec currently references
> > > SAM-2 for CRN.
> > >
> > > Per SAM-2:
> > > Command Reference Number (CRN):
> > > When this argument is used, all sequential commands of an
> > > I_T_L nexus shall include a CRN argument that is incremented
> > > by one. The initial, wrap, and reset CRN values shall be one.
> > > The CRN value zero shall be reserved for use
> > > as defined by the SCSI protocol. It is not an error for the
> > > application client to provide this argument when CRN is not
> > > supported by the SCSI protocol or logical unit.
> > >
> > > More text specifying the behavior of CRN in the iSCSI realm
> > > is needed. In addition, a method to determine if CRN is being
> > > used (or not) is missing.
> >
> > We went through this discussion several months ago in another ips
> > thread. CRN really belongs to the SCSI ULP and any mechanism
> > to check if the device server supports CRN should be in a SCSI ULP
> > mode page (like the Control Mode Page).
> 
> I agree this bit fits better there, but to date there is no such
> bit in the Control mode page and no proposals on the T10 CAP
> agenda to add one.
> 
> In the only protocol supporting this feature (FCP-2), the bit is
> in the Protocol-Specific Logical Unit Control mode page.  If a
> bit is added to the Control mode page for iSCSI and future
> protocols, it makes FCP-2 targets non-compliant. I'm not sure
> that there are any implementations of CRN yet that would care.
> 
> > As far as iscsi is concerned, both the iscsi initiator and target
> > implementations MUST support CRN, since it is defined in iscsi
> > command pdu.
> >
> > Why is such a method required at the SCSI LLP layer ?
> 
> iSCSI defers too much to SAM-2:
> "9.3.2 CRN
>  SCSI command reference number - if present in the SCSI
>  execute command arguments (according to [SAM2])."
> 
> To depend on the CRN in its Execute Command() remote
> procedure call, an application needs to know:
> a) the initiator port supports sending CRN;
> b) if there are any protocol bridges/gateways in the service
> delivery subsystem, all the protocols between the initiator
> port and target port support CRN;
> c) the target port supports CRN; and
> d) the logical unit supports and honors CRN.
> 
> Presumably the initiator's API will reject the RPC
> if a) is not honored.
> 
> Applications currently detect and set c) and d) with
> the Protocol-Specific Logical Unit Control mode page.
> Moving to the Control mode page would be a change
> but is certainly possible.  iSCSI needs to provide
> this information/control somehow.
> 
> For b), bridges need to be able to report that CRN is not
> available over iSCSI because they're bridging to a protocol
> that doesn't support it.
> 
> A text key would work pretty well, but this capability
> is logical unit based, not target-based.  This leaves
> intercepting mode page accesses and modifying the mode
> page data.
> 
> ---
> Rob Elliott, Compaq Server Storage
> Robert.Elliott@compaq.com

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################



--=_alternative 00254582C2256B88_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">I agree. &nbsp;It would also relieve us from having to maintain per-LU information in iSCSI (we have none today).</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Santosh Rao &lt;santoshr@cup.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">26-03-02 04:21</font>
<br><font size=1 face="sans-serif">Please respond to Santosh Rao</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;[Fwd: iSCSI: items discussed at WG meeting]</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Rob,<br>
<br>
FCP-2's EPDC bit really ought to be considered a SCSI LLP peer to peer<br>
mechanism to check and enable CRN support in FCP_CMD, since FCP did not<br>
support CRN in the FCP_CMD IU.<br>
<br>
There should be a seperate SCSI ULP peer to peer mechanism which<br>
involves the application client testing and enabling CRN support in the<br>
device servers being accessed.<br>
<br>
Only legacy scsi transports should require the former, due to early<br>
versions of such legacy scsi transports not having supported CRN.<br>
<br>
Future SCSI transports (iscsi, srp, etc) ought to only need the later<br>
SCSI ULP peer to peer mechanism to test and enable CRN in the peer SCSI<br>
ULPs.<br>
<br>
It would be a better preservation of layering to require a change in <br>
CAP which provides an enable_crn bit in the control mode page, than to<br>
further propagate the violation of layering that FCP-2 seems to have<br>
created with its EPDC bit testing both the SCSI LLP and ULP<br>
capabilities.<br>
<br>
Regards,<br>
Santosh<br>
<br>
<br>
<br>
<br>
&quot;Elliott, Robert&quot; wrote:<br>
&gt; <br>
&gt; &gt; -----Original Message-----<br>
&gt; &gt; From: Santosh Rao [mailto:santoshr@cup.hp.com]<br>
&gt; &gt; Sent: Wednesday, March 20, 2002 6:20 PM<br>
&gt; &gt; Subject: Re: iSCSI: items discussed at WG meeting<br>
&gt; &gt;<br>
&gt; &gt; Dave Peterson wrote:<br>
&gt; &gt; &gt; 8. CRN Processing and behavior: spec currently references<br>
&gt; &gt; &gt; SAM-2 for CRN.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Per SAM-2:<br>
&gt; &gt; &gt; Command Reference Number (CRN):<br>
&gt; &gt; &gt; When this argument is used, all sequential commands of an<br>
&gt; &gt; &gt; I_T_L nexus shall include a CRN argument that is incremented<br>
&gt; &gt; &gt; by one. The initial, wrap, and reset CRN values shall be one.<br>
&gt; &gt; &gt; The CRN value zero shall be reserved for use<br>
&gt; &gt; &gt; as defined by the SCSI protocol. It is not an error for the<br>
&gt; &gt; &gt; application client to provide this argument when CRN is not<br>
&gt; &gt; &gt; supported by the SCSI protocol or logical unit.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; More text specifying the behavior of CRN in the iSCSI realm<br>
&gt; &gt; &gt; is needed. In addition, a method to determine if CRN is being<br>
&gt; &gt; &gt; used (or not) is missing.<br>
&gt; &gt;<br>
&gt; &gt; We went through this discussion several months ago in another ips<br>
&gt; &gt; thread. CRN really belongs to the SCSI ULP and any mechanism<br>
&gt; &gt; to check if the device server supports CRN should be in a SCSI ULP<br>
&gt; &gt; mode page (like the Control Mode Page).<br>
&gt; <br>
&gt; I agree this bit fits better there, but to date there is no such<br>
&gt; bit in the Control mode page and no proposals on the T10 CAP<br>
&gt; agenda to add one.<br>
&gt; <br>
&gt; In the only protocol supporting this feature (FCP-2), the bit is<br>
&gt; in the Protocol-Specific Logical Unit Control mode page. &nbsp;If a<br>
&gt; bit is added to the Control mode page for iSCSI and future<br>
&gt; protocols, it makes FCP-2 targets non-compliant. I'm not sure<br>
&gt; that there are any implementations of CRN yet that would care.<br>
&gt; <br>
&gt; &gt; As far as iscsi is concerned, both the iscsi initiator and target<br>
&gt; &gt; implementations MUST support CRN, since it is defined in iscsi<br>
&gt; &gt; command pdu.<br>
&gt; &gt;<br>
&gt; &gt; Why is such a method required at the SCSI LLP layer ?<br>
&gt; <br>
&gt; iSCSI defers too much to SAM-2:<br>
&gt; &quot;9.3.2 CRN<br>
&gt; &nbsp;SCSI command reference number - if present in the SCSI<br>
&gt; &nbsp;execute command arguments (according to [SAM2]).&quot;<br>
&gt; <br>
&gt; To depend on the CRN in its Execute Command() remote<br>
&gt; procedure call, an application needs to know:</font>
<br><font size=2 face="Courier New">&gt; a) the initiator port supports sending CRN;<br>
&gt; b) if there are any protocol bridges/gateways in the service<br>
&gt; delivery subsystem, all the protocols between the initiator<br>
&gt; port and target port support CRN;<br>
&gt; c) the target port supports CRN; and<br>
&gt; d) the logical unit supports and honors CRN.<br>
&gt; <br>
&gt; Presumably the initiator's API will reject the RPC<br>
&gt; if a) is not honored.<br>
&gt; <br>
&gt; Applications currently detect and set c) and d) with<br>
&gt; the Protocol-Specific Logical Unit Control mode page.<br>
&gt; Moving to the Control mode page would be a change<br>
&gt; but is certainly possible. &nbsp;iSCSI needs to provide<br>
&gt; this information/control somehow.<br>
&gt; <br>
&gt; For b), bridges need to be able to report that CRN is not<br>
&gt; available over iSCSI because they're bridging to a protocol<br>
&gt; that doesn't support it.<br>
&gt; <br>
&gt; A text key would work pretty well, but this capability<br>
&gt; is logical unit based, not target-based. &nbsp;This leaves<br>
&gt; intercepting mode page accesses and modifying the mode<br>
&gt; page data.<br>
&gt; <br>
&gt; ---<br>
&gt; Rob Elliott, Compaq Server Storage<br>
&gt; Robert.Elliott@compaq.com<br>
<br>
-- <br>
##################################<br>
Santosh Rao<br>
Software Design Engineer,<br>
HP-UX iSCSI Driver Team,<br>
Hewlett Packard, Cupertino.<br>
email : santoshr@cup.hp.com<br>
Phone : 408-447-3751<br>
##################################<br>
</font>
<br>
<br>
--=_alternative 00254582C2256B88_=--


From owner-ips@ece.cmu.edu  Tue Mar 26 03:39:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA27495
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 03:39:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2Q7no723191
	for ips-outgoing; Tue, 26 Mar 2002 02:49:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2Q7nkw23181;
	Tue, 26 Mar 2002 02:49:46 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id IAA51074;
	Tue, 26 Mar 2002 08:49:40 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2Q7nd720594;
	Tue, 26 Mar 2002 08:49:39 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: SNACK RunLength
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF584369E9.972BA891-ONC2256B88.0029B014@telaviv.ibm.com>
Date: Tue, 26 Mar 2002 09:49:35 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 09:49:39,
	Serialize complete at 26/03/2002 09:49:39
Content-Type: multipart/alternative; boundary="=_alternative 0029FFC0C2256B88_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0029FFC0C2256B88_=
Content-Type: text/plain; charset="us-ascii"

Michael,

The paragraph says that if you issue a SNACK after the MaxPDURecvLength 
has decreased you should use RunLength 0 (meaning all) instead of a 
specific runlength which might not be accurate anymore.

Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
25-03-02 19:43
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: SNACK RunLength

 

Am I just not reading this or can this paragraph use some help?  Can 
someone
give an interpretation? 

   9.16.3  RunLength
                                 ...

           The first data SNACK, issued after initiator's MaxRecvPDULength 

           decreased, for a command issued on the same connection before 
the

           change in MaxRecvPDULength, MUST use RunLength "0" to request 
           retransmission of any number of PDUs (including one).  The 
number
of 
           retransmitted PDUs in this case, may or may not be the same as
the 
           original transmission, depending on whether loss was before or
after 
           the MaxRecvPDULength was changed at the target.


Does this refer to something like:

For connections with unacknowledged PDUs that undergo MaxRecvPDULength
negotiation ...




--=_alternative 0029FFC0C2256B88_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Michael,</font>
<br>
<br><font size=2 face="sans-serif">The paragraph says that if you issue a SNACK after the MaxPDURecvLength has decreased you should use RunLength 0 (meaning all) instead of a specific runlength which might not be accurate anymore.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">25-03-02 19:43</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: SNACK RunLength</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Am I just not reading this or can this paragraph use some help? &nbsp;Can someone<br>
give an interpretation? <br>
<br>
 &nbsp; 9.16.3 &nbsp;RunLength<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;...<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The first data SNACK, issued after initiator's MaxRecvPDULength <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; decreased, for a command issued on the same connection before the<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; change in MaxRecvPDULength, MUST use RunLength &quot;0&quot; to request <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; retransmission of any number of PDUs (including one). &nbsp;The number<br>
of <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; retransmitted PDUs in this case, may or may not be the same as<br>
the <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; original transmission, depending on whether loss was before or<br>
after <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; the MaxRecvPDULength was changed at the target.<br>
<br>
<br>
Does this refer to something like:<br>
<br>
For connections with unacknowledged PDUs that undergo MaxRecvPDULength<br>
negotiation ...<br>
<br>
</font>
<br>
<br>
--=_alternative 0029FFC0C2256B88_=--


From owner-ips@ece.cmu.edu  Tue Mar 26 10:57:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07987
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 10:57:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QFUF300556
	for ips-outgoing; Tue, 26 Mar 2002 10:30:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail05.ztx.compaq.com (ztxmail05.ztx.compaq.com [161.114.1.209])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QFUDw00552
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 10:30:13 -0500 (EST)
Received: from cceexg12.americas.cpqcorp.net (cceexg12.americas.cpqcorp.net [16.110.250.124])
	by ztxmail05.ztx.compaq.com (Postfix) with ESMTP id 32EFE3FF8
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 09:30:03 -0600 (CST)
Received: from cceexc17.americas.cpqcorp.net ([16.110.250.84]) by cceexg12.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Tue, 26 Mar 2002 09:30:00 -0600
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
Subject: RE: [Fwd: iSCSI: items discussed at WG meeting]
Date: Tue, 26 Mar 2002 09:30:00 -0600
Message-ID: <78AF3C342AEAEF4BA33B35A8A15668C6019E2203@cceexc17.americas.cpqcorp.net>
Thread-Topic: [Fwd: iSCSI: items discussed at WG meeting]
Thread-Index: AcHUbQJ6KscgknpfTRK8fycPs760ygAbBlLQ
From: "Elliott, Robert" <Robert.Elliott@compaq.com>
To: "IPS Reflector" <ips@ece.cmu.edu>
X-OriginalArrivalTime: 26 Mar 2002 15:30:00.0995 (UTC) FILETIME=[18139F30:01C1D4DB]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2QFUDw00553
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Don't assume that every new SCSI protocol will support CRN - 
SRP does not, for one.  Logical units on protocols that
do not will not support the Control mode page bit (leaving
it 0).  

Are you going to write a proposal for CAP to add a bit to 
the Control mode page?  

This two-level approach still leaves a hole for current 
FCP-2 applications/targets, which don't yet know about the
Control mode page bit:

LU Control bit on, Control bit on => CRN in use
LU Control bit on, Control bit off => no CRN
  existing targets don't implement the Control mode page bit;
  existing applications assume the LU Control page suffices
  to enable CRN. 

LU Control bit off, Control bit off => no CRN
LU Control bit off, Control bit on => illegal

While iSCSI applications/targets will have a simpler matrix:
Control bit on => CRN
Control bit off => no CRN

---
Rob Elliott, Compaq Server Storage
Robert.Elliott@compaq.com


> -----Original Message-----
> From: Santosh Rao [mailto:santoshr@cup.hp.com]
> Sent: Monday, March 25, 2002 8:21 PM
> To: IPS Reflector
> Subject: [Fwd: iSCSI: items discussed at WG meeting]
> 
> 
> Rob,
> 
> FCP-2's EPDC bit really ought to be considered a SCSI LLP peer to peer
> mechanism to check and enable CRN support in FCP_CMD, since 
> FCP did not
> support CRN in the FCP_CMD IU.
> 
> There should be a seperate SCSI ULP peer to peer mechanism which
> involves the application client testing and enabling CRN 
> support in the
> device servers being accessed.
> 
> Only legacy scsi transports should require the former, due to early
> versions of such legacy scsi transports not having supported CRN.
> 
> Future SCSI transports (iscsi, srp, etc) ought to only need the later
> SCSI ULP peer to peer mechanism to test and enable CRN in the 
> peer SCSI
> ULPs.
> 
> It would be a better preservation of layering to require a change in 
> CAP which provides an enable_crn bit in the control mode page, than to
> further propagate the violation of layering that FCP-2 seems to have
> created with its EPDC bit testing both the SCSI LLP and ULP
> capabilities.
> 
> Regards,
> Santosh
> 
> 
> 
> 
> "Elliott, Robert" wrote:
> > 
> > > -----Original Message-----
> > > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > > Sent: Wednesday, March 20, 2002 6:20 PM
> > > Subject: Re: iSCSI: items discussed at WG meeting
> > >
> > > Dave Peterson wrote:
> > > > 8. CRN Processing and behavior: spec currently references
> > > > SAM-2 for CRN.
> > > >
> > > > Per SAM-2:
> > > > Command Reference Number (CRN):
> > > > When this argument is used, all sequential commands of an
> > > > I_T_L nexus shall include a CRN argument that is incremented
> > > > by one. The initial, wrap, and reset CRN values shall be one.
> > > > The CRN value zero shall be reserved for use
> > > > as defined by the SCSI protocol. It is not an error for the
> > > > application client to provide this argument when CRN is not
> > > > supported by the SCSI protocol or logical unit.
> > > >
> > > > More text specifying the behavior of CRN in the iSCSI realm
> > > > is needed. In addition, a method to determine if CRN is being
> > > > used (or not) is missing.
> > >
> > > We went through this discussion several months ago in another ips
> > > thread. CRN really belongs to the SCSI ULP and any mechanism
> > > to check if the device server supports CRN should be in a SCSI ULP
> > > mode page (like the Control Mode Page).
> > 
> > I agree this bit fits better there, but to date there is no such
> > bit in the Control mode page and no proposals on the T10 CAP
> > agenda to add one.
> > 
> > In the only protocol supporting this feature (FCP-2), the bit is
> > in the Protocol-Specific Logical Unit Control mode page.  If a
> > bit is added to the Control mode page for iSCSI and future
> > protocols, it makes FCP-2 targets non-compliant. I'm not sure
> > that there are any implementations of CRN yet that would care.
> > 
> > > As far as iscsi is concerned, both the iscsi initiator and target
> > > implementations MUST support CRN, since it is defined in iscsi
> > > command pdu.
> > >
> > > Why is such a method required at the SCSI LLP layer ?
> > 
> > iSCSI defers too much to SAM-2:
> > "9.3.2 CRN
> >  SCSI command reference number - if present in the SCSI
> >  execute command arguments (according to [SAM2])."
> > 
> > To depend on the CRN in its Execute Command() remote
> > procedure call, an application needs to know:
> > a) the initiator port supports sending CRN;
> > b) if there are any protocol bridges/gateways in the service
> > delivery subsystem, all the protocols between the initiator
> > port and target port support CRN;
> > c) the target port supports CRN; and
> > d) the logical unit supports and honors CRN.
> > 
> > Presumably the initiator's API will reject the RPC
> > if a) is not honored.
> > 
> > Applications currently detect and set c) and d) with
> > the Protocol-Specific Logical Unit Control mode page.
> > Moving to the Control mode page would be a change
> > but is certainly possible.  iSCSI needs to provide
> > this information/control somehow.
> > 
> > For b), bridges need to be able to report that CRN is not
> > available over iSCSI because they're bridging to a protocol
> > that doesn't support it.
> > 
> > A text key would work pretty well, but this capability
> > is logical unit based, not target-based.  This leaves
> > intercepting mode page accesses and modifying the mode
> > page data.
> > 
> > ---
> > Rob Elliott, Compaq Server Storage
> > Robert.Elliott@compaq.com
> 
> -- 
> ##################################
> Santosh Rao
> Software Design Engineer,
> HP-UX iSCSI Driver Team,
> Hewlett Packard, Cupertino.
> email : santoshr@cup.hp.com
> Phone : 408-447-3751
> ##################################
> 


From owner-ips@ece.cmu.edu  Tue Mar 26 11:44:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10910
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 11:44:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QFv4e02759
	for ips-outgoing; Tue, 26 Mar 2002 10:57:04 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QFv1w02746
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 10:57:01 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id QAA29138
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:56:54 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2QFus735432
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:56:54 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: iSCSI - started countdown to 12
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFD6F41552.D91DD299-ONC2256B88.00572225@telaviv.ibm.com>
Date: Tue, 26 Mar 2002 17:56:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 17:56:54,
	Serialize complete at 26/03/2002 17:56:54
Content-Type: multipart/alternative; boundary="=_alternative 00573EFAC2256B88_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00573EFAC2256B88_=
Content-Type: text/plain; charset="us-ascii"

oops - it is 11-90 not 10-90 and the change bars are vs. 11 - Julo
----- Forwarded by Julian Satran/Haifa/IBM on 26-03-02 17:51 -----


Julian Satran
26-03-02 17:51

 
        To:     ips@ece.cmu.edu
        cc: 
        From:   Julian Satran/Haifa/IBM@IBMIL
        Subject:        iSCSI - started countdown to 12

 


-


Dear colleagues,

I've put on my site (http://haifa.il.ibm.com/satran/ips) a "working" version of the draft labeled 10-90.
Only the pdf version (with change bars vs. 10) is available.
It contains all the agreed changes + a MUST requirement for the initiator 
to fully deliver data on R2T and 
unsolicited data-out (thanks Ralph Weber for the convincing arguments).


It does not contain yet:

  - the "only tunnel mode is must" change
  - the normative naming text
  - the last version of the clearing effects appendix
  - bits and pieces of clarifying text that I have on the table (not many)

Next version will disappear on April 1st (just kidding!).

I'll be away on a 1 week vacation.

Julo






--=_alternative 00573EFAC2256B88_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">oops - it is 11-90 not 10-90 and the change bars are vs. 11 - Julo</font>
<br><font size=1 color=#800080 face="sans-serif">----- Forwarded by Julian Satran/Haifa/IBM on 26-03-02 17:51 -----</font>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Julian Satran</b></font>
<p><font size=1 face="sans-serif">26-03-02 17:51</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; From: &nbsp; &nbsp; &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI - started countdown to 12</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br>
<br><font size=1 color=#800080 face="sans-serif">-</font>
<br>
<br>
<br><font size=2 face="sans-serif">Dear colleagues,</font>
<br>
<br><font size=2 face="sans-serif">I've put on my site (http://haifa.il.ibm.com/satran/ips) a &quot;working&quot; version of the draft labeled 10-90.</font>
<br><font size=2 face="sans-serif">Only the pdf version (with change bars vs. 10) is available.</font>
<br><font size=2 face="sans-serif">It contains all the agreed changes + a MUST requirement for the initiator to fully deliver data on R2T and </font>
<br><font size=2 face="sans-serif">unsolicited data-out (thanks Ralph Weber for the convincing arguments).</font>
<br>
<br>
<br><font size=2 face="sans-serif">It does not contain yet:</font>
<br>
<br><font size=2 face="sans-serif">&nbsp; - the &quot;only tunnel mode is must&quot; change</font>
<br><font size=2 face="sans-serif">&nbsp; - the normative naming text</font>
<br><font size=2 face="sans-serif">&nbsp; - the last version of the clearing effects appendix</font>
<br><font size=2 face="sans-serif">&nbsp; - bits and pieces of clarifying text that I have on the table (not many)</font>
<br>
<br><font size=2 face="sans-serif">Next version will disappear on April 1st (just kidding!).</font>
<br>
<br><font size=2 face="sans-serif">I'll be away on a 1 week vacation.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
<br>
<br>
--=_alternative 00573EFAC2256B88_=--


From owner-ips@ece.cmu.edu  Tue Mar 26 11:47:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11239
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 11:47:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QFvC402778
	for ips-outgoing; Tue, 26 Mar 2002 10:57:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QFv1w02745
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 10:57:01 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id QAA119734
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:56:54 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2QFusN160554
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:56:54 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: iSCSI - started countdown to 12
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF90DC42B3.0B7D3C13-ONC2256B88.0055FAF8@telaviv.ibm.com>
Date: Tue, 26 Mar 2002 17:56:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 17:56:54,
	Serialize complete at 26/03/2002 17:56:54
Content-Type: multipart/alternative; boundary="=_alternative 0057112DC2256B88_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0057112DC2256B88_=
Content-Type: text/plain; charset="us-ascii"

-


Dear colleagues,

I've put on my site (http://haifa.il.ibm.com/satran/ips) a "working" 
version of the draft labeled 10-90.
Only the pdf version (with change bars vs. 10) is available.
It contains all the agreed changes + a MUST requirement for the initiator 
to fully deliver data on R2T and 
unsolicited data-out (thanks Ralph Weber for the convincing arguments).


It does not contain yet:

  - the "only tunnel mode is must" change
  - the normative naming text
  - the last version of the clearing effects appendix
  - bits and pieces of clarifying text that I have on the table (not many)

Next version will disappear on April 1st (just kidding!).

I'll be away on a 1 week vacation.

Julo




--=_alternative 0057112DC2256B88_=
Content-Type: text/html; charset="us-ascii"


<br><font size=1 color=#800080 face="sans-serif">-</font>
<br>
<br>
<br><font size=2 face="sans-serif">Dear colleagues,</font>
<br>
<br><font size=2 face="sans-serif">I've put on my site (http://haifa.il.ibm.com/satran/ips) a &quot;working&quot; version of the draft labeled 10-90.</font>
<br><font size=2 face="sans-serif">Only the pdf version (with change bars vs. 10) is available.</font>
<br><font size=2 face="sans-serif">It contains all the agreed changes + a MUST requirement for the initiator to fully deliver data on R2T and </font>
<br><font size=2 face="sans-serif">unsolicited data-out (thanks Ralph Weber for the convincing arguments).</font>
<br>
<br>
<br><font size=2 face="sans-serif">It does not contain yet:</font>
<br>
<br><font size=2 face="sans-serif">&nbsp; - the &quot;only tunnel mode is must&quot; change</font>
<br><font size=2 face="sans-serif">&nbsp; - the normative naming text</font>
<br><font size=2 face="sans-serif">&nbsp; - the last version of the clearing effects appendix</font>
<br><font size=2 face="sans-serif">&nbsp; - bits and pieces of clarifying text that I have on the table (not many)</font>
<br>
<br><font size=2 face="sans-serif">Next version will disappear on April 1st (just kidding!).</font>
<br>
<br><font size=2 face="sans-serif">I'll be away on a 1 week vacation.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<br>
--=_alternative 0057112DC2256B88_=--


From owner-ips@ece.cmu.edu  Tue Mar 26 11:49:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11407
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 11:49:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QGPs905359
	for ips-outgoing; Tue, 26 Mar 2002 11:25:54 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from erie.mcdata.com (mcjekyll.mcdata.com [144.49.6.25])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QGPpw05354
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 11:25:51 -0500 (EST)
Received: from erie.mcdata.com ([172.18.1.35]) by erie.mcdata.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id H4SB0YA1; Tue, 26 Mar 2002 09:25:45 -0700
Received: from 144.49.154.169 by erie.mcdata.com (InterScan E-Mail VirusWall NT); Tue, 26 Mar 2002 09:25:44 -0700
Received: by grizzly.mcdata.com with Internet Mail Service (5.5.2653.19)
	id <ZVVL5A9J>; Tue, 26 Mar 2002 11:24:41 -0500
Message-ID: <1B8A58D6C376FE4DB329408E2701384250CA82@grizzly.mcdata.com>
From: Ernest Dainow <Ernest.Dainow@mcdata.com>
To: "'Joshua Tseng'" <jtseng@NishanSystems.com>
Cc: ips@ece.cmu.edu
Subject: RE: iSNS scalability
Date: Tue, 26 Mar 2002 11:24:39 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Thanks for filling in the background on this. I guess it makes sense to
defer iSNS server to server communication to later.

Just a few points to clarify for future discussions. The examples I used for
partitioning DNS domains assumed a strictly internal (private) network in a
large organization and does not expose DNS servers or information about
internal machines to the Internet. External resources like public web
servers are handled by separate external DNS servers (usually outside the
firewall).

The concept of authority relates to division of responsibility, which is an
important issue in large organizations. That is, if a site has ownership of
storage resources, they should have ownership of that portion of the iSNS
database that relates to those resources. The current model for iSNS is
monolithic and may make this difficult. This is what DNS does so well
through the ability to delegate subdomains, which can then be managed by
separate servers. Authority is delegated down the DNS hierarchy, not up the
hierarchy to root servers.

I agree that DNS is quite different and may not be a good model for iSNS in
its detailed operation. The concept of "local authority" and how to apply it
to iSNS or between iSNS servers is the question. 

Ernie Dainow


-----Original Message-----
From: Joshua Tseng [mailto:jtseng@NishanSystems.com]
Sent: Monday, March 25, 2002 1:49 PM
To: 'Ernest Dainow'
Cc: ips@ece.cmu.edu
Subject: RE: iSNS scalability


Hi Ernest,

Thanks for your comments.  I understand your observations
and conclusions.  This has been a past topic of discussion
among the coauthors the iSNS implementers we've been working
with.

Note that the scope of this iSNS document is meant to
address the interaction between iSNS clients and the iSNS
server.  Interaction among multiple iSNS servers is
something to be addressed by future standards work, or by
individual implementations using proprietary or standards-
based mechanisms.  Perhaps I need to make that more clear
about that in the document abstract.  But I understand your
comments and would be open to addressing them in a separate
draft.

Comparison with DNS, while interesting and useful, needs to
take into consideration significant differences between DNS
and iSNS functionality.  Note the following:

1)  DNS does not support dynamic addition, deletion, or
updates of records by its clients.  Although zone transfers
and the distribution of DNS record information is standardized,
the process of changing and updating of the DNS records
themselves is done administratively, outside of the DNS
protocol mechanisms.  That really simplifies the job for DNS.
For iSNS, dynamic updates of records is an integral part of the
iSNS protocol.  The heirarchical model works well for DNS
because database updates only need to flow in one direction--
down the heirarchy.  With iSNS, updates and notifications will
need to flow in both directions, because there will be updates
done by iSNS clients at the lowest levels of the heirarchy.

2)  The concept of authority--Who is authoritative?  In DNS,
it's very simple.  Since we're only talking about names, the
authority is imbedded in the name itself.  However, for
discovery and management of storage devices, the authority is
not necessarily related to the name, and the name of the device
may have no relationship to its authority.  And I would be
reluctant to delegate authority for my storage devices to "root"
iSNS servers somewhere out there in the Internet.

3)  Security:  DNS has limited control over what information
is propagated down the heirarchy.  iSNS requires much stricter,
granular control.

Because of the above and especially because of 2), we felt that
existing standards-based tools such as LDAP and SNMP would be
sufficient for now.  Yes, as you point out it requires more
manual intervention, but the feeling is that this is a GOOD thing
since most administrators don't want discovery of their storage
arrays to take place on the Public Internet without their
knowledge, which is what happens with DNS all the time.

That being said, I would be open to working with anyone interested
in a new draft specifying interactions among iSNS servers.  If
anyone is interested, please send me an e-mail.

Josh
 
> 
> A major motive for the use of iSNS is to provide scalability 
> in a storage
> network. While many of the proposed features of iSNS do 
> provide this, it
> falls short in a few areas.
> 
> An organization with storage at several locations should have 
> the option for
> local management by each site, with an easy method to share 
> storage between
> sites. This is also required for sharing resources between 
> organizations,
> such as between business partners or between a Storage 
> Service Provider and
> customers. 
> 
> iSNS (draft 8) addresses this somewhat in Section 3.7, 
> "Transfer of iSNS
> Database Records between iSNS Servers". However, the 
> mechanism suggested for
> doing this may not be straight forward to automate and may 
> require manual
> intervention between sites to keep multiple iSNS servers 
> synchronized. In
> addition, since the mechanisms are suggested and not 
> standardized, there
> will probably not be a high degree of interoperabilty between 
> different
> implementations of iSNS.
> 
> The best example of a well-proven, scalable architecture to 
> address this is
> the Internet Domain Name Services (DNS). DNS scales from 
> single-site to
> multi-site to the global Internet. The key DNS concept 
> lacking in iSNS is
> that of local authority (i.e. ownership). With DNS, a site 
> has authority for
> its own domains. Requests for information about its domain 
> are supplied by
> its own servers (primary or secondary). When a server's 
> domain name records
> are modified, its database does not need to be replicated or 
> synchronized
> with external DNS servers. 
> 
> So, for example, in an organizaton global.com, there might be 
> subdomains
> partitioned and managed by different regions of the company, such as
> us.global.com and europe.global.com. A region can further 
> partition its
> domain if desired,  into say london.europe.global.com,
> rome.europe.global.com, etc. 
> 
> The concept of local authority, as used in DNS, could be 
> applied to iSNS
> objects such as Storage Nodes and Discovery Domains. That is, 
> only one iSNS
> server would maintain authoritative records for a particular object. A
> hierarchical iSNS with local authority would add significantly to the
> scalability of IP storage.
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Tue Mar 26 11:58:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07985
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 10:57:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QExvG27995
	for ips-outgoing; Tue, 26 Mar 2002 09:59:57 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QExsw27986
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 09:59:54 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4Z4XC>; Tue, 26 Mar 2002 09:59:53 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5943@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: padding on intermediate sequences
Date: Tue, 26 Mar 2002 09:52:50 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D4D5.E6A91DD0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D4D5.E6A91DD0
Content-Type: text/plain;
	charset="iso-8859-1"

Section 9.7.7 says:
 
The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
integer number of 4 byte words (real payload) unless the F bit is set
to 1.
 
This allows one to pad intermediate sequences of a transfer. But, there are
reasons why padding on intermediate sequences within a transfer can make
life difficult.
 
Can we forbid padding on all but the last PDU for the transfer? If that is
objectionable, could we forbid padding on all but the last PDU of a transfer
if DataInOrder=yes. 
 
Eddy

------_=_NextPart_001_01C1D4D5.E6A91DD0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV>
<DIV><SPAN class=613250313-26032002><SPAN class=971591614-26032002><FONT 
face=Arial><FONT size=2><SPAN class=064545014-26032002>Section 
9.7.7</SPAN>&nbsp;says:</FONT></FONT></SPAN></SPAN></DIV>
<DIV><SPAN class=613250313-26032002><FONT face=Arial><FONT size=2><SPAN 
class=971591614-26032002></SPAN></FONT></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613250313-26032002><SPAN class=971591614-26032002><FONT 
face="Courier New" size=2>The Data Segments of Data-in and Data-out PDUs SHOULD 
be filled to the</FONT></DIV>
<DIV><FONT face="Courier New" size=2>integer number of 4 byte words (real 
payload) unless the F bit is set</FONT></DIV>
<DIV><FONT face="Courier New" size=2>to 1.</FONT></DIV></SPAN></SPAN><SPAN 
class=613250313-26032002><FONT size=2></FONT></SPAN>
<DIV><SPAN class=613250313-26032002><FONT face="Courier New"><FONT face=Arial 
size=2></FONT></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613250313-26032002><FONT size=+0><FONT face=Arial size=2><SPAN 
class=971591614-26032002>This allows one to pad intermediate sequences of a 
transfer. But, there are reasons why padding on intermediate sequences within a 
transfer can make life difficult.</SPAN></FONT></FONT></SPAN></DIV>
<DIV><SPAN class=613250313-26032002><FONT size=+0><FONT face=Arial size=2><SPAN 
class=971591614-26032002></SPAN></FONT></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613250313-26032002><FONT size=+0><FONT size=+0><FONT 
face=Arial><FONT size=2>Can we forbid padding on all but the last PDU for the 
transfer?&nbsp;<SPAN class=971591614-26032002>If that is 
objectionable,&nbsp;</SPAN>could&nbsp;<SPAN class=971591614-26032002>we 
</SPAN>forbid&nbsp;<SPAN class=971591614-26032002>padding</SPAN> on all but the 
last PDU of a transfer&nbsp;if DataInOrder=yes.<SPAN class=971591614-26032002> 
</SPAN></FONT></FONT></FONT></FONT></SPAN></DIV>
<DIV><SPAN class=613250313-26032002><FONT face="Courier New"><FONT face=Arial 
size=2></FONT></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613250313-26032002><FONT face="Courier New"><FONT face=Arial 
size=2>Eddy</FONT></DIV></FONT></SPAN></DIV></BODY></HTML>

------_=_NextPart_001_01C1D4D5.E6A91DD0--


From owner-ips@ece.cmu.edu  Tue Mar 26 13:36:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18251
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 13:36:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QIGhH14391
	for ips-outgoing; Tue, 26 Mar 2002 13:16:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QIGew14386
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 13:16:40 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id TAA119182;
	Tue, 26 Mar 2002 19:16:33 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2QIGW773864;
	Tue, 26 Mar 2002 19:16:32 +0100
Importance: Normal
Subject: Re: iSCSI: SRP status
To: David Jablon <dpj@theworld.com>
Cc: Black_David@emc.com, ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFF8E7702E.B835DE65-ONC2256B88.006395D3@telaviv.ibm.com>
From: "Ofer Biran" <BIRAN@il.ibm.com>
Date: Tue, 26 Mar 2002 20:16:29 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 20:16:32
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk



David,

Can you clarify the statement

"...and that have been commercially deployed without licensing another
organization's patents."

Aren't you talking here about the patented SPEKE methods ?


 Thanks,
    Ofer


Ofer Biran
Storage and Systems Technology
IBM Research Lab in Haifa
biran@il.ibm.com  972-4-8296253


David Jablon <dpj@theworld.com>@ece.cmu.edu on 26/03/2002 23:37:45

Please respond to David Jablon <dpj@theworld.com>

Sent by:    owner-ips@ece.cmu.edu


To:    Black_David@emc.com
cc:    ips@ece.cmu.edu
Subject:    Re: iSCSI: SRP status



David,

Here are a few points to add to this summary of recent
events regarding SRP.

The first is simply that the just-posted policy letter from
Phoenix legal was presented and discussed in Minneapolis.
While I won't attempt to summarize that discussion here,
I have relayed the concerns expressed back to Phoenix.

A second point is a delicate one, related to larger IETF
policy in general. Concern was expressed at the meeting that
the WG appears to be changing the content (if not the
requirements too) of a proposed standard, based on
unconfirmed rumor.

The fact that a patent holder has refused to confirm or deny
such rumors, or provide a license policy statement, is
surely a concern.  But this concern may mask a pernicious
problem.  Such WG behavior allows anyone to start
unresolvable rumors of potential patent coverage in order to
steer a group in arbitrary directions.  Unfortunately, IETF
policy and tradition make open discussion of the legitimacy
of such rumors very difficult.

Concern was expressed at the meeting about security
dangers inherent in designing a new method, such as some
kind of mutually-authenticating variant of CHAP.  Even
beyond the security concerns, it may be impossible for the
group to determine that a newly proposed method is patent-
free.  The standard practices of using evidence of
surviving years of cryptographic review to establish
security, or commercial use to establish unencumbrance,
both may not work for methods still-to-be described.

The draft-jablon-speke-00.txt presented to the WG on this
list and at the meeting specifically describes methods that
provide the benefits of SRP, but are less structurally
related to EKE.  It describes methods that have survived
5 years of public scrutiny, that achieve higher goals than
the just-proposed alternatives, and that have been
commercially deployed without licensing another
organization's patents.

In presenting this information, I am clearly staying within
the guidelines of longstanding written IETF policy, but
clearly coming up against IETF tradition in talking as
openly as possible about such sensitive issues.

I hope that the group will carefully consider these methods,
in addition to any soon-to-be proposed variants of CHAP
or Diffie-Hellman, as they review their security and
functionality objectives.

Furthermore, in light of the repeated attempts to get
another company to clarify or simplify it's license
position, I would hope that any group or individual with
concern about the Phoenix position will make their concerns
known to the company, or to me personally, and I'll do my
best to get an acceptable response.

-- David Jablon






From owner-ips@ece.cmu.edu  Tue Mar 26 13:37:02 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18271
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 13:37:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QHhbd11672
	for ips-outgoing; Tue, 26 Mar 2002 12:43:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls2.std.com [199.172.62.104])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QGVsw05986
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 11:31:54 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id LAA28735;
	Tue, 26 Mar 2002 11:31:52 -0500
Message-Id: <5.1.0.14.0.20020326125232.04553cd0@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
X-Priority: 1 (Highest)
Date: Tue, 26 Mar 2002 16:37:45 -0500
To: Black_David@emc.com
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
Cc: ips@ece.cmu.edu
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E0293763D@CORPMX14>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

David,

Here are a few points to add to this summary of recent
events regarding SRP.

The first is simply that the just-posted policy letter from
Phoenix legal was presented and discussed in Minneapolis.
While I won't attempt to summarize that discussion here,
I have relayed the concerns expressed back to Phoenix.

A second point is a delicate one, related to larger IETF
policy in general. Concern was expressed at the meeting that
the WG appears to be changing the content (if not the
requirements too) of a proposed standard, based on
unconfirmed rumor.

The fact that a patent holder has refused to confirm or deny
such rumors, or provide a license policy statement, is
surely a concern.  But this concern may mask a pernicious
problem.  Such WG behavior allows anyone to start
unresolvable rumors of potential patent coverage in order to
steer a group in arbitrary directions.  Unfortunately, IETF
policy and tradition make open discussion of the legitimacy
of such rumors very difficult.

Concern was expressed at the meeting about security
dangers inherent in designing a new method, such as some
kind of mutually-authenticating variant of CHAP.  Even
beyond the security concerns, it may be impossible for the
group to determine that a newly proposed method is patent-
free.  The standard practices of using evidence of
surviving years of cryptographic review to establish
security, or commercial use to establish unencumbrance,
both may not work for methods still-to-be described.

The draft-jablon-speke-00.txt presented to the WG on this
list and at the meeting specifically describes methods that
provide the benefits of SRP, but are less structurally
related to EKE.  It describes methods that have survived
5 years of public scrutiny, that achieve higher goals than
the just-proposed alternatives, and that have been
commercially deployed without licensing another
organization's patents.

In presenting this information, I am clearly staying within
the guidelines of longstanding written IETF policy, but
clearly coming up against IETF tradition in talking as
openly as possible about such sensitive issues.

I hope that the group will carefully consider these methods,
in addition to any soon-to-be proposed variants of CHAP
or Diffie-Hellman, as they review their security and
functionality objectives.

Furthermore, in light of the repeated attempts to get
another company to clarify or simplify it's license
position, I would hope that any group or individual with
concern about the Phoenix position will make their concerns
known to the company, or to me personally, and I'll do my
best to get an acceptable response.

-- David Jablon


At 05:24 PM 3/25/02 -0500, Black_David@emc.com wrote:
>It's been an "interesting" week on this topic.  This is an
>attempt to (coherently) summarize the current situation in which
>the WG finds itself and what is being done.  This message is a
>mixture of technical and procedural material - technical queries
>and follow-ups should be sent to the list, but I would ask that
>procedural queries and follow-ups be sent directly to me to avoid
>procedural discussions on the list.  I promise to post the
>(inevitable) clarifications.
>
>-- Disclaimer
>
>- I am NOT a lawyer.
>- This message does NOT contain legal advice.
>- If you need legal advice, you need to talk to a lawyer.
>- If actions or decisions based on information in this message
>        have legal consequences, those consequences are YOUR
>        responsibility.
>        - The IETF and yours truly disclaim all responsibility
>
>On the subject of Intellectual Property Rights, the attention of all
>IETF participants is directed to Section 10 of RFC 2026.
>
>-- Patents
>
>While the IETF disclaims responsibility for performing patent
>searches (see Section 10 of RFC 2026), the following patents have
>been identified to the IPS WG as being of concern with respect to SRP:
>
>(1) An SRP patent application filed by Stanford University [The SRP patent]
>(2) US 6226383 held by Phoenix [The SPEKE patent)
>(3) US 5241599 and US 5440635, held by Lucent [The EKE patents]
>
>-- Enquiries and Responses
>
>Enquiries have been made of the above patent holders, who have responded
>as follows:
>
>(1) Stanford has a license to their pending SRP patent available on the web
>        at http://otl.stanford.edu/pdf/97006.pdf. There is no cost to
>obtain
>        the license.  No payments are due to Stanford under the license and
>        the license does not contain any reciprocal grant of rights back to
>        Stanford.
>(2) Phoenix has written to the IETF to say that the SPEKE patent may apply
>        to SRP and has committed to make licenses available on reasonable
>        and non-discriminatory terms.  The Phoenix letter containing these
>        statements will be sent to the list shortly and will also appear in
>        the Intellectual Property Rights Notices area of the IETF web site
>in
>        the near future.
>(3) After initially promising to do so, Lucent has decided not to make any
>        statement about applicability of the EKE patents to SRP.  Lucent has
>        orally pledged to license the EKE patents in accordance with normal
>        Lucent licensing practices, but these practices do not involve
>        "reasonable and non-discriminatory" terms.
>
>These responses have been summarized in this message for brevity and
>clarity.
>For more details on (1), see the license at the URL above.  For (2), see
>the forthcoming message and/or the IETF web site.  For (3), see the text
>on this topic contained in the message at:
>http://www.pdl.cmu.edu/mailinglists/ips/mail/msg08716.html . 
>
>-- IETF Standards Process
>
>The IETF standards process places some emphasis on commitments to
>reasonable and non-discriminatory licensing terms (see Section 10 of
>RFC 2026).  Commitments to license on openly specified, reasonable and
>non-discriminatory terms are neither strictly necessary nor sufficient
>for the IESG to approve use of technology that is covered by patents,
>but the absence of such commitments makes IESG approval both
>less likely to occur and more difficult to obtain.
>
>In all cases, it is up to the WG to determine the best technical
>solutions to the problems it is solving, and to make the case to the
>IESG that the nature of the problem and available technology justifies
>the use of technology covered by patents.  The IESG will analyze each
>individual case on its own merits.  This position was reaffirmed by
>the IESG during the IESG plenary last Thursday evening.
>
>-- iSCSI 
>
>The IPS WG considered this situation at its meeting last week and
>determined that rough consensus no longer exists for a "MUST implement"
>requirement for SRP in iSCSI.  As things currently stand, that requirement
>will be weakened to "MAY" and the WG is obligated to designate some
>other inband authentication protocol as "MUST implement" for
>interoperability.
>
>Based on my discussions with some of the Transport and Security Area
>Directors, an approach based on using CHAP instead of SRP appears to
>be acceptable, but the WG should consider whether to adopt a version
>of CHAP enhanced by adding a Diffie-Hellman key exchange that would make
>the protocol resist passive attacks (e.g., packet sniffer captures CHAP
>traffic, adversary tries the dictionary of passwords off-line).  The
>WG is *not* being instructed to adopt this approach; the request is
>simply to consider it.
>
>In no particular order of priority and/or importance, the following
>activities are underway to deal with the SRP situation:
>- The iSCSI security design team has been asked to take another look
>        at authentication mechanisms.
>- Work is underway with cryptographers to consider how to add a DH
>        exchange and/or mutual authentication to CHAP (the latter because
>        SRP is capable of mutual authentication).
>- A requirements discussion for the above two bullets will take place
>        on this list in the near future.  The reason for delaying this
>        discussion is to gather information on the consequences of
>        requirements decisions, rather than hold a discussion in the
>abstract.
>- Lucent continues to be approached with requests to be more cooperative.
>        Lucent's actions (or lack thereof) are the primary cause of this
>        delay to iSCSI.
>
>iSCSI progress has been delayed by this situation.  We were
>originally hoping to start a WG Last Call on the next (-12) version
>of iSCSI within the next week or so.  That is not possible with this
>technical issue open - a Mock WG Last Call will be conducted on the
>next version of the iSCSI draft with the goal of reaching closure on
>most of its text, but the actual WG Last Call will have to await
>resolution of this issue.  I am hopeful that this resolution can
>be achieved in the next month or two.
>
>Thanks,
>--David (IP Storage WG co-chair)
>
>---------------------------------------------------
>David L. Black, Senior Technologist
>EMC Corporation, 42 South St., Hopkinton, MA  01748
>+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
>black_david@emc.com         Cell: +1 (978) 394-7754
>--------------------------------------------------- 



From owner-ips@ece.cmu.edu  Tue Mar 26 15:26:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22114
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 15:26:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QJpi622376
	for ips-outgoing; Tue, 26 Mar 2002 14:51:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from iol.unh.edu (io.iol.unh.edu [132.177.123.82])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QJnKw22128
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 14:49:20 -0500 (EST)
Received: from io.iol.unh.edu (localhost.localdomain [127.0.0.1])
	by iol.unh.edu (8.12.2/8.12.2) with ESMTP id g2QJmOVM015145;
	Tue, 26 Mar 2002 14:48:24 -0500
Received: from localhost (rdr@localhost)
	by io.iol.unh.edu (8.12.2/8.12.1/Submit) with ESMTP id g2QJmK0A015142;
	Tue, 26 Mar 2002 14:48:24 -0500
Date: Tue, 26 Mar 2002 14:48:20 -0500 (EST)
From: "Robert D. Russell" <rdr@io.iol.unh.edu>
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: Re: iSCSI: padding on intermediate sequences
In-Reply-To: <25369470B6F0D41194820002B328BDD22F5943@ATLOPS>
Message-ID: <Pine.LNX.4.43.0203261445240.14933-100000@io.iol.unh.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that is
> objectionable, could we forbid padding on all but the last PDU of a transfer
> if DataInOrder=yes.
>
> Eddy
>


From owner-ips@ece.cmu.edu  Tue Mar 26 15:28:18 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22235
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 15:28:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QJkMk21872
	for ips-outgoing; Tue, 26 Mar 2002 14:46:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls3.std.com [199.172.62.105])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QJhsw21648
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 14:43:54 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id OAA29136;
	Tue, 26 Mar 2002 14:43:47 -0500
Message-Id: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 26 Mar 2002 19:42:03 -0500
To: "Ofer Biran" <BIRAN@il.ibm.com>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
Cc: Black_David@emc.com, ips@ece.cmu.edu
In-Reply-To: <OFF8E7702E.B835DE65-ONC2256B88.006395D3@telaviv.ibm.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Yes.

The words "another organization" mean "an organization other
than the owner of the SPEKE patent". The draft is intended
to clearly explain that the methods are subject to a patent currently
owned by Phoenix.  Please let me know if you find any of the
language there to be unclear.

-- David

At 08:16 PM 3/26/02 +0200, Ofer Biran wrote:
>Can you clarify the statement
>
>"...and that have been commercially deployed without licensing another
>organization's patents."
>
>Aren't you talking here about the patented SPEKE methods ?
>
>
> Thanks,
>    Ofer
>
>
>Ofer Biran
>Storage and Systems Technology
>IBM Research Lab in Haifa
>biran@il.ibm.com  972-4-8296253



From owner-ips@ece.cmu.edu  Tue Mar 26 15:34:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22561
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 15:34:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QKMHU24854
	for ips-outgoing; Tue, 26 Mar 2002 15:22:17 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QKMEw24849
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 15:22:14 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id VAA101040;
	Tue, 26 Mar 2002 21:22:07 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2QKM7N26706;
	Tue, 26 Mar 2002 21:22:07 +0100
Importance: Normal
Subject: Re: iSCSI: SRP status
To: David Jablon <dpj@theworld.com>
Cc: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFEA17A09C.71682F35-ONC2256B88.006EDC65@telaviv.ibm.com>
From: "Ofer Biran" <BIRAN@il.ibm.com>
Date: Tue, 26 Mar 2002 22:22:00 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 26/03/2002 22:22:06
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Thanks for the clarification. The draft was clear... that's
why I was wondering, interpreting wrongly "another organization"
as "an organization other then the deploying organization".

  Regards,
    Ofer


Ofer Biran
Storage and Systems Technology
IBM Research Lab in Haifa
biran@il.ibm.com  972-4-8296253


David Jablon <dpj@theworld.com>@ece.cmu.edu on 27/03/2002 02:42:03

Please respond to David Jablon <dpj@theworld.com>

Sent by:    owner-ips@ece.cmu.edu


To:    Ofer Biran/Haifa/IBM@IBMIL
cc:    Black_David@emc.com, ips@ece.cmu.edu
Subject:    Re: iSCSI: SRP status



Yes.

The words "another organization" mean "an organization other
than the owner of the SPEKE patent". The draft is intended
to clearly explain that the methods are subject to a patent currently
owned by Phoenix.  Please let me know if you find any of the
language there to be unclear.

-- David

At 08:16 PM 3/26/02 +0200, Ofer Biran wrote:
>Can you clarify the statement
>
>"...and that have been commercially deployed without licensing another
>organization's patents."
>
>Aren't you talking here about the patented SPEKE methods ?
>
>
> Thanks,
>    Ofer
>
>
>Ofer Biran
>Storage and Systems Technology
>IBM Research Lab in Haifa
>biran@il.ibm.com  972-4-8296253






From owner-ips@ece.cmu.edu  Tue Mar 26 16:06:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23840
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 16:06:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QKeZ326447
	for ips-outgoing; Tue, 26 Mar 2002 15:40:35 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QKeUw26430
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 15:40:30 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4Z497>; Tue, 26 Mar 2002 15:40:30 -0500
Message-ID: <25369470B6F0D41194820002B328BDD210B8F9@ATLOPS>
From: Sukha Ghosh <sukha_ghosh@ivivity.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        Eddy Quicksall
	 <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: padding on intermediate sequences
Date: Tue, 26 Mar 2002 15:40:29 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Just to clarify,

What Eddy (please correct me if I am wrong) is asking is that if a Data-in
response is multiple sequences of Data-In PDUs then the ending Data in PDUs
(F = 1)of intermediate sequences must also follow the 4-byte alignment rule
with pure data payload no padding. This means that only the last data-in PDU
can have padding, if necessary.   

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Tuesday, March 26, 2002 2:48 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there
are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that is
> objectionable, could we forbid padding on all but the last PDU of a
transfer
> if DataInOrder=yes.
>
> Eddy
>


From owner-ips@ece.cmu.edu  Tue Mar 26 16:07:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23869
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 16:07:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QKVl725646
	for ips-outgoing; Tue, 26 Mar 2002 15:31:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QKVjw25641
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 15:31:45 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2QKUo213672;
	Tue, 26 Mar 2002 15:30:50 -0500
Message-ID: <3CA0DAAD.CB5F1D2A@splentec.com>
Date: Tue, 26 Mar 2002 15:31:41 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: Luben Tuikov <luben@splentec.com>, iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>, Julian Satran <Julian_Satran@il.ibm.com>,
        "Mallikarjun C." <cbm@rose.hp.com>
Subject: iSCSI: Login stage transition; T bit
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hello there,

Q1. It appears to be the case that 
   o  CSG =/= NSG iff T=1, and 
   o  CSG < NSG, from the table on pg. 64, v11.

Thus, T=1 iff CSG < NSG, so the T bit can be retired,
by imposing that there be no garbage in NSG (that is
NSG >= CSG for all login PDU's).

Q2. After a request/response with T=1 and NSG > CSG
(appropriately), what is the RFC verb for
the initiator. That is, MUST the initiator switch
to the next stage, or SHOULD or MAY?

Q3. Same as Q2 but NSG=3?

Thanks,
-- 
Luben


From owner-ips@ece.cmu.edu  Tue Mar 26 16:09:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23979
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 16:09:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QKw4N27964
	for ips-outgoing; Tue, 26 Mar 2002 15:58:04 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QKw2w27957
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 15:58:02 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLJLCD>; Tue, 26 Mar 2002 14:57:57 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631EF@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>,
        "Julian Satran (E-mail)"
	 <Julian_Satran@il.ibm.com>
Subject: iSCSI: Task management 
Date: Tue, 26 Mar 2002 14:57:56 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I'm not sure if this is a documentation idiosyncrasy or not.  The iSCSI
Task-Management request has both an "Initiator Task Tag" and "Referenced
Task Tag".  The description of which is used where seems to overlap.  ABORT
TASK says it uses the "Referenced Task Tag" field and 9.5.3 says "Initiator
Task Tag" is used for ABORT TASK.  Also, which field holds the task tag for
TASK-REASSIGN?  9.5.1 Says "Initiator Task Tag" or should I assume
"Referenced Task Tag"?

  9.5.1  Function

                 1    ABORT TASK - aborts the task identified by the
Referenced       
                      Task Tag field.


                 8    TASK REASSIGN - reassigns connection allegiance for
the 
                      task identified by the Initiator Task Tag field to
this con-
                      nection, thus resuming the iSCSI exchanges for the
task.

   9.5.3  Referenced Task Tag 

           The Initiator Task Tag of the task to be aborted for the ABORT
TASK  
           function or reassigned for the TASK REASSIGN function.
           For all the other functions this field is reserved. 


From owner-ips@ece.cmu.edu  Tue Mar 26 16:16:35 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA24357
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 16:16:35 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QL3KF28398
	for ips-outgoing; Tue, 26 Mar 2002 16:03:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from hotmail.com (f63.pav2.hotmail.com [64.4.37.63])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QL3Hw28392
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:03:17 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Tue, 26 Mar 2002 13:03:12 -0800
Received: from 131.107.3.85 by pv2fd.pav2.hotmail.msn.com with HTTP;
	Tue, 26 Mar 2002 21:03:11 GMT
X-Originating-IP: [131.107.3.85]
From: "Bernard Aboba" <bernard_aboba@hotmail.com>
To: ips@ece.cmu.edu
Subject: iSCSI authentication requirements
Date: Tue, 26 Mar 2002 13:03:11 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com>
X-OriginalArrivalTime: 26 Mar 2002 21:03:12.0023 (UTC) FILETIME=[A3A86A70:01C1D509]
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

In order to move forward on selecting an alternative mandatory iSCSI login 
authentication method, it is important to understand what the requirements 
are. I would like to suggest that the following requirements are essential:

a. Mutual authentication
b. Pre-shared key support with sufficient key size (e.g. 128 bits)
c. Resistance to man-in-the-middle attack

On the other hand, I would argue that the following requirements are *not* 
important:

d. Resistance to hijacking
e. Dictionary attack resistance
f. Support for certificate authentication

Goals

Mutual authentication is important so that not only can the iSCSI Target 
authenticate the Initiator, but also the Initiator can authenticate the 
Target. The ability to detect a rogue Target is important, especially since 
iSCSI can be used for booting and rogue Targets could fools Initiators into 
making use of bogus data. The ability of the Target to authenticate the 
Initiator is important so that the Target can control access.

Pre-shared key support is important since this is likely to be the most 
common use of iSCSI login authentication. The pre-shared key should be 
unique to the two parties, and not suceptible to man-in-the-middle attack, 
as opposed to the Group Pre-Shared key that is so widely implemented within 
IPsec VPN clients, and that enables man-in-the-middle vulnerabilties. 
Sufficient entropy is required to avoid brute-force attacks.

Non-goals

iSCSI login authentication can be used with or without IPsec. When IPsec is 
not used, the iSCSI connection can be hijacked, but this is not something 
that login authentication can protect against.

One of the reasons that SRP was chosen was its resistant to dictionary 
attack when weak secrets are used. However, it is not clear that this is 
useful functionality for iSCSI login authentication.

Mounting iSCSI volumes is inherently a machine activity, since access to 
that volume, when mounted, is determined by the operating system and its 
access controls rather than security services within the wire protocol.

As a result, the credentials used for iSCSI login may be machine 
credentials, which can be assumed to be pre-shared keys with significant 
entropy, rather than a user password.

The once scenario in which a user password might be relevant is mounting an 
iSCSI volume via a storage service provider. However, this is exactly the 
scenario in which IPsec protection of iSCSI would be most likely. Therefore, 
I would claim that dictionary attack resistance is not important here 
either.

If certificate authentication is possible and desired, this can be provided 
within IKE Main Mode. As a result, certificate-based authentication is not 
required within iSCSI login.




_________________________________________________________________
MSN Photos is the easiest way to share and print your photos: 
http://photos.msn.com/support/worldwide.aspx



From owner-ips@ece.cmu.edu  Tue Mar 26 17:28:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28042
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 17:28:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QLgJX01654
	for ips-outgoing; Tue, 26 Mar 2002 16:42:19 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2QLgGw01648
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:42:16 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2QLgA027228
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 16:42:10 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2QLgAK27219;
	Tue, 26 Mar 2002 16:42:10 -0500
Received: from pkoning.dev.equallogic.com.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with SMTP id g2QLg9S25391;
	Tue, 26 Mar 2002 16:42:09 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15520.60209.506912.627220@pkoning.dev.equallogic.com>
Date: Tue, 26 Mar 2002 16:42:09 -0500
From: Paul Koning <ni1d@arrl.net>
To: Julian_Satran@il.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI - started countdown to 12
References: <OFD6F41552.D91DD299-ONC2256B88.00572225@telaviv.ibm.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

I couldn't find it at http://haifa.il.ibm.com/satran/ips, but using
http://www.haifa.il.ibm.com/satran/ips produces success.

Page 60 says that ranges are indicated by "double point" -- that
should presumably be tilde.

       paul



From owner-ips@ece.cmu.edu  Tue Mar 26 18:17:12 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29529
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 18:17:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QMQow04852
	for ips-outgoing; Tue, 26 Mar 2002 17:26:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from lucy.trebia.com ([65.192.191.151])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QMQlw04838
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 17:26:47 -0500 (EST)
Received: from trebiaachadda (pool-64-223-147-75.man.east.verizon.net [64.223.147.75]) by lucy.trebia.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id F4LCHJJH; Tue, 26 Mar 2002 17:26:26 -0500
Message-ID: <008601c1d515$1be33870$9a7fa8c0@trebiaachadda>
From: "Anshul Chadda" <anshul.chadda@trebia.com>
To: "Sukha Ghosh" <sukha_ghosh@ivivity.com>,
        "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu \(E-mail\)" <ips@ece.cmu.edu>
References: <25369470B6F0D41194820002B328BDD210B8F9@ATLOPS>
Subject: Re: iSCSI: padding on intermediate sequences
Date: Tue, 26 Mar 2002 17:25:17 -0500
Organization: Trebia Networks
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2919.6700
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

suppose there is a requirement that a Data-In PDU with F-bit set (denoting
just end of sequence and not last data-in pdu for the command) have real
data (no pad bytes) in its last 4 byte word.

Now the target has to keep track of data over sequences. if a target doesn't
have enough real data to fill the last data-in pdu (in a sequence) to
integer number of 4 byte words, then it has to wait (don't know for how
long) for data that might belong to next sequence. this will increase the
work for target, won't it? and it will break the concept of sequences too as
we want the sequences to be independent of each other and not wait for each
other.

hope i got the question correct!!

Anshul

----- Original Message -----
From: "Sukha Ghosh" <sukha_ghosh@ivivity.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>; "Eddy Quicksall"
<Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Tuesday, March 26, 2002 3:40 PM
Subject: RE: iSCSI: padding on intermediate sequences


> Just to clarify,
>
> What Eddy (please correct me if I am wrong) is asking is that if a Data-in
> response is multiple sequences of Data-In PDUs then the ending Data in
PDUs
> (F = 1)of intermediate sequences must also follow the 4-byte alignment
rule
> with pure data payload no padding. This means that only the last data-in
PDU
> can have padding, if necessary.
>
> -----Original Message-----
> From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
> Sent: Tuesday, March 26, 2002 2:48 PM
> To: Eddy Quicksall
> Cc: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: padding on intermediate sequences
>
>
> Eddy:
>
> I may not be understanding you correctly, but the
> words in section 9.7.7 I believe mean that these data
> segments should contain an integer number of 4 byte words
> of data, not arbitrary "pad" bytes.  If the data segment
> length is a multiple of 4 then there will be NO pad bytes.
>
> There seems to be confusion over your use of "pad"
> and the standard's use of "pad".  Would you please clarify?
>
> Thanks,
> Bob
>
>
> On Tue, 26 Mar 2002, Eddy Quicksall wrote:
>
> > Section 9.7.7 says:
> >
> > The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> > integer number of 4 byte words (real payload) unless the F bit is set
> > to 1.
> >
> > This allows one to pad intermediate sequences of a transfer. But, there
> are
> > reasons why padding on intermediate sequences within a transfer can make
> > life difficult.
> >
> > Can we forbid padding on all but the last PDU for the transfer? If that
is
> > objectionable, could we forbid padding on all but the last PDU of a
> transfer
> > if DataInOrder=yes.
> >
> > Eddy
> >



From owner-ips@ece.cmu.edu  Tue Mar 26 19:05:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00619
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 19:05:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QNIwG08611
	for ips-outgoing; Tue, 26 Mar 2002 18:18:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QNIuw08602
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 18:18:56 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLJNKZ>; Tue, 26 Mar 2002 17:18:50 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631F0@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Target -> Initiator SNACK?
Date: Tue, 26 Mar 2002 17:18:49 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

I'm having difficulty figuring out how a target handles CmdSN gaps it
detects (due to lost PDU, digest errors, etc.)  The draft reads like it is
not a Target issue and it's up to the initiator to recover from this.  How
are both the target and initiator are supposed to handle this situation?
Since the target cannot advance beyond it's expected next CmdSN (2.2.2.1),
how does the initiator detect the gap?  Through a timeout?  A target
initiated Nop-In?  

Thanks!

6.1.1  Usage of Retry

           By resending the same iSCSI command PDU ("retry") in the absence
of a 
           command acknowledgement or response, an initiator attempts to
"plug" 
           (what it thinks are) the discontinuities in CmdSN ordering on the
tar-
           get end.  Discarded command PDUs, due to digest errors, may have
cre-
           ated these discontinuities.
            
           Retry MUST NOT be used for reasons other than plugging command 
           sequence gaps.  In particular, all PDU retransmission (for data,
or 
           status) requests for a currently allegiant command in progress
must be 
           conveyed to the target using only the SNACK mechanism already 
           described.  This, however, does not constitute a requirement on
initi-
           ators to use SNACK.


From owner-ips@ece.cmu.edu  Tue Mar 26 19:05:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00634
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 19:05:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QNWTt09709
	for ips-outgoing; Tue, 26 Mar 2002 18:32:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QNWRw09697
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 18:32:27 -0500 (EST)
Received: from colosus2.cup.hp.com (colosus2.cup.hp.com [15.13.128.145])
	by palrel12.hp.com (Postfix) with ESMTP id B5F4FE004B7
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 15:32:21 -0800 (PST)
Received: from hp.com (IDENT:plabat@pl703521.cup.hp.com [15.13.133.216])
	by colosus2.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id PAA14542;
	Tue, 26 Mar 2002 15:32:21 -0800 (PST)
Message-ID: <3CA10556.9F1C0632@hp.com>
Date: Tue, 26 Mar 2002 15:33:43 -0800
From: Pierre Labat <pierre_labat@hp.com>
Organization: Hewlett Packard iSCSI-SISL
X-Mailer: Mozilla 4.51 [en] (X11; I; Linux 2.2.5-15 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: ips@ece.cmu.edu
Subject: iSCSI - IPSEC target and transport mode
Content-Type: multipart/alternative;
 boundary="------------9A44B409A733EEC983810100"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


--------------9A44B409A733EEC983810100
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hello,

Based on what has been decided in Minneapolis could you confirm
that the following 4 points till hold true for iSCSI.

(1)
RFC2401 Chapter 4.1 page 10 "a host must support both tunnel mode
and transport mode".

(2)
A target that "consumes" the IP destination address (inner in the case
of a tunnel)  MUST support the transport mode because of (1)
In this case the target is defined as a "host" in IPSEC terminology.
"consume" means rip off the IP header, don't forward the IP datagram.

(3)
As a consequence of (1) and (2):
An initiator (an IPSEC host) that talks with a target that "consumes"
its IP address (inner if tunnel) is guaranteed that it can use
the transport mode.
Because the target has to support it based on (2).

(4)
When tunnel mode to a target is used where destination address (inner)
is the same as the outer address,
that means the target is not an IPSEC gateway but
an IPSEC host, and transport mode could be used instead of transport
mode for this SA.


Regards,

Pierre




--------------9A44B409A733EEC983810100
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<tt>Hello,</tt><tt></tt>
<p><tt>Based on what has been decided in Minneapolis could you confirm</tt>
<br><tt>that the following 4 points till hold true for iSCSI.</tt><tt></tt>
<p><tt>(1)</tt>
<br><tt>RFC2401 Chapter 4.1 page 10 "a host must support both tunnel mode</tt>
<br><tt>and transport mode".</tt><tt></tt>
<p><tt>(2)</tt>
<br><tt>A target that "consumes" the IP destination address (inner in the
case</tt>
<br><tt>of a tunnel)&nbsp; MUST support the transport mode because of (1)</tt>
<br><tt>In this case the target is defined as a "host" in IPSEC terminology.</tt>
<br><tt>"consume" means rip off the IP header, don't forward the IP datagram.</tt><tt></tt>
<p><tt>(3)</tt>
<br><tt>As a consequence of (1) and (2):</tt>
<br><tt>An initiator (an IPSEC host) that talks with a target that "consumes"</tt>
<br><tt>its IP address (inner if tunnel) is guaranteed that it can use</tt>
<br><tt>the transport mode.</tt>
<br><tt>Because the target has to support it based on (2).</tt><tt></tt>
<p><tt>(4)</tt>
<br><tt>When tunnel mode to a target is used where destination address
(inner)</tt>
<br><tt>is the same as the outer address,</tt>
<br><tt>that means the target is not an IPSEC gateway but</tt>
<br><tt>an IPSEC host, and transport mode could be used instead of transport</tt>
<br><tt>mode for this SA.</tt>
<br><tt></tt>&nbsp;<tt></tt>
<p><tt>Regards,</tt><tt></tt>
<p><tt>Pierre</tt>
<br><tt></tt>&nbsp;
<br><tt></tt>&nbsp;
<br>&nbsp;</html>

--------------9A44B409A733EEC983810100--



From owner-ips@ece.cmu.edu  Tue Mar 26 19:05:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00649
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 19:05:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2QNJCp08631
	for ips-outgoing; Tue, 26 Mar 2002 18:19:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2QNJAw08626
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 18:19:10 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLJNK8>; Tue, 26 Mar 2002 17:19:04 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631F1@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: MaxRecvPDULength simplification
Date: Tue, 26 Mar 2002 17:19:03 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D51C.9E9107F0"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D51C.9E9107F0
Content-Type: text/plain;
	charset="iso-8859-1"

I've looked over some of the reflector messages regarding MaxRecvPDULength
negotiation (back to Oct 2001).  I can't find the discussion of why this
value must be available for negotiation outside of login.  It really
complicates SNACK and Task Reassignment if the initiator can change this
value on-the-fly.  Would it be too restrictive to propose the following
rules?
 
1) MaxRecvPDULength is negotiated only at login before FFP.
 
2) For message-level recovery, a connection must be prepared to accept the
MaxRecvPDULength of the connection it's providing fail over capability for.
It doesn't seem unreasonable to expect fault tolerant configurations to
comply with this.  It would simply be stating that RecoveryLevel 2 devices
should be somewhat matched in this capability.
 
 
 
 -----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 26, 2002 1:50 AM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: SNACK RunLength




Michael, 

The paragraph says that if you issue a SNACK after the MaxPDURecvLength has
decreased you should use RunLength 0 (meaning all) instead of a specific
runlength which might not be accurate anymore. 

Julo 



	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


25-03-02 19:43 
Please respond to Michael Schoberg 


        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: SNACK RunLength 

       


Am I just not reading this or can this paragraph use some help?  Can someone
give an interpretation? 

  9.16.3  RunLength
                                 ...

          The first data SNACK, issued after initiator's MaxRecvPDULength 
          decreased, for a command issued on the same connection before the

          change in MaxRecvPDULength, MUST use RunLength "0" to request 
          retransmission of any number of PDUs (including one).  The number
of 
          retransmitted PDUs in this case, may or may not be the same as
the 
          original transmission, depending on whether loss was before or
after 
          the MaxRecvPDULength was changed at the target.


Does this refer to something like:

For connections with unacknowledged PDUs that undergo MaxRecvPDULength
negotiation ...






------_=_NextPart_001_01C1D51C.9E9107F0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.50.4611.1300" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=065161722-26032002>I've 
looked over some of the reflector messages regarding MaxRecvPDULength 
negotiation (back to Oct 2001).&nbsp; I can't find the discussion of why this 
value must be available for negotiation outside of login.&nbsp; It really 
complicates SNACK and Task Reassignment if the initiator can change this 
value&nbsp;on-the-fly.&nbsp; Would it be too restrictive to propose the 
following rules?</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=065161722-26032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=065161722-26032002>1) 
MaxRecvPDULength is negotiated only&nbsp;at login before 
FFP.</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=065161722-26032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=065161722-26032002>2) For 
message-level&nbsp;recovery, a connection must be prepared to accept the 
MaxRecvPDULength of the connection it's providing fail over capability 
for.&nbsp; It doesn't seem unreasonable to expect fault tolerant configurations 
to comply with this.&nbsp; It would simply be stating that RecoveryLevel 
2&nbsp;devices should be somewhat matched in this 
capability.</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=065161722-26032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=065161722-26032002></SPAN></FONT>&nbsp;</DIV>
<DIV><SPAN class=065161722-26032002></SPAN><FONT face=Tahoma><FONT size=2><SPAN 
class=065161722-26032002><FONT face=Arial 
color=#0000ff>&nbsp;</FONT></SPAN></FONT></FONT></DIV>
<DIV><FONT face=Tahoma><FONT size=2><SPAN 
class=065161722-26032002>&nbsp;</SPAN>-----Original Message-----<BR><B>From:</B> 
Julian Satran [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Tuesday, March 
26, 2002 1:50 AM<BR><B>To:</B> Michael Schoberg<BR><B>Cc:</B> IPS Reflector 
(E-mail); owner-ips@ece.cmu.edu<BR><B>Subject:</B> Re: iSCSI: SNACK 
RunLength<BR><BR></DIV></FONT></FONT>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid"><BR><FONT 
  face=sans-serif size=2>Michael,</FONT> <BR><BR><FONT face=sans-serif 
  size=2>The paragraph says that if you issue a SNACK after the MaxPDURecvLength 
  has decreased you should use RunLength 0 (meaning all) instead of a specific 
  runlength which might not be accurate anymore.</FONT> <BR><BR><FONT 
  face=sans-serif size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Michael Schoberg 
        &lt;michael_schoberg@cnt.com&gt;</B></FONT> <BR><FONT face=sans-serif 
        size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
        <P><FONT face=sans-serif size=1>25-03-02 19:43</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Michael Schoberg</FONT> 
<BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;"IPS Reflector (E-mail)" &lt;ips@ece.cmu.edu&gt;</FONT> 
        <BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; 
        &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
        &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: SNACK 
        RunLength</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; 
        &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" size=2>Am I 
  just not reading this or can this paragraph use some help? &nbsp;Can 
  someone<BR>give an interpretation? <BR><BR>&nbsp; 9.16.3 
  &nbsp;RunLength<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;...<BR><BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The first data SNACK, 
  issued after initiator's MaxRecvPDULength <BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; decreased, for a command issued on the same connection before 
  the<BR><BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; change in MaxRecvPDULength, MUST 
  use RunLength "0" to request <BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  retransmission of any number of PDUs (including one). &nbsp;The number<BR>of 
  <BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; retransmitted PDUs in this case, may or 
  may not be the same as<BR>the <BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; original 
  transmission, depending on whether loss was before or<BR>after <BR>&nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; the MaxRecvPDULength was changed at the 
  target.<BR><BR><BR>Does this refer to something like:<BR><BR>For connections 
  with unacknowledged PDUs that undergo MaxRecvPDULength<BR>negotiation 
  ...<BR><BR></FONT><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D51C.9E9107F0--


From owner-ips@ece.cmu.edu  Tue Mar 26 20:14:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02076
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 20:14:34 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R0WD913985
	for ips-outgoing; Tue, 26 Mar 2002 19:32:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R0WCw13980
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 19:32:12 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <HWPB5N4Z>; Tue, 26 Mar 2002 19:31:41 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937656@CORPMX14>
From: Black_David@emc.com
To: pierre_labat@hp.com, ips@ece.cmu.edu
Subject: IPSEC target and transport mode
Date: Tue, 26 Mar 2002 19:31:37 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Pierre,

> Based on what has been decided in Minneapolis could you confirm
> that the following 4 points still hold true for iSCSI.

Actually, no, and thanks for asking, as you reminded me that
I promised to take this topic to the list.  I've changed the
Subject on this message slightly because this discussion applies
to all of the IP Storage protocols, not just iSCSI.

The sense of the room in Minneapolis (and it was a bit rough,
with visible dissent) was to drop the requirement for IPsec
transport mode.  Tunnel mode would become "MUST implement",
transport mode would become "MAY implement", and this would
override the "host must support both tunnel mode and transport
mode" requirement of RFC 2401.  Any procedural questions or
objections about whether/how/why the IPS WG is allowed/entitled
to override IPsec RFC requirements should be sent directly to
me off the list - we are allowed to do this solely for the use
of IPsec technology with the IPS protocols and have been doing
so for the past year.

Much of the responsibility for this flip-flop is mine (if you thought
this WG co-chair was infallible, you were bound to be disappointed
sooner or later ;-) ) - the transport mode requirement that is to be
dropped was inserted at the Huntington Beach meeting last month, and
I admit to leaning on the WG to put this in on the basis that I
believed it would be necessary to get approval of the Security Area
in the IESG.  Since that time, a new Security Area Director has been
appointed, Steve Bellovin.  Steve and I had lunch on Monday of IETF
week, and his advice on this issue was to drop the transport requirement
as a "MUST implement" for tunnel mode is sufficient for interoperability.

While I believe the current situation does represent rough consensus
of the WG, there was a visible minority in the meeting who dissented
from this decision, and essentially no time to discuss it.  Hence,
this is an opportunity for those who would like to see the transport
mode requirement from Huntington Beach retained to explain why on the
list and see if they can convince the WG.  The only available options
are (1) to drop all requirements for transport mode (i.e., "MAY implement")
and (2) to retain the transport mode requirement in the form that it
was added in Huntington Beach (i.e., transport mode is required when
RFC 2401 says it is).  I am certain that WG rough consensus cannot be
obtained for requiring transport mode in all cases (i.e., without the
"when RFC 2401 says it is" qualifier from Huntington Beach).

While I encourage everyone to participate, I also intend to drive
this issue to closure in the next week or so.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Tue Mar 26 20:15:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02130
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 20:15:30 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R0SpG13743
	for ips-outgoing; Tue, 26 Mar 2002 19:28:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R0Snw13739
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 19:28:49 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4ZVDP>; Tue, 26 Mar 2002 19:28:48 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5967@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Anshul Chadda <anshul.chadda@trebia.com>,
        Sukha Ghosh
	 <sukha_ghosh@ivivity.com>,
        "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: padding on intermediate sequences
Date: Tue, 26 Mar 2002 19:28:46 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Maybe I didn't say something right. Here is what I meant:
 
I-T Read CDB of 1024 bytes
T-I Data-In with 513 bytes and F bit set. So, pad is 3 bytes. I don't like
pad here.
T-I Data-In with 511 bytes and F bit set. So, pad is 1 byte. This is the
only place I would like to see pad.
 
Since the F bit ends a sequence and since a transfer can have several
sequences, the spec allows each sequence to have pad. It is a problem for
the HW guys to deal with pad except at the end of the whole transfer.
 
Eddy

-----Original Message-----
From: Anshul Chadda [mailto:anshul.chadda@trebia.com]
Sent: Tuesday, March 26, 2002 5:25 PM
To: Sukha Ghosh; 'Robert D. Russell'; Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


suppose there is a requirement that a Data-In PDU with F-bit set (denoting
just end of sequence and not last data-in pdu for the command) have real
data (no pad bytes) in its last 4 byte word.

Now the target has to keep track of data over sequences. if a target doesn't
have enough real data to fill the last data-in pdu (in a sequence) to
integer number of 4 byte words, then it has to wait (don't know for how
long) for data that might belong to next sequence. this will increase the
work for target, won't it? and it will break the concept of sequences too as
we want the sequences to be independent of each other and not wait for each
other.

hope i got the question correct!!

Anshul

----- Original Message -----
From: "Sukha Ghosh" <sukha_ghosh@ivivity.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>; "Eddy Quicksall"
<Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Tuesday, March 26, 2002 3:40 PM
Subject: RE: iSCSI: padding on intermediate sequences


> Just to clarify,
>
> What Eddy (please correct me if I am wrong) is asking is that if a Data-in
> response is multiple sequences of Data-In PDUs then the ending Data in
PDUs
> (F = 1)of intermediate sequences must also follow the 4-byte alignment
rule
> with pure data payload no padding. This means that only the last data-in
PDU
> can have padding, if necessary.
>
> -----Original Message-----
> From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
> Sent: Tuesday, March 26, 2002 2:48 PM
> To: Eddy Quicksall
> Cc: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: padding on intermediate sequences
>
>
> Eddy:
>
> I may not be understanding you correctly, but the
> words in section 9.7.7 I believe mean that these data
> segments should contain an integer number of 4 byte words
> of data, not arbitrary "pad" bytes.  If the data segment
> length is a multiple of 4 then there will be NO pad bytes.
>
> There seems to be confusion over your use of "pad"
> and the standard's use of "pad".  Would you please clarify?
>
> Thanks,
> Bob
>
>
> On Tue, 26 Mar 2002, Eddy Quicksall wrote:
>
> > Section 9.7.7 says:
> >
> > The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> > integer number of 4 byte words (real payload) unless the F bit is set
> > to 1.
> >
> > This allows one to pad intermediate sequences of a transfer. But, there
> are
> > reasons why padding on intermediate sequences within a transfer can make
> > life difficult.
> >
> > Can we forbid padding on all but the last PDU for the transfer? If that
is
> > objectionable, could we forbid padding on all but the last PDU of a
> transfer
> > if DataInOrder=yes.
> >
> > Eddy
> >


From owner-ips@ece.cmu.edu  Tue Mar 26 20:16:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02188
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 20:16:13 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R0fla14572
	for ips-outgoing; Tue, 26 Mar 2002 19:41:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R0fkw14568
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 19:41:46 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4ZVDV>; Tue, 26 Mar 2002 19:41:45 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F596B@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: padding on intermediate sequences
Date: Tue, 26 Mar 2002 19:41:44 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

It is the sequences I am speaking of, not the segments. The current wording
of the spec would allow you to send sequences with padding in each sequence
(the segments within the sequence are ok because they can't have padding).
But if a transfer is made up of several sequences then it is more work for
the hardware if intermediate sequences were allowed to have arbitrary pad
bytes.

And there is no good reason (that I am aware of) that intermediate sequences
could not just be pure data.

Now, if there is a reason, then we should come up with a scheme that allows
one party to "just say no". One possibility is that if DataInOrder=yes, then
padding would not be allowed except in the sequence that represents the last
portion of the transfer. 

If that is objectionable, then we should have a new key
(PaddingOnlyInLastSequenceOfTotalTransfer=yes). :-)

Eddy

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Tuesday, March 26, 2002 2:48 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there
are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that is
> objectionable, could we forbid padding on all but the last PDU of a
transfer
> if DataInOrder=yes.
>
> Eddy
>


From owner-ips@ece.cmu.edu  Tue Mar 26 21:47:37 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04900
	for <ips-archive@odin.ietf.org>; Tue, 26 Mar 2002 21:47:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R1xxl19598
	for ips-outgoing; Tue, 26 Mar 2002 20:59:59 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R1xuw19582
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 20:59:56 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP id 8E31BC00B43
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 17:45:06 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id RAA02641
	for <ips@ece.cmu.edu>; Tue, 26 Mar 2002 17:44:55 -0800 (PST)
Message-ID: <3CA1252E.2F66C29D@cup.hp.com>
Date: Tue, 26 Mar 2002 17:49:34 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
References: <78AF3C342AEAEF4BA33B35A8A15668C6019E2203@cceexc17.americas.cpqcorp.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"Elliott, Robert" wrote:
> 
> Don't assume that every new SCSI protocol will support CRN -
> SRP does not, for one. 

Rob,

From a reading of SAM-2, it appears that the "Send SCSI Command" and
"SCSI Command Received" APIs (Section 5.4.2) define the CRN as one of
the arguments, which seems to imply that scsi transports should be
capable of transporting this argument, if the application client decides
to use it. (at least the newer scsi transports.)

Are you saying that this is not the case ? What is the basis for SRP not
supporting CRN ? 
What are the guidelines that determine whether a scsi transport should
support CRN or not ? 

If the CRN is not required to be supported by all scsi transports, is
there a reason that iscsi needs to support this ?

Regards,
Santosh



> Logical units on protocols that
> do not will not support the Control mode page bit (leaving
> it 0).
> 
> Are you going to write a proposal for CAP to add a bit to
> the Control mode page?
> 
> This two-level approach still leaves a hole for current
> FCP-2 applications/targets, which don't yet know about the
> Control mode page bit:
> 
> LU Control bit on, Control bit on => CRN in use
> LU Control bit on, Control bit off => no CRN
>   existing targets don't implement the Control mode page bit;
>   existing applications assume the LU Control page suffices
>   to enable CRN.
> 
> LU Control bit off, Control bit off => no CRN
> LU Control bit off, Control bit on => illegal
> 
> While iSCSI applications/targets will have a simpler matrix:
> Control bit on => CRN
> Control bit off => no CRN
> 
> ---
> Rob Elliott, Compaq Server Storage
> Robert.Elliott@compaq.com
> 
> > -----Original Message-----
> > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > Sent: Monday, March 25, 2002 8:21 PM
> > To: IPS Reflector
> > Subject: [Fwd: iSCSI: items discussed at WG meeting]
> >
> >
> > Rob,
> >
> > FCP-2's EPDC bit really ought to be considered a SCSI LLP peer to peer
> > mechanism to check and enable CRN support in FCP_CMD, since
> > FCP did not
> > support CRN in the FCP_CMD IU.
> >
> > There should be a seperate SCSI ULP peer to peer mechanism which
> > involves the application client testing and enabling CRN
> > support in the
> > device servers being accessed.
> >
> > Only legacy scsi transports should require the former, due to early
> > versions of such legacy scsi transports not having supported CRN.
> >
> > Future SCSI transports (iscsi, srp, etc) ought to only need the later
> > SCSI ULP peer to peer mechanism to test and enable CRN in the
> > peer SCSI
> > ULPs.
> >
> > It would be a better preservation of layering to require a change in
> > CAP which provides an enable_crn bit in the control mode page, than to
> > further propagate the violation of layering that FCP-2 seems to have
> > created with its EPDC bit testing both the SCSI LLP and ULP
> > capabilities.
> >
> > Regards,
> > Santosh
> >
> >
> >
> >
> > "Elliott, Robert" wrote:
> > >
> > > > -----Original Message-----
> > > > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > > > Sent: Wednesday, March 20, 2002 6:20 PM
> > > > Subject: Re: iSCSI: items discussed at WG meeting
> > > >
> > > > Dave Peterson wrote:
> > > > > 8. CRN Processing and behavior: spec currently references
> > > > > SAM-2 for CRN.
> > > > >
> > > > > Per SAM-2:
> > > > > Command Reference Number (CRN):
> > > > > When this argument is used, all sequential commands of an
> > > > > I_T_L nexus shall include a CRN argument that is incremented
> > > > > by one. The initial, wrap, and reset CRN values shall be one.
> > > > > The CRN value zero shall be reserved for use
> > > > > as defined by the SCSI protocol. It is not an error for the
> > > > > application client to provide this argument when CRN is not
> > > > > supported by the SCSI protocol or logical unit.
> > > > >
> > > > > More text specifying the behavior of CRN in the iSCSI realm
> > > > > is needed. In addition, a method to determine if CRN is being
> > > > > used (or not) is missing.
> > > >
> > > > We went through this discussion several months ago in another ips
> > > > thread. CRN really belongs to the SCSI ULP and any mechanism
> > > > to check if the device server supports CRN should be in a SCSI ULP
> > > > mode page (like the Control Mode Page).
> > >
> > > I agree this bit fits better there, but to date there is no such
> > > bit in the Control mode page and no proposals on the T10 CAP
> > > agenda to add one.
> > >
> > > In the only protocol supporting this feature (FCP-2), the bit is
> > > in the Protocol-Specific Logical Unit Control mode page.  If a
> > > bit is added to the Control mode page for iSCSI and future
> > > protocols, it makes FCP-2 targets non-compliant. I'm not sure
> > > that there are any implementations of CRN yet that would care.
> > >
> > > > As far as iscsi is concerned, both the iscsi initiator and target
> > > > implementations MUST support CRN, since it is defined in iscsi
> > > > command pdu.
> > > >
> > > > Why is such a method required at the SCSI LLP layer ?
> > >
> > > iSCSI defers too much to SAM-2:
> > > "9.3.2 CRN
> > >  SCSI command reference number - if present in the SCSI
> > >  execute command arguments (according to [SAM2])."
> > >
> > > To depend on the CRN in its Execute Command() remote
> > > procedure call, an application needs to know:
> > > a) the initiator port supports sending CRN;
> > > b) if there are any protocol bridges/gateways in the service
> > > delivery subsystem, all the protocols between the initiator
> > > port and target port support CRN;
> > > c) the target port supports CRN; and
> > > d) the logical unit supports and honors CRN.
> > >
> > > Presumably the initiator's API will reject the RPC
> > > if a) is not honored.
> > >
> > > Applications currently detect and set c) and d) with
> > > the Protocol-Specific Logical Unit Control mode page.
> > > Moving to the Control mode page would be a change
> > > but is certainly possible.  iSCSI needs to provide
> > > this information/control somehow.
> > >
> > > For b), bridges need to be able to report that CRN is not
> > > available over iSCSI because they're bridging to a protocol
> > > that doesn't support it.
> > >
> > > A text key would work pretty well, but this capability
> > > is logical unit based, not target-based.  This leaves
> > > intercepting mode page accesses and modifying the mode
> > > page data.
> > >
> > > ---
> > > Rob Elliott, Compaq Server Storage
> > > Robert.Elliott@compaq.com
> >
> > --
> > ##################################
> > Santosh Rao
> > Software Design Engineer,
> > HP-UX iSCSI Driver Team,
> > Hewlett Packard, Cupertino.
> > email : santoshr@cup.hp.com
> > Phone : 408-447-3751
> > ##################################
> >

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Wed Mar 27 00:57:07 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA08892
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 00:57:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R58di01891
	for ips-outgoing; Wed, 27 Mar 2002 00:08:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dcmtechdom.dcmtech.co.in ([203.190.136.130])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R58Pw01880
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 00:08:36 -0500 (EST)
Received: by DCMTECHDOM with Internet Mail Service (5.5.2653.19)
	id <HWQ0PRXJ>; Wed, 27 Mar 2002 10:42:56 +0530
Message-ID: <FAC3A691B116D6119AA6000629A85D1A18E060@DCMTECHDOM>
From: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
To: "Ips (E-mail)" <ips@ece.cmu.edu>
Subject: Identifying Initiator
Date: Wed, 27 Mar 2002 10:42:55 +0530
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

The identification of Initiator should not be only InitiatorName + ISID,
Initiator Address should also 
be used for identifying the Initiator....

- Nitin


From owner-ips@ece.cmu.edu  Wed Mar 27 02:14:10 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18017
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:14:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R6UwG06816
	for ips-outgoing; Wed, 27 Mar 2002 01:30:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R6Uaw06787;
	Wed, 27 Mar 2002 01:30:36 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id HAA127418;
	Wed, 27 Mar 2002 07:30:26 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R6UPG145056;
	Wed, 27 Mar 2002 07:30:25 +0100
To: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Cc: "Ips (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: Identifying Initiator
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFED661AD3.240050FC-ONC2256B89.002319FC@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 08:30:19 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 08:30:25,
	Serialize complete at 27/03/2002 08:30:25
Content-Type: multipart/alternative; boundary="=_alternative 00234678C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00234678C2256B89_=
Content-Type: text/plain; charset="us-ascii"

That is not correct - Address is not an identifying element in iSCSI and 
there can be several of those (IP addresses) per initiator.

Julo




Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Sent by: owner-ips@ece.cmu.edu
27-03-02 07:12
Please respond to Nitin Dhingra

 
        To:     "Ips (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        Identifying Initiator

 

The identification of Initiator should not be only InitiatorName + ISID,
Initiator Address should also 
be used for identifying the Initiator....

- Nitin



--=_alternative 00234678C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">That is not correct - Address is not an identifying element in iSCSI and there can be several of those (IP addresses) per initiator.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Nitin Dhingra &lt;nitin.dhingra@dcmtech.co.in&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 07:12</font>
<br><font size=1 face="sans-serif">Please respond to Nitin Dhingra</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;Ips (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Identifying Initiator</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">The identification of Initiator should not be only InitiatorName + ISID,<br>
Initiator Address should also <br>
be used for identifying the Initiator....<br>
<br>
- Nitin<br>
</font>
<br>
<br>
--=_alternative 00234678C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 02:14:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18038
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:14:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R6Qdj06558
	for ips-outgoing; Wed, 27 Mar 2002 01:26:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R6QDw06516
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 01:26:13 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id BAA91460;
	Wed, 27 Mar 2002 01:22:18 -0500
Received: from d03nm014.boulder.ibm.com (d03nm014.boulder.ibm.com [9.17.194.13])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R6PTC56320;
	Tue, 26 Mar 2002 23:25:30 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: Identifying Initiator
To: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Cc: "Ips (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFFE34AE18.FCDE76DC-ON88256B89.00218968@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Tue, 26 Mar 2002 22:07:46 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/26/2002 11:25:30 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Not for iSCSI.  Initiator address can change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Nitin Dhingra <nitin.dhingra@dcmtech.co.in>@ece.cmu.edu on 03/26/2002
09:12:55 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Ips (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    Identifying Initiator



The identification of Initiator should not be only InitiatorName + ISID,
Initiator Address should also
be used for identifying the Initiator....

- Nitin





From owner-ips@ece.cmu.edu  Wed Mar 27 02:17:17 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18099
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:17:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R6VZQ06864
	for ips-outgoing; Wed, 27 Mar 2002 01:31:35 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dcmtechdom.dcmtech.co.in ([203.190.136.130])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R6VAw06825
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 01:31:31 -0500 (EST)
Received: by DCMTECHDOM with Internet Mail Service (5.5.2653.19)
	id <HWQ0PR02>; Wed, 27 Mar 2002 12:05:40 +0530
Message-ID: <FAC3A691B116D6119AA6000629A85D1A18E061@DCMTECHDOM>
From: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
To: "'John Hufferd'" <hufferd@us.ibm.com>
Cc: "Ips (E-mail)" <ips@ece.cmu.edu>
Subject: RE: Identifying Initiator
Date: Wed, 27 Mar 2002 12:05:29 +0530
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Ok fine, we cannot take Initiator Address..
But then Initiator Name + Isid, can be same for different machine's 
and it wouldn't be possible for the target to identify the initiator 
then... Would it??



-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Wednesday, March 27, 2002 11:38 AM
To: Nitin Dhingra
Cc: Ips (E-mail)
Subject: Re: Identifying Initiator



Not for iSCSI.  Initiator address can change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Nitin Dhingra <nitin.dhingra@dcmtech.co.in>@ece.cmu.edu on 03/26/2002
09:12:55 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Ips (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    Identifying Initiator



The identification of Initiator should not be only InitiatorName + ISID,
Initiator Address should also
be used for identifying the Initiator....

- Nitin




From owner-ips@ece.cmu.edu  Wed Mar 27 02:59:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18560
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:59:44 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7G5e09300
	for ips-outgoing; Wed, 27 Mar 2002 02:16:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7G3w09296
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 02:16:03 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id IAA103562;
	Wed, 27 Mar 2002 08:15:57 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7FuG133698;
	Wed, 27 Mar 2002 08:15:56 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
MIME-Version: 1.0
Subject: Re: iSCSI: Task management
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF05408335.F1E0DC84-ONC2256B89.002755A9@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:15:49 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:15:56,
	Serialize complete at 27/03/2002 09:15:56
Content-Type: multipart/alternative; boundary="=_alternative 00276BCCC2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00276BCCC2256B89_=
Content-Type: text/plain; charset="us-ascii"

The RTT is used for the task on which the operation is performed and the 
ITT is of the task management function itself!

Julo




Michael Schoberg <michael_schoberg@cnt.com>
26-03-02 22:57
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, Julian Satran/Haifa/IBM@IBMIL
        cc: 
        Subject:        iSCSI: Task management

 

I'm not sure if this is a documentation idiosyncrasy or not.  The iSCSI
Task-Management request has both an "Initiator Task Tag" and "Referenced
Task Tag".  The description of which is used where seems to overlap. ABORT
TASK says it uses the "Referenced Task Tag" field and 9.5.3 says 
"Initiator
Task Tag" is used for ABORT TASK.  Also, which field holds the task tag 
for
TASK-REASSIGN?  9.5.1 Says "Initiator Task Tag" or should I assume
"Referenced Task Tag"?

  9.5.1  Function

                 1    ABORT TASK - aborts the task identified by the
Referenced 
                      Task Tag field.


                 8    TASK REASSIGN - reassigns connection allegiance for
the 
                      task identified by the Initiator Task Tag field to
this con-
                      nection, thus resuming the iSCSI exchanges for the
task.

   9.5.3  Referenced Task Tag 

           The Initiator Task Tag of the task to be aborted for the ABORT
TASK 
           function or reassigned for the TASK REASSIGN function.
           For all the other functions this field is reserved. 



--=_alternative 00276BCCC2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">The RTT is used for the task on which the operation is performed and the ITT is of the task management function itself!</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<p><font size=1 face="sans-serif">26-03-02 22:57</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;, Julian Satran/Haifa/IBM@IBMIL</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Task management</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">I'm not sure if this is a documentation idiosyncrasy or not. &nbsp;The iSCSI<br>
Task-Management request has both an &quot;Initiator Task Tag&quot; and &quot;Referenced<br>
Task Tag&quot;. &nbsp;The description of which is used where seems to overlap. &nbsp;ABORT<br>
TASK says it uses the &quot;Referenced Task Tag&quot; field and 9.5.3 says &quot;Initiator<br>
Task Tag&quot; is used for ABORT TASK. &nbsp;Also, which field holds the task tag for<br>
TASK-REASSIGN? &nbsp;9.5.1 Says &quot;Initiator Task Tag&quot; or should I assume<br>
&quot;Referenced Task Tag&quot;?<br>
<br>
 &nbsp;9.5.1 &nbsp;Function<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1 &nbsp; &nbsp;ABORT TASK - aborts the task identified by the<br>
Referenced &nbsp; &nbsp; &nbsp; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Task Tag field.<br>
<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 8 &nbsp; &nbsp;TASK REASSIGN - reassigns connection allegiance for<br>
the <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;task identified by the Initiator Task Tag field to<br>
this con-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;nection, thus resuming the iSCSI exchanges for the<br>
task.<br>
<br>
 &nbsp; 9.5.3 &nbsp;Referenced Task Tag <br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; The Initiator Task Tag of the task to be aborted for the ABORT<br>
TASK &nbsp;<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; function or reassigned for the TASK REASSIGN function.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; For all the other functions this field is reserved. <br>
</font>
<br>
<br>
--=_alternative 00276BCCC2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 02:59:57 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18588
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:59:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7Rk610004
	for ips-outgoing; Wed, 27 Mar 2002 02:27:46 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7Rhw09999;
	Wed, 27 Mar 2002 02:27:43 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA23720;
	Wed, 27 Mar 2002 08:27:23 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7RLG37012;
	Wed, 27 Mar 2002 08:27:21 +0100
To: "Anshul Chadda" <anshul.chadda@trebia.com>
Cc: "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>,
        "ips@ece. cmu. edu \(E-mail\)" <ips@ece.cmu.edu>,
        owner-ips@ece.cmu.edu, "'Robert D. Russell'" <rdr@io.iol.unh.edu>,
        "Sukha Ghosh" <sukha_ghosh@ivivity.com>
MIME-Version: 1.0
Subject: Re: iSCSI: padding on intermediate sequences
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFB3F8EDEE.57B54DA3-ONC2256B89.002827F5@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:27:15 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:27:21,
	Serialize complete at 27/03/2002 09:27:21
Content-Type: multipart/alternative; boundary="=_alternative 0028374AC2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0028374AC2256B89_=
Content-Type: text/plain; charset="us-ascii"

The last one is allowed to be padded - Julo




"Anshul Chadda" <anshul.chadda@trebia.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 00:25
Please respond to "Anshul Chadda"

 
        To:     "Sukha Ghosh" <sukha_ghosh@ivivity.com>, "'Robert D. Russell'" 
<rdr@io.iol.unh.edu>, "Eddy Quicksall" <Eddy_Quicksall@ivivity.com>
        cc:     "ips@ece. cmu. edu \(E-mail\)" <ips@ece.cmu.edu>
        Subject:        Re: iSCSI: padding on intermediate sequences

 

suppose there is a requirement that a Data-In PDU with F-bit set (denoting
just end of sequence and not last data-in pdu for the command) have real
data (no pad bytes) in its last 4 byte word.

Now the target has to keep track of data over sequences. if a target 
doesn't
have enough real data to fill the last data-in pdu (in a sequence) to
integer number of 4 byte words, then it has to wait (don't know for how
long) for data that might belong to next sequence. this will increase the
work for target, won't it? and it will break the concept of sequences too 
as
we want the sequences to be independent of each other and not wait for 
each
other.

hope i got the question correct!!

Anshul

----- Original Message -----
From: "Sukha Ghosh" <sukha_ghosh@ivivity.com>
To: "'Robert D. Russell'" <rdr@io.iol.unh.edu>; "Eddy Quicksall"
<Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Sent: Tuesday, March 26, 2002 3:40 PM
Subject: RE: iSCSI: padding on intermediate sequences


> Just to clarify,
>
> What Eddy (please correct me if I am wrong) is asking is that if a 
Data-in
> response is multiple sequences of Data-In PDUs then the ending Data in
PDUs
> (F = 1)of intermediate sequences must also follow the 4-byte alignment
rule
> with pure data payload no padding. This means that only the last data-in
PDU
> can have padding, if necessary.
>
> -----Original Message-----
> From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
> Sent: Tuesday, March 26, 2002 2:48 PM
> To: Eddy Quicksall
> Cc: ips@ece. cmu. edu (E-mail)
> Subject: Re: iSCSI: padding on intermediate sequences
>
>
> Eddy:
>
> I may not be understanding you correctly, but the
> words in section 9.7.7 I believe mean that these data
> segments should contain an integer number of 4 byte words
> of data, not arbitrary "pad" bytes.  If the data segment
> length is a multiple of 4 then there will be NO pad bytes.
>
> There seems to be confusion over your use of "pad"
> and the standard's use of "pad".  Would you please clarify?
>
> Thanks,
> Bob
>
>
> On Tue, 26 Mar 2002, Eddy Quicksall wrote:
>
> > Section 9.7.7 says:
> >
> > The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> > integer number of 4 byte words (real payload) unless the F bit is set
> > to 1.
> >
> > This allows one to pad intermediate sequences of a transfer. But, 
there
> are
> > reasons why padding on intermediate sequences within a transfer can 
make
> > life difficult.
> >
> > Can we forbid padding on all but the last PDU for the transfer? If 
that
is
> > objectionable, could we forbid padding on all but the last PDU of a
> transfer
> > if DataInOrder=yes.
> >
> > Eddy
> >




--=_alternative 0028374AC2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">The last one is allowed to be padded - Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Anshul Chadda&quot; &lt;anshul.chadda@trebia.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 00:25</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Anshul Chadda&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;Sukha Ghosh&quot; &lt;sukha_ghosh@ivivity.com&gt;, &quot;'Robert D. Russell'&quot; &lt;rdr@io.iol.unh.edu&gt;, &quot;Eddy Quicksall&quot; &lt;Eddy_Quicksall@ivivity.com&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;&quot;ips@ece. cmu. edu \(E-mail\)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: padding on intermediate sequences</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">suppose there is a requirement that a Data-In PDU with F-bit set (denoting<br>
just end of sequence and not last data-in pdu for the command) have real<br>
data (no pad bytes) in its last 4 byte word.<br>
<br>
Now the target has to keep track of data over sequences. if a target doesn't<br>
have enough real data to fill the last data-in pdu (in a sequence) to<br>
integer number of 4 byte words, then it has to wait (don't know for how<br>
long) for data that might belong to next sequence. this will increase the<br>
work for target, won't it? and it will break the concept of sequences too as<br>
we want the sequences to be independent of each other and not wait for each<br>
other.<br>
<br>
hope i got the question correct!!<br>
<br>
Anshul<br>
<br>
----- Original Message -----<br>
From: &quot;Sukha Ghosh&quot; &lt;sukha_ghosh@ivivity.com&gt;<br>
To: &quot;'Robert D. Russell'&quot; &lt;rdr@io.iol.unh.edu&gt;; &quot;Eddy Quicksall&quot;<br>
&lt;Eddy_Quicksall@ivivity.com&gt;<br>
Cc: &quot;ips@ece. cmu. edu (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;<br>
Sent: Tuesday, March 26, 2002 3:40 PM<br>
Subject: RE: iSCSI: padding on intermediate sequences<br>
<br>
<br>
&gt; Just to clarify,<br>
&gt;<br>
&gt; What Eddy (please correct me if I am wrong) is asking is that if a Data-in<br>
&gt; response is multiple sequences of Data-In PDUs then the ending Data in<br>
PDUs<br>
&gt; (F = 1)of intermediate sequences must also follow the 4-byte alignment<br>
rule<br>
&gt; with pure data payload no padding. This means that only the last data-in<br>
PDU<br>
&gt; can have padding, if necessary.<br>
&gt;<br>
&gt; -----Original Message-----<br>
&gt; From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]<br>
&gt; Sent: Tuesday, March 26, 2002 2:48 PM<br>
&gt; To: Eddy Quicksall<br>
&gt; Cc: ips@ece. cmu. edu (E-mail)<br>
&gt; Subject: Re: iSCSI: padding on intermediate sequences<br>
&gt;<br>
&gt;<br>
&gt; Eddy:<br>
&gt;<br>
&gt; I may not be understanding you correctly, but the<br>
&gt; words in section 9.7.7 I believe mean that these data<br>
&gt; segments should contain an integer number of 4 byte words<br>
&gt; of data, not arbitrary &quot;pad&quot; bytes. &nbsp;If the data segment<br>
&gt; length is a multiple of 4 then there will be NO pad bytes.<br>
&gt;<br>
&gt; There seems to be confusion over your use of &quot;pad&quot;<br>
&gt; and the standard's use of &quot;pad&quot;. &nbsp;Would you please clarify?<br>
&gt;<br>
&gt; Thanks,<br>
&gt; Bob<br>
&gt;<br>
&gt;<br>
&gt; On Tue, 26 Mar 2002, Eddy Quicksall wrote:<br>
&gt;<br>
&gt; &gt; Section 9.7.7 says:<br>
&gt; &gt;<br>
&gt; &gt; The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the<br>
&gt; &gt; integer number of 4 byte words (real payload) unless the F bit is set<br>
&gt; &gt; to 1.<br>
&gt; &gt;<br>
&gt; &gt; This allows one to pad intermediate sequences of a transfer. But, there<br>
&gt; are<br>
&gt; &gt; reasons why padding on intermediate sequences within a transfer can make<br>
&gt; &gt; life difficult.<br>
&gt; &gt;<br>
&gt; &gt; Can we forbid padding on all but the last PDU for the transfer? If that<br>
is<br>
&gt; &gt; objectionable, could we forbid padding on all but the last PDU of a<br>
&gt; transfer<br>
&gt; &gt; if DataInOrder=yes.<br>
&gt; &gt;<br>
&gt; &gt; Eddy</font>
<br><font size=2 face="Courier New">&gt; &gt;<br>
<br>
</font>
<br>
<br>
--=_alternative 0028374AC2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:00:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA18613
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 03:00:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7GAp09309
	for ips-outgoing; Wed, 27 Mar 2002 02:16:10 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7G7w09303;
	Wed, 27 Mar 2002 02:16:08 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA11542;
	Wed, 27 Mar 2002 08:15:59 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7FtG43638;
	Wed, 27 Mar 2002 08:15:55 +0100
To: "Bernard Aboba" <bernard_aboba@hotmail.com>
Cc: ips@ece.cmu.edu, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI authentication requirements
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF7BAE490F.8E57FA38-ONC2256B89.00278221@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:15:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:15:55,
	Serialize complete at 27/03/2002 09:15:55
Content-Type: multipart/alternative; boundary="=_alternative 0027E372C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 0027E372C2256B89_=
Content-Type: text/plain; charset="us-ascii"

I don't know what "resistance to highjacking" means in this context.

I would say that resistance to dictionary attack is important.
I would also argue for:

"resistance to impersonation" for the target (and initiator?)

Julo




"Bernard Aboba" <bernard_aboba@hotmail.com>
Sent by: owner-ips@ece.cmu.edu
26-03-02 23:03
Please respond to "Bernard Aboba"

 
        To:     ips@ece.cmu.edu
        cc: 
        Subject:        iSCSI authentication requirements

 

In order to move forward on selecting an alternative mandatory iSCSI login 

authentication method, it is important to understand what the requirements 

are. I would like to suggest that the following requirements are 
essential:

a. Mutual authentication
b. Pre-shared key support with sufficient key size (e.g. 128 bits)
c. Resistance to man-in-the-middle attack

On the other hand, I would argue that the following requirements are *not* 

important:

d. Resistance to hijacking
e. Dictionary attack resistance
f. Support for certificate authentication

Goals

Mutual authentication is important so that not only can the iSCSI Target 
authenticate the Initiator, but also the Initiator can authenticate the 
Target. The ability to detect a rogue Target is important, especially 
since 
iSCSI can be used for booting and rogue Targets could fools Initiators 
into 
making use of bogus data. The ability of the Target to authenticate the 
Initiator is important so that the Target can control access.

Pre-shared key support is important since this is likely to be the most 
common use of iSCSI login authentication. The pre-shared key should be 
unique to the two parties, and not suceptible to man-in-the-middle attack, 

as opposed to the Group Pre-Shared key that is so widely implemented 
within 
IPsec VPN clients, and that enables man-in-the-middle vulnerabilties. 
Sufficient entropy is required to avoid brute-force attacks.

Non-goals

iSCSI login authentication can be used with or without IPsec. When IPsec 
is 
not used, the iSCSI connection can be hijacked, but this is not something 
that login authentication can protect against.

One of the reasons that SRP was chosen was its resistant to dictionary 
attack when weak secrets are used. However, it is not clear that this is 
useful functionality for iSCSI login authentication.

Mounting iSCSI volumes is inherently a machine activity, since access to 
that volume, when mounted, is determined by the operating system and its 
access controls rather than security services within the wire protocol.

As a result, the credentials used for iSCSI login may be machine 
credentials, which can be assumed to be pre-shared keys with significant 
entropy, rather than a user password.

The once scenario in which a user password might be relevant is mounting 
an 
iSCSI volume via a storage service provider. However, this is exactly the 
scenario in which IPsec protection of iSCSI would be most likely. 
Therefore, 
I would claim that dictionary attack resistance is not important here 
either.

If certificate authentication is possible and desired, this can be 
provided 
within IKE Main Mode. As a result, certificate-based authentication is not 

required within iSCSI login.




_________________________________________________________________
MSN Photos is the easiest way to share and print your photos: 
http://photos.msn.com/support/worldwide.aspx




--=_alternative 0027E372C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">I don't know what &quot;resistance to highjacking&quot; means in this context.</font>
<br>
<br><font size=2 face="sans-serif">I would say that resistance to dictionary attack is important.</font>
<br><font size=2 face="sans-serif">I would also argue for:</font>
<br>
<br><font size=2 face="sans-serif">&quot;resistance to impersonation&quot; for the target (and initiator?)</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Bernard Aboba&quot; &lt;bernard_aboba@hotmail.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">26-03-02 23:03</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Bernard Aboba&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI authentication requirements</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">In order to move forward on selecting an alternative mandatory iSCSI login <br>
authentication method, it is important to understand what the requirements <br>
are. I would like to suggest that the following requirements are essential:<br>
<br>
a. Mutual authentication<br>
b. Pre-shared key support with sufficient key size (e.g. 128 bits)<br>
c. Resistance to man-in-the-middle attack<br>
<br>
On the other hand, I would argue that the following requirements are *not* <br>
important:<br>
<br>
d. Resistance to hijacking<br>
e. Dictionary attack resistance<br>
f. Support for certificate authentication<br>
<br>
Goals<br>
<br>
Mutual authentication is important so that not only can the iSCSI Target <br>
authenticate the Initiator, but also the Initiator can authenticate the <br>
Target. The ability to detect a rogue Target is important, especially since <br>
iSCSI can be used for booting and rogue Targets could fools Initiators into <br>
making use of bogus data. The ability of the Target to authenticate the <br>
Initiator is important so that the Target can control access.<br>
<br>
Pre-shared key support is important since this is likely to be the most <br>
common use of iSCSI login authentication. The pre-shared key should be <br>
unique to the two parties, and not suceptible to man-in-the-middle attack, <br>
as opposed to the Group Pre-Shared key that is so widely implemented within <br>
IPsec VPN clients, and that enables man-in-the-middle vulnerabilties. <br>
Sufficient entropy is required to avoid brute-force attacks.<br>
<br>
Non-goals<br>
<br>
iSCSI login authentication can be used with or without IPsec. When IPsec is <br>
not used, the iSCSI connection can be hijacked, but this is not something <br>
that login authentication can protect against.<br>
<br>
One of the reasons that SRP was chosen was its resistant to dictionary <br>
attack when weak secrets are used. However, it is not clear that this is <br>
useful functionality for iSCSI login authentication.<br>
<br>
Mounting iSCSI volumes is inherently a machine activity, since access to <br>
that volume, when mounted, is determined by the operating system and its <br>
access controls rather than security services within the wire protocol.<br>
<br>
As a result, the credentials used for iSCSI login may be machine <br>
credentials, which can be assumed to be pre-shared keys with significant <br>
entropy, rather than a user password.<br>
<br>
The once scenario in which a user password might be relevant is mounting an <br>
iSCSI volume via a storage service provider. However, this is exactly the <br>
scenario in which IPsec protection of iSCSI would be most likely. Therefore, <br>
I would claim that dictionary attack resistance is not important here <br>
either.<br>
<br>
If certificate authentication is possible and desired, this can be provided <br>
within IKE Main Mode. As a result, certificate-based authentication is not <br>
required within iSCSI login.<br>
<br>
<br>
<br>
<br>
_________________________________________________________________<br>
MSN Photos is the easiest way to share and print your photos: <br>
http://photos.msn.com/support/worldwide.aspx<br>
<br>
</font>
<br>
<br>
--=_alternative 0027E372C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:00:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA18666
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 03:00:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7J7F09503
	for ips-outgoing; Wed, 27 Mar 2002 02:19:07 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7J5w09498
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 02:19:05 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id IAA04946;
	Wed, 27 Mar 2002 08:15:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7FsG133696;
	Wed, 27 Mar 2002 08:15:55 +0100
To: Luben Tuikov <luben@splentec.com>, iSCSI <ips@ece.cmu.edu>
Cc: "Mallikarjun C." <cbm@rose.hp.com>, iSCSI <ips@ece.cmu.edu>,
        luben@ns.splentec.com
MIME-Version: 1.0
Subject: Re: iSCSI: Login stage transition; T bit
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFC2C2C555.DDAC0704-ONC2256B89.0026ADB2@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:15:49 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:15:55,
	Serialize complete at 27/03/2002 09:15:55
Content-Type: multipart/alternative; boundary="=_alternative 00272C90C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00272C90C2256B89_=
Content-Type: text/plain; charset="us-ascii"

Comments in text.

Basically we had a a login with very little redundance earlier and it wa 
deemed cryptic and error prne.
Currently every step is clearly stated and although some infor is 
redundant it clearly states the intentions of the issuying party.
I suggest we stop improving on this.

Julo




Luben Tuikov <luben@splentec.com>
Sent by: luben@ns.splentec.com
26-03-02 22:31
Please respond to Luben Tuikov; Please respond to iSCSI

 
        To:     iSCSI <ips@ece.cmu.edu>, Julian Satran/Haifa/IBM@IBMIL, "Mallikarjun C." 
<cbm@rose.hp.com>
        cc: 
        Subject:        iSCSI: Login stage transition; T bit

 

Hello there,

Q1. It appears to be the case that 
   o  CSG =/= NSG iff T=1, and 
   o  CSG < NSG, from the table on pg. 64, v11.

Thus, T=1 iff CSG < NSG, so the T bit can be retired,
by imposing that there be no garbage in NSG (that is
NSG >= CSG for all login PDU's).


+++ yes it is redundant but intentionally so NSG hast to be 0 if T is not 
1 +++
Q2. After a request/response with T=1 and NSG > CSG
(appropriately), what is the RFC verb for
the initiator. That is, MUST the initiator switch
to the next stage, or SHOULD or MAY?
+++ it must switch as the initiator is the one that requested it.
Q3. Same as Q2 but NSG=3?
+++ same answer +++
Thanks,
-- 
Luben



--=_alternative 00272C90C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Comments in text.</font>
<br>
<br><font size=2 face="sans-serif">Basically we had a a login with very little redundance earlier and it wa deemed cryptic and error prne.</font>
<br><font size=2 face="sans-serif">Currently every step is clearly stated and although some infor is redundant it clearly states the intentions of the issuying party.</font>
<br><font size=2 face="sans-serif">I suggest we stop improving on this.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Luben Tuikov &lt;luben@splentec.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: luben@ns.splentec.com</font>
<p><font size=1 face="sans-serif">26-03-02 22:31</font>
<br><font size=1 face="sans-serif">Please respond to Luben Tuikov; Please respond to iSCSI</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI &lt;ips@ece.cmu.edu&gt;, Julian Satran/Haifa/IBM@IBMIL, &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Login stage transition; T bit</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Hello there,<br>
<br>
Q1. It appears to be the case that <br>
 &nbsp; o &nbsp;CSG =/= NSG iff T=1, and <br>
 &nbsp; o &nbsp;CSG &lt; NSG, from the table on pg. 64, v11.<br>
<br>
Thus, T=1 iff CSG &lt; NSG, so the T bit can be retired,<br>
by imposing that there be no garbage in NSG (that is<br>
NSG &gt;= CSG for all login PDU's).<br>
</font>
<br>
<br><font size=2 face="Courier New">+++ yes it is redundant but intentionally so NSG hast to be 0 if T is not 1 +++<br>
Q2. After a request/response with T=1 and NSG &gt; CSG<br>
(appropriately), what is the RFC verb for<br>
the initiator. That is, MUST the initiator switch<br>
to the next stage, or SHOULD or MAY?<br>
+++ it must switch as the initiator is the one that requested it.<br>
Q3. Same as Q2 but NSG=3?<br>
+++ same answer +++<br>
Thanks,<br>
-- <br>
Luben<br>
</font>
<br>
<br>
--=_alternative 00272C90C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:01:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA18693
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 03:01:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7RUm09976
	for ips-outgoing; Wed, 27 Mar 2002 02:27:30 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate.de.ibm.com (d12lmsgate.de.ibm.com [195.212.91.199])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7RSw09971;
	Wed, 27 Mar 2002 02:27:28 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate.de.ibm.com (1.0.0) with ESMTP id IAA63494;
	Wed, 27 Mar 2002 08:27:22 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7RKG166352;
	Wed, 27 Mar 2002 08:27:21 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Target -> Initiator SNACK?
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF9D51871B.CCF0B6AC-ONC2256B89.0028690A@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:27:15 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:27:21,
	Serialize complete at 27/03/2002 09:27:21
Content-Type: multipart/alternative; boundary="=_alternative 002896D2C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002896D2C2256B89_=
Content-Type: text/plain; charset="us-ascii"

Initiator finds out by timeout and follows-up with a retry. Chapter 6 has 
it all and details are in the appendix.

Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 01:18
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: Target -> Initiator SNACK?

 

I'm having difficulty figuring out how a target handles CmdSN gaps it
detects (due to lost PDU, digest errors, etc.)  The draft reads like it is
not a Target issue and it's up to the initiator to recover from this.  How
are both the target and initiator are supposed to handle this situation?
Since the target cannot advance beyond it's expected next CmdSN (2.2.2.1),
how does the initiator detect the gap?  Through a timeout?  A target
initiated Nop-In? 

Thanks!

6.1.1  Usage of Retry

           By resending the same iSCSI command PDU ("retry") in the 
absence
of a 
           command acknowledgement or response, an initiator attempts to
"plug" 
           (what it thinks are) the discontinuities in CmdSN ordering on 
the
tar-
           get end.  Discarded command PDUs, due to digest errors, may 
have
cre-
           ated these discontinuities.
 
           Retry MUST NOT be used for reasons other than plugging command 
           sequence gaps.  In particular, all PDU retransmission (for 
data,
or 
           status) requests for a currently allegiant command in progress
must be 
           conveyed to the target using only the SNACK mechanism already 
           described.  This, however, does not constitute a requirement on
initi-
           ators to use SNACK.



--=_alternative 002896D2C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Initiator finds out by timeout and follows-up with a retry. Chapter 6 has it all and details are in the appendix.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 01:18</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Target -&gt; Initiator SNACK?</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">I'm having difficulty figuring out how a target handles CmdSN gaps it<br>
detects (due to lost PDU, digest errors, etc.) &nbsp;The draft reads like it is<br>
not a Target issue and it's up to the initiator to recover from this. &nbsp;How<br>
are both the target and initiator are supposed to handle this situation?<br>
Since the target cannot advance beyond it's expected next CmdSN (2.2.2.1),<br>
how does the initiator detect the gap? &nbsp;Through a timeout? &nbsp;A target<br>
initiated Nop-In? &nbsp;<br>
<br>
Thanks!<br>
<br>
6.1.1 &nbsp;Usage of Retry<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; By resending the same iSCSI command PDU (&quot;retry&quot;) in the absence<br>
of a <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; command acknowledgement or response, an initiator attempts to<br>
&quot;plug&quot; <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; (what it thinks are) the discontinuities in CmdSN ordering on the<br>
tar-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; get end. &nbsp;Discarded command PDUs, due to digest errors, may have<br>
cre-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ated these discontinuities.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Retry MUST NOT be used for reasons other than plugging command <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; sequence gaps. &nbsp;In particular, all PDU retransmission (for data,<br>
or <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; status) requests for a currently allegiant command in progress<br>
must be <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; conveyed to the target using only the SNACK mechanism already <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; described. &nbsp;This, however, does not constitute a requirement on<br>
initi-<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ators to use SNACK.<br>
</font>
<br>
<br>
--=_alternative 002896D2C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:02:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA18717
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 03:02:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R7e5p10635
	for ips-outgoing; Wed, 27 Mar 2002 02:40:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R7e2w10628;
	Wed, 27 Mar 2002 02:40:02 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id IAA13246;
	Wed, 27 Mar 2002 08:39:56 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R7dqG55490;
	Wed, 27 Mar 2002 08:39:53 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: MaxRecvPDULength simplification
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF4707E66A.08262E4A-ONC2256B89.0028B700@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 09:39:47 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 09:39:54,
	Serialize complete at 27/03/2002 09:39:54
Content-Type: multipart/alternative; boundary="=_alternative 00291FACC2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00291FACC2256B89_=
Content-Type: text/plain; charset="us-ascii"

The simplification you are talking about is illusory. Currently this 
requires SNACK to require all data(RL = 0).
The restriction you propose instead is far more severe (and unwarranted).

Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 01:19
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: MaxRecvPDULength simplification

 

I've looked over some of the reflector messages regarding MaxRecvPDULength 
negotiation (back to Oct 2001).  I can't find the discussion of why this 
value must be available for negotiation outside of login.  It really 
complicates SNACK and Task Reassignment if the initiator can change this 
value on-the-fly.  Would it be too restrictive to propose the following 
rules?
 
1) MaxRecvPDULength is negotiated only at login before FFP.
 
2) For message-level recovery, a connection must be prepared to accept the 
MaxRecvPDULength of the connection it's providing fail over capability 
for.  It doesn't seem unreasonable to expect fault tolerant configurations 
to comply with this.  It would simply be stating that RecoveryLevel 2 
devices should be somewhat matched in this capability.
 
 
 
 -----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 26, 2002 1:50 AM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: SNACK RunLength


Michael, 

The paragraph says that if you issue a SNACK after the MaxPDURecvLength 
has decreased you should use RunLength 0 (meaning all) instead of a 
specific runlength which might not be accurate anymore. 

Julo 



Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 
25-03-02 19:43 
Please respond to Michael Schoberg 
        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: SNACK RunLength 

 


Am I just not reading this or can this paragraph use some help?  Can 
someone
give an interpretation? 

  9.16.3  RunLength
                                 ...

          The first data SNACK, issued after initiator's MaxRecvPDULength 
          decreased, for a command issued on the same connection before 
the

          change in MaxRecvPDULength, MUST use RunLength "0" to request 
          retransmission of any number of PDUs (including one).  The 
number
of 
          retransmitted PDUs in this case, may or may not be the same as
the 
          original transmission, depending on whether loss was before or
after 
          the MaxRecvPDULength was changed at the target.


Does this refer to something like:

For connections with unacknowledged PDUs that undergo MaxRecvPDULength
negotiation ...





--=_alternative 00291FACC2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">The simplification you are talking about is illusory. Currently this requires SNACK to require all data(RL = 0).</font>
<br><font size=2 face="sans-serif">The restriction you propose instead is far more severe (and unwarranted).</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 01:19</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: MaxRecvPDULength simplification</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 color=blue face="Arial">I've looked over some of the reflector messages regarding MaxRecvPDULength negotiation (back to Oct 2001). &nbsp;I can't find the discussion of why this value must be available for negotiation outside of login. &nbsp;It really complicates SNACK and Task Reassignment if the initiator can change this value on-the-fly. &nbsp;Would it be too restrictive to propose the following rules?</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 color=blue face="Arial">1) MaxRecvPDULength is negotiated only at login before FFP.</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 color=blue face="Arial">2) For message-level recovery, a connection must be prepared to accept the MaxRecvPDULength of the connection it's providing fail over capability for. &nbsp;It doesn't seem unreasonable to expect fault tolerant configurations to comply with this. &nbsp;It would simply be stating that RecoveryLevel 2 devices should be somewhat matched in this capability.</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=3 face="Times New Roman">&nbsp;</font>
<br><font size=2 color=blue face="Arial">&nbsp;</font>
<br><font size=2 face="Tahoma">&nbsp;-----Original Message-----<b><br>
From:</b> Julian Satran [mailto:Julian_Satran@il.ibm.com]<b><br>
Sent:</b> Tuesday, March 26, 2002 1:50 AM<b><br>
To:</b> Michael Schoberg<b><br>
Cc:</b> IPS Reflector (E-mail); owner-ips@ece.cmu.edu<b><br>
Subject:</b> Re: iSCSI: SNACK RunLength<br>
</font>
<br><font size=2 face="sans-serif"><br>
Michael,</font><font size=3 face="Times New Roman"> <br>
</font><font size=2 face="sans-serif"><br>
The paragraph says that if you issue a SNACK after the MaxPDURecvLength has decreased you should use RunLength 0 (meaning all) instead of a specific runlength which might not be accurate anymore.</font><font size=3 face="Times New Roman"> <br>
</font><font size=2 face="sans-serif"><br>
Julo</font><font size=3 face="Times New Roman"> <br>
<br>
</font>
<table width=100%>
<tr valign=top>
<td width=2%>
<td width=48%><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
Sent by: owner-ips@ece.cmu.edu</font><font size=3 face="Times New Roman"> </font>
<p><font size=1 face="sans-serif">25-03-02 19:43</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
Please respond to Michael Schoberg</font><font size=3 face="Times New Roman"> </font>
<td width=49%><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;cc: &nbsp; &nbsp; &nbsp; &nbsp;</font><font size=3 face="Times New Roman"> </font><font size=1 face="sans-serif"><br>
 &nbsp; &nbsp; &nbsp; &nbsp;Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: SNACK RunLength</font><font size=3 face="Times New Roman"> <br>
</font><font size=1 face="Arial"><br>
 &nbsp; &nbsp; &nbsp; </font></table>
<br><font size=3 face="Times New Roman"><br>
</font><font size=2 face="Courier New"><br>
Am I just not reading this or can this paragraph use some help? &nbsp;Can someone<br>
give an interpretation? <br>
<br>
 &nbsp;9.16.3 &nbsp;RunLength<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ...<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The first data SNACK, issued after initiator's MaxRecvPDULength <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;decreased, for a command issued on the same connection before the<br>
<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;change in MaxRecvPDULength, MUST use RunLength &quot;0&quot; to request <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;retransmission of any number of PDUs (including one). &nbsp;The number<br>
of <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;retransmitted PDUs in this case, may or may not be the same as<br>
the <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;original transmission, depending on whether loss was before or<br>
after <br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;the MaxRecvPDULength was changed at the target.<br>
<br>
<br>
Does this refer to something like:<br>
<br>
For connections with unacknowledged PDUs that undergo MaxRecvPDULength<br>
negotiation ...<br>
</font><font size=3 face="Times New Roman"><br>
<br>
</font>
<br>
<br>
--=_alternative 00291FACC2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:13:13 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA18028
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 02:14:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R6r5m08057
	for ips-outgoing; Wed, 27 Mar 2002 01:53:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R6r3w08052
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 01:53:03 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id HAA105648
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 07:52:57 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R6quq29196
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 07:52:56 +0100
To: ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: SRP status
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF7282ECF6.E49337C9-ONC2256B89.0024BBC4@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 08:52:51 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 08:52:56,
	Serialize complete at 27/03/2002 08:52:56
Content-Type: multipart/alternative; boundary="=_alternative 00258B7BC2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00258B7BC2256B89_=
Content-Type: text/plain; charset="us-ascii"

David,

As one of the authors of the discussed draft I would like to thank you for 
your efforts both in clarifying the position of you company and to clearly 
pointing out that it is both unwise to act on rumors and to "invent on the 
spot" an authentication method.  Following the later path we can end 
having an unproven method and there no guarantee that it is not encumbered 
by patents - both of which can happen regardless of the expertise and 
intentions of the participants in the effort.

Regards,
Julo




David Jablon <dpj@theworld.com>
Sent by: owner-ips@ece.cmu.edu
26-03-02 23:37
Please respond to David Jablon

 
        To:     Black_David@emc.com
        cc:     ips@ece.cmu.edu
        Subject:        Re: iSCSI: SRP status

 

David,

Here are a few points to add to this summary of recent
events regarding SRP.

The first is simply that the just-posted policy letter from
Phoenix legal was presented and discussed in Minneapolis.
While I won't attempt to summarize that discussion here,
I have relayed the concerns expressed back to Phoenix.

A second point is a delicate one, related to larger IETF
policy in general. Concern was expressed at the meeting that
the WG appears to be changing the content (if not the
requirements too) of a proposed standard, based on
unconfirmed rumor.

The fact that a patent holder has refused to confirm or deny
such rumors, or provide a license policy statement, is
surely a concern.  But this concern may mask a pernicious
problem.  Such WG behavior allows anyone to start
unresolvable rumors of potential patent coverage in order to
steer a group in arbitrary directions.  Unfortunately, IETF
policy and tradition make open discussion of the legitimacy
of such rumors very difficult.

Concern was expressed at the meeting about security
dangers inherent in designing a new method, such as some
kind of mutually-authenticating variant of CHAP.  Even
beyond the security concerns, it may be impossible for the
group to determine that a newly proposed method is patent-
free.  The standard practices of using evidence of
surviving years of cryptographic review to establish
security, or commercial use to establish unencumbrance,
both may not work for methods still-to-be described.

The draft-jablon-speke-00.txt presented to the WG on this
list and at the meeting specifically describes methods that
provide the benefits of SRP, but are less structurally
related to EKE.  It describes methods that have survived
5 years of public scrutiny, that achieve higher goals than
the just-proposed alternatives, and that have been
commercially deployed without licensing another
organization's patents.

In presenting this information, I am clearly staying within
the guidelines of longstanding written IETF policy, but
clearly coming up against IETF tradition in talking as
openly as possible about such sensitive issues.

I hope that the group will carefully consider these methods,
in addition to any soon-to-be proposed variants of CHAP
or Diffie-Hellman, as they review their security and
functionality objectives.

Furthermore, in light of the repeated attempts to get
another company to clarify or simplify it's license
position, I would hope that any group or individual with
concern about the Phoenix position will make their concerns
known to the company, or to me personally, and I'll do my
best to get an acceptable response.

-- David Jablon


At 05:24 PM 3/25/02 -0500, Black_David@emc.com wrote:
>It's been an "interesting" week on this topic.  This is an
>attempt to (coherently) summarize the current situation in which
>the WG finds itself and what is being done.  This message is a
>mixture of technical and procedural material - technical queries
>and follow-ups should be sent to the list, but I would ask that
>procedural queries and follow-ups be sent directly to me to avoid
>procedural discussions on the list.  I promise to post the
>(inevitable) clarifications.
>
>-- Disclaimer
>
>- I am NOT a lawyer.
>- This message does NOT contain legal advice.
>- If you need legal advice, you need to talk to a lawyer.
>- If actions or decisions based on information in this message
>        have legal consequences, those consequences are YOUR
>        responsibility.
>        - The IETF and yours truly disclaim all responsibility
>
>On the subject of Intellectual Property Rights, the attention of all
>IETF participants is directed to Section 10 of RFC 2026.
>
>-- Patents
>
>While the IETF disclaims responsibility for performing patent
>searches (see Section 10 of RFC 2026), the following patents have
>been identified to the IPS WG as being of concern with respect to SRP:
>
>(1) An SRP patent application filed by Stanford University [The SRP 
patent]
>(2) US 6226383 held by Phoenix [The SPEKE patent)
>(3) US 5241599 and US 5440635, held by Lucent [The EKE patents]
>
>-- Enquiries and Responses
>
>Enquiries have been made of the above patent holders, who have responded
>as follows:
>
>(1) Stanford has a license to their pending SRP patent available on the 
web
>        at http://otl.stanford.edu/pdf/97006.pdf. There is no cost to
>obtain
>        the license.  No payments are due to Stanford under the license 
and
>        the license does not contain any reciprocal grant of rights back 
to
>        Stanford.
>(2) Phoenix has written to the IETF to say that the SPEKE patent may 
apply
>        to SRP and has committed to make licenses available on reasonable
>        and non-discriminatory terms.  The Phoenix letter containing 
these
>        statements will be sent to the list shortly and will also appear 
in
>        the Intellectual Property Rights Notices area of the IETF web 
site
>in
>        the near future.
>(3) After initially promising to do so, Lucent has decided not to make 
any
>        statement about applicability of the EKE patents to SRP.  Lucent 
has
>        orally pledged to license the EKE patents in accordance with 
normal
>        Lucent licensing practices, but these practices do not involve
>        "reasonable and non-discriminatory" terms.
>
>These responses have been summarized in this message for brevity and
>clarity.
>For more details on (1), see the license at the URL above.  For (2), see
>the forthcoming message and/or the IETF web site.  For (3), see the text
>on this topic contained in the message at:
>http://www.pdl.cmu.edu/mailinglists/ips/mail/msg08716.html . 
>
>-- IETF Standards Process
>
>The IETF standards process places some emphasis on commitments to
>reasonable and non-discriminatory licensing terms (see Section 10 of
>RFC 2026).  Commitments to license on openly specified, reasonable and
>non-discriminatory terms are neither strictly necessary nor sufficient
>for the IESG to approve use of technology that is covered by patents,
>but the absence of such commitments makes IESG approval both
>less likely to occur and more difficult to obtain.
>
>In all cases, it is up to the WG to determine the best technical
>solutions to the problems it is solving, and to make the case to the
>IESG that the nature of the problem and available technology justifies
>the use of technology covered by patents.  The IESG will analyze each
>individual case on its own merits.  This position was reaffirmed by
>the IESG during the IESG plenary last Thursday evening.
>
>-- iSCSI 
>
>The IPS WG considered this situation at its meeting last week and
>determined that rough consensus no longer exists for a "MUST implement"
>requirement for SRP in iSCSI.  As things currently stand, that 
requirement
>will be weakened to "MAY" and the WG is obligated to designate some
>other inband authentication protocol as "MUST implement" for
>interoperability.
>
>Based on my discussions with some of the Transport and Security Area
>Directors, an approach based on using CHAP instead of SRP appears to
>be acceptable, but the WG should consider whether to adopt a version
>of CHAP enhanced by adding a Diffie-Hellman key exchange that would make
>the protocol resist passive attacks (e.g., packet sniffer captures CHAP
>traffic, adversary tries the dictionary of passwords off-line).  The
>WG is *not* being instructed to adopt this approach; the request is
>simply to consider it.
>
>In no particular order of priority and/or importance, the following
>activities are underway to deal with the SRP situation:
>- The iSCSI security design team has been asked to take another look
>        at authentication mechanisms.
>- Work is underway with cryptographers to consider how to add a DH
>        exchange and/or mutual authentication to CHAP (the latter because
>        SRP is capable of mutual authentication).
>- A requirements discussion for the above two bullets will take place
>        on this list in the near future.  The reason for delaying this
>        discussion is to gather information on the consequences of
>        requirements decisions, rather than hold a discussion in the
>abstract.
>- Lucent continues to be approached with requests to be more cooperative.
>        Lucent's actions (or lack thereof) are the primary cause of this
>        delay to iSCSI.
>
>iSCSI progress has been delayed by this situation.  We were
>originally hoping to start a WG Last Call on the next (-12) version
>of iSCSI within the next week or so.  That is not possible with this
>technical issue open - a Mock WG Last Call will be conducted on the
>next version of the iSCSI draft with the goal of reaching closure on
>most of its text, but the actual WG Last Call will have to await
>resolution of this issue.  I am hopeful that this resolution can
>be achieved in the next month or two.
>
>Thanks,
>--David (IP Storage WG co-chair)
>
>---------------------------------------------------
>David L. Black, Senior Technologist
>EMC Corporation, 42 South St., Hopkinton, MA  01748
>+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
>black_david@emc.com         Cell: +1 (978) 394-7754
>--------------------------------------------------- 




--=_alternative 00258B7BC2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">David,</font>
<br>
<br><font size=2 face="sans-serif">As one of the authors of the discussed draft I would like to thank you for your efforts both in clarifying the position of you company and to clearly pointing out that it is both unwise to act on rumors and to &quot;invent on the spot&quot; an authentication method. &nbsp;Following the later path we can end having an unproven method and there no guarantee that it is not encumbered by patents - both of which can happen regardless of the expertise and intentions of the participants in the effort.</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>David Jablon &lt;dpj@theworld.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">26-03-02 23:37</font>
<br><font size=1 face="sans-serif">Please respond to David Jablon</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;Black_David@emc.com</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;ips@ece.cmu.edu</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;Re: iSCSI: SRP status</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">David,<br>
<br>
Here are a few points to add to this summary of recent<br>
events regarding SRP.<br>
<br>
The first is simply that the just-posted policy letter from<br>
Phoenix legal was presented and discussed in Minneapolis.<br>
While I won't attempt to summarize that discussion here,<br>
I have relayed the concerns expressed back to Phoenix.<br>
<br>
A second point is a delicate one, related to larger IETF<br>
policy in general. Concern was expressed at the meeting that<br>
the WG appears to be changing the content (if not the<br>
requirements too) of a proposed standard, based on<br>
unconfirmed rumor.<br>
<br>
The fact that a patent holder has refused to confirm or deny<br>
such rumors, or provide a license policy statement, is<br>
surely a concern. &nbsp;But this concern may mask a pernicious<br>
problem. &nbsp;Such WG behavior allows anyone to start<br>
unresolvable rumors of potential patent coverage in order to<br>
steer a group in arbitrary directions. &nbsp;Unfortunately, IETF<br>
policy and tradition make open discussion of the legitimacy<br>
of such rumors very difficult.<br>
<br>
Concern was expressed at the meeting about security<br>
dangers inherent in designing a new method, such as some<br>
kind of mutually-authenticating variant of CHAP. &nbsp;Even<br>
beyond the security concerns, it may be impossible for the<br>
group to determine that a newly proposed method is patent-<br>
free. &nbsp;The standard practices of using evidence of<br>
surviving years of cryptographic review to establish<br>
security, or commercial use to establish unencumbrance,<br>
both may not work for methods still-to-be described.<br>
<br>
The draft-jablon-speke-00.txt presented to the WG on this<br>
list and at the meeting specifically describes methods that<br>
provide the benefits of SRP, but are less structurally<br>
related to EKE. &nbsp;It describes methods that have survived<br>
5 years of public scrutiny, that achieve higher goals than<br>
the just-proposed alternatives, and that have been<br>
commercially deployed without licensing another<br>
organization's patents.<br>
<br>
In presenting this information, I am clearly staying within<br>
the guidelines of longstanding written IETF policy, but<br>
clearly coming up against IETF tradition in talking as<br>
openly as possible about such sensitive issues.<br>
<br>
I hope that the group will carefully consider these methods,<br>
in addition to any soon-to-be proposed variants of CHAP<br>
or Diffie-Hellman, as they review their security and<br>
functionality objectives.<br>
<br>
Furthermore, in light of the repeated attempts to get<br>
another company to clarify or simplify it's license<br>
position, I would hope that any group or individual with<br>
concern about the Phoenix position will make their concerns<br>
known to the company, or to me personally, and I'll do my<br>
best to get an acceptable response.<br>
<br>
-- David Jablon<br>
<br>
<br>
At 05:24 PM 3/25/02 -0500, Black_David@emc.com wrote:<br>
&gt;It's been an &quot;interesting&quot; week on this topic. &nbsp;This is an<br>
&gt;attempt to (coherently) summarize the current situation in which<br>
&gt;the WG finds itself and what is being done. &nbsp;This message is a<br>
&gt;mixture of technical and procedural material - technical queries<br>
&gt;and follow-ups should be sent to the list, but I would ask that<br>
&gt;procedural queries and follow-ups be sent directly to me to avoid<br>
&gt;procedural discussions on the list. &nbsp;I promise to post the<br>
&gt;(inevitable) clarifications.<br>
&gt;<br>
&gt;-- Disclaimer<br>
&gt;<br>
&gt;- I am NOT a lawyer.<br>
&gt;- This message does NOT contain legal advice.<br>
&gt;- If you need legal advice, you need to talk to a lawyer.<br>
&gt;- If actions or decisions based on information in this message</font>
<br><font size=2 face="Courier New">&gt; &nbsp; &nbsp; &nbsp; &nbsp;have legal consequences, those consequences are YOUR<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;responsibility.<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;- The IETF and yours truly disclaim all responsibility<br>
&gt;<br>
&gt;On the subject of Intellectual Property Rights, the attention of all<br>
&gt;IETF participants is directed to Section 10 of RFC 2026.<br>
&gt;<br>
&gt;-- Patents<br>
&gt;<br>
&gt;While the IETF disclaims responsibility for performing patent<br>
&gt;searches (see Section 10 of RFC 2026), the following patents have<br>
&gt;been identified to the IPS WG as being of concern with respect to SRP:<br>
&gt;<br>
&gt;(1) An SRP patent application filed by Stanford University [The SRP patent]<br>
&gt;(2) US 6226383 held by Phoenix [The SPEKE patent)<br>
&gt;(3) US 5241599 and US 5440635, held by Lucent [The EKE patents]<br>
&gt;<br>
&gt;-- Enquiries and Responses<br>
&gt;<br>
&gt;Enquiries have been made of the above patent holders, who have responded<br>
&gt;as follows:<br>
&gt;<br>
&gt;(1) Stanford has a license to their pending SRP patent available on the web<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;at http://otl.stanford.edu/pdf/97006.pdf. There is no cost to<br>
&gt;obtain<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the license. &nbsp;No payments are due to Stanford under the license and<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the license does not contain any reciprocal grant of rights back to<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Stanford.<br>
&gt;(2) Phoenix has written to the IETF to say that the SPEKE patent may apply<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;to SRP and has committed to make licenses available on reasonable<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;and non-discriminatory terms. &nbsp;The Phoenix letter containing these<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;statements will be sent to the list shortly and will also appear in<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the Intellectual Property Rights Notices area of the IETF web site<br>
&gt;in<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;the near future.<br>
&gt;(3) After initially promising to do so, Lucent has decided not to make any<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;statement about applicability of the EKE patents to SRP. &nbsp;Lucent has<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;orally pledged to license the EKE patents in accordance with normal<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Lucent licensing practices, but these practices do not involve<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;&quot;reasonable and non-discriminatory&quot; terms.<br>
&gt;<br>
&gt;These responses have been summarized in this message for brevity and<br>
&gt;clarity.<br>
&gt;For more details on (1), see the license at the URL above. &nbsp;For (2), see<br>
&gt;the forthcoming message and/or the IETF web site. &nbsp;For (3), see the text<br>
&gt;on this topic contained in the message at:<br>
&gt;http://www.pdl.cmu.edu/mailinglists/ips/mail/msg08716.html . <br>
&gt;<br>
&gt;-- IETF Standards Process<br>
&gt;<br>
&gt;The IETF standards process places some emphasis on commitments to<br>
&gt;reasonable and non-discriminatory licensing terms (see Section 10 of<br>
&gt;RFC 2026). &nbsp;Commitments to license on openly specified, reasonable and<br>
&gt;non-discriminatory terms are neither strictly necessary nor sufficient<br>
&gt;for the IESG to approve use of technology that is covered by patents,<br>
&gt;but the absence of such commitments makes IESG approval both<br>
&gt;less likely to occur and more difficult to obtain.<br>
&gt;<br>
&gt;In all cases, it is up to the WG to determine the best technical<br>
&gt;solutions to the problems it is solving, and to make the case to the<br>
&gt;IESG that the nature of the problem and available technology justifies<br>
&gt;the use of technology covered by patents. &nbsp;The IESG will analyze each<br>
&gt;individual case on its own merits. &nbsp;This position was reaffirmed by<br>
&gt;the IESG during the IESG plenary last Thursday evening.<br>
&gt;<br>
&gt;-- iSCSI <br>
&gt;<br>
&gt;The IPS WG considered this situation at its meeting last week and<br>
&gt;determined that rough consensus no longer exists for a &quot;MUST implement&quot;<br>
&gt;requirement for SRP in iSCSI. &nbsp;As things currently stand, that requirement<br>
&gt;will be weakened to &quot;MAY&quot; and the WG is obligated to designate some<br>
&gt;other inband authentication protocol as &quot;MUST implement&quot; for<br>
&gt;interoperability.<br>
&gt;<br>
&gt;Based on my discussions with some of the Transport and Security Area<br>
&gt;Directors, an approach based on using CHAP instead of SRP appears to<br>
&gt;be acceptable, but the WG should consider whether to adopt a version<br>
&gt;of CHAP enhanced by adding a Diffie-Hellman key exchange that would make<br>
&gt;the protocol resist passive attacks (e.g., packet sniffer captures CHAP<br>
&gt;traffic, adversary tries the dictionary of passwords off-line). &nbsp;The<br>
&gt;WG is *not* being instructed to adopt this approach; the request is<br>
&gt;simply to consider it.<br>
&gt;<br>
&gt;In no particular order of priority and/or importance, the following<br>
&gt;activities are underway to deal with the SRP situation:<br>
&gt;- The iSCSI security design team has been asked to take another look<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;at authentication mechanisms.<br>
&gt;- Work is underway with cryptographers to consider how to add a DH<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;exchange and/or mutual authentication to CHAP (the latter because<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;SRP is capable of mutual authentication).<br>
&gt;- A requirements discussion for the above two bullets will take place<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;on this list in the near future. &nbsp;The reason for delaying this<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;discussion is to gather information on the consequences of<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;requirements decisions, rather than hold a discussion in the<br>
&gt;abstract.<br>
&gt;- Lucent continues to be approached with requests to be more cooperative.<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;Lucent's actions (or lack thereof) are the primary cause of this<br>
&gt; &nbsp; &nbsp; &nbsp; &nbsp;delay to iSCSI.<br>
&gt;<br>
&gt;iSCSI progress has been delayed by this situation. &nbsp;We were<br>
&gt;originally hoping to start a WG Last Call on the next (-12) version<br>
&gt;of iSCSI within the next week or so. &nbsp;That is not possible with this<br>
&gt;technical issue open - a Mock WG Last Call will be conducted on the<br>
&gt;next version of the iSCSI draft with the goal of reaching closure on<br>
&gt;most of its text, but the actual WG Last Call will have to await<br>
&gt;resolution of this issue. &nbsp;I am hopeful that this resolution can<br>
&gt;be achieved in the next month or two.<br>
&gt;<br>
&gt;Thanks,<br>
&gt;--David (IP Storage WG co-chair)<br>
&gt;<br>
&gt;---------------------------------------------------<br>
&gt;David L. Black, Senior Technologist<br>
&gt;EMC Corporation, 42 South St., Hopkinton, MA &nbsp;01748<br>
&gt;+1 (508) 249-6449 *NEW* &nbsp; &nbsp; &nbsp;FAX: +1 (508) 497-8500<br>
&gt;black_david@emc.com &nbsp; &nbsp; &nbsp; &nbsp; Cell: +1 (978) 394-7754<br>
&gt;--------------------------------------------------- <br>
<br>
</font>
<br>
<br>
--=_alternative 00258B7BC2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 03:50:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA19674
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 03:50:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R83cc11955
	for ips-outgoing; Wed, 27 Mar 2002 03:03:38 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R83Zw11942;
	Wed, 27 Mar 2002 03:03:35 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id JAA37620;
	Wed, 27 Mar 2002 09:03:28 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R83Rq61584;
	Wed, 27 Mar 2002 09:03:27 +0100
To: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: iSCSI: padding on intermediate sequences
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF426E4E0A.90ECCDEA-ONC2256B89.002A65F8@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 10:03:22 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 10:03:27,
	Serialize complete at 27/03/2002 10:03:27
Content-Type: multipart/alternative; boundary="=_alternative 002B99B8C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002B99B8C2256B89_=
Content-Type: text/plain; charset="us-ascii"

Eddy,

Now that we understand better you issue here are some reasons why we may 
not want to do what you propose:

the target may ask for a number of bytes that is not a multiple of 4 
(should we outlaw this? I don't think we want)
there might be devices that require/generate in "bursts" that are not 
multiples of 4


I think that we avoided abuse by what we have and we should leave further 
optimization to the implementer for specific devices.

Julo




Eddy Quicksall <Eddy_Quicksall@ivivity.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 02:41
Please respond to Eddy Quicksall

 
        To:     "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        RE: iSCSI: padding on intermediate sequences

 

It is the sequences I am speaking of, not the segments. The current 
wording
of the spec would allow you to send sequences with padding in each 
sequence
(the segments within the sequence are ok because they can't have padding).
But if a transfer is made up of several sequences then it is more work for
the hardware if intermediate sequences were allowed to have arbitrary pad
bytes.

And there is no good reason (that I am aware of) that intermediate 
sequences
could not just be pure data.

Now, if there is a reason, then we should come up with a scheme that 
allows
one party to "just say no". One possibility is that if DataInOrder=yes, 
then
padding would not be allowed except in the sequence that represents the 
last
portion of the transfer. 

If that is objectionable, then we should have a new key
(PaddingOnlyInLastSequenceOfTotalTransfer=yes). :-)

Eddy

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Tuesday, March 26, 2002 2:48 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there
are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that 
is
> objectionable, could we forbid padding on all but the last PDU of a
transfer
> if DataInOrder=yes.
>
> Eddy
>



--=_alternative 002B99B8C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Eddy,</font>
<br>
<br><font size=2 face="sans-serif">Now that we understand better you issue here are some reasons why we may not want to do what you propose:</font>
<br>
<ul>
<li><font size=2 face="sans-serif">the target may ask for a number of bytes that is not a multiple of 4 (should we outlaw this? I don't think we want)</font>
<li><font size=2 face="sans-serif">there might be devices that require/generate in &quot;bursts&quot; that are not multiples of 4</font>
<br>
<br>
<br><font size=2 face="sans-serif">I think that we avoided abuse by what we have and we should leave further optimization to the implementer for specific devices.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Eddy Quicksall &lt;Eddy_Quicksall@ivivity.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 02:41</font>
<br><font size=1 face="sans-serif">Please respond to Eddy Quicksall</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;ips@ece. cmu. edu (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: iSCSI: padding on intermediate sequences</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">It is the sequences I am speaking of, not the segments. The current wording<br>
of the spec would allow you to send sequences with padding in each sequence<br>
(the segments within the sequence are ok because they can't have padding).<br>
But if a transfer is made up of several sequences then it is more work for<br>
the hardware if intermediate sequences were allowed to have arbitrary pad<br>
bytes.<br>
<br>
And there is no good reason (that I am aware of) that intermediate sequences<br>
could not just be pure data.<br>
<br>
Now, if there is a reason, then we should come up with a scheme that allows<br>
one party to &quot;just say no&quot;. One possibility is that if DataInOrder=yes, then<br>
padding would not be allowed except in the sequence that represents the last<br>
portion of the transfer. <br>
<br>
If that is objectionable, then we should have a new key<br>
(PaddingOnlyInLastSequenceOfTotalTransfer=yes). :-)<br>
<br>
Eddy<br>
<br>
-----Original Message-----<br>
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]<br>
Sent: Tuesday, March 26, 2002 2:48 PM<br>
To: Eddy Quicksall<br>
Cc: ips@ece. cmu. edu (E-mail)<br>
Subject: Re: iSCSI: padding on intermediate sequences<br>
<br>
<br>
Eddy:<br>
<br>
I may not be understanding you correctly, but the<br>
words in section 9.7.7 I believe mean that these data<br>
segments should contain an integer number of 4 byte words<br>
of data, not arbitrary &quot;pad&quot; bytes. &nbsp;If the data segment<br>
length is a multiple of 4 then there will be NO pad bytes.<br>
<br>
There seems to be confusion over your use of &quot;pad&quot;<br>
and the standard's use of &quot;pad&quot;. &nbsp;Would you please clarify?<br>
<br>
Thanks,<br>
Bob<br>
<br>
<br>
On Tue, 26 Mar 2002, Eddy Quicksall wrote:<br>
<br>
&gt; Section 9.7.7 says:<br>
&gt;<br>
&gt; The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the<br>
&gt; integer number of 4 byte words (real payload) unless the F bit is set<br>
&gt; to 1.<br>
&gt;<br>
&gt; This allows one to pad intermediate sequences of a transfer. But, there<br>
are<br>
&gt; reasons why padding on intermediate sequences within a transfer can make<br>
&gt; life difficult.<br>
&gt;<br>
&gt; Can we forbid padding on all but the last PDU for the transfer? If that is<br>
&gt; objectionable, could we forbid padding on all but the last PDU of a<br>
transfer<br>
&gt; if DataInOrder=yes.<br>
&gt;<br>
&gt; Eddy<br>
&gt;<br>
</font>
<br>
<br></ul>
--=_alternative 002B99B8C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 04:59:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA20812
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 04:59:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2R9H3p15849
	for ips-outgoing; Wed, 27 Mar 2002 04:17:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2R9Gpw15827
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 04:16:51 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id EAA88476;
	Wed, 27 Mar 2002 04:12:56 -0500
Received: from d03nm014.boulder.ibm.com (d03nm014.boulder.ibm.com [9.17.194.13])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2R9G9C188098;
	Wed, 27 Mar 2002 02:16:09 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: RE: Identifying Initiator
To: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Cc: "Ips (E-mail)" <ips@ece.cmu.edu>
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFFBE3A7CD.44FD92F0-ON88256B89.00319A5D@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Wed, 27 Mar 2002 01:02:46 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/27/2002 02:16:09 AM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


You need to read the iSCSI section on naming, and perhaps, the Naming and
discovery document.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Nitin Dhingra <nitin.dhingra@dcmtech.co.in>@ece.cmu.edu on 03/26/2002
10:35:29 PM

Sent by:    owner-ips@ece.cmu.edu


To:    John Hufferd/San Jose/IBM@IBMUS
cc:    "Ips (E-mail)" <ips@ece.cmu.edu>
Subject:    RE: Identifying Initiator



Ok fine, we cannot take Initiator Address..
But then Initiator Name + Isid, can be same for different machine's
and it wouldn't be possible for the target to identify the initiator
then... Would it??



-----Original Message-----
From: John Hufferd [mailto:hufferd@us.ibm.com]
Sent: Wednesday, March 27, 2002 11:38 AM
To: Nitin Dhingra
Cc: Ips (E-mail)
Subject: Re: Identifying Initiator



Not for iSCSI.  Initiator address can change.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Nitin Dhingra <nitin.dhingra@dcmtech.co.in>@ece.cmu.edu on 03/26/2002
09:12:55 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Ips (E-mail)" <ips@ece.cmu.edu>
cc:
Subject:    Identifying Initiator



The identification of Initiator should not be only InitiatorName + ISID,
Initiator Address should also
be used for identifying the Initiator....

- Nitin







From owner-ips@ece.cmu.edu  Wed Mar 27 10:48:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA03290
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 10:48:15 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2REuHo16711
	for ips-outgoing; Wed, 27 Mar 2002 09:56:17 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from ztxmail03.ztx.compaq.com (ztxmail03.ztx.compaq.com [161.114.1.207])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2REuFw16701
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 09:56:15 -0500 (EST)
Received: from cceexg13.americas.cpqcorp.net (cceexg13.americas.cpqcorp.net [16.110.250.119])
	by ztxmail03.ztx.compaq.com (Postfix) with ESMTP id 1658F3C9A
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 08:56:06 -0600 (CST)
Received: from cceexc17.americas.cpqcorp.net ([16.110.250.84]) by cceexg13.americas.cpqcorp.net with Microsoft SMTPSVC(5.0.2195.2966);
	 Wed, 27 Mar 2002 08:56:05 -0600
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: RE: [Fwd: iSCSI: items discussed at WG meeting]
Date: Wed, 27 Mar 2002 08:56:05 -0600
Message-ID: <78AF3C342AEAEF4BA33B35A8A15668C6019E2207@cceexc17.americas.cpqcorp.net>
Thread-Topic: [Fwd: iSCSI: items discussed at WG meeting]
Thread-Index: AcHVM4il1r7Mpl2sTN+I3TJHDGPDbQAatojw
From: "Elliott, Robert" <Robert.Elliott@compaq.com>
To: "IPS Reflector" <ips@ece.cmu.edu>
X-OriginalArrivalTime: 27 Mar 2002 14:56:05.0442 (UTC) FILETIME=[8534A220:01C1D59F]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ece.cmu.edu id g2REuFw16702
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Comments below...

> -----Original Message-----
> From: Santosh Rao [mailto:santoshr@cup.hp.com]
> Sent: Tuesday, March 26, 2002 7:50 PM
> To: IPS Reflector
> Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
> 
> "Elliott, Robert" wrote:
> > 
> > Don't assume that every new SCSI protocol will support CRN -
> > SRP does not, for one. 
> 
> From a reading of SAM-2, it appears that the "Send SCSI Command" and
> "SCSI Command Received" APIs (Section 5.4.2) define the CRN as one of
> the arguments, which seems to imply that scsi transports should be
> capable of transporting this argument, if the application 
> client decides to use it. (at least the newer scsi transports.)
> 
> Are you saying that this is not the case ? 

Yes.

> What is the basis for SRP not supporting CRN ? 

The description of CRN in SAM-2 mentions that protocols might not
support it - "It is not an error for the application client to 
provide this argument when CRN is not supported by the SCSI protocol 
or logical unit."

The same holds for autosense (although we did add language recently 
requiring all protocols except Parallel SCSI support autosense).

> What are the guidelines that determine whether a scsi transport should
> support CRN or not ? 

If the transport provides out of order delivery and you want to be able
to send queued commands to tapes, CRN may be helpful.

> If the CRN is not required to be supported by all scsi transports, is
> there a reason that iscsi needs to support this ?

Since iSCSI has added sequence numbers everywhere, CRN is not much of 
an extra burden.



From owner-ips@ece.cmu.edu  Wed Mar 27 12:09:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA08821
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:09:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RGOi824207
	for ips-outgoing; Wed, 27 Mar 2002 11:24:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RGOfw24196;
	Wed, 27 Mar 2002 11:24:41 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id RAA52282;
	Wed, 27 Mar 2002 17:24:34 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2RGOYq108928;
	Wed, 27 Mar 2002 17:24:34 +0100
To: "Elliott, Robert" <Robert.Elliott@compaq.com>
Cc: "IPS Reflector" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: RE: [Fwd: iSCSI: items discussed at WG meeting]
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFEF45F3EE.D40C03BE-ONC2256B89.0059728B@telaviv.ibm.com>
Date: Wed, 27 Mar 2002 18:24:29 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 27/03/2002 18:24:34,
	Serialize complete at 27/03/2002 18:24:34
Content-Type: multipart/alternative; boundary="=_alternative 005999A3C2256B89_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 005999A3C2256B89_=
Content-Type: text/plain; charset="us-ascii"

Elliot - in fact CRN is per-LU and it is an extra burden.  We considered 
briefly as our numbering scheme and dropped it for this reason.

Julo




"Elliott, Robert" <Robert.Elliott@compaq.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 16:56
Please respond to "Elliott, Robert"

 
        To:     "IPS Reflector" <ips@ece.cmu.edu>
        cc: 
        Subject:        RE: [Fwd: iSCSI: items discussed at WG meeting]

 

Comments below...

> -----Original Message-----
> From: Santosh Rao [mailto:santoshr@cup.hp.com]
> Sent: Tuesday, March 26, 2002 7:50 PM
> To: IPS Reflector
> Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
> 
> "Elliott, Robert" wrote:
> > 
> > Don't assume that every new SCSI protocol will support CRN -
> > SRP does not, for one. 
> 
> From a reading of SAM-2, it appears that the "Send SCSI Command" and
> "SCSI Command Received" APIs (Section 5.4.2) define the CRN as one of
> the arguments, which seems to imply that scsi transports should be
> capable of transporting this argument, if the application 
> client decides to use it. (at least the newer scsi transports.)
> 
> Are you saying that this is not the case ? 

Yes.

> What is the basis for SRP not supporting CRN ? 

The description of CRN in SAM-2 mentions that protocols might not
support it - "It is not an error for the application client to 
provide this argument when CRN is not supported by the SCSI protocol 
or logical unit."

The same holds for autosense (although we did add language recently 
requiring all protocols except Parallel SCSI support autosense).

> What are the guidelines that determine whether a scsi transport should
> support CRN or not ? 

If the transport provides out of order delivery and you want to be able
to send queued commands to tapes, CRN may be helpful.

> If the CRN is not required to be supported by all scsi transports, is
> there a reason that iscsi needs to support this ?

Since iSCSI has added sequence numbers everywhere, CRN is not much of 
an extra burden.




--=_alternative 005999A3C2256B89_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Elliot - in fact CRN is per-LU and it is an extra burden. &nbsp;We considered briefly as our numbering scheme and dropped it for this reason.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>&quot;Elliott, Robert&quot; &lt;Robert.Elliott@compaq.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 16:56</font>
<br><font size=1 face="sans-serif">Please respond to &quot;Elliott, Robert&quot;</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;RE: [Fwd: iSCSI: items discussed at WG meeting]</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Comments below...<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: Santosh Rao [mailto:santoshr@cup.hp.com]<br>
&gt; Sent: Tuesday, March 26, 2002 7:50 PM<br>
&gt; To: IPS Reflector<br>
&gt; Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]<br>
&gt; <br>
&gt; &quot;Elliott, Robert&quot; wrote:<br>
&gt; &gt; <br>
&gt; &gt; Don't assume that every new SCSI protocol will support CRN -<br>
&gt; &gt; SRP does not, for one. <br>
&gt; <br>
&gt; From a reading of SAM-2, it appears that the &quot;Send SCSI Command&quot; and<br>
&gt; &quot;SCSI Command Received&quot; APIs (Section 5.4.2) define the CRN as one of<br>
&gt; the arguments, which seems to imply that scsi transports should be<br>
&gt; capable of transporting this argument, if the application <br>
&gt; client decides to use it. (at least the newer scsi transports.)<br>
&gt; <br>
&gt; Are you saying that this is not the case ? <br>
<br>
Yes.<br>
<br>
&gt; What is the basis for SRP not supporting CRN ? <br>
<br>
The description of CRN in SAM-2 mentions that protocols might not<br>
support it - &quot;It is not an error for the application client to <br>
provide this argument when CRN is not supported by the SCSI protocol <br>
or logical unit.&quot;<br>
<br>
The same holds for autosense (although we did add language recently <br>
requiring all protocols except Parallel SCSI support autosense).<br>
<br>
&gt; What are the guidelines that determine whether a scsi transport should<br>
&gt; support CRN or not ? <br>
<br>
If the transport provides out of order delivery and you want to be able<br>
to send queued commands to tapes, CRN may be helpful.<br>
<br>
&gt; If the CRN is not required to be supported by all scsi transports, is<br>
&gt; there a reason that iscsi needs to support this ?<br>
<br>
Since iSCSI has added sequence numbers everywhere, CRN is not much of <br>
an extra burden.<br>
<br>
</font>
<br>
<br>
--=_alternative 005999A3C2256B89_=--


From owner-ips@ece.cmu.edu  Wed Mar 27 12:12:06 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09041
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:12:06 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RGi1c25815
	for ips-outgoing; Wed, 27 Mar 2002 11:44:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.brocade.com (sj6-b.brocade.com [63.121.140.220])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RGhvw25801;
	Wed, 27 Mar 2002 11:43:57 -0500 (EST)
Received: from hq-ex-c3.brocade.com (hq-ex-c3 [192.168.126.211])
	by mail.brocade.com (8.8.8+Sun/8.8.8) with ESMTP id IAA23923;
	Wed, 27 Mar 2002 08:43:43 -0800 (PST)
Received: by hq-ex-c3.brocade.com with Internet Mail Service (5.5.2653.19)
	id <HXN14RA1>; Wed, 27 Mar 2002 08:43:27 -0800
Message-ID: <FFD40DB4943CD411876500508BAD027905D11A46@sj5-ex2.brocade.com>
From: Robert Snively <rsnively@Brocade.COM>
To: "'Julian Satran'" <Julian_Satran@il.ibm.com>,
        Eddy Quicksall
	 <Eddy_Quicksall@ivivity.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
Subject: RE: iSCSI: padding on intermediate sequences
Date: Wed, 27 Mar 2002 08:43:40 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D5AE.8CE72970"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D5AE.8CE72970
Content-Type: text/plain

Since there is no requirement by the SCSI ULP to say anything about data
until
the SCSI Status has been presented, there is no need to concern ourselves
with
device dependent burst boundaries.  We can make the boundaries convenient
for the technology.  In FCP, all bursts were required to begin on a 
4-byte boundary, and all except the last to end on a 4-byte boundary.  This
simplified DMA and segmentation/reassembly mechanisms
in all hardware paths.  Looking at the TCP/IP formats, I see a similar
bias toward 4-byte structures, which implies that the same rule would be
a constructive addition to the document.
 
This simply prohibited the target from asking for a number of intermediate
bytes that was not a multiple of 4.
 
The folks using odd byte block counts had to manage the buffers in
a manner appropriate to such behaviors.  Practically, I do not believe that
there were many such devices, nor was this a burden to any devices that did
support such behavior.
 
Bob

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 27, 2002 12:03 AM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail); owner-ips@ece.cmu.edu
Subject: RE: iSCSI: padding on intermediate sequences



Eddy, 

Now that we understand better you issue here are some reasons why we may not
want to do what you propose: 


*	the target may ask for a number of bytes that is not a multiple of 4
(should we outlaw this? I don't think we want) 

*	there might be devices that require/generate in "bursts" that are
not multiples of 4 


I think that we avoided abuse by what we have and we should leave further
optimization to the implementer for specific devices. 

Julo 




		Eddy Quicksall <Eddy_Quicksall@ivivity.com> 
Sent by: owner-ips@ece.cmu.edu 


	27-03-02 02:41 
Please respond to Eddy Quicksall 


	        
        To:        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        RE: iSCSI: padding on intermediate sequences 

       


	It is the sequences I am speaking of, not the segments. The current
wording
of the spec would allow you to send sequences with padding in each sequence
(the segments within the sequence are ok because they can't have padding).
But if a transfer is made up of several sequences then it is more work for
the hardware if intermediate sequences were allowed to have arbitrary pad
bytes.

And there is no good reason (that I am aware of) that intermediate sequences
could not just be pure data.

Now, if there is a reason, then we should come up with a scheme that allows
one party to "just say no". One possibility is that if DataInOrder=yes, then
padding would not be allowed except in the sequence that represents the last
portion of the transfer. 

If that is objectionable, then we should have a new key
(PaddingOnlyInLastSequenceOfTotalTransfer=yes). :-)

Eddy

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Tuesday, March 26, 2002 2:48 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there
are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that is
> objectionable, could we forbid padding on all but the last PDU of a
transfer
> if DataInOrder=yes.
>
> Eddy
>





------_=_NextPart_001_01C1D5AE.8CE72970
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=US-ASCII">


<META content="MSHTML 5.50.4913.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>Since 
there is no requirement by the SCSI ULP to say anything about data 
until</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>the 
SCSI Status has been presented, there is no need to concern ourselves 
with</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>device 
dependent burst boundaries.&nbsp; We can make the boundaries 
convenient</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>for 
the technology.&nbsp; In FCP, all bursts were required to begin on a 
</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>4-byte 
boundary, and all except the last to end on a 4-byte boundary.&nbsp; 
This</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2>simplified DMA and segmentation/reassembly mechanisms</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>in all 
hardware paths.&nbsp; Looking at the TCP/IP formats, I see a 
similar</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>bias 
toward 4-byte structures, which implies that the same rule would 
be</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>a 
constructive addition to the document.</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>This 
simply prohibited the target from asking for a number of 
intermediate</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>bytes 
that was not a multiple of 4.</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>The 
folks using odd byte block counts had to manage the buffers 
in</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>a 
manner appropriate to such behaviors.&nbsp; Practically, I do not believe 
that</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff size=2>there 
were many such devices, nor was this a burden to any devices that 
did</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2>support such behavior.</FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=720252516-27032002><FONT face=Arial color=#0000ff 
size=2>Bob</FONT></SPAN></DIV>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Wednesday, March 27, 2002 
  12:03 AM<BR><B>To:</B> Eddy Quicksall<BR><B>Cc:</B> ips@ece. cmu. edu 
  (E-mail); owner-ips@ece.cmu.edu<BR><B>Subject:</B> RE: iSCSI: padding on 
  intermediate sequences<BR><BR></FONT></DIV><BR><FONT face=sans-serif 
  size=2>Eddy,</FONT> <BR><BR><FONT face=sans-serif size=2>Now that we 
  understand better you issue here are some reasons why we may not want to do 
  what you propose:</FONT> <BR>
  <UL>
    <LI><FONT face=sans-serif size=2>the target may ask for a number of bytes 
    that is not a multiple of 4 (should we outlaw this? I don't think we 
    want)</FONT> 
    <LI><FONT face=sans-serif size=2>there might be devices that 
    require/generate in "bursts" that are not multiples of 4</FONT> 
    <BR><BR><BR><FONT face=sans-serif size=2>I think that we avoided abuse by 
    what we have and we should leave further optimization to the implementer for 
    specific devices.</FONT> <BR><BR><FONT face=sans-serif size=2>Julo</FONT> 
    <BR><BR><BR>
    <TABLE width="100%">
      <TBODY>
      <TR vAlign=top>
        <TD>
        <TD><FONT face=sans-serif size=1><B>Eddy Quicksall 
          &lt;Eddy_Quicksall@ivivity.com&gt;</B></FONT> <BR><FONT 
          face=sans-serif size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
          <P><FONT face=sans-serif size=1>27-03-02 02:41</FONT> <BR><FONT 
          face=sans-serif size=1>Please respond to Eddy Quicksall</FONT> 
<BR></P>
        <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          </FONT><BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          To: &nbsp; &nbsp; &nbsp; &nbsp;"ips@ece. cmu. edu (E-mail)" 
          &lt;ips@ece.cmu.edu&gt;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
          &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT 
          face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; 
          &nbsp; &nbsp; &nbsp;RE: iSCSI: padding on intermediate 
          sequences</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; 
          &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" size=2>It 
    is the sequences I am speaking of, not the segments. The current 
    wording<BR>of the spec would allow you to send sequences with padding in 
    each sequence<BR>(the segments within the sequence are ok because they can't 
    have padding).<BR>But if a transfer is made up of several sequences then it 
    is more work for<BR>the hardware if intermediate sequences were allowed to 
    have arbitrary pad<BR>bytes.<BR><BR>And there is no good reason (that I am 
    aware of) that intermediate sequences<BR>could not just be pure 
    data.<BR><BR>Now, if there is a reason, then we should come up with a scheme 
    that allows<BR>one party to "just say no". One possibility is that if 
    DataInOrder=yes, then<BR>padding would not be allowed except in the sequence 
    that represents the last<BR>portion of the transfer. <BR><BR>If that is 
    objectionable, then we should have a new 
    key<BR>(PaddingOnlyInLastSequenceOfTotalTransfer=yes). 
    :-)<BR><BR>Eddy<BR><BR>-----Original Message-----<BR>From: Robert D. Russell 
    [mailto:rdr@io.iol.unh.edu]<BR>Sent: Tuesday, March 26, 2002 2:48 PM<BR>To: 
    Eddy Quicksall<BR>Cc: ips@ece. cmu. edu (E-mail)<BR>Subject: Re: iSCSI: 
    padding on intermediate sequences<BR><BR><BR>Eddy:<BR><BR>I may not be 
    understanding you correctly, but the<BR>words in section 9.7.7 I believe 
    mean that these data<BR>segments should contain an integer number of 4 byte 
    words<BR>of data, not arbitrary "pad" bytes. &nbsp;If the data 
    segment<BR>length is a multiple of 4 then there will be NO pad 
    bytes.<BR><BR>There seems to be confusion over your use of "pad"<BR>and the 
    standard's use of "pad". &nbsp;Would you please 
    clarify?<BR><BR>Thanks,<BR>Bob<BR><BR><BR>On Tue, 26 Mar 2002, Eddy 
    Quicksall wrote:<BR><BR>&gt; Section 9.7.7 says:<BR>&gt;<BR>&gt; The Data 
    Segments of Data-in and Data-out PDUs SHOULD be filled to the<BR>&gt; 
    integer number of 4 byte words (real payload) unless the F bit is 
    set<BR>&gt; to 1.<BR>&gt;<BR>&gt; This allows one to pad intermediate 
    sequences of a transfer. But, there<BR>are<BR>&gt; reasons why padding on 
    intermediate sequences within a transfer can make<BR>&gt; life 
    difficult.<BR>&gt;<BR>&gt; Can we forbid padding on all but the last PDU for 
    the transfer? If that is<BR>&gt; objectionable, could we forbid padding on 
    all but the last PDU of a<BR>transfer<BR>&gt; if 
    DataInOrder=yes.<BR>&gt;<BR>&gt; 
Eddy<BR>&gt;<BR></FONT><BR><BR></LI></UL></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D5AE.8CE72970--


From owner-ips@ece.cmu.edu  Wed Mar 27 12:12:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09053
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:12:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RGnVZ26329
	for ips-outgoing; Wed, 27 Mar 2002 11:49:31 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RGnSw26319
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 11:49:28 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLJX0S>; Wed, 27 Mar 2002 10:49:25 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631F3@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: iSCSI: Logout hierarchy
Date: Wed, 27 Mar 2002 10:49:24 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Quick scenario:

A connection receives a logout message with recovery (ReasonCode = 2).  The
Logout response sets a Time2Wait & Time2Retain as negotiated at login.
Within these periods, a new Logout (implicit or explicit) request comes in
either to remove that exact connection or to destroy the whole session.
Should the target obey the new request or honor the previous?


From owner-ips@ece.cmu.edu  Wed Mar 27 12:12:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA09092
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:12:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RGaoQ25205
	for ips-outgoing; Wed, 27 Mar 2002 11:36:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RGamw25200
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 11:36:48 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLJXYY>; Wed, 27 Mar 2002 10:36:43 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631F2@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: MaxRecvPDULength simplification
Date: Wed, 27 Mar 2002 10:36:42 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D5AD.93B20320"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D5AD.93B20320
Content-Type: text/plain;
	charset="iso-8859-1"

SNACK with RL=0 is only one requirement.  Another is task allegiance
reassignment (6.1.2) which does not use SNACK (correct?)  Here the initiator
sends a Task-Management request with a Task-Reassign message to the target.
The target must reorganize it's T->I messages to match the MaxRecvPDULength
of the new connection.  Plus, the Task Reassign message includes the
ExpDataSN field which, if I'm reading right, on reassignment the target must
remember the sequencing of the old connection in order to track the
ExpDataSN field then re-sequence for the new connection (9.5.4).  So now
target implementations will have to keep track of sequence indexes for
Data-In PDUs for conversion over to the new allegiance.
 
On-the-fly modification of MaxRecvPDULength also means that some compliance
standard must be set for in-flight messages.  An outstanding read request
may have T->I PDUs that comply with multiple MaxRecvPDULength values.  In a
sense, there will be times where multiple MaxRecvPDULength values are valid.
At what point MUST the target comply with the new value?
 
So I guess I'm not convinced that the benefit of simplification is
illusionary.  Is there a discussion thread that expressly states
MaxRecvPDULength must have the flexibility allowed for in the draft?  The
discussions I've seen mainly centered around whether it should be duplex
valued (I->T, T->I).
 
Thanks.

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 27, 2002 1:40 AM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: MaxRecvPDULength simplification



The simplification you are talking about is illusory. Currently this
requires SNACK to require all data(RL = 0). 
The restriction you propose instead is far more severe (and unwarranted). 

Julo 



	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


27-03-02 01:19 
Please respond to Michael Schoberg 


        
        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        iSCSI: MaxRecvPDULength simplification 

       


I've looked over some of the reflector messages regarding MaxRecvPDULength
negotiation (back to Oct 2001).  I can't find the discussion of why this
value must be available for negotiation outside of login.  It really
complicates SNACK and Task Reassignment if the initiator can change this
value on-the-fly.  Would it be too restrictive to propose the following
rules? 
  
1) MaxRecvPDULength is negotiated only at login before FFP. 
  
2) For message-level recovery, a connection must be prepared to accept the
MaxRecvPDULength of the connection it's providing fail over capability for.
It doesn't seem unreasonable to expect fault tolerant configurations to
comply with this.  It would simply be stating that RecoveryLevel 2 devices
should be somewhat matched in this capability. 
  
  
  
 -----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 26, 2002 1:50 AM
To: Michael Schoberg
Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
Subject: Re: iSCSI: SNACK RunLength


Michael, 

The paragraph says that if you issue a SNACK after the MaxPDURecvLength has
decreased you should use RunLength 0 (meaning all) instead of a specific
runlength which might not be accurate anymore. 

Julo 


	Michael Schoberg <michael_schoberg@cnt.com> 
Sent by: owner-ips@ece.cmu.edu 


25-03-02 19:43 
Please respond to Michael Schoberg 

        
       To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu> 
       cc:         
       Subject:        iSCSI: SNACK RunLength 

      



Am I just not reading this or can this paragraph use some help?  Can someone
give an interpretation? 

 9.16.3  RunLength
                                ...

         The first data SNACK, issued after initiator's MaxRecvPDULength 
         decreased, for a command issued on the same connection before the

         change in MaxRecvPDULength, MUST use RunLength "0" to request 
         retransmission of any number of PDUs (including one).  The number
of 
         retransmitted PDUs in this case, may or may not be the same as
the 
         original transmission, depending on whether loss was before or
after 
         the MaxRecvPDULength was changed at the target.


Does this refer to something like:

For connections with unacknowledged PDUs that undergo MaxRecvPDULength
negotiation ...







------_=_NextPart_001_01C1D5AD.93B20320
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 5.50.4611.1300" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2>SNACK&nbsp;with RL=0 is only one&nbsp;requirement.&nbsp; 
A</FONT></SPAN><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2>nother is task allegiance reassignment (6.1.2) which does not use SNACK 
(correct?)&nbsp; Here the initiator sends a Task-Management&nbsp;request with a 
Task-Reassign message to the target.&nbsp; The&nbsp;target must reorganize it's 
T-&gt;I messages to match the MaxRecvPDULength of&nbsp;the new connection.&nbsp; 
Plus, the Task Reassign message&nbsp;includes the ExpDataSN field which, if I'm 
reading right,&nbsp;on reassignment the target must remember the sequencing of 
the old connection in order to track the ExpDataSN field then re-sequence for 
the new connection (9.5.4).&nbsp; So now target implementations will have to 
keep track of sequence indexes for&nbsp;Data-In PDUs for conversion over to the 
new allegiance.</FONT></SPAN></DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2>On-the-fly modification of MaxRecvPDULength also means that some 
compliance standard must be set for in-flight messages.&nbsp; An outstanding 
read request may have T-&gt;I PDUs that comply with multiple MaxRecvPDULength 
values.&nbsp; In a sense, there will be times where multiple MaxRecvPDULength 
values are valid.&nbsp; At what point MUST the target comply with the new 
value?</FONT></SPAN></DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff size=2>So I 
guess I'm not convinced that the benefit of simplification is illusionary.&nbsp; 
Is there a discussion thread that expressly states MaxRecvPDULength must have 
the flexibility allowed for in the draft?&nbsp;&nbsp;The&nbsp;discussions I've 
seen&nbsp;mainly centered around whether&nbsp;it should be duplex valued 
(I-&gt;T, T-&gt;I).</FONT></SPAN></DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=266001915-27032002><FONT face=Arial color=#0000ff 
size=2>Thanks.</FONT></SPAN></DIV>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Wednesday, March 27, 2002 
  1:40 AM<BR><B>To:</B> Michael Schoberg<BR><B>Cc:</B> IPS Reflector (E-mail); 
  owner-ips@ece.cmu.edu<BR><B>Subject:</B> Re: iSCSI: MaxRecvPDULength 
  simplification<BR><BR></FONT></DIV><BR><FONT face=sans-serif size=2>The 
  simplification you are talking about is illusory. Currently this requires 
  SNACK to require all data(RL = 0).</FONT> <BR><FONT face=sans-serif size=2>The 
  restriction you propose instead is far more severe (and unwarranted).</FONT> 
  <BR><BR><FONT face=sans-serif size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Michael Schoberg 
        &lt;michael_schoberg@cnt.com&gt;</B></FONT> <BR><FONT face=sans-serif 
        size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
        <P><FONT face=sans-serif size=1>27-03-02 01:19</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Michael Schoberg</FONT> 
<BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;"IPS Reflector (E-mail)" &lt;ips@ece.cmu.edu&gt;</FONT> 
        <BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; 
        &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
        &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: 
        MaxRecvPDULength simplification</FONT> <BR><BR><FONT face=Arial 
        size=1>&nbsp; &nbsp; &nbsp; &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT 
  face=Arial color=blue size=2>I've looked over some of the reflector messages 
  regarding MaxRecvPDULength negotiation (back to Oct 2001). &nbsp;I can't find 
  the discussion of why this value must be available for negotiation outside of 
  login. &nbsp;It really complicates SNACK and Task Reassignment if the 
  initiator can change this value on-the-fly. &nbsp;Would it be too restrictive 
  to propose the following rules?</FONT> <BR><FONT face="Times New Roman" 
  size=3>&nbsp;</FONT> <BR><FONT face=Arial color=blue size=2>1) 
  MaxRecvPDULength is negotiated only at login before FFP.</FONT> <BR><FONT 
  face="Times New Roman" size=3>&nbsp;</FONT> <BR><FONT face=Arial color=blue 
  size=2>2) For message-level recovery, a connection must be prepared to accept 
  the MaxRecvPDULength of the connection it's providing fail over capability 
  for. &nbsp;It doesn't seem unreasonable to expect fault tolerant 
  configurations to comply with this. &nbsp;It would simply be stating that 
  RecoveryLevel 2 devices should be somewhat matched in this capability.</FONT> 
  <BR><FONT face="Times New Roman" size=3>&nbsp;</FONT> <BR><FONT 
  face="Times New Roman" size=3>&nbsp;</FONT> <BR><FONT face=Arial color=blue 
  size=2>&nbsp;</FONT> <BR><FONT face=Tahoma size=2>&nbsp;-----Original 
  Message-----<B><BR>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<B><BR>Sent:</B> Tuesday, March 26, 2002 1:50 
  AM<B><BR>To:</B> Michael Schoberg<B><BR>Cc:</B> IPS Reflector (E-mail); 
  owner-ips@ece.cmu.edu<B><BR>Subject:</B> Re: iSCSI: SNACK 
  RunLength<BR></FONT><BR><FONT face=sans-serif size=2><BR>Michael,</FONT><FONT 
  face="Times New Roman" size=3> <BR></FONT><FONT face=sans-serif size=2><BR>The 
  paragraph says that if you issue a SNACK after the MaxPDURecvLength has 
  decreased you should use RunLength 0 (meaning all) instead of a specific 
  runlength which might not be accurate anymore.</FONT><FONT 
  face="Times New Roman" size=3> <BR></FONT><FONT face=sans-serif 
  size=2><BR>Julo</FONT><FONT face="Times New Roman" size=3> <BR><BR></FONT>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD width="2%">
      <TD width="48%"><FONT face=sans-serif size=1><B>Michael Schoberg 
        &lt;michael_schoberg@cnt.com&gt;</B></FONT><FONT face="Times New Roman" 
        size=3> </FONT><FONT face=sans-serif size=1><BR>Sent by: 
        owner-ips@ece.cmu.edu</FONT><FONT face="Times New Roman" size=3> </FONT>
        <P><FONT face=sans-serif size=1>25-03-02 19:43</FONT><FONT 
        face="Times New Roman" size=3> </FONT><FONT face=sans-serif 
        size=1><BR>Please respond to Michael Schoberg</FONT><FONT 
        face="Times New Roman" size=3> </FONT></P>
      <TD width="49%"><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; &nbsp;To: 
        &nbsp; &nbsp; &nbsp; &nbsp;"IPS Reflector (E-mail)" 
        &lt;ips@ece.cmu.edu&gt;</FONT><FONT face="Times New Roman" size=3> 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; &nbsp;cc: 
        &nbsp; &nbsp; &nbsp; &nbsp;</FONT><FONT face="Times New Roman" size=3> 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; 
        &nbsp;Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: SNACK 
        RunLength</FONT><FONT face="Times New Roman" size=3> <BR></FONT><FONT 
        face=Arial size=1><BR>&nbsp; &nbsp; &nbsp; 
  </FONT></TR></TBODY></TABLE><BR><FONT face="Times New Roman" 
  size=3><BR></FONT><FONT face="Courier New" size=2><BR>Am I just not reading 
  this or can this paragraph use some help? &nbsp;Can someone<BR>give an 
  interpretation? <BR><BR>&nbsp;9.16.3 &nbsp;RunLength<BR>&nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; ...<BR><BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The first data 
  SNACK, issued after initiator's MaxRecvPDULength <BR>&nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp;decreased, for a command issued on the same connection before 
  the<BR><BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;change in MaxRecvPDULength, MUST 
  use RunLength "0" to request <BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;retransmission of any number of PDUs (including one). &nbsp;The 
  number<BR>of <BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;retransmitted PDUs in this 
  case, may or may not be the same as<BR>the <BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;original transmission, depending on whether loss was before or<BR>after 
  <BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;the MaxRecvPDULength was changed at the 
  target.<BR><BR><BR>Does this refer to something like:<BR><BR>For connections 
  with unacknowledged PDUs that undergo MaxRecvPDULength<BR>negotiation 
  ...<BR></FONT><FONT face="Times New Roman" 
size=3><BR><BR></FONT><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D5AD.93B20320--


From owner-ips@ece.cmu.edu  Wed Mar 27 12:55:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11546
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:55:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RHD5428249
	for ips-outgoing; Wed, 27 Mar 2002 12:13:05 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls3.std.com [199.172.62.105])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RGtRw26823
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 11:55:27 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id LAA15625;
	Wed, 27 Mar 2002 11:55:24 -0500
Message-Id: <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Wed, 27 Mar 2002 15:42:55 -0500
To: "Bernard Aboba" <bernard_aboba@hotmail.com>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI authentication requirements
Cc: ips@ece.cmu.edu
In-Reply-To: <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

A primary decision for the WG to consider is whether
item (e), preventing "dictionary attack", is important.

To determine this, some basic questions come to mind, that the
WG needs to answer.

-- How are login authenticators intended to be distributed?
-- Are people ever in the loop?
-- If so, where, when, and how are they likely to handle these authenticators?
-- If not, then what kind of automated key selection and distribution
        system can be expected or mandated to be used?

Other comments are embedded below.

At 01:03 PM 3/26/02 -0800, Bernard Aboba wrote:
>...
>e. Dictionary attack resistance
>...
>Goals
>...
>Pre-shared key support is important since this is likely to be the most common use of iSCSI login authentication. The pre-shared key should be unique to the two parties, and not suceptible to man-in-the-middle attack, as opposed to the Group Pre-Shared key that is so widely implemented within IPsec VPN clients, and that enables man-in-the-middle vulnerabilties. Sufficient entropy is required to avoid brute-force attacks.

If the use of pre-shared key authenticators is the desired goal, then it should
openly state that "all compliant applications must enforce machine-generated
of high-quality keys, and preclude the use of passwords or hashed
passwords directly as keys".  Otherwise it will lead to the same kind of
false-advertising problems that have plagued other standards.

On the other hand, if pre-shared password authenticators is a common use
case, whether or not it's the dominant case, this naturally imposes more
stringent requirements than "pre-shared key".

>Non-goals
>
>iSCSI login authentication can be used with or without IPsec. When IPsec is not used, the iSCSI connection can be hijacked, but this is not something that login authentication can protect against.

Goal (d) should be restated as "resistance to session hijacking".
Strong authentication protocols can defend against "hijacking" of the secret
credentials themselves, whereas other protocols may not.

>One of the reasons that SRP was chosen was its resistant to dictionary attack when weak secrets are used. However, it is not clear that this is useful functionality for iSCSI login authentication.
>
>Mounting iSCSI volumes is inherently a machine activity, since access to that volume, when mounted, is determined by the operating system and its access controls rather than security services within the wire protocol.
>
>As a result, the credentials used for iSCSI login may be machine credentials, which can be assumed to be pre-shared keys with significant entropy, rather than a user password.

Those three paragraphs make one point -- that passwords are not needed
when machines will always choose and distribute these keys,
with no human involvement.

Q for the WG:  Can this be true for all compliant products?

>The once scenario in which a user password might be relevant is mounting an iSCSI volume via a storage service provider. However, this is exactly the scenario in which IPsec protection of iSCSI would be most likely. Therefore, I would claim that dictionary attack resistance is not important here either.

I don't understand that argument. What distinction is being drawn here
for use vs. non-use of IPsec?  And why are passwords relevant in that
scenario, but not others?

>If certificate authentication is possible and desired, this can be provided within IKE Main Mode. As a result, certificate-based authentication is not required within iSCSI login.

-- David



From owner-ips@ece.cmu.edu  Wed Mar 27 12:57:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11661
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 12:57:11 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RHk0c00881
	for ips-outgoing; Wed, 27 Mar 2002 12:46:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RHjpw00872
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 12:45:51 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 4795C30706; Wed, 27 Mar 2002 12:45:47 -0500 (EST)
Date: Wed, 27 Mar 2002 09:41:06 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: <Black_David@emc.com>
Cc: <pierre_labat@hp.com>, <ips@ece.cmu.edu>
Subject: Re: IPSEC target and transport mode
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E02937656@CORPMX14>
Message-ID: <Pine.NEB.4.33.0203261915080.7065-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Sorry if this goes out twice, I think my mailer ate it the first time.

On Tue, 26 Mar 2002 Black_David@emc.com wrote:

> While I believe the current situation does represent rough consensus
> of the WG, there was a visible minority in the meeting who dissented
> from this decision, and essentially no time to discuss it.  Hence,
> this is an opportunity for those who would like to see the transport
> mode requirement from Huntington Beach retained to explain why on the
> list and see if they can convince the WG.  The only available options
> are (1) to drop all requirements for transport mode (i.e., "MAY implement")
> and (2) to retain the transport mode requirement in the form that it
> was added in Huntington Beach (i.e., transport mode is required when
> RFC 2401 says it is).  I am certain that WG rough consensus cannot be
> obtained for requiring transport mode in all cases (i.e., without the
> "when RFC 2401 says it is" qualifier from Huntington Beach).

As I understand tunnel mode, you have an IPsec security gateway in the
topology. Among other things, that means we won't readily have end-to-end
security, since you have security from the gateway to the device, not
necessarily the initiator to the device.

How do you suggest we achieve end-to-end security without transport mode a
MUST?

Specifically the topology I have in mind is I make a dedicated IP SAN, and
want ESP from the file servers to the storage boxes. They are all on the
same (GigE) subnet. How do I get this level of security (end-to-end) with
just tunnel mode?

Puzzled,

Bill




From owner-ips@ece.cmu.edu  Wed Mar 27 13:25:13 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13989
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 13:25:12 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RHn6P01186
	for ips-outgoing; Wed, 27 Mar 2002 12:49:06 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RHn4w01182
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 12:49:04 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 6849A30706; Wed, 27 Mar 2002 12:49:04 -0500 (EST)
Date: Wed, 27 Mar 2002 09:44:24 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: Nitin Dhingra <nitin.dhingra@dcmtech.co.in>
Cc: "'John Hufferd'" <hufferd@us.ibm.com>, "Ips (E-mail)" <ips@ece.cmu.edu>
Subject: RE: Identifying Initiator
In-Reply-To: <FAC3A691B116D6119AA6000629A85D1A18E061@DCMTECHDOM>
Message-ID: <Pine.NEB.4.33.0203270943240.365-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Wed, 27 Mar 2002, Nitin Dhingra wrote:

> Ok fine, we cannot take Initiator Address..
> But then Initiator Name + Isid, can be same for different machine's
> and it wouldn't be possible for the target to identify the initiator
> then... Would it??

That's why Initiator Name uniqueness is so important. It needs to beunique
in the world.

Take care,

Bill



From owner-ips@ece.cmu.edu  Wed Mar 27 13:26:36 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14191
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 13:26:36 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RIBwm03051
	for ips-outgoing; Wed, 27 Mar 2002 13:11:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2RIBtw03042
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 13:11:55 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2RIBn004595
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 13:11:49 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2RIBnK04586;
	Wed, 27 Mar 2002 13:11:49 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2RIBmM07574;
	Wed, 27 Mar 2002 13:11:49 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15522.2916.762000.847538@gargle.gargle.HOWL>
Date: Wed, 27 Mar 2002 13:11:48 -0500
From: Paul Koning <ni1d@arrl.net>
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: Re: IPSEC target and transport mode
References: <277DD60FB639D511AC0400B0D068B71E02937656@CORPMX14>
	<Pine.NEB.4.33.0203261915080.7065-100000@candlekeep.home-net.internetconnect.net>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 27 March 2002) by Bill Studenmund:
> As I understand tunnel mode, you have an IPsec security gateway in the
> topology. Among other things, that means we won't readily have end-to-end
> security, since you have security from the gateway to the device, not
> necessarily the initiator to the device.
> 
> How do you suggest we achieve end-to-end security without transport mode a
> MUST?
> 
> Specifically the topology I have in mind is I make a dedicated IP SAN, and
> want ESP from the file servers to the storage boxes. They are all on the
> same (GigE) subnet. How do I get this level of security (end-to-end) with
> just tunnel mode?

Tunnel mode enables the use of (separate) security gateways.  It does
NOT require them.  It is perfectly reasonable to do end to end
security with tunnel mode.  To do so, you terminate the tunnels at the
storage nodes.

Some users will require end to end security, others will prefer site
to site security.  Tunnel mode is the common mechanism that supports
both needs.

     paul



From owner-ips@ece.cmu.edu  Wed Mar 27 13:27:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14268
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 13:27:26 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RIH8b03510
	for ips-outgoing; Wed, 27 Mar 2002 13:17:08 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RIH7w03505
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 13:17:07 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <HWPB7NTF>; Wed, 27 Mar 2002 13:16:34 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937666@CORPMX14>
From: Black_David@emc.com
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: RE: IPSEC target and transport mode
Date: Wed, 27 Mar 2002 13:16:31 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Bill,

> As I understand tunnel mode, you have an IPsec security gateway in the
> topology. Among other things, that means we won't readily have end-to-end
> security, since you have security from the gateway to the device, not
> necessarily the initiator to the device.

The gateway is possible, but not necessary.  RFC 2401, section 4.1 says:

	Two hosts MAY establish a tunnel mode SA between themselves.

Hence the assertion that end-to-end security is not possible in tunnel
mode is incorrect.  OTOH, if someone chooses to use a separate security
gateway packaged with their IP Storage implementation, they
can only claim compliance with the security requirements of the
appropriate IP Storage RFC(s) on the secured side of the gateway -
they have to explain to their customer that there is no IPsec security
on the (presumably private) link between the IP Storage system and
the gateway.

> How do you suggest we achieve end-to-end security without 
> transport mode a MUST?

IPsec security policy (including use and acceptance of ID payloads)
and decisions about which IKE authentication material is installed
in what systems and is accepted/required by what other systems.
Forcing use of transport mode is a poor substitute for putting a
proper security policy in place.  Ensuring that only the ends of
interest have the material required to set up the end-to-end SA is
a good idea.

> Specifically the topology I have in mind is I make a dedicated IP SAN, and
> want ESP from the file servers to the storage boxes. They are all on the
> same (GigE) subnet. How do I get this level of security (end-to-end) with
> just tunnel mode?

Negotiate what you want and make sure that no security gateway between the
file servers and storage boxes has the IKE authentication material that
the file servers and storage boxes will require.  Negotiation of the
encapsulation mode (you can still do transport if you want to, it's just
not REQUIRED) is supported by SA attribute 4 in Section 4.5 of RFC 2407
(yes, it's well hidden ...).

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Wed Mar 27 13:39:29 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA15100
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 13:39:29 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RIJdK03733
	for ips-outgoing; Wed, 27 Mar 2002 13:19:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RIJbw03729
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 13:19:37 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4ZVM5>; Wed, 27 Mar 2002 13:19:37 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F5978@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: padding on intermediate sequences
Date: Wed, 27 Mar 2002 13:19:36 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D5BB.F3931D70"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D5BB.F3931D70
Content-Type: text/plain;
	charset="iso-8859-1"

Julian,
 
Notice in the example I gave below, that the pad was only applied when the F
bit was set. Section 9.7.7 says: 
 
The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the 
integer number of 4 byte words (real payload) unless the F bit is set 
to 1. 

 
So my example is not forbidden. Can you please change section 9.7.7 to be
more clear and forbid this behavior? I suggest something like:
 
The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the 
integer number of 4 byte words (real payload) unless the F bit is set 
to 1 on the last Data PDU that concludes the entire requested
data transfer for the task from the target's perspective.
 
Eddy

-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 27, 2002 1:42 AM
To: Eddy Quicksall
Cc: Sanjay Goyal
Subject: RE: iSCSI: padding on intermediate sequences




The spec clearly forbids this behavior - data pdus (except the last) have to
filled (not padded) to a 4 byte boundary. That is what the text says. 

Regards, 
Julo 



	Eddy Quicksall <Eddy_Quicksall@ivivity.com> 


26-03-02 18:52 
Please respond to Eddy Quicksall 


        
        To:        Julian Satran/Haifa/IBM@IBMIL 
        cc:        Sanjay Goyal <sanjay_goyal@ivivity.com>, Sukha Ghosh
<sukha_ghosh@ivivity.com> 
        Subject:        RE: iSCSI: padding on intermediate sequences 

       


Maybe I didn't say something right. Here is what I meant: 
  
I-T Read CDB of 1024 bytes 
T-I Data-In with 513 bytes and F bit set. So, pad is 3 bytes. I don't like
pad here. 
T-I Data-In with 511 bytes and F bit set. So, pad is 1 byte. This is the
only place I would like to see pad. 
  
Since the F bit ends a sequence and since a transfer can have several
sequences, the spec allows each sequence to have pad. It is a problem for
the HW guys to deal with pad except at the end of the whole transfer. 
  
Eddy 
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Tuesday, March 26, 2002 11:09 AM
To: Eddy Quicksall
Subject: Re: iSCSI: padding on intermediate sequences


Eddy - it says real payload. They must be filled not padded. That is
mandataed to avoid padding abuse. 

But I assume that I missread your question. 

Julo 


	Eddy Quicksall <Eddy_Quicksall@ivivity.com> 
Sent by: owner-ips@ece.cmu.edu 


26-03-02 16:52 
Please respond to Eddy Quicksall 

        
       To:        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu> 
       cc:         
       Subject:        iSCSI: padding on intermediate sequences 

      



Section 9.7.7 says: 
 
The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the 
integer number of 4 byte words (real payload) unless the F bit is set 
to 1. 
 
This allows one to pad intermediate sequences of a transfer. But, there are
reasons why padding on intermediate sequences within a transfer can make
life difficult. 
 
Can we forbid padding on all but the last PDU for the transfer? If that is
objectionable, could we forbid padding on all but the last PDU of a transfer
if DataInOrder=yes. 
 
Eddy 







------_=_NextPart_001_01C1D5BB.F3931D70
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#0000ff size=2>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=642303717-27032002>Julian,</SPAN></FONT></DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN 
class=642303717-27032002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial color=#0000ff size=2><SPAN class=642303717-27032002>Notice 
in the example I gave below, that the pad was only applied when the F bit was 
set. <FONT color=#000000>Section 9.7.7 says:</FONT><FONT face="Times New Roman" 
color=#000000 size=3> <BR>&nbsp;</FONT><FONT face="Courier New" size=2><BR><FONT 
color=#000000>The Data Segments of Data-in and Data-out PDUs SHOULD be filled to 
the</FONT></FONT><FONT face="Times New Roman" color=#000000 size=3> </FONT><FONT 
face="Courier New" size=2><BR><FONT color=#000000>integer number of 4 byte words 
(real payload) unless the F bit is set</FONT></FONT><FONT face="Times New Roman" 
color=#000000 size=3> </FONT><FONT face="Courier New" size=2><BR><FONT 
color=#000000>to 1.</FONT></FONT><FONT face="Times New Roman" size=3><FONT 
color=#000000> </FONT><BR></DIV></FONT></SPAN></FONT>
<DIV><SPAN class=642303717-27032002></SPAN>&nbsp;</DIV>
<DIV><SPAN class=642303717-27032002>So my example is not forbidden. Can you 
please change section 9.7.7 to be more clear and forbid this behavior<SPAN 
class=480031818-27032002>?</SPAN> I suggest something like:</SPAN></DIV>
<DIV><FONT face=Arial size=2><SPAN class=642303717-27032002><FONT 
face="Times New Roman" size=3></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face="Courier New" color=#000000 size=2><SPAN 
class=642303717-27032002>The Data Segments of Data-in and Data-out PDUs SHOULD 
be filled to the <BR>integer number of 4 byte words (real payload) unless the F 
bit is set <BR>to 1 </SPAN></FONT><SPAN class=642303717-27032002><FONT 
face="Courier New" color=#000000 size=2>on the last Data PDU that concludes the 
entire requested</FONT></DIV>
<DIV><FONT face="Courier New"><FONT size=2><FONT color=#000000>data transfer for 
the task from the target's perspective<SPAN 
class=642303717-27032002>.</SPAN></FONT></FONT></FONT></DIV>
<DIV><FONT size=+0><FONT size=2><SPAN 
class=642303717-27032002></SPAN></FONT></FONT>&nbsp;</DIV>
<DIV><FONT size=+0><FONT face=Arial color=#0000ff size=2><SPAN 
class=642303717-27032002>Eddy</SPAN></FONT></FONT></DIV></SPAN></FONT></DIV>
<BLOCKQUOTE>
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Wednesday, March 27, 2002 
  1:42 AM<BR><B>To:</B> Eddy Quicksall<BR><B>Cc:</B> Sanjay 
  Goyal<BR><B>Subject:</B> RE: iSCSI: padding on intermediate 
  sequences<BR><BR></FONT></DIV><BR><BR><FONT face=sans-serif size=2>The spec 
  clearly forbids this behavior - data pdus (except the last) have to filled 
  (not padded) to a 4 byte boundary. That is what the text says.</FONT> 
  <BR><BR><FONT face=sans-serif size=2>Regards,</FONT> <BR><FONT face=sans-serif 
  size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD>
      <TD><FONT face=sans-serif size=1><B>Eddy Quicksall 
        &lt;Eddy_Quicksall@ivivity.com&gt;</B></FONT> 
        <P><FONT face=sans-serif size=1>26-03-02 18:52</FONT> <BR><FONT 
        face=sans-serif size=1>Please respond to Eddy Quicksall</FONT> <BR></P>
      <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; </FONT><BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; 
        &nbsp; &nbsp;Julian Satran/Haifa/IBM@IBMIL</FONT> <BR><FONT 
        face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; 
        &nbsp; &nbsp;Sanjay Goyal &lt;sanjay_goyal@ivivity.com&gt;, Sukha Ghosh 
        &lt;sukha_ghosh@ivivity.com&gt;</FONT> <BR><FONT face=sans-serif 
        size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; 
        &nbsp;RE: iSCSI: padding on intermediate sequences</FONT> <BR><BR><FONT 
        face=Arial size=1>&nbsp; &nbsp; &nbsp; 
  &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face=Arial color=blue 
  size=2>Maybe I didn't say something right. Here is what I meant:</FONT> 
  <BR><FONT face="Times New Roman" size=3>&nbsp;</FONT> <BR><FONT face=Arial 
  color=blue size=2>I-T Read CDB of 1024 bytes</FONT> <BR><FONT face=Arial 
  color=blue size=2>T-I Data-In with 513 bytes and F bit set. So, pad is 3 
  bytes. I don't like pad here.</FONT> <BR><FONT face=Arial color=blue 
  size=2>T-I Data-In with 511 bytes and F bit set. So, pad is 1 byte. This is 
  the only place I would like to see pad.</FONT> <BR><FONT 
  face="Times New Roman" size=3>&nbsp;</FONT> <BR><FONT face=Arial color=blue 
  size=2>Since the F bit ends a sequence and since a transfer can have several 
  sequences, the spec allows each sequence to have pad. It is a problem for the 
  HW guys to deal with pad except at the end of the whole transfer.</FONT> 
  <BR><FONT face=Arial color=blue size=2>&nbsp;</FONT> <BR><FONT face=Arial 
  color=blue size=2>Eddy</FONT> <BR><FONT face=Tahoma size=2>-----Original 
  Message-----<B><BR>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com]<B><BR>Sent:</B> Tuesday, March 26, 2002 
  11:09 AM<B><BR>To:</B> Eddy Quicksall<B><BR>Subject:</B> Re: iSCSI: padding on 
  intermediate sequences<BR></FONT><BR><FONT face=sans-serif size=2><BR>Eddy - 
  it says real payload. They must be filled not padded. That is mandataed to 
  avoid padding abuse.</FONT><FONT face="Times New Roman" size=3> 
  <BR></FONT><FONT face=sans-serif size=2><BR>But I assume that I missread your 
  question.</FONT><FONT face="Times New Roman" size=3> <BR></FONT><FONT 
  face=sans-serif size=2><BR>Julo</FONT><FONT face="Times New Roman" size=3> 
  <BR><BR></FONT>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD width="2%">
      <TD width="44%"><FONT face=sans-serif size=1><B>Eddy Quicksall 
        &lt;Eddy_Quicksall@ivivity.com&gt;</B></FONT><FONT 
        face="Times New Roman" size=3> </FONT><FONT face=sans-serif 
        size=1><BR>Sent by: owner-ips@ece.cmu.edu</FONT><FONT 
        face="Times New Roman" size=3> </FONT>
        <P><FONT face=sans-serif size=1>26-03-02 16:52</FONT><FONT 
        face="Times New Roman" size=3> </FONT><FONT face=sans-serif 
        size=1><BR>Please respond to Eddy Quicksall</FONT><FONT 
        face="Times New Roman" size=3> </FONT></P>
      <TD width="53%"><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; &nbsp;To: 
        &nbsp; &nbsp; &nbsp; &nbsp;"ips@ece. cmu. edu (E-mail)" 
        &lt;ips@ece.cmu.edu&gt;</FONT><FONT face="Times New Roman" size=3> 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; &nbsp;cc: 
        &nbsp; &nbsp; &nbsp; &nbsp;</FONT><FONT face="Times New Roman" size=3> 
        </FONT><FONT face=sans-serif size=1><BR>&nbsp; &nbsp; &nbsp; 
        &nbsp;Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: padding on intermediate 
        sequences</FONT><FONT face="Times New Roman" size=3> <BR></FONT><FONT 
        face=Arial size=1><BR>&nbsp; &nbsp; &nbsp; 
  </FONT></TR></TBODY></TABLE><BR><FONT face="Times New Roman" 
  size=3><BR></FONT><FONT face=Arial size=2><BR>Section 9.7.7 says:</FONT><FONT 
  face="Times New Roman" size=3> <BR>&nbsp;</FONT><FONT face="Courier New" 
  size=2><BR>The Data Segments of Data-in and Data-out PDUs SHOULD be filled to 
  the</FONT><FONT face="Times New Roman" size=3> </FONT><FONT face="Courier New" 
  size=2><BR>integer number of 4 byte words (real payload) unless the F bit is 
  set</FONT><FONT face="Times New Roman" size=3> </FONT><FONT face="Courier New" 
  size=2><BR>to 1.</FONT><FONT face="Times New Roman" size=3> 
  <BR>&nbsp;</FONT><FONT face=Arial size=2><BR>This allows one to pad 
  intermediate sequences of a transfer. But, there are reasons why padding on 
  intermediate sequences within a transfer can make life difficult.</FONT><FONT 
  face="Times New Roman" size=3> <BR>&nbsp;</FONT><FONT face=Arial 
  size=2><BR>Can we forbid padding on all but the last PDU for the transfer? If 
  that is objectionable, could we forbid padding on all but the last PDU of a 
  transfer if DataInOrder=yes. </FONT><FONT face="Times New Roman" 
  size=3><BR>&nbsp;</FONT><FONT face=Arial size=2><BR>Eddy</FONT><FONT 
  face="Times New Roman" size=3> 
<BR></FONT><BR><BR><BR><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D5BB.F3931D70--


From owner-ips@ece.cmu.edu  Wed Mar 27 14:40:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18469
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 14:40:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RJ1Fw07314
	for ips-outgoing; Wed, 27 Mar 2002 14:01:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RJ1Dw07309
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 14:01:13 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 3223230706; Wed, 27 Mar 2002 14:01:13 -0500 (EST)
Date: Wed, 27 Mar 2002 10:56:32 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: <Black_David@emc.com>
Cc: <ips@ece.cmu.edu>, <thorpej@wasabisystems.com>, <sommerfeld@sun.com>
Subject: RE: IPSEC target and transport mode
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E02937666@CORPMX14>
Message-ID: <Pine.NEB.4.33.0203271018280.365-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Wed, 27 Mar 2002 Black_David@emc.com wrote:

> Bill,
>
> > As I understand tunnel mode, you have an IPsec security gateway in the
> > topology. Among other things, that means we won't readily have end-to-end
> > security, since you have security from the gateway to the device, not
> > necessarily the initiator to the device.
>
> The gateway is possible, but not necessary.  RFC 2401, section 4.1 says:
>
> 	Two hosts MAY establish a tunnel mode SA between themselves.
>
> Hence the assertion that end-to-end security is not possible in tunnel
> mode is incorrect.  OTOH, if someone chooses to use a separate security
> gateway packaged with their IP Storage implementation, they
> can only claim compliance with the security requirements of the
> appropriate IP Storage RFC(s) on the secured side of the gateway -
> they have to explain to their customer that there is no IPsec security
> on the (presumably private) link between the IP Storage system and
> the gateway.

The examples I've seen of that are cases where security gateways want to
talk to each other, *and* they end up using internal addresses to use the
tunnel. i.e. not the IP addresses the tunnel is built between. I think
you can slide and have the connection to one of the tunnel addresses, but
the other one needs to be internal.

If we need an extra address, I don't see that mentioned, and I don't want
folks to get surprised whent hey go to try and hook thing up.

Oh, by basing a MUST in iSCSI on a MAY in RFC 2401, aren't we seting
ourselves up for interoperability problems when we hit an IPsec stack on
the other end that doesn't support the mode you support?

> > How do you suggest we achieve end-to-end security without
> > transport mode a MUST?
>
> IPsec security policy (including use and acceptance of ID payloads)
> and decisions about which IKE authentication material is installed
> in what systems and is accepted/required by what other systems.
> Forcing use of transport mode is a poor substitute for putting a
> proper security policy in place.  Ensuring that only the ends of
> interest have the material required to set up the end-to-end SA is
> a good idea.

David, I think we have a disconnect here. I had my example in mind. I
agree that there are places where tunnel mode will be needed to do IPsec
right. And that a topology more complicated than my example will need more
flexability.

> > Specifically the topology I have in mind is I make a dedicated IP SAN, and
> > want ESP from the file servers to the storage boxes. They are all on the
> > same (GigE) subnet. How do I get this level of security (end-to-end) with
> > just tunnel mode?
>
> Negotiate what you want and make sure that no security gateway between the
> file servers and storage boxes has the IKE authentication material that
> the file servers and storage boxes will require.  Negotiation of the
> encapsulation mode (you can still do transport if you want to, it's just
> not REQUIRED) is supported by SA attribute 4 in Section 4.5 of RFC 2407
> (yes, it's well hidden ...).

Let me try that again. I have a file server with an address on the IP SAN
at 192.168.1.1, and the iSCSI device is at 192.168.1.3. They have either a
cross-over cable or a gig swith between them.

What would the SPDs look like?

Have you tried it?

Also, I realize that transport will be a MAY. But as I understand it, I'll
have to look at specs to make sure that devices have it in order to be
able to do what I describe above.

If the answer to those questions just above is, "blah" and "yes," then I'm
happy. It's just my experience with IPsec is that it's not that simple.

Take care,

Bill



From owner-ips@ece.cmu.edu  Wed Mar 27 14:40:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18495
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 14:40:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RJNdJ09347
	for ips-outgoing; Wed, 27 Mar 2002 14:23:39 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from atlrel6.hp.com (atlrel6.hp.com [156.153.255.205])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RJNbw09342
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 14:23:37 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by atlrel6.hp.com (Postfix) with ESMTP id CC6CDBA4
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 14:23:31 -0500 (EST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id LAA11953 for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 11:25:14 -0800 (PST)
Message-ID: <00c201c1d5c4$e0bbe0c0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: <ips@ece.cmu.edu>
References: <OF7282ECF6.E49337C9-ONC2256B89.0024BBC4@telaviv.ibm.com>
Subject: Re: iSCSI: SRP status
Date: Wed, 27 Mar 2002 11:23:30 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

FWIW, I share Julian's concerns.  I am concerned that attempts to 
invent a new mechanism will be time-taking, and essentially will leave
us all less knowledgeable about any potential patent overlaps than 
even what we know about SRP today.  I also recall hearing similar 
sentiments expressed at the Minneapolis meeting.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com


----- Original Message ----- 
From: "Julian Satran" <Julian_Satran@il.ibm.com>
To: <ips@ece.cmu.edu>
Sent: Tuesday, March 26, 2002 10:52 PM
Subject: Re: iSCSI: SRP status


> David,
> 
> As one of the authors of the discussed draft I would like to thank you for 
> your efforts both in clarifying the position of you company and to clearly 
> pointing out that it is both unwise to act on rumors and to "invent on the 
> spot" an authentication method.  Following the later path we can end 
> having an unproven method and there no guarantee that it is not encumbered 
> by patents - both of which can happen regardless of the expertise and 
> intentions of the participants in the effort.
> 
> Regards,
> Julo
> 
> 
> 
> 
> David Jablon <dpj@theworld.com>
> Sent by: owner-ips@ece.cmu.edu
> 26-03-02 23:37
> Please respond to David Jablon
> 
>  
>         To:     Black_David@emc.com
>         cc:     ips@ece.cmu.edu
>         Subject:        Re: iSCSI: SRP status
> 
>  
> 
> David,
> 
> Here are a few points to add to this summary of recent
> events regarding SRP.
> 
> The first is simply that the just-posted policy letter from
> Phoenix legal was presented and discussed in Minneapolis.
> While I won't attempt to summarize that discussion here,
> I have relayed the concerns expressed back to Phoenix.
> 
> A second point is a delicate one, related to larger IETF
> policy in general. Concern was expressed at the meeting that
> the WG appears to be changing the content (if not the
> requirements too) of a proposed standard, based on
> unconfirmed rumor.
> 
> The fact that a patent holder has refused to confirm or deny
> such rumors, or provide a license policy statement, is
> surely a concern.  But this concern may mask a pernicious
> problem.  Such WG behavior allows anyone to start
> unresolvable rumors of potential patent coverage in order to
> steer a group in arbitrary directions.  Unfortunately, IETF
> policy and tradition make open discussion of the legitimacy
> of such rumors very difficult.
> 
> Concern was expressed at the meeting about security
> dangers inherent in designing a new method, such as some
> kind of mutually-authenticating variant of CHAP.  Even
> beyond the security concerns, it may be impossible for the
> group to determine that a newly proposed method is patent-
> free.  The standard practices of using evidence of
> surviving years of cryptographic review to establish
> security, or commercial use to establish unencumbrance,
> both may not work for methods still-to-be described.
> 
> The draft-jablon-speke-00.txt presented to the WG on this
> list and at the meeting specifically describes methods that
> provide the benefits of SRP, but are less structurally
> related to EKE.  It describes methods that have survived
> 5 years of public scrutiny, that achieve higher goals than
> the just-proposed alternatives, and that have been
> commercially deployed without licensing another
> organization's patents.
> 
> In presenting this information, I am clearly staying within
> the guidelines of longstanding written IETF policy, but
> clearly coming up against IETF tradition in talking as
> openly as possible about such sensitive issues.
> 
> I hope that the group will carefully consider these methods,
> in addition to any soon-to-be proposed variants of CHAP
> or Diffie-Hellman, as they review their security and
> functionality objectives.
> 
> Furthermore, in light of the repeated attempts to get
> another company to clarify or simplify it's license
> position, I would hope that any group or individual with
> concern about the Phoenix position will make their concerns
> known to the company, or to me personally, and I'll do my
> best to get an acceptable response.
> 
> -- David Jablon
> 
> 
> At 05:24 PM 3/25/02 -0500, Black_David@emc.com wrote:
> >It's been an "interesting" week on this topic.  This is an
> >attempt to (coherently) summarize the current situation in which
> >the WG finds itself and what is being done.  This message is a
> >mixture of technical and procedural material - technical queries
> >and follow-ups should be sent to the list, but I would ask that
> >procedural queries and follow-ups be sent directly to me to avoid
> >procedural discussions on the list.  I promise to post the
> >(inevitable) clarifications.
> >
> >-- Disclaimer
> >
> >- I am NOT a lawyer.
> >- This message does NOT contain legal advice.
> >- If you need legal advice, you need to talk to a lawyer.
> >- If actions or decisions based on information in this message
> >        have legal consequences, those consequences are YOUR
> >        responsibility.
> >        - The IETF and yours truly disclaim all responsibility
> >
> >On the subject of Intellectual Property Rights, the attention of all
> >IETF participants is directed to Section 10 of RFC 2026.
> >
> >-- Patents
> >
> >While the IETF disclaims responsibility for performing patent
> >searches (see Section 10 of RFC 2026), the following patents have
> >been identified to the IPS WG as being of concern with respect to SRP:
> >
> >(1) An SRP patent application filed by Stanford University [The SRP 
> patent]
> >(2) US 6226383 held by Phoenix [The SPEKE patent)
> >(3) US 5241599 and US 5440635, held by Lucent [The EKE patents]
> >
> >-- Enquiries and Responses
> >
> >Enquiries have been made of the above patent holders, who have responded
> >as follows:
> >
> >(1) Stanford has a license to their pending SRP patent available on the 
> web
> >        at http://otl.stanford.edu/pdf/97006.pdf. There is no cost to
> >obtain
> >        the license.  No payments are due to Stanford under the license 
> and
> >        the license does not contain any reciprocal grant of rights back 
> to
> >        Stanford.
> >(2) Phoenix has written to the IETF to say that the SPEKE patent may 
> apply
> >        to SRP and has committed to make licenses available on reasonable
> >        and non-discriminatory terms.  The Phoenix letter containing 
> these
> >        statements will be sent to the list shortly and will also appear 
> in
> >        the Intellectual Property Rights Notices area of the IETF web 
> site
> >in
> >        the near future.
> >(3) After initially promising to do so, Lucent has decided not to make 
> any
> >        statement about applicability of the EKE patents to SRP.  Lucent 
> has
> >        orally pledged to license the EKE patents in accordance with 
> normal
> >        Lucent licensing practices, but these practices do not involve
> >        "reasonable and non-discriminatory" terms.
> >
> >These responses have been summarized in this message for brevity and
> >clarity.
> >For more details on (1), see the license at the URL above.  For (2), see
> >the forthcoming message and/or the IETF web site.  For (3), see the text
> >on this topic contained in the message at:
> >http://www.pdl.cmu.edu/mailinglists/ips/mail/msg08716.html . 
> >
> >-- IETF Standards Process
> >
> >The IETF standards process places some emphasis on commitments to
> >reasonable and non-discriminatory licensing terms (see Section 10 of
> >RFC 2026).  Commitments to license on openly specified, reasonable and
> >non-discriminatory terms are neither strictly necessary nor sufficient
> >for the IESG to approve use of technology that is covered by patents,
> >but the absence of such commitments makes IESG approval both
> >less likely to occur and more difficult to obtain.
> >
> >In all cases, it is up to the WG to determine the best technical
> >solutions to the problems it is solving, and to make the case to the
> >IESG that the nature of the problem and available technology justifies
> >the use of technology covered by patents.  The IESG will analyze each
> >individual case on its own merits.  This position was reaffirmed by
> >the IESG during the IESG plenary last Thursday evening.
> >
> >-- iSCSI 
> >
> >The IPS WG considered this situation at its meeting last week and
> >determined that rough consensus no longer exists for a "MUST implement"
> >requirement for SRP in iSCSI.  As things currently stand, that 
> requirement
> >will be weakened to "MAY" and the WG is obligated to designate some
> >other inband authentication protocol as "MUST implement" for
> >interoperability.
> >
> >Based on my discussions with some of the Transport and Security Area
> >Directors, an approach based on using CHAP instead of SRP appears to
> >be acceptable, but the WG should consider whether to adopt a version
> >of CHAP enhanced by adding a Diffie-Hellman key exchange that would make
> >the protocol resist passive attacks (e.g., packet sniffer captures CHAP
> >traffic, adversary tries the dictionary of passwords off-line).  The
> >WG is *not* being instructed to adopt this approach; the request is
> >simply to consider it.
> >
> >In no particular order of priority and/or importance, the following
> >activities are underway to deal with the SRP situation:
> >- The iSCSI security design team has been asked to take another look
> >        at authentication mechanisms.
> >- Work is underway with cryptographers to consider how to add a DH
> >        exchange and/or mutual authentication to CHAP (the latter because
> >        SRP is capable of mutual authentication).
> >- A requirements discussion for the above two bullets will take place
> >        on this list in the near future.  The reason for delaying this
> >        discussion is to gather information on the consequences of
> >        requirements decisions, rather than hold a discussion in the
> >abstract.
> >- Lucent continues to be approached with requests to be more cooperative.
> >        Lucent's actions (or lack thereof) are the primary cause of this
> >        delay to iSCSI.
> >
> >iSCSI progress has been delayed by this situation.  We were
> >originally hoping to start a WG Last Call on the next (-12) version
> >of iSCSI within the next week or so.  That is not possible with this
> >technical issue open - a Mock WG Last Call will be conducted on the
> >next version of the iSCSI draft with the goal of reaching closure on
> >most of its text, but the actual WG Last Call will have to await
> >resolution of this issue.  I am hopeful that this resolution can
> >be achieved in the next month or two.
> >
> >Thanks,
> >--David (IP Storage WG co-chair)
> >
> >---------------------------------------------------
> >David L. Black, Senior Technologist
> >EMC Corporation, 42 South St., Hopkinton, MA  01748
> >+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
> >black_david@emc.com         Cell: +1 (978) 394-7754
> >--------------------------------------------------- 
> 
> 
> 
> 


From owner-ips@ece.cmu.edu  Wed Mar 27 15:54:39 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22280
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 15:54:39 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RKSUU14584
	for ips-outgoing; Wed, 27 Mar 2002 15:28:30 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2RKSSw14579
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 15:28:28 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2RKSN005736
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 15:28:23 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2RKSMK05727;
	Wed, 27 Mar 2002 15:28:22 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2RKSLc16408;
	Wed, 27 Mar 2002 15:28:22 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15522.11109.463000.254722@gargle.gargle.HOWL>
Date: Wed, 27 Mar 2002 15:28:21 -0500
From: Paul Koning <ni1d@arrl.net>
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: RE: IPSEC target and transport mode
References: <277DD60FB639D511AC0400B0D068B71E02937666@CORPMX14>
	<Pine.NEB.4.33.0203271018280.365-100000@candlekeep.home-net.internetconnect.net>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 27 March 2002) by Bill Studenmund:
> On Wed, 27 Mar 2002 Black_David@emc.com wrote:
> 
> > Bill,
> >
> > > As I understand tunnel mode, you have an IPsec security gateway in the
> > > topology. Among other things, that means we won't readily have end-to-end
> > > security, since you have security from the gateway to the device, not
> > > necessarily the initiator to the device.
> >
> > The gateway is possible, but not necessary.  RFC 2401, section 4.1 says:
> >
> > 	Two hosts MAY establish a tunnel mode SA between themselves.
> >
> > Hence the assertion that end-to-end security is not possible in tunnel
> > mode is incorrect.  OTOH, if someone chooses to use a separate security
> > gateway packaged with their IP Storage implementation, they
> > can only claim compliance with the security requirements of the
> > appropriate IP Storage RFC(s) on the secured side of the gateway -
> > they have to explain to their customer that there is no IPsec security
> > on the (presumably private) link between the IP Storage system and
> > the gateway.
> 
> The examples I've seen of that are cases where security gateways want to
> talk to each other, *and* they end up using internal addresses to use the
> tunnel. i.e. not the IP addresses the tunnel is built between. I think
> you can slide and have the connection to one of the tunnel addresses, but
> the other one needs to be internal.

There's no restriction on the "inner" address in a tunnel.  It may be
the same as the outer address (tunnel endpoint address) if the tunnel
terminates at the same node as the source or destination of the
protected traffic.  But even in that case you're allowed to use a
different address if you wish.
 
> Oh, by basing a MUST in iSCSI on a MAY in RFC 2401, aren't we seting
> ourselves up for interoperability problems when we hit an IPsec stack on
> the other end that doesn't support the mode you support?

No, because the "MAY" David quoted indicates that a host has a choice
of modes it can pick from.  The more important statement in RFC 2401
is this one, which is the statement of what's mandatory-to-implement:

   In summary,
           a) A host MUST support both transport and tunnel mode.

(RFC 2401, top of page 9).

> Let me try that again. I have a file server with an address on the IP SAN
> at 192.168.1.1, and the iSCSI device is at 192.168.1.3. They have either a
> cross-over cable or a gig swith between them.
> 
> What would the SPDs look like?

"from 192.168.1.1, TCP port x, to 192.168.1.3, port <iscsi>, ESP
encryption foo, authentication bar" and the reverse.  It's the same
SPD whether you use tunnel mode or transport mode.

> Have you tried it?

Not recently.  Actually, an interesting wrinkle is that a number of
security gateways don't implement fine grain (per port) SPDs, in spite
of RFC 2401.  But apart from that it's pretty straightforward.

   paul



From owner-ips@ece.cmu.edu  Wed Mar 27 15:54:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22300
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 15:54:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RKGof13677
	for ips-outgoing; Wed, 27 Mar 2002 15:16:50 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RKGjw13662
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 15:16:45 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2RKFQ218750;
	Wed, 27 Mar 2002 15:15:26 -0500
Message-ID: <3CA22891.23363A9@splentec.com>
Date: Wed, 27 Mar 2002 15:16:17 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: iSCSI <ips@ece.cmu.edu>, Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Julian Satran <Julian_Satran@il.ibm.com>, iSCSI <ips@ece.cmu.edu>,
        "Mallikarjun C." <cbm@rose.hp.com>
Subject: Re: iSCSI: Login stage transition; T bit
References: <OFC2C2C555.DDAC0704-ONC2256B89.0026ADB2@telaviv.ibm.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Thanks Julian.

> +++ it must switch as the initiator is the one that requested it.

Do you think that it will be a good idea that this sentence
be included in the draft, since it makes the requrements
explicit. I.e.:

That is, if a req and resp stage transition sequence is communicated,
i.e. T=1 and NSG > CSG, then the initiator MUST switch to NSG, i.e.
the next PDU has to be an I->T PDU AND it MUST carry
a CSG = NSG(of the sequence). The target MUST close
the connection if such a PDU is not received, that is
a different PDU was received, after the stage transition sequence communication.

Comments on the above paragraph, appreciated.

Ok, no more improvement on the T bit. But as a side note:

> +++ yes it is redundant but intentionally so NSG hast to be 0 if T is not 1 +++

The text says that if T = 0 then NSG is reserved. That is it is invalid
whatever the value therein. T <==> NSG, thus the redundancy.

-- 
Luben


From owner-ips@ece.cmu.edu  Wed Mar 27 16:06:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23087
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 16:06:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RKqBe16542
	for ips-outgoing; Wed, 27 Mar 2002 15:52:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RKqAw16538
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 15:52:10 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <H4LPPQKT>; Wed, 27 Mar 2002 15:46:04 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293766D@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: RE: IPSEC target and transport mode
Date: Wed, 27 Mar 2002 15:51:34 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

> Not recently.  Actually, an interesting wrinkle is that a number of
> security gateways don't implement fine grain (per port) SPDs, in spite
> of RFC 2401.  But apart from that it's pretty straightforward.

I actually checked this in the ipsec WG last week.  Something like 2/3
of the security gateway vendors in the room indicated that they do support
the fine grain (per port) selectors in their SPDs, so the support does
exist, but it's not universal.

--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Wed Mar 27 16:14:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23713
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 16:14:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RKqJL16560
	for ips-outgoing; Wed, 27 Mar 2002 15:52:19 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from dr-evil.shagadelic.org (yeah-baby.shagadelic.org [208.176.2.162])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RJBCw08196
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 14:11:12 -0500 (EST)
Received: by dr-evil.shagadelic.org (Postfix, from userid 7518)
	id B86B79869; Wed, 27 Mar 2002 11:11:06 -0800 (PST)
Date: Wed, 27 Mar 2002 11:11:06 -0800
From: Jason R Thorpe <thorpej@wasabisystems.com>
To: ips@ece.cmu.edu
Subject: Re: IPSEC target and transport mode
Message-ID: <20020327111106.H23871@dr-evil.shagadelic.org>
Reply-To: thorpej@wasabisystems.com
References: <Pine.NEB.4.33.0203271031130.365-100000@candlekeep.home-net.internetconnect.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <Pine.NEB.4.33.0203271031130.365-100000@candlekeep.home-net.internetconnect.net>; from wrstuden@wasabisystems.com on Wed, Mar 27, 2002 at 10:31:40AM -0800
Organization: Wasabi Systems, Inc.
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

First of all, I'm new to the list (my subscription request is pending
approval right now, so please CC me explicitly on any replies..)

Sigh, every time I see a discussion of this nature, it makes me wish that
IPsec Tunnel Mode didn't even exist...

 > ---------- Forwarded message ----------
 > Date: Tue, 26 Mar 2002 19:31:37 -0500
 > From: Black_David@emc.com
 > To: pierre_labat@hp.com, ips@ece.cmu.edu
 > Subject: IPSEC target and transport mode
 > 

 ...

 > The sense of the room in Minneapolis (and it was a bit rough,
 > with visible dissent) was to drop the requirement for IPsec
 > transport mode.  Tunnel mode would become "MUST implement",
 > transport mode would become "MAY implement", and this would
 > override the "host must support both tunnel mode and transport
 > mode" requirement of RFC 2401.  Any procedural questions or

I really don't like this idea.  While it is true that Tunnel Mode
does not require the use of a gateway, Transport Mode is actually
the more general mode.

It is possible to combine Transport Mode with any arbitrary something-in-IP
tunneling protocol (IP-IP, GRE, etc.).  In the case of Transport Mode +
IP-IP tunneling, you achieve something that is equivalent to Tunnel Mode,
thus satisfying those who need it (I suggest that everyone read
draft-touch-ipsec-vpn-03.txt).

Transport Mode is also less expensive from a processing point of view.
If you use Tunnel Mode with no gateway (i.e. inner-dest==outer-dest,
outer-source==inner-source), you still have to de-encap the packet and
re-process it, which is something you don't have to do in Transport Mode.

-- 
        -- Jason R. Thorpe <thorpej@wasabisystems.com>


From owner-ips@ece.cmu.edu  Wed Mar 27 16:39:34 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25499
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 16:39:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RLB1518378
	for ips-outgoing; Wed, 27 Mar 2002 16:11:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web21201.mail.yahoo.com (web21201.mail.yahoo.com [216.136.129.59])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2RLAvw18370
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 16:10:57 -0500 (EST)
Message-ID: <20020327211056.4697.qmail@web21201.mail.yahoo.com>
Received: from [64.229.53.210] by web21201.mail.yahoo.com via HTTP; Wed, 27 Mar 2002 16:10:56 EST
Date: Wed, 27 Mar 2002 16:10:56 -0500 (EST)
From: David Wong <rsaecc@yahoo.com>
Subject: Re: iSCSI: SRP status
To: ips@ece.cmu.edu
In-Reply-To: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

May I know which SRP infringe which cliam of 
SPEKE patent: US Patent 6,226,383?
I feel that SRP does not infringe anything of SPEKE
though it may infringe EKE patent
(I am sure SPEKE infringe EKE patent: 
US Patent 5,241,559 and US Patent 5,440,635. )


--- David Jablon <dpj@theworld.com> wrote:
> Yes.
> 
> The words "another organization" mean "an
> organization other
> than the owner of the SPEKE patent". The draft is
> intended
> to clearly explain that the methods are subject to a
> patent currently
> owned by Phoenix.  Please let me know if you find
> any of the
> language there to be unclear.
> 
> -- David
> 
> At 08:16 PM 3/26/02 +0200, Ofer Biran wrote:
> >Can you clarify the statement
> >
> >"...and that have been commercially deployed
> without licensing another
> >organization's patents."
> >
> >Aren't you talking here about the patented SPEKE
> methods ?
> >
> >
> > Thanks,
> >    Ofer
> >
> >
> >Ofer Biran
> >Storage and Systems Technology
> >IBM Research Lab in Haifa
> >biran@il.ibm.com  972-4-8296253
> 


______________________________________________________________________ 
File your taxes online! http://taxes.yahoo.ca


From owner-ips@ece.cmu.edu  Wed Mar 27 18:30:40 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29456
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 18:30:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RN3mu26359
	for ips-outgoing; Wed, 27 Mar 2002 18:03:48 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RN3lw26355
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 18:03:47 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <H4LPPY1A>; Wed, 27 Mar 2002 17:57:40 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937676@CORPMX14>
From: Black_David@emc.com
To: rsnively@Brocade.COM
Cc: ips@ece.cmu.edu
Subject: RE: Bit numbering I-D nit
Date: Wed, 27 Mar 2002 18:03:12 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Ok, here's the resolution, complete with AD approval, and I even
used the "normative" word for clarity ...

(1) Any normative diagram (i.e., one that the reader must understand
	in order to implement the protocol) MUST use the bit and byte
	order in the ID nits document.  A version using the T11 bit and
	byte order may be provided in addition to (but NOT instead of)
	the primary version with a note that it is provided for the
	convenience of those familiar with Fibre Channel.  A note to
	the RFC Editor SHOULD be inserted to instruct that the bit
	and byte order not be changed in this second version.

(2) It is acceptable to provide the sole version of a diagram in T11
	bit and byte order when that diagram is:
	- not normative, AND
	- located in an appendix of the draft
	In this situation, the draft needs to make it clear that the
	appendix containing such a diagram is not normative.  RFC 2625
	is an example, as it is clear from context that the appendices
	are not normative.  Any new draft needs to contain an explicit
	statement that the appendixes are not normative (i.e., do not
	impose requirements on the protocol).  A note to the RFC Editor
	similar to the previous case SHOULD be inserted.

The above items also apply to T10 and SCSI via the obvious word/acronym
substitutions.  I hope this is satisfactory.

Thanks,
--David

---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Wed Mar 27 18:31:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29476
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 18:31:01 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2RMnMW25317
	for ips-outgoing; Wed, 27 Mar 2002 17:49:22 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mailhub.lss.emc.com (xdch.emc.com [168.159.1.79])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2RMnKw25313
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 17:49:20 -0500 (EST)
Received: from emc.com (emcmail.lss.emc.com [168.159.48.78])
	by mailhub.lss.emc.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g2RMnD410970;
	Wed, 27 Mar 2002 17:49:13 -0500 (EST)
Received: from mxic1.isus.emc.com ([168.159.129.100])
	by emc.com (8.10.1/8.10.1) with ESMTP id g2RMnD714796;
	Wed, 27 Mar 2002 17:49:13 -0500 (EST)
Received: by MXIC1 with Internet Mail Service (5.5.2653.19)
	id <HKRQ8RZK>; Wed, 27 Mar 2002 17:48:46 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937675@CORPMX14>
From: Black_David@emc.com
To: thorpej@wasabisystems.com, ips@ece.cmu.edu
Subject: RE: IPSEC target and transport mode
Date: Wed, 27 Mar 2002 17:48:43 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Jason,

With my WG co-chair hat off ...

>  > The sense of the room in Minneapolis (and it was a bit rough,
>  > with visible dissent) was to drop the requirement for IPsec
>  > transport mode.  Tunnel mode would become "MUST implement",
>  > transport mode would become "MAY implement", and this would
>  > override the "host must support both tunnel mode and transport
>  > mode" requirement of RFC 2401.  Any procedural questions or
> 
> I really don't like this idea.  While it is true that Tunnel Mode
> does not require the use of a gateway, Transport Mode is actually
> the more general mode.
> 
> It is possible to combine Transport Mode with any arbitrary
something-in-IP
> tunneling protocol (IP-IP, GRE, etc.).  In the case of Transport Mode +
> IP-IP tunneling, you achieve something that is equivalent to Tunnel Mode,
> thus satisfying those who need it (I suggest that everyone read
> draft-touch-ipsec-vpn-03.txt).

And make sure to pay attention to the following paragraph in Section 4.4:

   With IIPtran, next-hop forwarding is done outside IPsec. For full
   IPsec compliance, IIPtran requires a content-based forwarding
   mechanism that supports all IPsec selectors. On many systems,
   existing firewall mechanisms can be used for that purpose.

IIPtran is IPsec transport mode applied to an IP-in-IP tunnel.  This
creates a practical issue of needing to coordinate the IPsec SPD with
the configuration of the additional content-based forwarding mechanism.
This is probably not that complex for likely IP Storage deployment
scenarios, but it's one more thing to manage.

> Transport Mode is also less expensive from a processing point of view.
> If you use Tunnel Mode with no gateway (i.e. inner-dest==outer-dest,
> outer-source==inner-source), you still have to de-encap the packet and
> re-process it, which is something you don't have to do in 
> Transport Mode.

If I were starting from a clean sheet of paper without regard to existing
IPsec implementations/technology/etc., I would be inclined to do as Jason
suggests.  However, we are not in that situation.

The current situation is that there is significant interest in the WG in
using existing IPsec systems/devices/etc. to address this area of
functionality; the folks with this interest believe that only requiring
tunnel mode will significantly increase their design/implementation
options for doing so and are willing to pay the additional overhead of
tunnel mode encapsulation.

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Wed Mar 27 22:27:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA04278
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 22:27:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S2aBv09651
	for ips-outgoing; Wed, 27 Mar 2002 21:36:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls4.std.com [199.172.62.106])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S2Jkw08679
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 21:19:46 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id VAA24069
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 21:19:41 -0500
Message-Id: <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 28 Mar 2002 01:36:58 -0500
To: ips@ece.cmu.edu
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
In-Reply-To: <20020327211056.4697.qmail@web21201.mail.yahoo.com>
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

At 04:10 PM 3/27/02 -0500, "David Wong <rsaecc@yahoo.com>" wrote:
>May I know which SRP infringe which cliam of 
>SPEKE patent: US Patent 6,226,383?
>I feel that SRP does not infringe anything of SPEKE
>though it may infringe EKE patent
>(I am sure SPEKE infringe EKE patent: 
>US Patent 5,241,559 and US Patent 5,440,635. )

Technical material to support a contradictory viewpoint to the
above is in www.ietf.org/internet-drafts/draft-jablon-speke-00.txt.
The draft is careful to not state feelings or legal conclusions,
but SPEKE has been openly licensed and deployed for years
without using the Lucent patents.

I'm probably the last person to be lecturing about IETF etiquette
in this regard, but I think it is improper to present unsupported feelings
and beliefs about patent issues in any standards group discussion.
Facts are helpful.  Rumors and unsupported opinion are not.

The specific question from <rsaecc@yahoo.com> has been forwarded
to the appropriate legal people within Phoenix.  However, responding
to anonymous email is probably not a high priority for them.

-- David



From owner-ips@ece.cmu.edu  Wed Mar 27 22:27:28 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA04277
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 22:27:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S313t11204
	for ips-outgoing; Wed, 27 Mar 2002 22:01:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S311w11200
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 22:01:01 -0500 (EST)
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP id 9C332600B80
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 19:00:55 -0800 (PST)
Received: from cup.hp.com (santoshr@hpindhhm.cup.hp.com [15.8.80.197])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id TAA11656
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 19:00:47 -0800 (PST)
Message-ID: <3CA28879.5FC4F233@cup.hp.com>
Date: Wed, 27 Mar 2002 19:05:29 -0800
From: Santosh Rao <santoshr@cup.hp.com>
Organization: Hewlett Packard, Cupertino.
X-Mailer: Mozilla 4.78 [en] (X11; U; HP-UX B.11.00 9000/778)
X-Accept-Language: en
MIME-Version: 1.0
To: IPS Reflector <ips@ece.cmu.edu>
Subject: iscsi: CRN support not required. [was :Re: [Fwd: iSCSI: items discussed 
 at WG meeting]]
References: <78AF3C342AEAEF4BA33B35A8A15668C6019E2207@cceexc17.americas.cpqcorp.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Hello,

[ I changed the subject of this thread to be more meaningful to the
issue being discussed.]

Based on the below considerations, I am in favor of following the
example set by other serial scsi transports such as packetized SPI-x &
SRP, in not supporting CRN for iscsi.

Consider the following :

1) CRN is only defined as a parameter in SAM-2. Its usage semantics have
not been explained in SAM-2. It has also been made optional to support
for each scsi transport.

2) CRN usage description seems to have been left to each scsi transport,
based on the only usage being described in FCP-2, and not in SAM-2.

3) iscsi's CmdSN provides similar semantics as CRN, but at a session
granularity. (CmdSN usage, is mandatory, compared to an optional CRN.
CRN is on a per-lun basis. Cmdsn is 32-bit vs. 8-bit CRN.)

4) Due to mandatory use of CmdSN in iscsi, iscsi guarantees transport
ordering for command delivery and eliminates the need for yet another
sequencing scheme using CRN.
Other scsi transports that provide an ordered reliable transport do not
support CRN. The only scsi transport that supports CRN is FCP-2 and it
uses CRN to apply sequencing in a manner similar to iscsi using CmdSN.

Based on the above, I believe iscsi does not need to support CRN. 

Comments ?

Thanks,
Santosh




http://www.pdl.cmu.edu/mailinglists/ips/mail/msg03428.html


"Elliott, Robert" wrote:
> 
> Comments below...
> 
> > -----Original Message-----
> > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > Sent: Tuesday, March 26, 2002 7:50 PM
> > To: IPS Reflector
> > Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
> >
> > "Elliott, Robert" wrote:
> > >
> > > Don't assume that every new SCSI protocol will support CRN -
> > > SRP does not, for one.
> >
> > From a reading of SAM-2, it appears that the "Send SCSI Command" and
> > "SCSI Command Received" APIs (Section 5.4.2) define the CRN as one of
> > the arguments, which seems to imply that scsi transports should be
> > capable of transporting this argument, if the application
> > client decides to use it. (at least the newer scsi transports.)
> >
> > Are you saying that this is not the case ?
> 
> Yes.
> 
> > What is the basis for SRP not supporting CRN ?
> 
> The description of CRN in SAM-2 mentions that protocols might not
> support it - "It is not an error for the application client to
> provide this argument when CRN is not supported by the SCSI protocol
> or logical unit."
> 
> The same holds for autosense (although we did add language recently
> requiring all protocols except Parallel SCSI support autosense).
> 
> > What are the guidelines that determine whether a scsi transport should
> > support CRN or not ?
> 
> If the transport provides out of order delivery and you want to be able
> to send queued commands to tapes, CRN may be helpful.
> 
> > If the CRN is not required to be supported by all scsi transports, is
> > there a reason that iscsi needs to support this ?
> 
> Since iSCSI has added sequence numbers everywhere, CRN is not much of
> an extra burden.

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################


From owner-ips@ece.cmu.edu  Wed Mar 27 23:15:32 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05953
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 23:15:32 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S3REa12934
	for ips-outgoing; Wed, 27 Mar 2002 22:27:14 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S3RCw12929
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 22:27:12 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP id 78F53C00893
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 19:27:06 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id TAA22525 for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 19:28:49 -0800 (PST)
Message-ID: <015701c1d608$6e7db8a0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
References: <3C7122FAF06DD5118ED60050047336482631F2@esply01.cnt.com>
Subject: Re: iSCSI: MaxRecvPDULength simplification
Date: Wed, 27 Mar 2002 19:27:03 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

One of the design goals of task reassign is to be able to reassign the
connection allegiance of a task to a different connection that's perhaps
using an entire different network for a true failover capability - for ex.,
the original allegiant connection could be traversing a corprorate intranet,
and the reassigned connection could be using the public internet.  That's
the reason for not placing the equivalence requirement on the two
connections.

MaxRecvPDULength was made negotiable during the FFP because
several of us felt that it's very useful for iSCSI to allow implementations
with the `ULPDU containment' property
(http://search.ietf.org/internet-drafts/draft-ietf-tsvwg-tcp-ulp-frame-01.txt).
This automatically means that MaxRecvPDULength should be changeable
with changes in PMTU changes, particularly with dynamic PMTU degradation.

Let's look at the possibility you suggest - there being two valid MaxRecvPDULength
values at the same time.  If a change in FFP is being attempted for this key, it must
be due to PMTU changes, and the implicit expectation is that initiator will sense
it and initiate the negotiation process (thus enabling the target to declare its changed
MaxRecvPDULength, if any, as well in the text response).  There is no ambiguity for
the initiator since the text negotiation can not be assumed successful (meaning new
MaxRecvPDULength can't be used) until the text response (with F-bit) is received.
As far as the target is concerned, it can not assume the text negotiation to be effective
(meaing new MaxRecvPDULength can't be used) until the StatSN for the text response
is ack'ed - perhaps we should make this clear in the text (and allow explicit soliciting
for StatSN acknowledgement using a NOP-ping).
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

----- Original Message -----
From: "Michael Schoberg" <michael_schoberg@cnt.com>
To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Sent: Wednesday, March 27, 2002 8:36 AM
Subject: RE: iSCSI: MaxRecvPDULength simplification


> SNACK with RL=0 is only one requirement.  Another is task allegiance
> reassignment (6.1.2) which does not use SNACK (correct?)  Here the initiator
> sends a Task-Management request with a Task-Reassign message to the target.
> The target must reorganize it's T->I messages to match the MaxRecvPDULength
> of the new connection.  Plus, the Task Reassign message includes the
> ExpDataSN field which, if I'm reading right, on reassignment the target must
> remember the sequencing of the old connection in order to track the
> ExpDataSN field then re-sequence for the new connection (9.5.4).  So now
> target implementations will have to keep track of sequence indexes for
> Data-In PDUs for conversion over to the new allegiance.
>
> On-the-fly modification of MaxRecvPDULength also means that some compliance
> standard must be set for in-flight messages.  An outstanding read request
> may have T->I PDUs that comply with multiple MaxRecvPDULength values.  In a
> sense, there will be times where multiple MaxRecvPDULength values are valid.
> At what point MUST the target comply with the new value?
>
> So I guess I'm not convinced that the benefit of simplification is
> illusionary.  Is there a discussion thread that expressly states
> MaxRecvPDULength must have the flexibility allowed for in the draft?  The
> discussions I've seen mainly centered around whether it should be duplex
> valued (I->T, T->I).
>
> Thanks.
>
> -----Original Message-----
> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
> Sent: Wednesday, March 27, 2002 1:40 AM
> To: Michael Schoberg
> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
> Subject: Re: iSCSI: MaxRecvPDULength simplification
>
>
>
> The simplification you are talking about is illusory. Currently this
> requires SNACK to require all data(RL = 0).
> The restriction you propose instead is far more severe (and unwarranted).
>
> Julo
>
>
>
> Michael Schoberg <michael_schoberg@cnt.com>
> Sent by: owner-ips@ece.cmu.edu
>
>
> 27-03-02 01:19
> Please respond to Michael Schoberg
>
>
>
>         To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
>         cc:
>         Subject:        iSCSI: MaxRecvPDULength simplification
>
>
>
>
> I've looked over some of the reflector messages regarding MaxRecvPDULength
> negotiation (back to Oct 2001).  I can't find the discussion of why this
> value must be available for negotiation outside of login.  It really
> complicates SNACK and Task Reassignment if the initiator can change this
> value on-the-fly.  Would it be too restrictive to propose the following
> rules?
>
> 1) MaxRecvPDULength is negotiated only at login before FFP.
>
> 2) For message-level recovery, a connection must be prepared to accept the
> MaxRecvPDULength of the connection it's providing fail over capability for.
> It doesn't seem unreasonable to expect fault tolerant configurations to
> comply with this.  It would simply be stating that RecoveryLevel 2 devices
> should be somewhat matched in this capability.
>
>
>
>  -----Original Message-----
> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
> Sent: Tuesday, March 26, 2002 1:50 AM
> To: Michael Schoberg
> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
> Subject: Re: iSCSI: SNACK RunLength
>
>
> Michael,
>
> The paragraph says that if you issue a SNACK after the MaxPDURecvLength has
> decreased you should use RunLength 0 (meaning all) instead of a specific
> runlength which might not be accurate anymore.
>
> Julo
>
>
> Michael Schoberg <michael_schoberg@cnt.com>
> Sent by: owner-ips@ece.cmu.edu
>
>
> 25-03-02 19:43
> Please respond to Michael Schoberg
>
>
>        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
>        cc:
>        Subject:        iSCSI: SNACK RunLength
>
>
>
>
>
> Am I just not reading this or can this paragraph use some help?  Can someone
> give an interpretation?
>
>  9.16.3  RunLength
>                                 ...
>
>          The first data SNACK, issued after initiator's MaxRecvPDULength
>          decreased, for a command issued on the same connection before the
>
>          change in MaxRecvPDULength, MUST use RunLength "0" to request
>          retransmission of any number of PDUs (including one).  The number
> of
>          retransmitted PDUs in this case, may or may not be the same as
> the
>          original transmission, depending on whether loss was before or
> after
>          the MaxRecvPDULength was changed at the target.
>
>
> Does this refer to something like:
>
> For connections with unacknowledged PDUs that undergo MaxRecvPDULength
> negotiation ...
>
>
>
>
>
>
>



From owner-ips@ece.cmu.edu  Wed Mar 27 23:17:54 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA06025
	for <ips-archive@odin.ietf.org>; Wed, 27 Mar 2002 23:17:54 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S3vhR14811
	for ips-outgoing; Wed, 27 Mar 2002 22:57:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snap.thunk.org (SNAP.THUNK.ORG [216.175.175.173])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S3vfw14806
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 22:57:41 -0500 (EST)
Received: from 195.chicago-13-14rs.il.dial-access.att.net ([12.84.5.195] helo=think.thunk.org)
	by snap.thunk.org with asmtp (Exim 3.33 #1 (Debian))
	id 16qR2c-0008D6-00; Wed, 27 Mar 2002 22:57:34 -0500
Received: from tytso by think.thunk.org with local (Exim 3.34 #1 (Debian))
	id 16qR2b-0004m5-00; Wed, 27 Mar 2002 22:57:33 -0500
Date: Wed, 27 Mar 2002 22:57:32 -0500
From: Theodore Tso <tytso@mit.edu>
To: David Jablon <dpj@theworld.com>
Cc: Bernard Aboba <bernard_aboba@hotmail.com>, ips@ece.cmu.edu
Subject: Re: iSCSI authentication requirements
Message-ID: <20020327225732.A17992@thunk.org>
References: <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com> <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.15i
In-Reply-To: <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>; from dpj@theworld.com on Wed, Mar 27, 2002 at 03:42:55PM -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Wed, Mar 27, 2002 at 03:42:55PM -0500, David Jablon wrote:
> A primary decision for the WG to consider is whether
> item (e), preventing "dictionary attack", is important.

We need to be a bit more nuanced here.  The question is not just
whether or not a particular scheme is vulnerable to a dictionary
attack, but under what circumstances is it vulnerable to a dictionary
attack.  If the attack requires the use of an active attack, where the
attacker has to be on communications path, *and* the attacker must
interpose him/herself between the client and the server, *and* the
attack causes the attempted authentication to fail, such that the
client knows something might be going on --- how bad is it that under
these sorts of circumstances, a dictionary attack might be possible?

Also, if we posit that the authentication target has a public key,
which can be optionally cached by the client (in an ssh-style type
approach), then the server can sign its challenge with its public key,
and then even the possibility of an active attack is limited to the
first time the client talks to a particular server or iSCSI target.

Is this as good as an EKE, SPEKE, or PDM-style authentication scheme?
Nope; but it's close.  And as I articulated during the IETF
open-plenary, we are an engineering organization, and engineering
always involves tradeoffs.  Some of these tradeoffs are not
necessarily strictly technical, but involve real-world
business/financial issues.

The problem at this point is that the IP situation with respect to all
of these schemes is cloudy, and that may prevent some companies from
being able to implement the spec.  Also, if any of these patent claims
are true, then it certainly will rule out open-source, reference
implementations from being able to fully implement the specification.
Such reference implementations have for other working groups been a
significant force towards helping assure interoperability.  (Also,
consider that as Linux continues to make inroads into the server
platforms, it would be a real shame if Linux were not able to make
authenticated connections to iSCSI devices thanks to the patent
issues; you'd be essentially eliminating part of the iSCSI device
manufacturers' market thanks to the patent issue.)

How important are these issues?  Well, I will be the first to admit
that if some patented technology conferred overwhelming advantage over
all other alternatives (such as back in the bad old days when RSA and
D-H was the only game in town for doing public-key cryptography), then
the concerns which I've articulated probably would not outweigh the
technical advantage conferred by the IP-encumbered technology.  (And
even in that case, the fact that the technology was encumbered
probably delayed the wide-spread use of protocols which specified the
use of public-key technology by close to a decade.)

In this particular case, however, I would submit that the advantage
confered by using EKE, SPEKE, PDM, or other related technologies is at
best marginal.  There are other technical solutions, which I've
outlined above, that provide almost the same amount of protection,
without having to deal with the headaches of settling with potentially
two or three patent holders.  We also avoid eliminating at one stroke
all possibilities of compliant/legal open-source implementations of
the technology.  Because of both downsides, in this particular case,
the engineering tradeoffs simply isn't worth it.

							- Ted


From owner-ips@ece.cmu.edu  Thu Mar 28 00:15:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA07102
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 00:15:38 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S4THE16837
	for ips-outgoing; Wed, 27 Mar 2002 23:29:17 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from anchorage.arcot.com (anchorage.arcot.com [206.14.221.34])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S4TFw16831
	for <ips@ece.cmu.edu>; Wed, 27 Mar 2002 23:29:15 -0500 (EST)
Received: from arcot.com (172.16.50.219 [172.16.50.219]) by anchorage.arcot.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 1MT6V9L4; Wed, 27 Mar 2002 20:25:12 -0800
Message-ID: <3CA29C95.8060708@arcot.com>
Date: Wed, 27 Mar 2002 20:31:17 -0800
From: Tom Wu <tom@arcot.com>
Organization: Arcot Systems
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.8) Gecko/20020204
X-Accept-Language: en-us
MIME-Version: 1.0
To: ips@ece.cmu.edu
Subject: Re: iSCSI: SRP status
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com> <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

David Jablon wrote:
> At 04:10 PM 3/27/02 -0500, "David Wong <rsaecc@yahoo.com>" wrote:
> 
>>May I know which SRP infringe which cliam of 
>>SPEKE patent: US Patent 6,226,383?
>>I feel that SRP does not infringe anything of SPEKE
>>though it may infringe EKE patent
>>(I am sure SPEKE infringe EKE patent: 
>>US Patent 5,241,559 and US Patent 5,440,635. )
>>
> 
> Technical material to support a contradictory viewpoint to the
> above is in www.ietf.org/internet-drafts/draft-jablon-speke-00.txt.
> The draft is careful to not state feelings or legal conclusions,

After reading the draft, I must respectfully disagree.  Although it 
doesn't state explicit legal conclusions such as "X is covered by patent 
Y", it makes statements of opinion like "X uses techniques from Y (which 
is patented)" or "X is fundamentally different from Y", which, if the 
reader believes these assertions, leads him/her to a corresponding legal 
opinion.  I would suggest that opinions w.r.t. IP be struck from the I-D.

> but SPEKE has been openly licensed and deployed for years
> without using the Lucent patents.

But by that standard, so has SRP.  Has Phoenix (or Integrity Sciences) 
ever requested any IPR statement from Lucent regarding the EKE patents, 
similar to what the IPS WG has gone through the last few months?

> I'm probably the last person to be lecturing about IETF etiquette
> in this regard, but I think it is improper to present unsupported feelings
> and beliefs about patent issues in any standards group discussion.
> Facts are helpful.  Rumors and unsupported opinion are not.

Are "unsupported opinions" proper/improper in an Internet-Draft, though?

> The specific question from <rsaecc@yahoo.com> has been forwarded
> to the appropriate legal people within Phoenix.  However, responding
> to anonymous email is probably not a high priority for them.
> 
> -- David
> 

Tom
-- 
Tom Wu
Principal Software Engineer
Arcot Systems
(408) 969-6124



From owner-ips@ece.cmu.edu  Thu Mar 28 03:44:03 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA18829
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 03:44:02 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S86lS29245
	for ips-outgoing; Thu, 28 Mar 2002 03:06:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-3.de.ibm.com (d12lmsgate-3.de.ibm.com [195.212.91.201])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S86jw29240;
	Thu, 28 Mar 2002 03:06:45 -0500 (EST)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-3.de.ibm.com (1.0.0) with ESMTP id JAA59160;
	Thu, 28 Mar 2002 09:06:38 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2S86be106548;
	Thu, 28 Mar 2002 09:06:37 +0100
To: Michael Schoberg <michael_schoberg@cnt.com>
Cc: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iSCSI: Logout hierarchy
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF434F9475.95EC8707-ONC2256B8A.002B9808@telaviv.ibm.com>
Date: Thu, 28 Mar 2002 10:06:33 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 28/03/2002 10:06:37,
	Serialize complete at 28/03/2002 10:06:37
Content-Type: multipart/alternative; boundary="=_alternative 002BD870C2256B8A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 002BD870C2256B8A_=
Content-Type: text/plain; charset="us-ascii"

Nothing can come after the login response on the same connection. Times 
can be set for any values (the negotiated are defaults).
Tasks to be recovered are individually set to to Time2Retain. Any other 
logout can occur on another connection only and affect other tasks.

Julo




Michael Schoberg <michael_schoberg@cnt.com>
Sent by: owner-ips@ece.cmu.edu
27-03-02 18:49
Please respond to Michael Schoberg

 
        To:     "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
        cc: 
        Subject:        iSCSI: Logout hierarchy

 

Quick scenario:

A connection receives a logout message with recovery (ReasonCode = 2). The
Logout response sets a Time2Wait & Time2Retain as negotiated at login.
Within these periods, a new Logout (implicit or explicit) request comes in
either to remove that exact connection or to destroy the whole session.
Should the target obey the new request or honor the previous?



--=_alternative 002BD870C2256B8A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Nothing can come after the login response on the same connection. Times can be set for any values (the negotiated are defaults).</font>
<br><font size=2 face="sans-serif">Tasks to be recovered are individually set to to Time2Retain. Any other logout can occur on another connection only and affect other tasks.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Michael Schoberg &lt;michael_schoberg@cnt.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">27-03-02 18:49</font>
<br><font size=1 face="sans-serif">Please respond to Michael Schoberg</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;&quot;IPS Reflector (E-mail)&quot; &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iSCSI: Logout hierarchy</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Quick scenario:<br>
<br>
A connection receives a logout message with recovery (ReasonCode = 2). &nbsp;The<br>
Logout response sets a Time2Wait &amp; Time2Retain as negotiated at login.<br>
Within these periods, a new Logout (implicit or explicit) request comes in<br>
either to remove that exact connection or to destroy the whole session.<br>
Should the target obey the new request or honor the previous?<br>
</font>
<br>
<br>
--=_alternative 002BD870C2256B8A_=--


From owner-ips@ece.cmu.edu  Thu Mar 28 04:40:45 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA19959
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 04:40:45 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2S8lDG01420
	for ips-outgoing; Thu, 28 Mar 2002 03:47:13 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [195.212.91.200])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2S8lAw01410;
	Thu, 28 Mar 2002 03:47:10 -0500 (EST)
Received: from d12relay01.de.ibm.com (d12relay01.de.ibm.com [9.165.215.22])
	by d12lmsgate-2.de.ibm.com (1.0.0) with ESMTP id JAA150000;
	Thu, 28 Mar 2002 09:46:59 +0100
Received: from d10hubm1.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay01.de.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2S8ksg119002;
	Thu, 28 Mar 2002 09:46:58 +0100
To: Santosh Rao <santoshr@cup.hp.com>
Cc: IPS Reflector <ips@ece.cmu.edu>, owner-ips@ece.cmu.edu
MIME-Version: 1.0
Subject: Re: iscsi: CRN support not required. [was :Re: [Fwd: iSCSI: items discussed
  at WG meeting]]
X-Mailer: Lotus Notes Release 5.0.9  November 16, 2001
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OFA3881DD2.610E4E6A-ONC2256B8A.002FA726@telaviv.ibm.com>
Date: Thu, 28 Mar 2002 10:46:50 +0200
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 28/03/2002 10:46:58,
	Serialize complete at 28/03/2002 10:46:58
Content-Type: multipart/alternative; boundary="=_alternative 00300BC1C2256B8A_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This is a multipart message in MIME format.
--=_alternative 00300BC1C2256B8A_=
Content-Type: text/plain; charset="us-ascii"

I would say that CRN (wherever used) might add to the LU functionality and 
iSCSI can support it with no additional cost as we already support a 
stronger ordering.
Support involves only accepting the parameter and transporting it and no 
additional logic.

BTW are we going to constantly reopen issues on which we reached consensus 
a while ago without good reason for reopening!

Julo




Santosh Rao <santoshr@cup.hp.com>
Sent by: owner-ips@ece.cmu.edu
28-03-02 05:05
Please respond to Santosh Rao

 
        To:     IPS Reflector <ips@ece.cmu.edu>
        cc: 
        Subject:        iscsi: CRN support not required. [was :Re: [Fwd: iSCSI: items discussed at 
WG meeting]]

 

Hello,

[ I changed the subject of this thread to be more meaningful to the
issue being discussed.]

Based on the below considerations, I am in favor of following the
example set by other serial scsi transports such as packetized SPI-x &
SRP, in not supporting CRN for iscsi.

Consider the following :

1) CRN is only defined as a parameter in SAM-2. Its usage semantics have
not been explained in SAM-2. It has also been made optional to support
for each scsi transport.

2) CRN usage description seems to have been left to each scsi transport,
based on the only usage being described in FCP-2, and not in SAM-2.

3) iscsi's CmdSN provides similar semantics as CRN, but at a session
granularity. (CmdSN usage, is mandatory, compared to an optional CRN.
CRN is on a per-lun basis. Cmdsn is 32-bit vs. 8-bit CRN.)

4) Due to mandatory use of CmdSN in iscsi, iscsi guarantees transport
ordering for command delivery and eliminates the need for yet another
sequencing scheme using CRN.
Other scsi transports that provide an ordered reliable transport do not
support CRN. The only scsi transport that supports CRN is FCP-2 and it
uses CRN to apply sequencing in a manner similar to iscsi using CmdSN.

Based on the above, I believe iscsi does not need to support CRN. 

Comments ?

Thanks,
Santosh




http://www.pdl.cmu.edu/mailinglists/ips/mail/msg03428.html


"Elliott, Robert" wrote:
> 
> Comments below...
> 
> > -----Original Message-----
> > From: Santosh Rao [mailto:santoshr@cup.hp.com]
> > Sent: Tuesday, March 26, 2002 7:50 PM
> > To: IPS Reflector
> > Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]
> >
> > "Elliott, Robert" wrote:
> > >
> > > Don't assume that every new SCSI protocol will support CRN -
> > > SRP does not, for one.
> >
> > From a reading of SAM-2, it appears that the "Send SCSI Command" and
> > "SCSI Command Received" APIs (Section 5.4.2) define the CRN as one of
> > the arguments, which seems to imply that scsi transports should be
> > capable of transporting this argument, if the application
> > client decides to use it. (at least the newer scsi transports.)
> >
> > Are you saying that this is not the case ?
> 
> Yes.
> 
> > What is the basis for SRP not supporting CRN ?
> 
> The description of CRN in SAM-2 mentions that protocols might not
> support it - "It is not an error for the application client to
> provide this argument when CRN is not supported by the SCSI protocol
> or logical unit."
> 
> The same holds for autosense (although we did add language recently
> requiring all protocols except Parallel SCSI support autosense).
> 
> > What are the guidelines that determine whether a scsi transport should
> > support CRN or not ?
> 
> If the transport provides out of order delivery and you want to be able
> to send queued commands to tapes, CRN may be helpful.
> 
> > If the CRN is not required to be supported by all scsi transports, is
> > there a reason that iscsi needs to support this ?
> 
> Since iSCSI has added sequence numbers everywhere, CRN is not much of
> an extra burden.

-- 
##################################
Santosh Rao
Software Design Engineer,
HP-UX iSCSI Driver Team,
Hewlett Packard, Cupertino.
email : santoshr@cup.hp.com
Phone : 408-447-3751
##################################



--=_alternative 00300BC1C2256B8A_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">I would say that CRN (wherever used) might add to the LU functionality and iSCSI can support it with no additional cost as we already support a stronger ordering.</font>
<br><font size=2 face="sans-serif">Support involves only accepting the parameter and transporting it and no additional logic.</font>
<br>
<br><font size=2 face="sans-serif">BTW are we going to constantly reopen issues on which we reached consensus a while ago without good reason for reopening!</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Santosh Rao &lt;santoshr@cup.hp.com&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: owner-ips@ece.cmu.edu</font>
<p><font size=1 face="sans-serif">28-03-02 05:05</font>
<br><font size=1 face="sans-serif">Please respond to Santosh Rao</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;IPS Reflector &lt;ips@ece.cmu.edu&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;iscsi: CRN support not required. [was :Re: [Fwd: iSCSI: items discussed &nbsp;at WG meeting]]</font>
<br>
<br><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp;</font></table>
<br>
<br><font size=2 face="Courier New">Hello,<br>
<br>
[ I changed the subject of this thread to be more meaningful to the<br>
issue being discussed.]<br>
<br>
Based on the below considerations, I am in favor of following the<br>
example set by other serial scsi transports such as packetized SPI-x &amp;<br>
SRP, in not supporting CRN for iscsi.<br>
<br>
Consider the following :<br>
<br>
1) CRN is only defined as a parameter in SAM-2. Its usage semantics have<br>
not been explained in SAM-2. It has also been made optional to support<br>
for each scsi transport.<br>
<br>
2) CRN usage description seems to have been left to each scsi transport,<br>
based on the only usage being described in FCP-2, and not in SAM-2.<br>
<br>
3) iscsi's CmdSN provides similar semantics as CRN, but at a session<br>
granularity. (CmdSN usage, is mandatory, compared to an optional CRN.<br>
CRN is on a per-lun basis. Cmdsn is 32-bit vs. 8-bit CRN.)<br>
<br>
4) Due to mandatory use of CmdSN in iscsi, iscsi guarantees transport<br>
ordering for command delivery and eliminates the need for yet another<br>
sequencing scheme using CRN.<br>
Other scsi transports that provide an ordered reliable transport do not<br>
support CRN. The only scsi transport that supports CRN is FCP-2 and it<br>
uses CRN to apply sequencing in a manner similar to iscsi using CmdSN.<br>
<br>
Based on the above, I believe iscsi does not need to support CRN. <br>
<br>
Comments ?<br>
<br>
Thanks,<br>
Santosh<br>
<br>
<br>
<br>
<br>
http://www.pdl.cmu.edu/mailinglists/ips/mail/msg03428.html<br>
<br>
<br>
&quot;Elliott, Robert&quot; wrote:<br>
&gt; <br>
&gt; Comments below...<br>
&gt; <br>
&gt; &gt; -----Original Message-----<br>
&gt; &gt; From: Santosh Rao [mailto:santoshr@cup.hp.com]<br>
&gt; &gt; Sent: Tuesday, March 26, 2002 7:50 PM<br>
&gt; &gt; To: IPS Reflector<br>
&gt; &gt; Subject: Re: [Fwd: iSCSI: items discussed at WG meeting]<br>
&gt; &gt;<br>
&gt; &gt; &quot;Elliott, Robert&quot; wrote:<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Don't assume that every new SCSI protocol will support CRN -<br>
&gt; &gt; &gt; SRP does not, for one.<br>
&gt; &gt;<br>
&gt; &gt; From a reading of SAM-2, it appears that the &quot;Send SCSI Command&quot; and<br>
&gt; &gt; &quot;SCSI Command Received&quot; APIs (Section 5.4.2) define the CRN as one of<br>
&gt; &gt; the arguments, which seems to imply that scsi transports should be<br>
&gt; &gt; capable of transporting this argument, if the application<br>
&gt; &gt; client decides to use it. (at least the newer scsi transports.)<br>
&gt; &gt;<br>
&gt; &gt; Are you saying that this is not the case ?<br>
&gt; <br>
&gt; Yes.<br>
&gt; <br>
&gt; &gt; What is the basis for SRP not supporting CRN ?<br>
&gt; <br>
&gt; The description of CRN in SAM-2 mentions that protocols might not<br>
&gt; support it - &quot;It is not an error for the application client to<br>
&gt; provide this argument when CRN is not supported by the SCSI protocol<br>
&gt; or logical unit.&quot;<br>
&gt; <br>
&gt; The same holds for autosense (although we did add language recently<br>
&gt; requiring all protocols except Parallel SCSI support autosense).<br>
&gt; <br>
&gt; &gt; What are the guidelines that determine whether a scsi transport should<br>
&gt; &gt; support CRN or not ?<br>
&gt; <br>
&gt; If the transport provides out of order delivery and you want to be able</font>
<br><font size=2 face="Courier New">&gt; to send queued commands to tapes, CRN may be helpful.<br>
&gt; <br>
&gt; &gt; If the CRN is not required to be supported by all scsi transports, is<br>
&gt; &gt; there a reason that iscsi needs to support this ?<br>
&gt; <br>
&gt; Since iSCSI has added sequence numbers everywhere, CRN is not much of<br>
&gt; an extra burden.<br>
<br>
-- <br>
##################################<br>
Santosh Rao<br>
Software Design Engineer,<br>
HP-UX iSCSI Driver Team,<br>
Hewlett Packard, Cupertino.<br>
email : santoshr@cup.hp.com<br>
Phone : 408-447-3751<br>
##################################<br>
</font>
<br>
<br>
--=_alternative 00300BC1C2256B8A_=--


From owner-ips@ece.cmu.edu  Thu Mar 28 10:20:21 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA00083
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 10:20:21 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SEVBF01189
	for ips-outgoing; Thu, 28 Mar 2002 09:31:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mail.ivivity.com ([64.238.111.99])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SEV9w01185
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 09:31:09 -0500 (EST)
Received: by ATLOPS with Internet Mail Service (5.5.2653.19)
	id <H4N4ZVYC>; Thu, 28 Mar 2002 09:31:09 -0500
Message-ID: <25369470B6F0D41194820002B328BDD22F598A@ATLOPS>
From: Eddy Quicksall <Eddy_Quicksall@ivivity.com>
To: Julian Satran <Julian_Satran@il.ibm.com>
Cc: "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu>
Subject: RE: iSCSI: padding on intermediate sequences
Date: Thu, 28 Mar 2002 09:31:01 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1D665.2F0AC340"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1D665.2F0AC340
Content-Type: text/plain;
	charset="iso-8859-1"

Apparently FC had to make this restriction (see EMAIL from Robert Snively
[rsnively@brocade.com] dated 3/27). We should consider that as a basis for
discussion.
 
I have quoted Bob below:
 
>Since there is no requirement by the SCSI ULP to say anything about data
until
>the SCSI Status has been presented, there is no need to concern ourselves
with
>device dependent burst boundaries.  We can make the boundaries convenient
>for the technology.  In FCP, all bursts were required to begin on a 
>4-byte boundary, and all except the last to end on a 4-byte boundary.  This
>simplified DMA and segmentation/reassembly mechanisms
>in all hardware paths.  Looking at the TCP/IP formats, I see a similar
>bias toward 4-byte structures, which implies that the same rule would be
>a constructive addition to the document.
>
>This simply prohibited the target from asking for a number of intermediate
>bytes that was not a multiple of 4.
>
>The folks using odd byte block counts had to manage the buffers in
>a manner appropriate to such behaviors.  Practically, I do not believe that
>there were many such devices, nor was this a burden to any devices that did
>support such behavior.
>
>Bob
 
Eddy


 -----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
Sent: Wednesday, March 27, 2002 3:03 AM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail); owner-ips@ece.cmu.edu
Subject: RE: iSCSI: padding on intermediate sequences



Eddy, 

Now that we understand better you issue here are some reasons why we may not
want to do what you propose: 


*	the target may ask for a number of bytes that is not a multiple of 4
(should we outlaw this? I don't think we want) 

*	there might be devices that require/generate in "bursts" that are
not multiples of 4 


I think that we avoided abuse by what we have and we should leave further
optimization to the implementer for specific devices. 

Julo 




		Eddy Quicksall <Eddy_Quicksall@ivivity.com> 
Sent by: owner-ips@ece.cmu.edu 


	27-03-02 02:41 
Please respond to Eddy Quicksall 


	        
        To:        "ips@ece. cmu. edu (E-mail)" <ips@ece.cmu.edu> 
        cc:         
        Subject:        RE: iSCSI: padding on intermediate sequences 

       


	It is the sequences I am speaking of, not the segments. The current
wording
of the spec would allow you to send sequences with padding in each sequence
(the segments within the sequence are ok because they can't have padding).
But if a transfer is made up of several sequences then it is more work for
the hardware if intermediate sequences were allowed to have arbitrary pad
bytes.

And there is no good reason (that I am aware of) that intermediate sequences
could not just be pure data.

Now, if there is a reason, then we should come up with a scheme that allows
one party to "just say no". One possibility is that if DataInOrder=yes, then
padding would not be allowed except in the sequence that represents the last
portion of the transfer. 

If that is objectionable, then we should have a new key
(PaddingOnlyInLastSequenceOfTotalTransfer=yes). :-)

Eddy

-----Original Message-----
From: Robert D. Russell [mailto:rdr@io.iol.unh.edu]
Sent: Tuesday, March 26, 2002 2:48 PM
To: Eddy Quicksall
Cc: ips@ece. cmu. edu (E-mail)
Subject: Re: iSCSI: padding on intermediate sequences


Eddy:

I may not be understanding you correctly, but the
words in section 9.7.7 I believe mean that these data
segments should contain an integer number of 4 byte words
of data, not arbitrary "pad" bytes.  If the data segment
length is a multiple of 4 then there will be NO pad bytes.

There seems to be confusion over your use of "pad"
and the standard's use of "pad".  Would you please clarify?

Thanks,
Bob


On Tue, 26 Mar 2002, Eddy Quicksall wrote:

> Section 9.7.7 says:
>
> The Data Segments of Data-in and Data-out PDUs SHOULD be filled to the
> integer number of 4 byte words (real payload) unless the F bit is set
> to 1.
>
> This allows one to pad intermediate sequences of a transfer. But, there
are
> reasons why padding on intermediate sequences within a transfer can make
> life difficult.
>
> Can we forbid padding on all but the last PDU for the transfer? If that is
> objectionable, could we forbid padding on all but the last PDU of a
transfer
> if DataInOrder=yes.
>
> Eddy
>





------_=_NextPart_001_01C1D665.2F0AC340
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">


<META content="MSHTML 6.00.2713.1100" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff 
size=2>Apparently FC had to make this restriction (see EMAIL from Robert Snively 
[rsnively@brocade.com] dated 3/27). We should consider that as a basis for 
discussion.</FONT></SPAN></DIV>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff size=2>I have 
quoted Bob below:</FONT></SPAN></DIV>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613380414-28032002>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>Since there is no requirement by the SCSI 
ULP to say anything about data until</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>the SCSI Status has been presented, there is 
no need to concern ourselves with</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT size=2><FONT face="Courier New"><SPAN 
class=613380414-28032002>&gt;</SPAN>device dependent burst boundaries.&nbsp; We 
can make the boundaries convenient</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>for the technology.&nbsp; In FCP, all bursts 
were required to begin on a </FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>4-byte boundary, and all except the last to 
end on a 4-byte boundary.&nbsp; This</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>simplified DMA and segmentation/reassembly 
mechanisms</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>in all hardware paths.&nbsp; Looking at the 
TCP/IP formats, I see a similar</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>bias toward 4-byte structures, which implies 
that the same rule would be</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>a constructive addition to the 
document.</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New" size=2><SPAN 
class=613380414-28032002>&gt;</SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>This simply prohibited the target from 
asking for a number of intermediate</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>bytes that was not a multiple of 
4.</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New" size=2><SPAN 
class=613380414-28032002>&gt;</SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>The folks using odd byte block counts had to 
manage the buffers in</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>a manner appropriate to such 
behaviors.&nbsp; Practically, I do not believe that</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>there were many such devices, nor was this a 
burden to any devices that did</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>support such 
behavior.</FONT></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New" size=2><SPAN 
class=613380414-28032002>&gt;</SPAN></FONT></SPAN></DIV>
<DIV><SPAN class=720252516-27032002><FONT face="Courier New"><FONT size=2><SPAN 
class=613380414-28032002>&gt;</SPAN>Bob</FONT></FONT></SPAN></DIV></SPAN></DIV>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=613380414-28032002><FONT face=Arial color=#0000ff 
size=2>Eddy</FONT></SPAN></DIV>
<BLOCKQUOTE>
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma><BR><FONT 
  size=2><SPAN class=613380414-28032002><FONT face=Arial 
  color=#0000ff>&nbsp;</FONT></SPAN>-----Original Message-----<BR><B>From:</B> 
  Julian Satran [mailto:Julian_Satran@il.ibm.com]<BR><B>Sent:</B> Wednesday, 
  March 27, 2002 3:03 AM<BR><B>To:</B> Eddy Quicksall<BR><B>Cc:</B> ips@ece. 
  cmu. edu (E-mail); owner-ips@ece.cmu.edu<BR><B>Subject:</B> RE: iSCSI: padding 
  on intermediate sequences<BR><BR></FONT></FONT></DIV><BR><FONT face=sans-serif 
  size=2>Eddy,</FONT> <BR><BR><FONT face=sans-serif size=2>Now that we 
  understand better you issue here are some reasons why we may not want to do 
  what you propose:</FONT> <BR>
  <UL>
    <LI><FONT face=sans-serif size=2>the target may ask for a number of bytes 
    that is not a multiple of 4 (should we outlaw this? I don't think we 
    want)</FONT> 
    <LI><FONT face=sans-serif size=2>there might be devices that 
    require/generate in "bursts" that are not multiples of 4</FONT> 
    <BR><BR><BR><FONT face=sans-serif size=2>I think that we avoided abuse by 
    what we have and we should leave further optimization to the implementer for 
    specific devices.</FONT> <BR><BR><FONT face=sans-serif size=2>Julo</FONT> 
    <BR><BR><BR>
    <TABLE width="100%">
      <TBODY>
      <TR vAlign=top>
        <TD>
        <TD><FONT face=sans-serif size=1><B>Eddy Quicksall 
          &lt;Eddy_Quicksall@ivivity.com&gt;</B></FONT> <BR><FONT 
          face=sans-serif size=1>Sent by: owner-ips@ece.cmu.edu</FONT> 
          <P><FONT face=sans-serif size=1>27-03-02 02:41</FONT> <BR><FONT 
          face=sans-serif size=1>Please respond to Eddy Quicksall</FONT> 
<BR></P>
        <TD><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          </FONT><BR><FONT face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; 
          To: &nbsp; &nbsp; &nbsp; &nbsp;"ips@ece. cmu. edu (E-mail)" 
          &lt;ips@ece.cmu.edu&gt;</FONT> <BR><FONT face=sans-serif size=1>&nbsp; 
          &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</FONT> <BR><FONT 
          face=sans-serif size=1>&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; 
          &nbsp; &nbsp; &nbsp;RE: iSCSI: padding on intermediate 
          sequences</FONT> <BR><BR><FONT face=Arial size=1>&nbsp; &nbsp; &nbsp; 
          &nbsp;</FONT></TR></TBODY></TABLE><BR><BR><FONT face="Courier New" size=2>It 
    is the sequences I am speaking of, not the segments. The current 
    wording<BR>of the spec would allow you to send sequences with padding in 
    each sequence<BR>(the segments within the sequence are ok because they can't 
    have padding).<BR>But if a transfer is made up of several sequences then it 
    is more work for<BR>the hardware if intermediate sequences were allowed to 
    have arbitrary pad<BR>bytes.<BR><BR>And there is no good reason (that I am 
    aware of) that intermediate sequences<BR>could not just be pure 
    data.<BR><BR>Now, if there is a reason, then we should come up with a scheme 
    that allows<BR>one party to "just say no". One possibility is that if 
    DataInOrder=yes, then<BR>padding would not be allowed except in the sequence 
    that represents the last<BR>portion of the transfer. <BR><BR>If that is 
    objectionable, then we should have a new 
    key<BR>(PaddingOnlyInLastSequenceOfTotalTransfer=yes). 
    :-)<BR><BR>Eddy<BR><BR>-----Original Message-----<BR>From: Robert D. Russell 
    [mailto:rdr@io.iol.unh.edu]<BR>Sent: Tuesday, March 26, 2002 2:48 PM<BR>To: 
    Eddy Quicksall<BR>Cc: ips@ece. cmu. edu (E-mail)<BR>Subject: Re: iSCSI: 
    padding on intermediate sequences<BR><BR><BR>Eddy:<BR><BR>I may not be 
    understanding you correctly, but the<BR>words in section 9.7.7 I believe 
    mean that these data<BR>segments should contain an integer number of 4 byte 
    words<BR>of data, not arbitrary "pad" bytes. &nbsp;If the data 
    segment<BR>length is a multiple of 4 then there will be NO pad 
    bytes.<BR><BR>There seems to be confusion over your use of "pad"<BR>and the 
    standard's use of "pad". &nbsp;Would you please 
    clarify?<BR><BR>Thanks,<BR>Bob<BR><BR><BR>On Tue, 26 Mar 2002, Eddy 
    Quicksall wrote:<BR><BR>&gt; Section 9.7.7 says:<BR>&gt;<BR>&gt; The Data 
    Segments of Data-in and Data-out PDUs SHOULD be filled to the<BR>&gt; 
    integer number of 4 byte words (real payload) unless the F bit is 
    set<BR>&gt; to 1.<BR>&gt;<BR>&gt; This allows one to pad intermediate 
    sequences of a transfer. But, there<BR>are<BR>&gt; reasons why padding on 
    intermediate sequences within a transfer can make<BR>&gt; life 
    difficult.<BR>&gt;<BR>&gt; Can we forbid padding on all but the last PDU for 
    the transfer? If that is<BR>&gt; objectionable, could we forbid padding on 
    all but the last PDU of a<BR>transfer<BR>&gt; if 
    DataInOrder=yes.<BR>&gt;<BR>&gt; 
Eddy<BR>&gt;<BR></FONT><BR><BR></LI></UL></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1D665.2F0AC340--


From owner-ips@ece.cmu.edu  Thu Mar 28 12:31:52 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07161
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 12:31:52 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SGlia12072
	for ips-outgoing; Thu, 28 Mar 2002 11:47:44 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from esply02.cnt.com (mailhost.cnt.com [139.93.128.21])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SGlgw12066
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 11:47:42 -0500 (EST)
Received: by esply02.cnt.com with Internet Mail Service (5.5.2653.19)
	id <F6DLK2CW>; Thu, 28 Mar 2002 10:47:36 -0600
Message-ID: <3C7122FAF06DD5118ED60050047336482631F4@esply01.cnt.com>
From: Michael Schoberg <michael_schoberg@cnt.com>
To: "'Mallikarjun C.'" <cbm@rose.hp.com>,
        "IPS Reflector (E-mail)"
	 <ips@ece.cmu.edu>
Subject: RE: iSCSI: MaxRecvPDULength simplification
Date: Thu, 28 Mar 2002 10:47:32 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Thank you for the draft reference.  It's good that the iSCSI group is
looking at these other drafts.  Unfortunately, I haven't been following the
TUFs draft so my opinion may be way off.  From my brief read, it seems iSCSI
may be able to afford a little elasticity with MaxRecvPDULength than what's
being proposed.  The PMTU reduction scenario is referenced within TUFs as
rare and recoverable.  In your opinion, could an iSCSI client afford to
ignore resegmentation on previously sent PDUs (SNACK) or for recovered PDUs
(task reassignment) and simply apply the new MaxRecvPDULength negotiated
value on future PDUs?  This would turn the resegmentation feature into a MAY
from a MUST.
 
Thanks.

:-----Original Message-----
:From: Mallikarjun C. [mailto:cbm@rose.hp.com]
:Sent: Wednesday, March 27, 2002 9:27 PM
:To: IPS Reflector (E-mail)
:Subject: Re: iSCSI: MaxRecvPDULength simplification
:
:
:One of the design goals of task reassign is to be able to reassign the
:connection allegiance of a task to a different connection 
:that's perhaps
:using an entire different network for a true failover 
:capability - for ex.,
:the original allegiant connection could be traversing a 
:corprorate intranet,
:and the reassigned connection could be using the public 
:internet.  That's
:the reason for not placing the equivalence requirement on the two
:connections.
:
:MaxRecvPDULength was made negotiable during the FFP because
:several of us felt that it's very useful for iSCSI to allow 
:implementations
:with the `ULPDU containment' property
:(http://search.ietf.org/internet-drafts/draft-ietf-tsvwg-tcp-ul
:p-frame-01.txt).
:This automatically means that MaxRecvPDULength should be changeable
:with changes in PMTU changes, particularly with dynamic PMTU 
:degradation.
:
:Let's look at the possibility you suggest - there being two 
:valid MaxRecvPDULength
:values at the same time.  If a change in FFP is being 
:attempted for this key, it must
:be due to PMTU changes, and the implicit expectation is that 
:initiator will sense
:it and initiate the negotiation process (thus enabling the 
:target to declare its changed
:MaxRecvPDULength, if any, as well in the text response).  
:There is no ambiguity for
:the initiator since the text negotiation can not be assumed 
:successful (meaning new
:MaxRecvPDULength can't be used) until the text response (with 
:F-bit) is received.
:As far as the target is concerned, it can not assume the text 
:negotiation to be effective
:(meaing new MaxRecvPDULength can't be used) until the StatSN 
:for the text response
:is ack'ed - perhaps we should make this clear in the text (and 
:allow explicit soliciting
:for StatSN acknowledgement using a NOP-ping).
:--
:Mallikarjun
:
:Mallikarjun Chadalapaka
:Networked Storage Architecture
:Network Storage Solutions Organization
:Hewlett-Packard MS 5668
:Roseville CA 95747
:cbm@rose.hp.com
:
:----- Original Message -----
:From: "Michael Schoberg" <michael_schoberg@cnt.com>
:To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
:Sent: Wednesday, March 27, 2002 8:36 AM
:Subject: RE: iSCSI: MaxRecvPDULength simplification
:
:
:> SNACK with RL=0 is only one requirement.  Another is task allegiance
:> reassignment (6.1.2) which does not use SNACK (correct?)  
:Here the initiator
:> sends a Task-Management request with a Task-Reassign message 
:to the target.
:> The target must reorganize it's T->I messages to match the 
:MaxRecvPDULength
:> of the new connection.  Plus, the Task Reassign message includes the
:> ExpDataSN field which, if I'm reading right, on reassignment 
:the target must
:> remember the sequencing of the old connection in order to track the
:> ExpDataSN field then re-sequence for the new connection 
:(9.5.4).  So now
:> target implementations will have to keep track of sequence 
:indexes for
:> Data-In PDUs for conversion over to the new allegiance.
:>
:> On-the-fly modification of MaxRecvPDULength also means that 
:some compliance
:> standard must be set for in-flight messages.  An outstanding 
:read request
:> may have T->I PDUs that comply with multiple 
:MaxRecvPDULength values.  In a
:> sense, there will be times where multiple MaxRecvPDULength 
:values are valid.
:> At what point MUST the target comply with the new value?
:>
:> So I guess I'm not convinced that the benefit of simplification is
:> illusionary.  Is there a discussion thread that expressly states
:> MaxRecvPDULength must have the flexibility allowed for in 
:the draft?  The
:> discussions I've seen mainly centered around whether it 
:should be duplex
:> valued (I->T, T->I).
:>
:> Thanks.
:>
:> -----Original Message-----
:> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
:> Sent: Wednesday, March 27, 2002 1:40 AM
:> To: Michael Schoberg
:> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
:> Subject: Re: iSCSI: MaxRecvPDULength simplification
:>
:>
:>
:> The simplification you are talking about is illusory. Currently this
:> requires SNACK to require all data(RL = 0).
:> The restriction you propose instead is far more severe (and 
:unwarranted).
:>
:> Julo
:>
:>
:>
:> Michael Schoberg <michael_schoberg@cnt.com>
:> Sent by: owner-ips@ece.cmu.edu
:>
:>
:> 27-03-02 01:19
:> Please respond to Michael Schoberg
:>
:>
:>
:>         To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
:>         cc:
:>         Subject:        iSCSI: MaxRecvPDULength simplification
:>
:>
:>
:>
:> I've looked over some of the reflector messages regarding 
:MaxRecvPDULength
:> negotiation (back to Oct 2001).  I can't find the discussion 
:of why this
:> value must be available for negotiation outside of login.  It really
:> complicates SNACK and Task Reassignment if the initiator can 
:change this
:> value on-the-fly.  Would it be too restrictive to propose 
:the following
:> rules?
:>
:> 1) MaxRecvPDULength is negotiated only at login before FFP.
:>
:> 2) For message-level recovery, a connection must be prepared 
:to accept the
:> MaxRecvPDULength of the connection it's providing fail over 
:capability for.
:> It doesn't seem unreasonable to expect fault tolerant 
:configurations to
:> comply with this.  It would simply be stating that 
:RecoveryLevel 2 devices
:> should be somewhat matched in this capability.
:>
:>
:>
:>  -----Original Message-----
:> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
:> Sent: Tuesday, March 26, 2002 1:50 AM
:> To: Michael Schoberg
:> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
:> Subject: Re: iSCSI: SNACK RunLength
:>
:>
:> Michael,
:>
:> The paragraph says that if you issue a SNACK after the 
:MaxPDURecvLength has
:> decreased you should use RunLength 0 (meaning all) instead 
:of a specific
:> runlength which might not be accurate anymore.
:>
:> Julo
:>
:>
:> Michael Schoberg <michael_schoberg@cnt.com>
:> Sent by: owner-ips@ece.cmu.edu
:>
:>
:> 25-03-02 19:43
:> Please respond to Michael Schoberg
:>
:>
:>        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
:>        cc:
:>        Subject:        iSCSI: SNACK RunLength
:>
:>
:>
:>
:>
:> Am I just not reading this or can this paragraph use some 
:help?  Can someone
:> give an interpretation?
:>
:>  9.16.3  RunLength
:>                                 ...
:>
:>          The first data SNACK, issued after initiator's 
:MaxRecvPDULength
:>          decreased, for a command issued on the same 
:connection before the
:>
:>          change in MaxRecvPDULength, MUST use RunLength "0" 
:to request
:>          retransmission of any number of PDUs (including 
:one).  The number
:> of
:>          retransmitted PDUs in this case, may or may not be 
:the same as
:> the
:>          original transmission, depending on whether loss 
:was before or
:> after
:>          the MaxRecvPDULength was changed at the target.
:>
:>
:> Does this refer to something like:
:>
:> For connections with unacknowledged PDUs that undergo 
:MaxRecvPDULength
:> negotiation ...
:>
:>
:>
:>
:>
:>
:>
:


From owner-ips@ece.cmu.edu  Thu Mar 28 13:53:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA10432
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 13:53:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SI8RV18615
	for ips-outgoing; Thu, 28 Mar 2002 13:08:27 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls3.std.com [199.172.62.105])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SF4uw03699
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 10:04:56 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id KAA04872;
	Thu, 28 Mar 2002 10:04:34 -0500
Message-Id: <5.1.0.14.0.20020328134747.00a60e30@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 28 Mar 2002 14:41:50 -0500
To: Tom Wu <tom@arcot.com>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
Cc: ips@ece.cmu.edu
In-Reply-To: <3CA29C95.8060708@arcot.com>
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
 <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


>I, David Jablon wrote:
>>[draft-jablon-speke-00.txt] is careful to not state feelings or legal conclusions,

At 08:31 PM 3/27/02 -0800, Tom Wu wrote:
>After reading the draft, I must respectfully disagree.  Although it doesn't state explicit legal conclusions such as "X is covered by patent Y", it makes statements of opinion like "X uses techniques from Y (which is patented)" or "X is fundamentally different from Y", which, if the reader believes these assertions, leads him/her to a corresponding legal opinion.  I would suggest that opinions w.r.t. IP be struck from the I-D.

Thanks.  I'll review those statements, and look into removing any
opinionated remarks.  However, I think it's important and helpful to
present facts about these methods to assist people in performing
their own analysis.

>>but SPEKE has been openly licensed and deployed for years
>>without using the Lucent patents.
>
>But by that standard, so has SRP.  Has Phoenix (or Integrity Sciences) ever requested any IPR statement from Lucent regarding the EKE patents, similar to what the IPS WG has gone through the last few months?

Frankly, neither myself, Integrity Sciences, Phoenix, or,
as far as I know, any licensees of SPEKE, have seen any need to solicit
an opinion from Lucent in this regard.  All questions that I've heard
of have been resolved by analysis.  And to assist other people who
seek their own answers in this regard, the draft presents relevant facts.

What the IPS WG has done, in openly soliciting companies for opinions,
to confirm or deny rumors, appears to be unusual.
But whether this clarifies the situation, or obscures it, is not
obvious to me.  I think everyone's motives may be suspect.

How a patent holder responds to such a request must be weighed
*very* carefully, as I've mentioned earlier.  One could easily
abuse this process to chop out any targetted technology from any
IETF proposed standard.  If, for example, someone approached, say
Lucent, asking what how they feel about some new Diffie-Hellman-based
proposal, and they refused to answer, what would that mean?
Of if they gave a free license for that, but refused to answer about SPEKE,
which they might view as more of a competetive threat, what would
that mean?  Do we really want to be relying too-heavily on the veto
or blessing of any one person or corporation?

This is why I think it's very important for people to perform their own
analysis, and not rely on rumor, opinion, or too-heavily on the
assertions of any individual or corporation.

>>I'm probably the last person to be lecturing about IETF etiquette
>>in this regard, but I think it is improper to present unsupported feelings
>>and beliefs about patent issues in any standards group discussion.
>>Facts are helpful.  Rumors and unsupported opinion are not.
>
>Are "unsupported opinions" proper/improper in an Internet-Draft, though?

What I said applies to drafts too.
If anyone points out specific language of mine that appears to have
crossed this line, either privately or publicly, I'll definitely look into
correcting it.

-- David



From owner-ips@ece.cmu.edu  Thu Mar 28 14:37:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12343
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 14:37:27 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SItwb22853
	for ips-outgoing; Thu, 28 Mar 2002 13:55:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel11.hp.com (palrel11.hp.com [156.153.255.246])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SIttw22847
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 13:55:55 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel11.hp.com (Postfix) with ESMTP id 71539600235
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 10:55:49 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id KAA00549 for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 10:57:32 -0800 (PST)
Message-ID: <001c01c1d68a$2c96dd40$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: <ips@ece.cmu.edu>
References: <3C7122FAF06DD5118ED60050047336482631F4@esply01.cnt.com>
Subject: Re: iSCSI: MaxRecvPDULength simplification
Date: Thu, 28 Mar 2002 10:55:48 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>  In your opinion, could an iSCSI client afford to
> ignore resegmentation on previously sent PDUs (SNACK) or for recovered PDUs
> (task reassignment) and simply apply the new MaxRecvPDULength negotiated
> value on future PDUs?  This would turn the resegmentation feature into a MAY
> from a MUST.

I am not sure. 

If I understood you correctly, you're suggesting that the current value of MaxRecvPDULength
should simply be used always.  That's exactly what the draft enforces.  Doing so would require 
the iSCSI server (target) to resegment the data, if necessary, to match the current value - hence
the "MUST use RunLength=0".

I also see a misunderstanding of the required target functionality on a task reassign.  First off,
the draft clearly states that it's not an error to ignore the ExpDataSN and redo the whole 
transfer.  Secondly, note that the target must keep DataSN->Buffer_Offset mapping to
satisfy retransmission requests regardless of this MaxRecvPDULength change with reassign -
IOW, the mapping you're referring to must be maintained for ErrorRecoveryLevel =1,
even if task reassign is *not* supported.

Hope that helps.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Michael Schoberg" <michael_schoberg@cnt.com>
To: "'Mallikarjun C.'" <cbm@rose.hp.com>; "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
Sent: Thursday, March 28, 2002 8:47 AM
Subject: RE: iSCSI: MaxRecvPDULength simplification


> Thank you for the draft reference.  It's good that the iSCSI group is
> looking at these other drafts.  Unfortunately, I haven't been following the
> TUFs draft so my opinion may be way off.  From my brief read, it seems iSCSI
> may be able to afford a little elasticity with MaxRecvPDULength than what's
> being proposed.  The PMTU reduction scenario is referenced within TUFs as
> rare and recoverable.  In your opinion, could an iSCSI client afford to
> ignore resegmentation on previously sent PDUs (SNACK) or for recovered PDUs
> (task reassignment) and simply apply the new MaxRecvPDULength negotiated
> value on future PDUs?  This would turn the resegmentation feature into a MAY
> from a MUST.
>  
> Thanks.
> 
> :-----Original Message-----
> :From: Mallikarjun C. [mailto:cbm@rose.hp.com]
> :Sent: Wednesday, March 27, 2002 9:27 PM
> :To: IPS Reflector (E-mail)
> :Subject: Re: iSCSI: MaxRecvPDULength simplification
> :
> :
> :One of the design goals of task reassign is to be able to reassign the
> :connection allegiance of a task to a different connection 
> :that's perhaps
> :using an entire different network for a true failover 
> :capability - for ex.,
> :the original allegiant connection could be traversing a 
> :corprorate intranet,
> :and the reassigned connection could be using the public 
> :internet.  That's
> :the reason for not placing the equivalence requirement on the two
> :connections.
> :
> :MaxRecvPDULength was made negotiable during the FFP because
> :several of us felt that it's very useful for iSCSI to allow 
> :implementations
> :with the `ULPDU containment' property
> :(http://search.ietf.org/internet-drafts/draft-ietf-tsvwg-tcp-ul
> :p-frame-01.txt).
> :This automatically means that MaxRecvPDULength should be changeable
> :with changes in PMTU changes, particularly with dynamic PMTU 
> :degradation.
> :
> :Let's look at the possibility you suggest - there being two 
> :valid MaxRecvPDULength
> :values at the same time.  If a change in FFP is being 
> :attempted for this key, it must
> :be due to PMTU changes, and the implicit expectation is that 
> :initiator will sense
> :it and initiate the negotiation process (thus enabling the 
> :target to declare its changed
> :MaxRecvPDULength, if any, as well in the text response).  
> :There is no ambiguity for
> :the initiator since the text negotiation can not be assumed 
> :successful (meaning new
> :MaxRecvPDULength can't be used) until the text response (with 
> :F-bit) is received.
> :As far as the target is concerned, it can not assume the text 
> :negotiation to be effective
> :(meaing new MaxRecvPDULength can't be used) until the StatSN 
> :for the text response
> :is ack'ed - perhaps we should make this clear in the text (and 
> :allow explicit soliciting
> :for StatSN acknowledgement using a NOP-ping).
> :--
> :Mallikarjun
> :
> :Mallikarjun Chadalapaka
> :Networked Storage Architecture
> :Network Storage Solutions Organization
> :Hewlett-Packard MS 5668
> :Roseville CA 95747
> :cbm@rose.hp.com
> :
> :----- Original Message -----
> :From: "Michael Schoberg" <michael_schoberg@cnt.com>
> :To: "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
> :Sent: Wednesday, March 27, 2002 8:36 AM
> :Subject: RE: iSCSI: MaxRecvPDULength simplification
> :
> :
> :> SNACK with RL=0 is only one requirement.  Another is task allegiance
> :> reassignment (6.1.2) which does not use SNACK (correct?)  
> :Here the initiator
> :> sends a Task-Management request with a Task-Reassign message 
> :to the target.
> :> The target must reorganize it's T->I messages to match the 
> :MaxRecvPDULength
> :> of the new connection.  Plus, the Task Reassign message includes the
> :> ExpDataSN field which, if I'm reading right, on reassignment 
> :the target must
> :> remember the sequencing of the old connection in order to track the
> :> ExpDataSN field then re-sequence for the new connection 
> :(9.5.4).  So now
> :> target implementations will have to keep track of sequence 
> :indexes for
> :> Data-In PDUs for conversion over to the new allegiance.
> :>
> :> On-the-fly modification of MaxRecvPDULength also means that 
> :some compliance
> :> standard must be set for in-flight messages.  An outstanding 
> :read request
> :> may have T->I PDUs that comply with multiple 
> :MaxRecvPDULength values.  In a
> :> sense, there will be times where multiple MaxRecvPDULength 
> :values are valid.
> :> At what point MUST the target comply with the new value?
> :>
> :> So I guess I'm not convinced that the benefit of simplification is
> :> illusionary.  Is there a discussion thread that expressly states
> :> MaxRecvPDULength must have the flexibility allowed for in 
> :the draft?  The
> :> discussions I've seen mainly centered around whether it 
> :should be duplex
> :> valued (I->T, T->I).
> :>
> :> Thanks.
> :>
> :> -----Original Message-----
> :> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
> :> Sent: Wednesday, March 27, 2002 1:40 AM
> :> To: Michael Schoberg
> :> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
> :> Subject: Re: iSCSI: MaxRecvPDULength simplification
> :>
> :>
> :>
> :> The simplification you are talking about is illusory. Currently this
> :> requires SNACK to require all data(RL = 0).
> :> The restriction you propose instead is far more severe (and 
> :unwarranted).
> :>
> :> Julo
> :>
> :>
> :>
> :> Michael Schoberg <michael_schoberg@cnt.com>
> :> Sent by: owner-ips@ece.cmu.edu
> :>
> :>
> :> 27-03-02 01:19
> :> Please respond to Michael Schoberg
> :>
> :>
> :>
> :>         To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
> :>         cc:
> :>         Subject:        iSCSI: MaxRecvPDULength simplification
> :>
> :>
> :>
> :>
> :> I've looked over some of the reflector messages regarding 
> :MaxRecvPDULength
> :> negotiation (back to Oct 2001).  I can't find the discussion 
> :of why this
> :> value must be available for negotiation outside of login.  It really
> :> complicates SNACK and Task Reassignment if the initiator can 
> :change this
> :> value on-the-fly.  Would it be too restrictive to propose 
> :the following
> :> rules?
> :>
> :> 1) MaxRecvPDULength is negotiated only at login before FFP.
> :>
> :> 2) For message-level recovery, a connection must be prepared 
> :to accept the
> :> MaxRecvPDULength of the connection it's providing fail over 
> :capability for.
> :> It doesn't seem unreasonable to expect fault tolerant 
> :configurations to
> :> comply with this.  It would simply be stating that 
> :RecoveryLevel 2 devices
> :> should be somewhat matched in this capability.
> :>
> :>
> :>
> :>  -----Original Message-----
> :> From: Julian Satran [mailto:Julian_Satran@il.ibm.com]
> :> Sent: Tuesday, March 26, 2002 1:50 AM
> :> To: Michael Schoberg
> :> Cc: IPS Reflector (E-mail); owner-ips@ece.cmu.edu
> :> Subject: Re: iSCSI: SNACK RunLength
> :>
> :>
> :> Michael,
> :>
> :> The paragraph says that if you issue a SNACK after the 
> :MaxPDURecvLength has
> :> decreased you should use RunLength 0 (meaning all) instead 
> :of a specific
> :> runlength which might not be accurate anymore.
> :>
> :> Julo
> :>
> :>
> :> Michael Schoberg <michael_schoberg@cnt.com>
> :> Sent by: owner-ips@ece.cmu.edu
> :>
> :>
> :> 25-03-02 19:43
> :> Please respond to Michael Schoberg
> :>
> :>
> :>        To:        "IPS Reflector (E-mail)" <ips@ece.cmu.edu>
> :>        cc:
> :>        Subject:        iSCSI: SNACK RunLength
> :>
> :>
> :>
> :>
> :>
> :> Am I just not reading this or can this paragraph use some 
> :help?  Can someone
> :> give an interpretation?
> :>
> :>  9.16.3  RunLength
> :>                                 ...
> :>
> :>          The first data SNACK, issued after initiator's 
> :MaxRecvPDULength
> :>          decreased, for a command issued on the same 
> :connection before the
> :>
> :>          change in MaxRecvPDULength, MUST use RunLength "0" 
> :to request
> :>          retransmission of any number of PDUs (including 
> :one).  The number
> :> of
> :>          retransmitted PDUs in this case, may or may not be 
> :the same as
> :> the
> :>          original transmission, depending on whether loss 
> :was before or
> :> after
> :>          the MaxRecvPDULength was changed at the target.
> :>
> :>
> :> Does this refer to something like:
> :>
> :> For connections with unacknowledged PDUs that undergo 
> :MaxRecvPDULength
> :> negotiation ...
> :>
> :>
> :>
> :>
> :>
> :>
> :>
> :
> 


From owner-ips@ece.cmu.edu  Thu Mar 28 16:54:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA17330
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 16:54:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SL6O104007
	for ips-outgoing; Thu, 28 Mar 2002 16:06:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls1.std.com [199.172.62.103])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SKEPw29634
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 15:14:25 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id PAA11518;
	Thu, 28 Mar 2002 15:14:21 -0500
Message-Id: <5.1.0.14.0.20020328195149.00a27220@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 28 Mar 2002 20:13:42 -0500
To: Theodore Tso <tytso@mit.edu>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI authentication requirements
Cc: ips@ece.cmu.edu
In-Reply-To: <20020327225732.A17992@thunk.org>
References: <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
 <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com>
 <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Ted,

Regarding my statement:
>On Wed, Mar 27, 2002 at 03:42:55PM -0500, David Jablon wrote:
>> A primary decision for the WG to consider is whether
>> item (e), preventing "dictionary attack", is important.

Your thoughtful, rather lengthy reply warrants a response.

I feel it is necessary for me to point out where exaggeration
invalidates your argument and is also damaging to the process
of arriving at a consensus on the best all-around solution.
I will clarify these points here.

At 10:57 PM 3/27/02 -0500, Theodore Tso wrote:
>We need to be a bit more nuanced here.  The question is not just
>whether or not a particular scheme is vulnerable to a dictionary
>attack, but under what circumstances is it vulnerable to a dictionary
>attack.  If the attack requires the use of an active attack, where the
>attacker has to be on communications path, *and* the attacker must
>interpose him/herself between the client and the server, *and* the
>attack causes the attempted authentication to fail, such that the
>client knows something might be going on --- how bad is it that under
>these sorts of circumstances, a dictionary attack might be possible?

Ok.  On the one hand, you sure do make that attack sound hard.
But stated in other words, an attacker can inject just a couple
bogus packets, a mere hiccup from the user's view, and then he
gets unlimited offline guessing to crack the password.  Some
might consider that a *bad thing* indeed.

>Also, if we posit that the authentication target has a public key,
>which can be optionally cached by the client (in an ssh-style type
>approach), then the server can sign its challenge with its public key,
>and then even the possibility of an active attack is limited to the
>first time the client talks to a particular server or iSCSI target.

Sure, posit that.  Strong password methods work well for securing
initial connections, or generally in remote retrieval of data when a
local credential cache has been cleared or needs updating.
If this standard used SSH, or proposed such caching, then, I'd argue,
a person should use a strong password method to protect that
initial connection.

Furthermore, limiting the attack window to *just* the first time may
not significantly decrease the problem.  It depends on other
assumptions.  In some cases it may be like locking all but one door
of your house.  A good burglar will try them all, or wait for the
appropriate time, etc.  In contrast, a strong password method closes
all these doors to offline cracking of network messages, forcing the
burglar to try something different.

>Is this as good as an EKE, SPEKE, or PDM-style authentication scheme?
>Nope; but it's close.  And as I articulated during the IETF
>open-plenary, we are an engineering organization, and engineering
>always involves tradeoffs.  Some of these tradeoffs are not
>necessarily strictly technical, but involve real-world
>business/financial issues.

I do love those "real-world" arguments, implying that the opponent
is living on some other planet. So, for the record, I, also an Earthling,
believe that these tradeoffs must be made. Let's start:

        Is it OK for proposal X to allow active attack?

        Is it OK for proposal Y to allows both passive and active
        attack, perhaps in the theory that people or applications that
        use passwords as keys deserve to be hacked?

        Do Z, W, U, and V really work as advertised in preventing both
        active and passive attacks, and if so how much is it worth?

        Are X or Y truly less encumbered than the others, and if so,
        is this fact significant?  For example, has the WG established
        that costs would likely be onerous for anyone who implements
        any of the others?

I have no problem in letting the WG decide these things.

But the IETF *cannot* make proper business/engineering tradeoffs
by political fiat.  As an organization, the IETF cannot investigate pricing
or license policies.  And no decree from on high can take into
consideration the concerns or nuances of each specific application.
This is a job that must be done by individual WG members.
And they should not be discouraged or preempted from doing that job.

>The problem at this point is that the IP situation with respect to all
>of these schemes is cloudy, and that may prevent some companies from
>being able to implement the spec.  ...

No, the IP situation is very clear for several of the patented schemes.

>... Also, if any of these patent claims
>are true, then it certainly will rule out open-source, reference
>implementations from being able to fully implement the specification.
>Such reference implementations have for other working groups been a
>significant force towards helping assure interoperability. ...

That is false.  Open source and reference implementations are
no problem per-se for patented techniques.  Open source at a basic
level relates to copyright protection, not patents. And there are
several examples of open source software for patented methods.

>... (Also,
>consider that as Linux continues to make inroads into the server
>platforms, it would be a real shame if Linux were not able to make
>authenticated connections to iSCSI devices thanks to the patent
>issues; you'd be essentially eliminating part of the iSCSI device
>manufacturers' market thanks to the patent issue.)

Again, this is false.  Even that last requirement can be met.
While it is true that free use and distribution products like Linux
can pose a different problem for a patent holder, it is surmountable.
And finally, as you almost point out, all these interoperability
problems go away when a patented technique is standardized as
a SHOULD implement method.

>How important are these issues?  Well, I will be the first to admit
>that if some patented technology conferred overwhelming advantage over
>all other alternatives (such as back in the bad old days when RSA and
>D-H was the only game in town for doing public-key cryptography), then
>the concerns which I've articulated probably would not outweigh the
>technical advantage conferred by the IP-encumbered technology.  (And
>even in that case, the fact that the technology was encumbered
>probably delayed the wide-spread use of protocols which specified the
>use of public-key technology by close to a decade.)

First, you'll forgive me if I doubt that you'd be the *first* to
stand in line to use anybody's patent.  Let's be honest.
I do appreciate your role here.  Unnecessary encumbrances should be
discouraged.  So, in this case, why not lighten up on the preaching
and exaggeration, state the IETF policy, or, as you see it, the
general-but-unwritten IETF philosophy, and let people determine for
themselves how easy or hard it is to use such methods.  And if a
patented technique is still acceptable to the group, then so be it.

>In this particular case, however, I would submit that the advantage
>confered by using EKE, SPEKE, PDM, or other related technologies is at
>best marginal.  There are other technical solutions, which I've
>outlined above, that provide almost the same amount of protection,
>without having to deal with the headaches of settling with potentially
>two or three patent holders. . . .

Again, why exaggerate?  Anyone who properly investigates this field can
find out that, for several methods, there is exactly one patent holder, and
among these there is a clear and free choice of more than one such holder.
It is also obvious that different people have different views on the
significance of the technical benefits, and this is clearly a factor
in establishing a fair price.

>... We also avoid eliminating at one stroke
>all possibilities of compliant/legal open-source implementations of
>the technology.  Because of both downsides, in this particular case,
>the engineering tradeoffs simply isn't worth it.
>
>                                                        - Ted 

I'll argue the reverse.  With your "one stroke", you might prevent all
possibility of anyone benefitting from an entire class of technology.
THAT seems to be the bigger threat.

 From here on down, I feel compelled to make some philosophical points,
so readers purely focused on iSCSI should feel free to skip to the last
couple paragraphs, if indeed, you've held on this long.


Ted, I have no problem with your concerns, your *personal* philosophy,
or even the longstanding IETF tradition to prefer unpatented technology
to any *equivalent* patented technology.  I also have no problem with
you trying to focus on the need for these methods in specific narrow
times and places (which, incidently, sound like fine bargaining points
to negotiate a lower price).

But here's where I do see some big problems, only some of which are
actually contained in your message:

* I disagree with the somewhat arbitrary line you've drawn between active
and passive attacks.  It seems contrived to fit your agenda.

* I disagree with the concept of making *uninformed* business/engineering
tradeoffs.

* I disagree with idea of retrofitting requirements to fit certain methods,
which I believe that some people are trying to do.

* I think it's up to the working group members to decide what technology is
truly equivalent to an optimal case for its purposes, without undue pressure
or interference from "outsiders" (including me too of course).

* I object to the idea of IETF watchdogs too-closely directing actions of a
working group, or discouraging them, especially using false statements,
from properly investigating relevant technical and business
issues to be able to make the necessary tradeoffs.

* I believe it is wrong for all IETF participants to promote an unwritten
extremist anti-patent agenda onto others in this or any working group.
I think that you, and others, should simply stop encouraging exaggerated
fears in this regard.

Patent infringement is not some criminal thing, like oh, say, a copyright
violation.  You can't go to jail over a patent.  The worst that might
happen is that a truly extreme infringer who gets caught might overpay.
In a majority of day-to-day cases of people using other people's patents,
nobody takes any real action or pays anything.  In this specific field there
is no monopoly position blocking this class of technology.  And if in the
worst case, should some patent holder abuse it's power and position,
the process is ultimately self-correcting as you yourself have argued.

Let's keep this in perspective.

The problem is that actions like yours may prevent people from being
able to obtain the benefits in the first place.  Using IETF standards are
important, and standardization is required for some people to invest in
using a technology.  No standards organization should create a blockade
to the legitimate use of any general class of patented technology.

And, for those people who have an inordinate fear that the mere mention in
an IETF standard of some patented technique will somehow establish a
huge business monopoly of some sort, all I can say is come back to Earth.
These documents don't have *that* much power.  The existence of a
standard doesn't compel any vendor to have to implement every little
thing in it, especially when there are alternatives.
People can always pick and choose what they want to implement,
based on value and price.  There are no standards-compliance
police twisting peoples arms.  It just doesn't work that way.

In the context of this working group, it appears to me that forces have
gathered to try to downgrade a MUST-implement security method to a MAY,
or to do away with it entirely, and in this process are retroactively adjusting
the requirements to fit certain techniques.  That this may be done without
full investigation of the actual cost of the tradeoff from a business
perspective, and with only hasty discussion of the technically equivalent
methods, as well as other non-equivalent tradeoffs, seems wrong to me.

The general practice of *avoiding* patents at any cost is damaging
to patent holders, and to the world at large.  Such a practice is forbidden
in other standards organizations, for these reasons.

Yes, we all know that IETF is a *different kind* of standards body.
I just think that you're promoting a too-extreme position in this regard.

All of this discussion may be premature, as I'm not absolutely sure that
password-based authentication was the real goal here.  I think there's good
evidence that this was indeed the case, after all, if not, then why SRP?
Yet, I believe that some participants may be afraid of the consequences
of speaking up, even to just discuss technical issues, for fear of violating
the default IETF religion. That is not a good thing.

If one of the goals here is to allow people to use passwords to authenticate
the establishment of these device connections, then I think there are many
paths to an optimal engineering solution.

If not a MUST, then why not a SHOULD for some variant of EKE, SPEKE, SRP, 
or an equivalent?

How about asking a vendor to back up their claim of being able to provide
this freely to all, as was suggested in Minneapolis?

Why not ask if people have ever had trouble licensing these schemes on
reasonable terms from any available sources?

I see several paths that can result in wide-scale deployment of optimally
engineered solutions here.  And where there are real (or "real-world")
requirements for strong password methods, I will do my best to get my
company to assist in this process.

-- David



From owner-ips@ece.cmu.edu  Thu Mar 28 19:01:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA19600
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 19:01:19 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2SNLYw14404
	for ips-outgoing; Thu, 28 Mar 2002 18:21:34 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from anchorage.arcot.com (anchorage.arcot.com [206.14.221.34])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2SNLVw14397
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 18:21:31 -0500 (EST)
Received: from arcot.com (172.16.50.219 [172.16.50.219]) by anchorage.arcot.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 1MT6WCGD; Thu, 28 Mar 2002 15:17:28 -0800
Message-ID: <3CA3A5F5.1010100@arcot.com>
Date: Thu, 28 Mar 2002 15:23:33 -0800
From: Tom Wu <tom@arcot.com>
Organization: Arcot Systems
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.8) Gecko/20020204
X-Accept-Language: en-us
MIME-Version: 1.0
To: David Jablon <dpj@theworld.com>
CC: ips@ece.cmu.edu
Subject: Re: iSCSI: SRP status
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com> <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com> <5.1.0.14.0.20020328134747.00a60e30@pop.theworld.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

David Jablon wrote:
>>I, David Jablon wrote:
>>
>>>[draft-jablon-speke-00.txt] is careful to not state feelings or legal conclusions,
>>>
> 
> At 08:31 PM 3/27/02 -0800, Tom Wu wrote:
> 
>>After reading the draft, I must respectfully disagree.  Although it doesn't state explicit legal conclusions such as "X is covered by patent Y", it makes statements of opinion like "X uses techniques from Y (which is patented)" or "X is fundamentally different from Y", which, if the reader believes these assertions, leads him/her to a corresponding legal opinion.  I would suggest that opinions w.r.t. IP be struck from the I-D.
>>
> 
> Thanks.  I'll review those statements, and look into removing any
> opinionated remarks.  However, I think it's important and helpful to
> present facts about these methods to assist people in performing
> their own analysis.

[...]

>>Are "unsupported opinions" proper/improper in an Internet-Draft, though?
>>
> 
> What I said applies to drafts too.
> If anyone points out specific language of mine that appears to have
> crossed this line, either privately or publicly, I'll definitely look into
> correcting it.

In my opinion, section 4.10 of that I-D, in its entirety, crosses this 
line and sticks out like a sore thumb.  It presents no new facts about 
the techniques being discussed; the math behind SPEKE is already 
disclosed elsewhere in the draft, while the math behind SRP is disclosed 
in RFC2945.  What it does do, is present the author's unsupported 
opinion on what techniques are similar or different to/from other 
techniques.  I ask that it be removed.

Although I understand the need to justify the existence of an I-D that 
discusses patented, non-free technology, I submit that an I-D is an 
inappropriate place to state opinions about IP, even if it is done under 
the guise of "structural analysis".  More to the point, other I-Ds and 
RFCs, even in areas with IP disputes, like VRRP and the idn drafts, seem 
to have steered clear of including anything beyond a simple IPR Notice 
section, as mandated by RFC2026.  This is, of course, based on the 
documents I've managed to dig up so far; I'd be interested in hearing 
the opinion of someone with more experience in IETF procedure.

> 
> -- David
> 


Tom
-- 
Tom Wu
Principal Software Engineer
Arcot Systems
(408) 969-6124



From owner-ips@ece.cmu.edu  Thu Mar 28 20:06:20 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA20742
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 20:06:20 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T0Ctn17977
	for ips-outgoing; Thu, 28 Mar 2002 19:12:55 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T0Crw17972
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 19:12:53 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2T08r014941;
	Thu, 28 Mar 2002 19:08:53 -0500
Message-ID: <3CA3B17F.B5299568@splentec.com>
Date: Thu, 28 Mar 2002 19:12:47 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: Luben Tuikov <luben@splentec.com>, iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: iSCSI <ips@ece.cmu.edu>, Julian Satran <Julian_Satran@il.ibm.com>,
        "Mallikarjun C." <cbm@rose.hp.com>
Subject: Text request/response spanning - security issue?
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

A key=value pair can span multiple Text Request/Response PDU's.

A rougue/badly implemented T/I can use this ``feature''
to completely drain the I/T resources and stall its
operation.

I.e. the node will keep the data and wait indefinitely until
0x00 in order to process the request. If 0x00 is never
received, the node will eventually run out of memory.

If such an implementation is in kernel space,
then after such an attack, the only solution
is the big red button.

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 28 20:09:27 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA20773
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 20:09:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T0c0v19588
	for ips-outgoing; Thu, 28 Mar 2002 19:38:00 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel10.hp.com (palrel10.hp.com [156.153.255.245])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T0bww19582
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 19:37:58 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel10.hp.com (Postfix) with ESMTP
	id 7EE7CC006B5; Thu, 28 Mar 2002 16:37:52 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id QAA11010; Thu, 28 Mar 2002 16:39:35 -0800 (PST)
Message-ID: <012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Luben Tuikov" <luben@splentec.com>
Cc: "iSCSI" <ips@ece.cmu.edu>
References: <3CA3B17F.B5299568@splentec.com>
Subject: Re: iSCSI: Text request/response spanning - security issue?
Date: Thu, 28 Mar 2002 16:37:50 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Luben,

> A rougue/badly implemented T/I can use this ``feature''
> to completely drain the I/T resources and stall its
> operation.

I assume you are describing a DoS attack on an iSCSI peer -
it isn't exactly limited only to this feature, there are several other
ways - not sending a Login Request at all after the TCP connection
establishment, not setting the F-bit/T-bit etc.  will all result in this
problem.

The expectation is that implementations will set the right timeouts
to detect and get out of these conditions.  The state transitions 
(chapter 5) allow these timeouts as legal events that could cause a 
Login failure.  Also take a look at section 6.8, which deals with 
timeouts in text negotiations.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Luben Tuikov" <luben@splentec.com>
To: "iSCSI" <ips@ece.cmu.edu>; "Julian Satran" <Julian_Satran@il.ibm.com>; "Mallikarjun C." <cbm@rose.hp.com>
Sent: Thursday, March 28, 2002 4:12 PM
Subject: Text request/response spanning - security issue?


> A key=value pair can span multiple Text Request/Response PDU's.
> 
> A rougue/badly implemented T/I can use this ``feature''
> to completely drain the I/T resources and stall its
> operation.
> 
> I.e. the node will keep the data and wait indefinitely until
> 0x00 in order to process the request. If 0x00 is never
> received, the node will eventually run out of memory.
> 
> If such an implementation is in kernel space,
> then after such an attack, the only solution
> is the big red button.
> 
> -- 
> Luben
> 


From owner-ips@ece.cmu.edu  Thu Mar 28 21:18:55 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA21797
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 21:18:55 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T1fX323513
	for ips-outgoing; Thu, 28 Mar 2002 20:41:33 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T1fVw23509
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 20:41:31 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2T1aT015313;
	Thu, 28 Mar 2002 20:36:29 -0500
Message-ID: <3CA3C607.242E8EC5@splentec.com>
Date: Thu, 28 Mar 2002 20:40:23 -0500
From: Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: "Mallikarjun C." <cbm@rose.hp.com>
CC: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <3CA3B17F.B5299568@splentec.com> <012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"Mallikarjun C." wrote:
>
> The expectation is that implementations will set the right timeouts
> to detect and get out of these conditions.  The state transitions
> (chapter 5) allow these timeouts as legal events that could cause a
> Login failure.  Also take a look at section 6.8, which deals with
> timeouts in text negotiations.

This isn't a timeout issue at all (but it is a DoS attack).

The Text Requests can come at the right time,
and none of them may have a 0x00 in it's payload
to indicate end of key=value pair. This will
drain the node's memory.

There needs to be a limitaion (somehow) on how long
a key=value could ever be (spanning or not).
Negotiated or not.

"Buffer overrun" rings a bell.

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 28 21:20:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA21830
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 21:20:18 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T23lS24864
	for ips-outgoing; Thu, 28 Mar 2002 21:03:47 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel12.hp.com (palrel12.hp.com [156.153.255.237])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T23kw24858
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 21:03:46 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel12.hp.com (Postfix) with ESMTP
	id 4FC10E003F0; Thu, 28 Mar 2002 18:03:40 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id SAA21122; Thu, 28 Mar 2002 18:05:23 -0800 (PST)
Message-ID: <015e01c1d6c5$f14e5ab0$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Luben Tuikov" <luben@splentec.com>
Cc: "iSCSI" <ips@ece.cmu.edu>
References: <3CA3B17F.B5299568@splentec.com> <012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com> <3CA3C607.242E8EC5@splentec.com>
Subject: Re: iSCSI: Text request/response spanning - security issue?
Date: Thu, 28 Mar 2002 18:03:38 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

> This isn't a timeout issue at all

Okay, I guess I was sidetracked by "wait indefinitely " in 
your note.

> and none of them may have a 0x00 in it's payload

Since we define the max key size in chapter 4, I take it
that you are concerned about very long lists causing buffer
overruns even while each of the options being within legal size
limits?  I haven't checked the draft, but it appears that this
may need clarification.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com

----- Original Message ----- 
From: "Luben Tuikov" <luben@splentec.com>
To: "Mallikarjun C." <cbm@rose.hp.com>
Cc: "iSCSI" <ips@ece.cmu.edu>
Sent: Thursday, March 28, 2002 5:40 PM
Subject: Re: iSCSI: Text request/response spanning - security issue?


> "Mallikarjun C." wrote:
> >
> > The expectation is that implementations will set the right timeouts
> > to detect and get out of these conditions.  The state transitions
> > (chapter 5) allow these timeouts as legal events that could cause a
> > Login failure.  Also take a look at section 6.8, which deals with
> > timeouts in text negotiations.
> 
> This isn't a timeout issue at all (but it is a DoS attack).
> 
> The Text Requests can come at the right time,
> and none of them may have a 0x00 in it's payload
> to indicate end of key=value pair. This will
> drain the node's memory.
> 
> There needs to be a limitaion (somehow) on how long
> a key=value could ever be (spanning or not).
> Negotiated or not.
> 
> "Buffer overrun" rings a bell.
> 
> -- 
> Luben
> 


From owner-ips@ece.cmu.edu  Thu Mar 28 23:21:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA25626
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 23:21:07 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T3cha00780
	for ips-outgoing; Thu, 28 Mar 2002 22:38:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pepsi.splentec.com (ns.splentec.com [209.47.35.194])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T3cbw00761
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 22:38:37 -0500 (EST)
Received: from splentec.com (canoe.splentec.com [209.47.35.250])
	by pepsi.splentec.com (8.11.6/8.11.0) with ESMTP id g2T3XY015756;
	Thu, 28 Mar 2002 22:33:34 -0500
Message-ID: <3CA3E178.2C56F36B@splentec.com>
Date: Thu, 28 Mar 2002 22:37:28 -0500
From: Luben Tuikov <luben@splentec.com>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: "Mallikarjun C." <cbm@rose.hp.com>
CC: iSCSI <ips@ece.cmu.edu>
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <3CA3B17F.B5299568@splentec.com> <012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com> <3CA3C607.242E8EC5@splentec.com> <015e01c1d6c5$f14e5ab0$edd52b0f@rose.hp.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

"Mallikarjun C." wrote:
>
> Since we define the max key size in chapter 4, I take it
> that you are concerned about very long lists causing buffer
> overruns even while each of the options being within legal size
> limits?

Yes, exactly.

Furthermore an individual value encoded representation
can have any length -- the draft only specifies that
its _decoded_ representation is <= 255 bytes.

That is "rogue=base64 of length 1e30,bye,bye" will make a node
die. (You get the meaning.)

Since a "KEY=VALUE" cannot contain 0x00 (since it separates it
from other assignments), we need to consider the entity
"KEY=VALUE" as a whole and impose restrictions on it
as a whole. (Reason 1)

We cannot control the format of the VALUE (above),
as companies will add their own keys. (Reason 2)

Thus we need to restrict the "KEY=VALUE" as a whole,
its internals past iSCSI are up to the implementations/
companies which add them.

If we impose restrictions on "KEY=VALUE" then we need not
impose restrictions on the size of KEY or VALUE separately,
just that KEY cannot be an empty sequence.

The node should know in advance how big of a span a
"KEY=VALUE" will be in order to 1) reject it (out of resources)
or 2) prepare for its arrival (whatever this means).

-- 
Luben


From owner-ips@ece.cmu.edu  Thu Mar 28 23:22:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA25676
	for <ips-archive@odin.ietf.org>; Thu, 28 Mar 2002 23:22:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2T462k02357
	for ips-outgoing; Thu, 28 Mar 2002 23:06:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from palrel13.hp.com (palrel13.hp.com [156.153.255.238])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2T460w02352
	for <ips@ece.cmu.edu>; Thu, 28 Mar 2002 23:06:00 -0500 (EST)
Received: from core.rose.hp.com (core.rose.hp.com [15.43.208.100])
	by palrel13.hp.com (Postfix) with ESMTP
	id D30C6400BFC; Thu, 28 Mar 2002 20:05:54 -0800 (PST)
Received: from swathi (swathi.rose.hp.com [15.43.213.237]) by core.rose.hp.com with SMTP (8.9.3 (PHNE_22672)/8.8.6 SMKit7.02) id UAA00113; Thu, 28 Mar 2002 20:07:33 -0800 (PST)
Message-ID: <016b01c1d6d7$04ef5130$edd52b0f@rose.hp.com>
From: "Mallikarjun C." <cbm@rose.hp.com>
To: "Charles Monia" <cmonia@NishanSystems.com>
Cc: <ips@ece.cmu.edu>
References: <013e01c1d6bf$05b2dc30$edd52b0f@rose.hp.com>
Subject: iFCP: review comments
Date: Thu, 28 Mar 2002 20:05:48 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4807.1700
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 8bit

Charles,

Some review comments below.  I figured I will post my scribbled notes
even though the WG Last Call is long gone.  Sorry for the delay.

Regards.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions Organization
Hewlett-Packard MS 5668
Roseville CA 95747
cbm@rose.hp.com

> 1.2 Purpose of this document

> standards controlled by NCITS T10 and T11. This material is

S/b "NCITS" w/ "INCITS".

> 2.1 Definitions

> Gateway Region û The portion of an iFCP fabric accessed through an
> iFCP gateway. Fibre channel devices in the region consist
> of all fibre channel devices locally attached to the
> gateway.

The first sentence here when interpreted wrt a Nx_port sitting within
a given gateway region, implies something that isn't right - viz. the rest
of the iFCP fabric.  The second sentence makes the intention clear, if
"locally attached" includes the entire local fabric.  My suggestion would
be: "The portion of an iFCP fabric that accesses the rest of the fabric through
one iFCP gateway."

> 3.3.1 Fabric-Supplied Link Services

> Time Server û- Intended for the management of fabric-wide
> expiration timers or elapsed time values and is not intended for
> precise time synchronization.

I am curious about this - is it the conclusion the iFCP authors reached?
The reason I ask is that IIRC, FCIP allows using this for time sync.

> 3.7 Fibre Channel Frame Format

> The source and destination N_PORT fabric addresses embedded in the
> S_ID and D_ID fields represent the physical MAC addresses of
> originating and receiving N_PORTs.

I am not sure that it is a correct analogy....S_ID and D_ID are actually
(potentially transient) addresses assigned by the fabric, Port Names are
more akin to the MAC addresses.

> 4. The iFCP Network Model
> The iFCP protocol enables the implementation of fibre channel mixed
> or switched fabric functionality on an IP network

I am not sure what is intended by "fibre channel mixed or switched" here,
perhaps this could use rewording.

> Each iFCP gateway contains two standards-compliant fibre channel
> ports and an iFCP Portal for attachment to the IP network.

Why are two FC ports required?  As far as I can tell, even one E_Port
works just as well - is it to be technically called as a "switch"?

Also, is there a reason for limiting to only one IP address (implied by
one iFCP Portal)?  I see that supporting multiple iFCP Portals would
require enahancements to the data structures presented - but can you
please comment on any architectural issues here?

> channel switch element. At this interface, remote N_PORTs are
> presented as fabric-attached devices. Conversely, on the IP network
> side, the gateway presents each locally connected N_PORT as a
> logical fibre channel device.

I am not sure the last sentence is correct - I think "logical fibre channel
device" should probably be replaced by "a TCP connection".

> 4.1 Fibre Channel Fabric Topologies Supported by iFCP

> cases, the gateway may support any standards-compliant fibre
> channel fabric type by incorporating the functionality required to

Can you please comment if really "fabric type" is meant here?  Or, is
it the "fabric port type"?

> present locally attached N_PORTs as logical iFCP devices.

It may be useful to define "iFCP device" in section 2.1.

> 4.4.1 Address Transparency

> messages, a gateway cannot convert such addresses in the payload of
> vendor- or user-specific fibre channel frame traffic.

Not being very familiar with today's FC, can you please comment if these
proprietary versions of frame formats (with even the D_ID out of place) are
legal on regular fabrics?  Seems like the entire fabric should be capable
of special handling these ....

> 4.4.3 Fault Tolerance
> In an unbounded iFCP fabric, limiting the scope of an N_PORT
> address to a gateway region reduces the likelihood that

Does it not prevent the likelihood?

> reassignment of domain I/Ds caused by a disruption in one gateway
> region will cascade to others.
>
> In addition, a bounded iFCP fabric has an increased dependency on

Suggest S/b "In addition" W/ "On the other hand".

> Finally, adding a gateway to a bounded fabric is more likely to
> disrupt the operation of all devices in the gateway region along
> with those already in the fabric as new, fabric-wide N_PORT
> addresses are assigned

Isn't the issue in this para the same as that in the first para, albeit from
the bounded fabric's perspective?  If so, suggest merging them.

> be done non-disruptively and requires only that new gateway's iSNS

S/b "that" W/ "that the"

> 4.5 The iFCP N_PORT Address Model

> b) A 24-bit N_PORT alias. A fibre channel N_PORT address assigned
> by a gateway operating in address translation mode to identify a
> remotely attached N_PORT. Frame traffic is directed to a
> remotely attached N_PORT by means of the N_PORT alias.

At any point in time, there can only be 2^24 N_PORTs communicating
even in the address translation mode, eventhough this mode allows the same
nport_id to be mapped to different nports in different gateway regions at
different times.  If this is a correct interpretation, I suggest that this be made
clear in section 4.4.2, which currently simply states that there are no architectural
limitations on the number of fibre channel devices in this mode.

> 4.6.1 Transparent Mode Domain I/D Management

General comment - S/b "principal switch" W/ "Principal Switch".

> In its role as principal switch within the gateway region, an iFCP

S/b "as" W/ "as the"

> 5.2.1 iFCP Session Model

> iFCP session. A gateway implementation MAY establish a pool of

I wonder if there is a scope for DoS attack here with the possibility of
one gateway potentially holding onto several ununsed TCP connections
infinitely....

> 5.2.2.1 The Remote N_PORT Descriptor

> SHALL be created in response to an iSNS name server query. Such

Did you mean "SHALL be created after the response to an iSNS name
server query is received"?

> 5.2.2.1.1 Updating a Remote N_PORT Descriptor
>
>
> Monia et-al. Standards Track [Page 31]
>
> iFCP Revision 10 February 2002
>
> A Remote N_PORT descriptor SHALL only be updated as the result of
> an iSNS query that returns information for the specified worldwide
> port name. Following such an update, a new N_PORT alias SHALL NOT
> be assigned.

- I assume you meant "iSNS response" instead of "iSNS query"?
- I am a little confused by the SHALL NOT.  Here's what I was assuming
  as the sequence of events - 1. Local FC Name Server query
  2. iFCP gateway picks it up 3. Consults with iSNS server 4. iSNS
  provides the remote nport_id for the WWN 5. iFCP gateway
  assigns a local alias if in translation mode and if the remote nport_id
  clashes with a pre-existing local nport_id.

   I do not see why this sequence should be prohibited.  Comments
   will certainly help.

> Until such an update occurs, the contents of a descriptor may

I assume that generally what is meant by "Until such an update occurs"
is "In the absence of an operational iFCP session based on a descriptor".
If so, it perhaps requires rewording.

> Once the originating N_PORT learns of the reconfiguration, usually
> through the name server state change notification mechanism, the
> name server lookup needed to reestablish the iFCP session will
> automatically purge such stale data from the gateway.

Just a clarification here - it seems to me that the SCN for a remote nport_id
needs to delivered via the iFCP gateway anyway, so why not purge
the stale mapping then (instead of waiting for the new SNS query from
the local nport)?

> 5.2.2.2 Creating an iFCP Session

> f) A CBIND response with a CBIND STATUS of "N_PORT session already
> exists" indicates that the remote gateway has concurrently

I think the document should specify that this status be mapped to the
LS_RJT reason code of "Login/command already in progress" - 0x0E.

Also, there may be nports that go down without issuing a LOGO, and attempt
a PLOGI once they come back - unbeknownst to the iFCP gateway still with
the old session descriptor.  It isn't clear to me how this is proposed to be dealt with.

> 5.2.2.3 Monitoring iFCP Connectivity

> b) An LTEST message is not received within twice the specified
> interval or the iFCP session has been quiescent for longer than
> twice the specified interval.

I think "or" above should be "and" - else it implies that the LTEST
message must be received periodically even in the presence of other
traffic.

> 5.2.3 Terminating an iFCP Session

> a) An LS_RJT response is returned to the gateway that issued the
> PLOGI ELS. The gateway SHALL forward the LS_RJT to the local

My reading is that the gateway does not "issue" the PLOGI ELS, it merely
facilitates the transport of an issued PLOGI ELS.  The wording here is a little
confusing - I also believe that the forwarding should be to the remote
N_PORT, not local.

> N_PORT and complete the session as described in section

I recommend "terminate"/"close" in all the places "complete" is used.

> 5.2.3.1 iFCP Session Completion

> Unbind session control ELS as described in section 6.2.

I am a little confused about the status of Unbind here - is it a
FC-FS approved ELS or an iFCP session control message?

> 5.2.3.2 Aborting an iFCP Session

> In any event, the TCP connection SHOULD be terminated with a
> connection reset (RST). If the local N_PORT has logged in to the
> remote N_PORT, the gateway SHALL send a LOGO to the local N_PORT.

I think the draft should specify both OPEN and OPEN PENDING
cases here.  For OPEN state, a local LOGO is required as stated,
whereas for OPEN PENDING, a local LS_RJT may be appropriate.

Also, it is useful to state that the proxied ELS (in either case) be indistinguishable
from the end-to-end ELS in its payload (so any sanity checking done by endnode
software would continue to work).

> 5.4.1 Encapsulation Header Format

> Protocol# IANA-assigned protocol number
> identifying the protocol using the
> encapsulation. For iFCP the value is
> (/TBD/).

Should FCEncap document be referred here instead?

> 5.4.3 Frame Encapsulation

> Following frame validation, the S_ID and D_ID fields in the frame
> header SHALL be referenced to lookup the iFCP session descriptor
> (see section 5.2.2.2). If no iFCP session descriptor exists, the
> frame SHALL be discarded.

With the exception of PLOGI?

> Frames types submitted for encapsulation and forwarding on the IP

S/b "Frames" W/ "Frame".

> 6. TCP Session Control Messages
> TCP session control messages are used to create and manage an iFCP
> session as described in section 5.2.2. They are passed between peer
> iFCP Portals and are only processed within the iFCP layer.
> The message format is based on the fibre channel extended link
> service message template shown below.

It may be useful to state that this message forms the "FC Frame" payload
of the iFCP frame.

It may also be useful to state the value of LS_COMMAND in the encap
header (0?).

In stead of having two LS_COMMAND fields - one in the header and
one in the payload - for these messages, a simpler approach could be to
state that LS_COMMAND in the header contains an iFCP-defined
value when SES=1 (and remove the one in the payload).

> 6.1 Connection Bind (CBIND)

> The following shows the format of the CBIND request.

I take it that this CBIND structure goes into the Session Control
Message starting from word 6?  Same question on CBIND response.

> 6.2 Unbind Connection (UNBIND)
> UNBIND is used to release a bound TCP connection and. optionally,
> return it to the pool of unbound TCP connections.

I assume "release" here implies - "remove the binding"?

Is there a way to convey the preference to not terminate the connection
on the part of the sender?  IOW, where is the optionality selected?

> transmitted in the connection that is to be unbound. The time

S/b "in" W/ "on"

> 8.2.1 Enforcing R_A_TOV Limits
> The R_A_TOV limit on frame lifetimes SHALL be enforced by means of
> the time stamp in the encapsulation header (see section 5.4.1) as
> described in this section.

A couple of general questions on this section -

- Is Unsynchronized operation allowed?  If so, how is the R_A_TOV
   expectation met?
- If an incorrect configuration causes the timestamp of the incoming frame
  to be higher than the gateway's time base, it is better if there is a way to
  detect and perhaps resync both ends with the same SNTP server (as opposed to
  one out of a list returned by iSNS).  As far as I can tell, the current text
  specifies that it would simply cause the frames to be discarded, but doesn't
  break the binding nor terminate the TCP connection - perhaps relying on
  the end nodes to LOGOUT?




From owner-ips@ece.cmu.edu  Fri Mar 29 09:01:19 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA13911
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 09:01:14 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TDCpB13247
	for ips-outgoing; Fri, 29 Mar 2002 08:12:51 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from pkoning.akdesign.com (156-88-189-66.wo.cpe.charter-ne.com [66.189.88.156])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TDCkw13242
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 08:12:46 -0500 (EST)
Received: from pkoning.akdesign.com.equallogic.com (IDENT:pkoning@localhost [127.0.0.1])
	by pkoning.akdesign.com (8.11.6/8.9.3) with SMTP id g2TDCYT01328;
	Fri, 29 Mar 2002 08:12:34 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15524.26689.696151.300469@pkoning.akdesign.com>
Date: Fri, 29 Mar 2002 08:12:33 -0500
From: Paul Koning <ni1d@arrl.net>
To: luben@splentec.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <3CA3B17F.B5299568@splentec.com>
	<012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com>
	<3CA3C607.242E8EC5@splentec.com>
	<015e01c1d6c5$f14e5ab0$edd52b0f@rose.hp.com>
	<3CA3E178.2C56F36B@splentec.com>
X-Mailer: VM 7.01 under 21.1 (patch 11) "Carlsbad Caverns" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

>>>>> "Luben" == Luben Tuikov <luben@splentec.com> writes:

 Luben> ...We cannot control the format of the VALUE (above), as
 Luben> companies will add their own keys. (Reason 2)

 Luben> Thus we need to restrict the "KEY=VALUE" as a whole, its
 Luben> internals past iSCSI are up to the implementations/ companies
 Luben> which add them.

 Luben> If we impose restrictions on "KEY=VALUE" then we need not
 Luben> impose restrictions on the size of KEY or VALUE separately,
 Luben> just that KEY cannot be an empty sequence.

 Luben> The node should know in advance how big of a span a
 Luben> "KEY=VALUE" will be in order to 1) reject it (out of
 Luben> resources) or 2) prepare for its arrival (whatever this
 Luben> means).

I would argue that an implementation can, and should, have its own
protective limits no matter what the standard may have to say about
it.  If a well-crafted sequence of messages crashes an implementation,
the blame goes to the implementation, not to the standard.

But I do agree that the standard needs to say more.  Given that
resources and needs may vary, it seems overly restrictive to place a
hard upper bound on the overall size.  What I would propose instead is
that the standard specify an overall size that all implementations
MUST support.  Larger sizes may be accepted if the implementation has
the needed memory -- which allows implementations that have special
requirements to deal with that within the standard -- but a conforming
implementation would be entitled to reject such large negotiations.

One question: are we concerned here with an individual "key=value" or
with all of the key=value pairs in the text messages taken together?
I can see reasons to worry about the entire set of key=value pairs, so
having a size bound (as in "everyone MUST support at least this much")
on that would take care of the entire question in one step.

       paul



From owner-ips@ece.cmu.edu  Fri Mar 29 10:43:56 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA19767
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 10:43:56 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TF4A920425
	for ips-outgoing; Fri, 29 Mar 2002 10:04:10 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from maho3msx2.isus.emc.com (maho3msx2.isus.emc.com [128.221.11.32])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TF48w20421
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 10:04:08 -0500 (EST)
Received: by maho3msx2.isus.emc.com with Internet Mail Service (5.5.2653.19)
	id <HWPCBQZR>; Fri, 29 Mar 2002 10:03:30 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E02937690@CORPMX14>
From: Black_David@emc.com
To: ips@ece.cmu.edu
Subject: iSCSI: New Lucent stmt on SRP
Date: Fri, 29 Mar 2002 10:03:25 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

   http://www.ietf.org/ietf/IPR/LUCENT-SRP

--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Fri Mar 29 12:52:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25381
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 12:52:40 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2THATX00232
	for ips-outgoing; Fri, 29 Mar 2002 12:10:29 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from astutenetworks.com (2.astutenetworks.com [216.142.74.2])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2THARw00226
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 12:10:27 -0500 (EST)
Received: from amirdesktop (dhcp62 [172.21.2.62])
	by astutenetworks.com (8.11.6/8.11.2) with SMTP id g2THAC122431;
	Fri, 29 Mar 2002 09:10:12 -0800
From: "Amir Shalit" <amir@astutenetworks.com>
To: <Black_David@emc.com>, <ips@ece.cmu.edu>
Subject: RE: iSCSI: New Lucent stmt on SRP
Date: Fri, 29 Mar 2002 09:10:11 -0800
Message-ID: <NDENIJJABNDACKOMLGPNIEDCCIAA.amir@astutenetworks.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E02937690@CORPMX14>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4807.1700
Importance: Normal
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

David,

Does it solve the SRP dilemma? 

Amir

-----Original Message-----
From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
Black_David@emc.com
Sent: Friday, March 29, 2002 7:03 AM
To: ips@ece.cmu.edu
Subject: iSCSI: New Lucent stmt on SRP


   http://www.ietf.org/ietf/IPR/LUCENT-SRP

--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------





From owner-ips@ece.cmu.edu  Fri Mar 29 13:39:44 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27518
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 13:39:44 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TI03K03826
	for ips-outgoing; Fri, 29 Mar 2002 13:00:03 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from emulex.emulex.com (emulex.emulex.com [138.239.112.1])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TI01w03821
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 13:00:01 -0500 (EST)
Received: from xbl.ad.emulex.com (xbl.ma.emulex.com [172.16.12.11])
	by emulex.emulex.com (8.9.1a/8.9.1) with ESMTP id JAA09841;
	Fri, 29 Mar 2002 09:59:47 -0800 (PST)
Received: by xbl.ad.emulex.com with Internet Mail Service (5.5.2653.19)
	id <GFHTPMPC>; Fri, 29 Mar 2002 12:59:48 -0500
Message-ID: <3356669BBE90C448AD4645C843E2BF289B8D22@xbl.ad.emulex.com>
From: "Williams, Jim" <Jim.Williams@emulex.com>
To: "'Black_David@emc.com'" <Black_David@emc.com>, ips@ece.cmu.edu
Subject: RE: iSCSI: New Lucent stmt on SRP
Date: Fri, 29 Mar 2002 12:59:47 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

What does "on the basis of reciprocity" mean.
Does this mean that if a company has ANY patent
they do not wish to license to Lucent, then
Lucent may deny rights to SRP?  Does this still
meet the IETF requirements for reasonable and
non-discriminatory?

> -----Original Message-----
> From: Black_David@emc.com [mailto:Black_David@emc.com]
> Sent: Friday, March 29, 2002 10:03 AM
> To: ips@ece.cmu.edu
> Subject: iSCSI: New Lucent stmt on SRP
> 
> 
>    http://www.ietf.org/ietf/IPR/LUCENT-SRP
> 
> --David
> ---------------------------------------------------
> David L. Black, Senior Technologist
> EMC Corporation, 42 South St., Hopkinton, MA  01748
> +1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
> black_david@emc.com         Cell: +1 (978) 394-7754
> ---------------------------------------------------
> 


From owner-ips@ece.cmu.edu  Fri Mar 29 14:31:08 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA00015
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 14:31:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TIxGS08017
	for ips-outgoing; Fri, 29 Mar 2002 13:59:16 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mxic2.us.dg.com (mxic2.isus.emc.com [128.221.31.40])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TIxEw08009
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 13:59:14 -0500 (EST)
Received: by mxic2.us.dg.com with Internet Mail Service (5.5.2653.19)
	id <H4LPS86Q>; Fri, 29 Mar 2002 13:53:06 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293769E@CORPMX14>
From: Black_David@emc.com
To: amir@astutenetworks.com, ips@ece.cmu.edu
Subject: RE: iSCSI: New Lucent stmt on SRP
Date: Fri, 29 Mar 2002 13:58:36 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Amir,

Not completely, but it helps.  The IESG is now requesting
that the WG consider use of a version of CHAP strengthened
by an anonymous Diffie-Hellman key exchange as an alternative
to SRP.  In essence, the DH key exchange would produce the
CHAP challenge and replace passing it as part of the protocol.
In addition, I believe the IESG could accept CHAP without
DH strengthening if the WG believes that to be the best choice.

Ted Ts'o has done us the favor of posting many of the issues
that the IESG expects the WG to consider in his post from
this past Wednesday:

http://www.pdl.cmu.edu/mailinglists/ips/mail/msg09358.html

I would hope that a strawman design for this mechanism
could be posted in the next week, and apologize for the
delay ... I'm afraid that all attempts to clone me have
failed, and I need to ensure that some real cryptographers
check the resulting design before it is posted  ;-).

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------

> -----Original Message-----
> From: Amir Shalit [mailto:amir@astutenetworks.com]
> Sent: Friday, March 29, 2002 12:10 PM
> To: Black_David@emc.com; ips@ece.cmu.edu
> Subject: RE: iSCSI: New Lucent stmt on SRP
> 
> 
> David,
> 
> Does it solve the SRP dilemma? 
> 
> Amir
> 
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> Black_David@emc.com
> Sent: Friday, March 29, 2002 7:03 AM
> To: ips@ece.cmu.edu
> Subject: iSCSI: New Lucent stmt on SRP
> 
> 
>    http://www.ietf.org/ietf/IPR/LUCENT-SRP
> 
> --David
> ---------------------------------------------------
> David L. Black, Senior Technologist
> EMC Corporation, 42 South St., Hopkinton, MA  01748
> +1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
> black_david@emc.com         Cell: +1 (978) 394-7754
> ---------------------------------------------------


From owner-ips@ece.cmu.edu  Fri Mar 29 14:33:00 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA00105
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 14:33:00 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TIn9G07300
	for ips-outgoing; Fri, 29 Mar 2002 13:49:09 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from snap.thunk.org (SNAP.THUNK.ORG [216.175.175.173])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TIn7w07296
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 13:49:07 -0500 (EST)
Received: from think.thunk.org ([216.175.175.162])
	by snap.thunk.org with asmtp (Exim 3.33 #1 (Debian))
	id 16r1Qt-0000vK-03; Fri, 29 Mar 2002 13:49:03 -0500
Received: from tytso by think.thunk.org with local (Exim 3.34 #1 (Debian))
	id 16qk3M-0000NC-00; Thu, 28 Mar 2002 19:15:36 -0500
Date: Thu, 28 Mar 2002 19:15:36 -0500
From: Theodore Tso <tytso@mit.edu>
To: David Jablon <dpj@theworld.com>
Cc: Theodore Tso <tytso@mit.edu>, ips@ece.cmu.edu
Subject: Re: iSCSI authentication requirements
Message-ID: <20020328191535.B964@thunk.org>
References: <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com> <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com> <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com> <20020327225732.A17992@thunk.org> <5.1.0.14.0.20020328195149.00a27220@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.15i
In-Reply-To: <5.1.0.14.0.20020328195149.00a27220@pop.theworld.com>; from dpj@theworld.com on Thu, Mar 28, 2002 at 08:13:42PM -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Thu, Mar 28, 2002 at 08:13:42PM -0500, David Jablon wrote:
> Ok.  On the one hand, you sure do make that attack sound hard.
> But stated in other words, an attacker can inject just a couple
> bogus packets, a mere hiccup from the user's view, and then he
> gets unlimited offline guessing to crack the password.  Some
> might consider that a *bad thing* indeed.

Nope, not that easy.  As I said, the attacker has to be on the network
communications path between the client and the server.  Also, the
attacker has to prevent the original packets from the client to the
server from getting through.  This is not necessarily trivial --- it's
*not* just a matter of "injecting a few bogus packets".

> Furthermore, limiting the attack window to *just* the first time may
> not significantly decrease the problem.  It depends on other
> assumptions.  In some cases it may be like locking all but one door
> of your house.  A good burglar will try them all, or wait for the
> appropriate time, etc.  In contrast, a strong password method closes
> all these doors to offline cracking of network messages, forcing the
> burglar to try something different.

Again, nope.  It's like saying that while the house is being built,
there is a small window when the deadbolt hasn't been installed yet.
But once the deadbolt has been installed, the burgler can't get in.

Given the usage patterns of clients talking to disks, most of the time
you're talking the same disk where you had previously stored data.  So
most of the time, it's *not* the first time a client is talking to a
disk, and by definition, that vulnerability only happens once.  For
that reason, limiting the vulnerability to an active attack during the
initial attack window is quite significant.

Also, note that if the public key of the server is (optionally)
certified by some well-known CA, then even the initial attack window
(if people think it's important) can be avoided.  And if you think
that's impractical, note that significant amounts of e-commerce is
done using precisely level of protection.

> Again, this is false.  Even that last requirement can be met.
> While it is true that free use and distribution products like Linux
> can pose a different problem for a patent holder, it is surmountable.
> And finally, as you almost point out, all these interoperability
> problems go away when a patented technique is standardized as
> a SHOULD implement method.

Nope.  Security mechanisms have to be a MUST implement.  If we have a
non-encumbered MUST implement mechanism, then whether or not we have
an encumbered SHOULD mechanism at some level is less important.  Most
people will probably depend on the MUST implement for
interoperability.  So then, people will only pay whever are costs (in
money, legal uncertainty, etc.) for using said encumbered technology
if said encumbered technology really provides enough value that it's
worth the cost.

In some sense, this might be the best result.  As I said, it really is
all about engineering tradeoffs.  Are the benefits worth the costs?
If there is a MUST implement which is unencumbered, then instead of
arguing about the relative costs and benefits, vendors will be able to
decide for themselves whether or not it's worth it to trade in the
encumbered technology.

> * I disagree with the concept of making *uninformed* business/engineering
> tradeoffs.

Ultimately, we always have to make decisions based partial
information.  There have been cases where a patent holder has
publically stated during the standardization process that the patent
will be free for people implementing the specific protcol, in that
case, the working group can make decisions based on that knowledge.

But if the statement which is made is only the stock "reasonable and
non-discriminatory", that can mean many things.  It can mean a no-cost
license, or it could mean "everyone gets to pay $10 million dollars",
where while the terms might be non-discriminatory, it could lock out
all but the largest companies, which many would say is a Bad Thing.

But just because we don't know doesn't mean that we should freeze and
not make any decision.  At the same time, we can't assume that
companies will be utterly benign with their patent licensing policies.
All we can do is make the best possible decision we can based on the
information we have.  And that's something that we always have to do,
no matter what the field of endeavor.

> * I think it's up to the working group members to decide what technology is
> truly equivalent to an optimal case for its purposes, without undue pressure
> or interference from "outsiders" (including me too of course).

The security area of the IETF, and the security AD's of the IESG are
not "outsiders".  They are part of the IETF community.  And the IETF
community *has* made some global decisions for the entire IETF.  For
example, in the past, the IETF as a whole had decided that despite
export control regulations, strong cryptography would be required,
despite the desires of some working groups, which were dominated by
vendors who were motivated by a desire to ship products that could be
exported outside of the U.S.  The general policy that strong
cryptography would be required for all working groups, despite any
nation's export control policy was termed the "Danvers Doctrine", from
the IETF plenary meeting in Danvers, Massachusetts, where it was clear
this consensus was reached.

More recently, the IETF decided that standardizing wiretap-friendly
provisions into protocols was bad from an engineering standpoint, and
so this was something that the IETF would not engage in.

So there is in fact a rich history of the IETF community as a whole
(and not just an individual working group) making statements which
take into account the entire Internet community, sometimes to the
frustration of parties whose priorities are solely based on monetary
motivations, or by people who only care about law enforcement's
concerns.  Personally, I believe this is a Good Thing.

						- Ted

P.S.  I will note that in the case of public key technology, it seems
pretty clear that the patent issue very much did inhibit its
deployment.  Most recently at this Minneapolis IETF meeting, we
enjoyed the integration of dynamic DNS updates and DHCP, which
involved the use of public key technology.  The standards involved
were developed while the RSA patent was in force, but in fact,
widespread deployment of RSA technology in IETF protocols really
didn't happen before the RSA patent expired.  And at this Minneapolis
IETF meeting, the dynamic DNS update demonstration was spearheaded by
open source implementations: the ISC dhcp server, the ISC dhcp server,
and ISC BIND implementation were all involved.  None of these open
source implementations could have used the RSA technology while the
patent was still in force.

Make no mistake.  Patents have their costs.  If you want your protocol
to be widely deployed across the Internet, use of patented technology
(unless that patent has been freely licensed) has historically been a
strike against your protocol.


From owner-ips@ece.cmu.edu  Fri Mar 29 14:33:01 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA00117
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 14:33:01 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TIoKQ07405
	for ips-outgoing; Fri, 29 Mar 2002 13:50:20 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TIoIw07401
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 13:50:18 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 357B330706; Fri, 29 Mar 2002 13:50:18 -0500 (EST)
Date: Fri, 29 Mar 2002 10:45:24 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: Paul Koning <ni1d@arrl.net>
Cc: <luben@splentec.com>, <ips@ece.cmu.edu>
Subject: Re: iSCSI: Text request/response spanning - security issue?
In-Reply-To: <15524.26689.696151.300469@pkoning.akdesign.com>
Message-ID: <Pine.NEB.4.33.0203291042230.314-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Fri, 29 Mar 2002, Paul Koning wrote:

> I would argue that an implementation can, and should, have its own
> protective limits no matter what the standard may have to say about
> it.  If a well-crafted sequence of messages crashes an implementation,
> the blame goes to the implementation, not to the standard.
>
> But I do agree that the standard needs to say more.  Given that
> resources and needs may vary, it seems overly restrictive to place a
> hard upper bound on the overall size.  What I would propose instead is
> that the standard specify an overall size that all implementations
> MUST support.  Larger sizes may be accepted if the implementation has
> the needed memory -- which allows implementations that have special
> requirements to deal with that within the standard -- but a conforming
> implementation would be entitled to reject such large negotiations.
>
> One question: are we concerned here with an individual "key=value" or
> with all of the key=value pairs in the text messages taken together?
> I can see reasons to worry about the entire set of key=value pairs, so
> having a size bound (as in "everyone MUST support at least this much")
> on that would take care of the entire question in one step.

Why don't we negotiate a size? We have a default max size for individual
key=value items, and a max for the entire set. Either the target or the
initiator can try to negotiate it up, but has to deal with the other side
saying no. You can't negotiate it below the default max that we decide on.

The main thing about making it a negotiated value is both sides can know
what the other can do. We won't get surprise errors as we tripped over an
undisclosed limit one side had.

Take care,

Bill



From owner-ips@ece.cmu.edu  Fri Mar 29 14:34:14 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA00189
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 14:34:09 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TIkQ007101
	for ips-outgoing; Fri, 29 Mar 2002 13:46:26 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mailhub.lss.emc.com (xdch.emc.com [168.159.1.79])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TIkOw07097
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 13:46:24 -0500 (EST)
Received: from emc.com (emcmail.lss.emc.com [168.159.48.78])
	by mailhub.lss.emc.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g2TIkHX16253;
	Fri, 29 Mar 2002 13:46:17 -0500 (EST)
Received: from mxic1.isus.emc.com ([168.159.129.100])
	by emc.com (8.10.1/8.10.1) with ESMTP id g2TIkH724662;
	Fri, 29 Mar 2002 13:46:17 -0500 (EST)
Received: by MXIC1 with Internet Mail Service (5.5.2653.19)
	id <HKRRAVHA>; Fri, 29 Mar 2002 13:45:48 -0500
Message-ID: <277DD60FB639D511AC0400B0D068B71E0293769D@CORPMX14>
From: Black_David@emc.com
To: Jim.Williams@emulex.com, ips@ece.cmu.edu
Subject: RE: iSCSI: New Lucent stmt on SRP
Date: Fri, 29 Mar 2002 13:45:45 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Jim,

> What does "on the basis of reciprocity" mean.
> Does this mean that if a company has ANY patent
> they do not wish to license to Lucent, then
> Lucent may deny rights to SRP?  Does this still
> meet the IETF requirements for reasonable and
> non-discriminatory?

-- Disclaimer

- I am NOT a lawyer.
- This message does NOT contain legal advice.
- If you need legal advice, you need to talk to a lawyer.
- If actions or decisions based on information in this message
	have legal consequences, those consequences are YOUR
	responsibility.
	- The IETF and yours truly disclaim all responsibility

I believe the short answers are:

> Does this mean that if a company has ANY patent
> they do not wish to license to Lucent, then
> Lucent may deny rights to SRP? 

"Almost certainly not."

> Does this still
> meet the IETF requirements for reasonable and
> non-discriminatory?

"Not a strictly relevant question, but it most likely does".

Here's the long explanation:

Reciprocity is usually scoped by field of use, which the Lucent
statement identifies as:

	implementation of SRP as an IETF standards
	track specification

In other words, in return for rights to Lucent's patent(s)
for the purpose of implementing SRP, Lucent wants rights
to any of your patents that are required to implement SRP
for the purpose of implementing SRP.  If you have no such
patents, that's not a problem.

As for IETF requirements for reasonable and non-discriminatory,
Section 10.3.3 of RFC 2026 says:

	The IESG will not make any explicit determination that
	the assurance of reasonable and non-discriminatory terms
	for the use of a technology has been fulfilled in practice.

Nonetheless reciprocity has been acceptable to the IETF community
in other circumstances, for example, see Section 2, Paragraph 3
("Reciprocal Grant by Licensee") in the document at:

	http://www.ietf.org/entrust_license.html

and I believe you'll find reciprocity conditions in a number of
the IPR notices on the IETF web site.  IMHO, the Stanford SRP
license is quite generous in not requiring reciprocity.

Thanks,
--David
---------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 42 South St., Hopkinton, MA  01748
+1 (508) 249-6449 *NEW*      FAX: +1 (508) 497-8500
black_david@emc.com         Cell: +1 (978) 394-7754
---------------------------------------------------


From owner-ips@ece.cmu.edu  Fri Mar 29 15:39:41 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02917
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 15:39:41 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TJoOQ11549
	for ips-outgoing; Fri, 29 Mar 2002 14:50:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2TJoMw11544
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 14:50:22 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2TJoG027722
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 14:50:16 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2TJoGK27713;
	Fri, 29 Mar 2002 14:50:16 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2TJoF214784;
	Fri, 29 Mar 2002 14:50:16 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15524.50552.86000.748182@gargle.gargle.HOWL>
Date: Fri, 29 Mar 2002 14:50:16 -0500
From: Paul Koning <ni1d@arrl.net>
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <15524.26689.696151.300469@pkoning.akdesign.com>
	<Pine.NEB.4.33.0203291042230.314-100000@candlekeep.home-net.internetconnect.net>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 29 March 2002) by Bill Studenmund:
> Why don't we negotiate a size? We have a default max size for individual
> key=value items, and a max for the entire set. Either the target or the
> initiator can try to negotiate it up, but has to deal with the other side
> saying no. You can't negotiate it below the default max that we decide on.
> 
> The main thing about making it a negotiated value is both sides can know
> what the other can do. We won't get surprise errors as we tripped over an
> undisclosed limit one side had.

But we're talking about limits of the negotiation process itself.
Yes, you can renegotiate after login, but login is the primary
negotiation point.  I think a fixed minimum requirement is more
straightforward. 

	 paul



From owner-ips@ece.cmu.edu  Fri Mar 29 15:40:53 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02960
	for <ips-archive@odin.ietf.org>; Fri, 29 Mar 2002 15:40:53 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TKRUH13962
	for ips-outgoing; Fri, 29 Mar 2002 15:27:30 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2TKRSw13957
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 15:27:28 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2TKRM028236
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 15:27:22 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2TKRMK28227;
	Fri, 29 Mar 2002 15:27:22 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2TKRLP16273;
	Fri, 29 Mar 2002 15:27:22 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15524.52778.147000.815997@gargle.gargle.HOWL>
Date: Fri, 29 Mar 2002 15:27:22 -0500
From: Paul Koning <ni1d@arrl.net>
To: wrstuden@wasabisystems.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <15524.50552.86000.748182@gargle.gargle.HOWL>
	<Pine.NEB.4.33.0203291148160.314-100000@candlekeep.home-net.internetconnect.net>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 29 March 2002) by Bill Studenmund:
> > Yes, you can renegotiate after login, but login is the primary
> > negotiation point.  I think a fixed minimum requirement is more
> > straightforward.
> 
> While having a minimum required is good, if we don't have a way to
> negotiate a larger value, how can we really use a larger value? So if we
> can't negotiate the largest size we allow for key=value items and for the
> set, aren't you really suggesting we just pick a number and that's it?
>
> What's the alternative? Send something too large and either crash the
> other side or have some 'I'm confused' error come back? At least with
> negotiation, each side will know what it can and can't send.

If you crash, you have a bug.  I was assuming a reject that says "your
text is too long".
 
> So here's the suggestion again. We start negotiation with a default value
> for the largest key=value item that can be sent, and the largest set of
> items that can be sent. These defaults are the minimum required that you
> mention. If we want, either side can try to negotiate these values larger.
> If negotiation suceeds, then future steps of negotiation can use the
> larger values. Negotiation can't lower the values below the minimum
> required.

That sounds workable but I don't see the justification for that extra
complexity.  Luben brought up the original issue as a denial of
service concern.  Is there a plausible real-world example where
someone will want to send a meaningful negotiation exchange that's
"very large"?  I don't know of one.  If there isn't a real need for
the complexity, let's make the minimal fix needed, which is to say
"everyone must support at least x" without negotiating x.

	    paul



From owner-ips@ece.cmu.edu  Fri Mar 29 15:41:31 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02990
	for <ips-archive@lists.ietf.org>; Fri, 29 Mar 2002 15:41:31 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2TKHLZ13312
	for ips-outgoing; Fri, 29 Mar 2002 15:17:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from mononoke.wasabisystems.com (lion.ninthwonder.com [151.199.66.147])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2TKHIw13300
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 15:17:18 -0500 (EST)
Received: by mononoke.wasabisystems.com (Postfix, from userid 1021)
	id 0F2E130706; Fri, 29 Mar 2002 15:17:18 -0500 (EST)
Date: Fri, 29 Mar 2002 12:12:24 -0800 (PST)
From: Bill Studenmund <wrstuden@wasabisystems.com>
X-X-Sender:  <wrstuden@candlekeep.home-net.internetconnect.net>
To: Paul Koning <ni1d@arrl.net>
Cc: <ips@ece.cmu.edu>
Subject: Re: iSCSI: Text request/response spanning - security issue?
In-Reply-To: <15524.50552.86000.748182@gargle.gargle.HOWL>
Message-ID: <Pine.NEB.4.33.0203291148160.314-100000@candlekeep.home-net.internetconnect.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

On Fri, 29 Mar 2002, Paul Koning wrote:

> Excerpt of message (sent 29 March 2002) by Bill Studenmund:
> > Why don't we negotiate a size? We have a default max size for individual
                                             ^^^^^^^^^^^
This is the fixed minimum you mention below, under a different name. I
call it a max since it is the max size of negotiation items it covers.

> > key=value items, and a max for the entire set. Either the target or the
> > initiator can try to negotiate it up, but has to deal with the other side
> > saying no. You can't negotiate it below the default max that we decide on.
> >
> > The main thing about making it a negotiated value is both sides can know
> > what the other can do. We won't get surprise errors as we tripped over an
> > undisclosed limit one side had.
>
> But we're talking about limits of the negotiation process itself.

I understand.

I am suggesting that durning negotiation we negotiate parameters covering
the very negotiations we are in. That means that some key=value items can
only be sent after a given size has been negotiated.

> Yes, you can renegotiate after login, but login is the primary
> negotiation point.  I think a fixed minimum requirement is more
> straightforward.

While having a minimum required is good, if we don't have a way to
negotiate a larger value, how can we really use a larger value? So if we
can't negotiate the largest size we allow for key=value items and for the
set, aren't you really suggesting we just pick a number and that's it?

What's the alternative? Send something too large and either crash the
other side or have some 'I'm confused' error come back? At least with
negotiation, each side will know what it can and can't send.

So here's the suggestion again. We start negotiation with a default value
for the largest key=value item that can be sent, and the largest set of
items that can be sent. These defaults are the minimum required that you
mention. If we want, either side can try to negotiate these values larger.
If negotiation suceeds, then future steps of negotiation can use the
larger values. Negotiation can't lower the values below the minimum
required.

Take care,

Bill



From owner-ips@ece.cmu.edu  Fri Mar 29 19:43:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA08447
	for <ips-archive@odin.ietf.org>; Fri, 29 Mar 2002 19:43:11 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2U05bM27252
	for ips-outgoing; Fri, 29 Mar 2002 19:05:37 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2U05aw27248
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 19:05:36 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id TAA57776
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 19:02:11 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2U05ZF151986
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 17:05:35 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: iSCSI: Text request/response spanning - security issue?
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF69D16339.9EEB047A-ON88256B8B.008343CD@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Fri, 29 Mar 2002 16:04:55 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/29/2002 05:05:34 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Before we run off to far in this direction, ....

Each Key of the Key=value pairs, supplies enough information to understand
the Max length of the value that follows.  The length permitted by each
keyword that is supported, should  be enough to define the approprate
length for any key=value pair.  I think that the implementation can
determine the Max amount of buffer it needs by computing the Max size based
on the keywords supported.

I think the item that got us into the Multi PDU  spanning of a key=value is
the Certificates associated with authentication.  So depending on the type
of Authentication supported, and the Max size of Certificates supported,
you can compute the Max size of the total key=value buffer needed.

I do not see anything broken here.  Hence, I do not think a fix is needed.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Paul Koning <ni1d@arrl.net>@ece.cmu.edu on 03/29/2002 12:27:22 PM

Sent by:    owner-ips@ece.cmu.edu


To:    wrstuden@wasabisystems.com
cc:    ips@ece.cmu.edu
Subject:    Re: iSCSI: Text request/response spanning - security issue?



Excerpt of message (sent 29 March 2002) by Bill Studenmund:
> > Yes, you can renegotiate after login, but login is the primary
> > negotiation point.  I think a fixed minimum requirement is more
> > straightforward.
>
> While having a minimum required is good, if we don't have a way to
> negotiate a larger value, how can we really use a larger value? So if we
> can't negotiate the largest size we allow for key=value items and for the
> set, aren't you really suggesting we just pick a number and that's it?
>
> What's the alternative? Send something too large and either crash the
> other side or have some 'I'm confused' error come back? At least with
> negotiation, each side will know what it can and can't send.

If you crash, you have a bug.  I was assuming a reject that says "your
text is too long".

> So here's the suggestion again. We start negotiation with a default value
> for the largest key=value item that can be sent, and the largest set of
> items that can be sent. These defaults are the minimum required that you
> mention. If we want, either side can try to negotiate these values
larger.
> If negotiation suceeds, then future steps of negotiation can use the
> larger values. Negotiation can't lower the values below the minimum
> required.

That sounds workable but I don't see the justification for that extra
complexity.  Luben brought up the original issue as a denial of
service concern.  Is there a plausible real-world example where
someone will want to send a meaningful negotiation exchange that's
"very large"?  I don't know of one.  If there isn't a real need for
the complexity, let's make the minimal fix needed, which is to say
"everyone must support at least x" without negotiating x.

     paul






From owner-ips@ece.cmu.edu  Fri Mar 29 22:22:50 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA11580
	for <ips-archive@odin.ietf.org>; Fri, 29 Mar 2002 22:22:50 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2U2eLZ05563
	for ips-outgoing; Fri, 29 Mar 2002 21:40:21 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from fep01-mail.bloor.is.net.cable.rogers.com (fep01-mail.bloor.is.net.cable.rogers.com [66.185.86.71])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2U2eJw05558
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 21:40:19 -0500 (EST)
Received: from splentec.com ([24.43.3.86])
          by fep01-mail.bloor.is.net.cable.rogers.com
          (InterMail vM.5.01.04.06 201-253-122-122-106-20020109) with ESMTP
          id <20020330024013.NENF213949.fep01-mail.bloor.is.net.cable.rogers.com@splentec.com>;
          Fri, 29 Mar 2002 21:40:13 -0500
Message-ID: <3CA52585.5239B9D3@splentec.com>
Date: Fri, 29 Mar 2002 21:40:05 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: luben@splentec.com, iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Paul Koning <ni1d@arrl.net>
CC: ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <3CA3B17F.B5299568@splentec.com>
		<012601c1d6b9$f4fe87e0$edd52b0f@rose.hp.com>
		<3CA3C607.242E8EC5@splentec.com>
		<015e01c1d6c5$f14e5ab0$edd52b0f@rose.hp.com>
		<3CA3E178.2C56F36B@splentec.com> <15524.26689.696151.300469@pkoning.akdesign.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep01-mail.bloor.is.net.cable.rogers.com from [24.43.3.86] using ID <tluben@rogers.com> at Fri, 29 Mar 2002 21:40:13 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul Koning wrote:
> 
> I would argue that an implementation can, and should, have its own
> protective limits no matter what the standard may have to say about
> it.

Yes and no.

Yes, since a well written implementation
should indeed check buffer limits (if they are known
beforehand).

No, because a computer program is a theorem proof;
the theorem being the specification, which is the iSCSI
draft/RFC. And if the specification is faulty, then
there is no way the program can work.

>  If a well-crafted sequence of messages crashes an implementation,
> the blame goes to the implementation, not to the standard.

Yes, but I can crash a conforming to the iSCSI spec implementation,
by sending it an extremely long "KEY=VALUE" sequence.
That is, the implementation will have to keep a state
until 0x00 is received so that it can _then_ interpret it.

> One question: are we concerned here with an individual "key=value" or
> with all of the key=value pairs in the text messages taken together?

Answer: limit ONLY a "KEY=VALUE" sequence. Either by
negotiation per assignment or global.

Reason 1: The reason is that such a sequence can span PDUs.
If it didn't, then it is limited by the PDU size.

Reason 2: Multiple "KEY=VALUE" pairs that span PDUs have NO
burden on memory because as soon as a 0x00 is received
_that_ key=value assignment is processed and the memory
where it is kept is _freed_. (something like a conveyer belt)

BUT as noted in reason 1, you support a KEY=VALUE assignment
to span multiple PDU's AND I send you one, you'll have to
``wait'' or ``keep state'' until I send you 0x00
and by that time you can run out of memory.

For a reference see char *gets(char *s) which has exactly
the same problem I'm describing here.

-- 
Luben


From owner-ips@ece.cmu.edu  Fri Mar 29 23:44:33 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA13821
	for <ips-archive@odin.ietf.org>; Fri, 29 Mar 2002 23:44:33 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2U4OBk10833
	for ips-outgoing; Fri, 29 Mar 2002 23:24:11 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from fep04-mail.bloor.is.net.cable.rogers.com (fep04-mail.bloor.is.net.cable.rogers.com [66.185.86.74])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2U4O9w10828
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 23:24:09 -0500 (EST)
Received: from splentec.com ([24.43.3.86])
          by fep04-mail.bloor.is.net.cable.rogers.com
          (InterMail vM.5.01.04.06 201-253-122-122-106-20020109) with ESMTP
          id <20020330042354.GNCP4492.fep04-mail.bloor.is.net.cable.rogers.com@splentec.com>;
          Fri, 29 Mar 2002 23:23:54 -0500
Message-ID: <3CA53DE2.FA3AE1A0@splentec.com>
Date: Fri, 29 Mar 2002 23:24:02 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: Luben Tuikov <luben@splentec.com>, iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Bill Studenmund <wrstuden@wasabisystems.com>
CC: Paul Koning <ni1d@arrl.net>, ips@ece.cmu.edu,
        Julian Satran <Julian_Satran@il.ibm.com>,
        "Mallikarjun C." <cbm@rose.hp.com>
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <Pine.NEB.4.33.0203291148160.314-100000@candlekeep.home-net.internetconnect.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep04-mail.bloor.is.net.cable.rogers.com from [24.43.3.86] using ID <tluben@rogers.com> at Fri, 29 Mar 2002 23:23:54 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Bill Studenmund wrote:
> 
> So here's the suggestion again. We start negotiation with a default value
> for the largest key=value item that can be sent, and the largest set of
> items that can be sent. These defaults are the minimum required that you
> mention. If we want, either side can try to negotiate these values larger.
> If negotiation suceeds, then future steps of negotiation can use the
> larger values. Negotiation can't lower the values below the minimum
> required.

I like this.

Have a maximium default, and if a node needs a larger
value, then let it negotiate it. Futhermore, let the
negotiation be dynamic, that is, if later on
a node needs yet a larger size for an assignment,
let it negotiate it _again_.

Question: I don't see the point in MaxRecvPDULength
be _per_direction_. This is unnecessary and adds extra
complexity. Furthermore since its value is a minimum
of other values, it will be better if it is
only _per_connection_, both directions.

-- 
Luben


From owner-ips@ece.cmu.edu  Fri Mar 29 23:44:48 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA13833
	for <ips-archive@odin.ietf.org>; Fri, 29 Mar 2002 23:44:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2U47cE10029
	for ips-outgoing; Fri, 29 Mar 2002 23:07:38 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from fep02-mail.bloor.is.net.cable.rogers.com (fep02-mail.bloor.is.net.cable.rogers.com [66.185.86.72])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2U47aw10024
	for <ips@ece.cmu.edu>; Fri, 29 Mar 2002 23:07:36 -0500 (EST)
Received: from splentec.com ([24.43.3.86])
          by fep02-mail.bloor.is.net.cable.rogers.com
          (InterMail vM.5.01.04.06 201-253-122-122-106-20020109) with ESMTP
          id <20020330040721.TIPL4585.fep02-mail.bloor.is.net.cable.rogers.com@splentec.com>;
          Fri, 29 Mar 2002 23:07:21 -0500
Message-ID: <3CA53A02.7C32CC83@splentec.com>
Date: Fri, 29 Mar 2002 23:07:30 -0500
From: Luben Tuikov <luben@splentec.com>
Reply-To: luben@splentec.com, iSCSI <ips@ece.cmu.edu>
Organization: Splentec Ltd.
X-Mailer: Mozilla 4.79 [en] (X11; U; Linux 2.4.18 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: Paul Koning <ni1d@arrl.net>
CC: wrstuden@wasabisystems.com, ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <15524.50552.86000.748182@gargle.gargle.HOWL>
		<Pine.NEB.4.33.0203291148160.314-100000@candlekeep.home-net.internetconnect.net> <15524.52778.147000.815997@gargle.gargle.HOWL>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Authentication-Info: Submitted using SMTP AUTH PLAIN at fep02-mail.bloor.is.net.cable.rogers.com from [24.43.3.86] using ID <tluben@rogers.com> at Fri, 29 Mar 2002 23:07:21 -0500
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Paul Koning wrote:
> 
> If you crash, you have a bug.
>

No. Paul, as the draft currently stands, there is no limit
on a single assignment "KEY=VALUE" and it can span multiple
PDU's -- that is, the specification is faulty (the theorem),
_then_ the program crashes (proof doesn't work).

That is, a program satisfies the specification and
upon a legitimate input it crashes the computer.

> Is there a plausible real-world example where
> someone will want to send a meaningful negotiation exchange that's
> "very large"?

Why wouldn't there be? This gets tricky especially if
companies add their own variables and allow users to
set their values... This way I can send _anything_ over
the wire, being a value assignment.

-- 
Luben


From owner-ips@ece.cmu.edu  Sat Mar 30 04:06:44 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA26478
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 04:06:44 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2U8IWV22351
	for ips-outgoing; Sat, 30 Mar 2002 03:18:32 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from web10304.mail.yahoo.com (web10304.mail.yahoo.com [216.136.130.82])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2U8ITw22346
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 03:18:29 -0500 (EST)
Message-ID: <20020330081827.33760.qmail@web10304.mail.yahoo.com>
Received: from [202.56.254.13] by web10304.mail.yahoo.com via HTTP; Sat, 30 Mar 2002 00:18:27 PST
Date: Sat, 30 Mar 2002 00:18:27 -0800 (PST)
From: Rohit B <b_rohitb@yahoo.com>
Subject: Relation between the Initiator Task Tag and the execution state
To: ips@ece.cmu.edu
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Section 2.2.2.1 says:

At the target, it is assumed that CmdSN is relevant
only while the 
command has not created any state related to its
execution (execution 
state); afterwards, CmdSN becomes irrelevant. Testing
for the execution 
state (represented by identifying the Initiator Task
Tag) is assumed 
to precede any other action at the target, and is
followed by ordering 
and delivery if no execution state is found or
delivery if an 
execution state is found.

What is the execution state? How does it relate to the
Intitator Task Tag if the task is a chain of commands?
and how can we use the Initiator Task Tag to find the
execution state of the command?

Regards
Rohit


__________________________________________________
Do You Yahoo!?
Yahoo! Greetings - send holiday greetings for Easter, Passover
http://greetings.yahoo.com/


From owner-ips@ece.cmu.edu  Sat Mar 30 09:36:58 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA29174
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 09:36:58 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UDpQ918472
	for ips-outgoing; Sat, 30 Mar 2002 08:51:26 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from hotmail.com (f17.pav2.hotmail.com [64.4.37.17])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UDpOw18467
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 08:51:24 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Sat, 30 Mar 2002 05:51:19 -0800
Received: from 64.38.134.110 by pv2fd.pav2.hotmail.msn.com with HTTP;
	Sat, 30 Mar 2002 13:51:18 GMT
X-Originating-IP: [64.38.134.110]
From: "Bernard Aboba" <bernard_aboba@hotmail.com>
To: thorpej@wasabisystems.com, ips@ece.cmu.edu
Subject: Re: IPSEC target and transport mode
Date: Sat, 30 Mar 2002 05:51:18 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F173HvoFOAmEaJswFCH00001dd5@hotmail.com>
X-OriginalArrivalTime: 30 Mar 2002 13:51:19.0112 (UTC) FILETIME=[F802FC80:01C1D7F1]
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

>I really don't like this idea.
>
>While it is true that Tunnel Mode
>does not require the use of a gateway, Transport Mode is actually
>the more general mode.
>
>It is possible to combine Transport Mode with any arbitrary something-in-IP 
>tunneling protocol (IP-IP, GRE, etc.).  In the case of >Transport Mode + 
>IP-IP tunneling, you achieve something that is equivalent to Tunnel Mode, 
>thus satisfying those who need it (I >suggest that everyone read 
>draft-touch-ipsec-vpn-03.txt).

Having worked with transport mode tunnels for a few years now (L2TP), we 
have come to the same conclusion. By linking SA selection to next hop 
forwarding, tunnel mode complicates routing considerably. Transport mode 
tunnels are more compatible with dynamic routing protocols. Today most 
tunnel mode vendors only support either static routing or BGP run down the 
tunnel, and that makes it very difficult for enterprise customers to manage 
and deploy large numbers of tunnels.

Although it can be done, Tunnel mode is also more difficult to implement as 
an interface than Transport mode IP-IP. There already is pushback on iSCSI 
HBAs that cannot act as a full fledged interface; this will ensure that this 
continues to be a problem many years into the future.

>Transport Mode is also less expensive from a processing point of view.
>If you use Tunnel Mode with no gateway (i.e. inner-dest==outer-dest,
>outer-source==inner-source), you still have to de-encap the packet and
>re-process it, which is something you don't have to do in Transport >Mode.

It would seem to me that this additional cost might be a concern in the 10 
Gbps case in particular.


_________________________________________________________________
Chat with friends online, try MSN Messenger: http://messenger.msn.com



From owner-ips@ece.cmu.edu  Sat Mar 30 12:31:17 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA02198
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 12:31:17 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UGpOr27306
	for ips-outgoing; Sat, 30 Mar 2002 11:51:24 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls1.std.com [199.172.62.103])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UFmcw24100
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 10:48:38 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id KAA05719;
	Sat, 30 Mar 2002 10:48:16 -0500
Message-Id: <5.1.0.14.0.20020329153053.00acd280@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sat, 30 Mar 2002 15:55:15 -0500
To: Tom Wu <tom@arcot.com>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
Cc: ips@ece.cmu.edu
In-Reply-To: <3CA3A5F5.1010100@arcot.com>
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
 <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com>
 <5.1.0.14.0.20020328134747.00a60e30@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Regarding feedback on draft-jablon-speke-00.txt ...

First, this draft is an informational document, and as such does
not have to strictly adhere to the requirements for an RFC.
Some relevant advice is found in RFC 3160:

>6.4.5 Patents in IETF Standards
>...
>   If you are writing an Internet Draft and you know of a patent that
>   applies to the technology you're writing about, don't list the patent
>   in the document.  Instead, send a note to the IETF Secretariat ...
>... Intellectual property rights aren't
>   mentioned in RFCs because RFCs never change after they are published,
>   but knowledge of IPR can change at any time.  Therefore, an IPR list
>   in a RFC could be incomplete and mislead the reader. ...

The reason for not including patent references is apparently to insure that
RFCs do not have out-of-date or incomplete information.  But the short
lifetime of Internet-Drafts, and the fact that they can be easily and quickly
updated at any time, would seem to warrant including specific information.
RFC 3160 refers to RFC 2026, which says nothing on this point.
Does anyone know of other reasons for not having full and complete
information in a draft?

On the subject of whether the draft includes "unsupported opinions",
At 03:23 PM 3/28/02 -0800, Tom Wu wrote:
>In my opinion, section 4.10 of that I-D, in its entirety, crosses this line and sticks out like a sore thumb.  It presents no new facts about the techniques being discussed; the math behind SPEKE is already disclosed elsewhere in the draft, while the math behind SRP is disclosed in RFC2945.  What it does do, is present the author's unsupported opinion on what techniques are similar or different to/from other techniques.  I ask that it be removed.

I think section 4.10 of the draft and reference to specific patents is
important, given the current state of awareness of these issues,
and rumors that abound.  Comparison of related techniques is essential
for an understanding of these methods, regarding patents or otherwise.
I think more specific facts, rather than less, encourages discussion and review.

If I said that I think that your opinion is unsupported, because I believe
the draft statements are supported, we could talk in circles forever.
Obviously we disagree on some things.

Nevertheless, I'll amend the draft to use simpler factual statements,
and I'll try harder to avoid statements that might be viewed
as opinions, however supported I may think they are.

-- David



From owner-ips@ece.cmu.edu  Sat Mar 30 12:32:59 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA02339
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 12:32:59 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UGqFo27349
	for ips-outgoing; Sat, 30 Mar 2002 11:52:15 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls2.std.com [199.172.62.104])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UGg9w26745
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 11:42:09 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id LAA20462;
	Sat, 30 Mar 2002 11:42:07 -0500
Message-Id: <5.1.0.14.0.20020329214614.00a31530@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sat, 30 Mar 2002 16:25:43 -0500
To: Theodore Tso <tytso@mit.edu>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI authentication requirements
Cc: Theodore Tso <tytso@mit.edu>, ips@ece.cmu.edu
In-Reply-To: <20020328191535.B964@thunk.org>
References: <5.1.0.14.0.20020328195149.00a27220@pop.theworld.com>
 <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
 <F63ZRhQdOgl4rhYQYx30001e295@hotmail.com>
 <5.1.0.14.0.20020327001138.00a2b7b0@pop.theworld.com>
 <20020327225732.A17992@thunk.org>
 <5.1.0.14.0.20020328195149.00a27220@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Ted, on some relevant points, I think we may be closer to
agreement than you think, for example, I think we could probably
tweak the following into a mutually agreeable form:

1)  A MUST implement CHAP-based method would surely promote
free interoperability for all, with security for some.

2)  A SHOULD implement method in the SRP category would permit 
implementors the opportunity to make an engineering/business tradeoff,
and if desired, to use a method optimally resistant to dictionary attack,
with a chance for widespread interoperability in this regard too.

I think there are clearly ways that the standard can let people
pay "whatever they think it's worth", as you've characterized it,
to use a method like SRP, and still maximize interoperability
among applications that use either that approach or a
guaranteed-free but not-equivalent alternative.

The next job would seem to be to insure that the SRP-like option
is specified in a way that makes a decision to use it as easy
and as inexpensive as possible.

I'll respond below to some points where we have had or may
still have disagreement,

At 07:15 PM 3/28/02 -0500, Theodore Tso wrote:
>On Thu, Mar 28, 2002 at 08:13:42PM -0500, David Jablon wrote:
>> [...] But stated in other words, an attacker can inject just a couple
>> bogus packets, a mere hiccup from the user's view, and then he
>> gets unlimited offline guessing to crack the password [...]
>
>Nope, not that easy.  As I said, [...] This is not necessarily trivial --- it's
>*not* just a matter of "injecting a few bogus packets".

In order for either of us to prove our points, someone has to specify the
exact protocol you've been thinking about. Maybe it's not exactly the
EZ-to-crack thing I was thinking of.  SRP and well-known equivalents
are established protocols that have survived years of public scrutiny.
But I'll be glad to to spend a few minutes looking at the new proposal
when it's ready.  ;-)

>> Furthermore, limiting the attack window to *just* the first time may
>> not significantly decrease the problem.  It depends on other
>> assumptions.  In some cases it may be like locking all but one door
>> of your house.  [...]
>
>Again, nope.  It's like saying that while the house is being built,
>there is a small window when the deadbolt hasn't been installed yet.
>But once the deadbolt has been installed, the burgler can't get in. [...]

That "nope" is not so well supported.  Essentially, I think you've argued
that you know how the application can be built and is likely to be used
in a way that greatly reduces this window of vulnerability, so therefore
everything is A-OK.

But I think the real test is in how applications interpret the standard,
and how people use those applications, and it seems pretty early to
know that, and therefore hard to predict how big that "window" might be.

In getting rid of that window entirely, one reduces the risk of failure
due to unanticipated application and user behavior, which can't be
easily specified.

>> And finally, as you almost point out, all these [freeware] interoperability
>> problems go away when a patented technique is standardized as
>> a SHOULD implement method.
>
>Nope.  Security mechanisms have to be a MUST implement.  If we have a
>non-encumbered MUST implement mechanism, then whether or not we have
>an encumbered SHOULD mechanism at some level is less important. ...

That "Nope" is inappropriate.  I was arguing almost the same point.

One difference is that I think at least a SHOULD for something like SRP
is still important, since before all the IP rumors, people thought it was
a MUST.  Anything less seems like a downgrade.

Yet, another possibility to fit your original point, is for a MUST SRP and
MUST CHAP standard.  Everything that implements the standard is 
interoperable, and it still allows for (somewhat-non-compliant) freeware
implementations that fully interoperate with all standard ones.
(Yes. I know. This is surely politically incorrect.)

But I also wonder if the interoperable freeware debate is based on the
assumption that there are no other IP encumbrances on this standard,
which seems like it might be an open question.  If there are other
encumbrances, discussion about freeware may be irrelevant.

> ... Most
>people will probably depend on the MUST implement for
>interoperability.

I'd rather not debate predictions.  We clearly agree that a MUST
method provides a baseline for interoperability.

>... So then, people will only pay whever are costs (in
>money, legal uncertainty, etc.) for using said encumbered technology
>if said encumbered technology really provides enough value that it's
>worth the cost.

That sounds reasonable to me.  People can pay what they think it's worth.

>> * I think it's up to the working group members to decide what technology is
>> truly equivalent to an optimal case for its purposes, without undue pressure
>> or interference from "outsiders" (including me too of course).
>
>The security area of the IETF, and the security AD's of the IESG are
>not "outsiders".  They are part of the IETF community.  And the IETF
>community *has* made some global decisions for the entire IETF. ...

Ok.  There are definitely legitimate reasons for global decisions to be
made in the IETF.  You cited some great examples involving
governmental entanglements.

My point is that it seems to be a very bad thing for the IETF to start
making global top-down decisions about specific competing technologies
that merely involve business/engineering tradeoffs. I think we're talking
about the difference between a light hand and a heavy hand.

A relevant sentence in RFC2026, 10.3.2:
  "(B)  The IESG disclaims any responsibility for identifying the
      existence of or for evaluating the applicability of any claimed
      copyrights, patents, patent applications, or other rights in the
      fulfilling of the its obligations under (A), and will take no
      position on the validity or scope of any such rights."

In the act of proposing specific alternative technology to avoid
specific patents, there is at least the appearance that the IESG
is indeed taking on this responsibility.  And it certainly seems
to be "taking a position" here.

>PS.
>...
>Make no mistake.  Patents have their costs.  If you want your protocol
>to be widely deployed across the Internet, use of patented technology
>...

P.S.
If by "you" and "your", you mean me and mine, I object to personalizing
the debate. I think we all know that I invented one of the contenders.
Otherwise, if you were just using the "royal you", please don't. Thanks.



From owner-ips@ece.cmu.edu  Sat Mar 30 12:33:49 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA02361
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 12:33:48 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UGp1H27282
	for ips-outgoing; Sat, 30 Mar 2002 11:51:01 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls1.std.com [199.172.62.103])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UFmcw24100
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 10:48:38 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id KAA05719;
	Sat, 30 Mar 2002 10:48:16 -0500
Message-Id: <5.1.0.14.0.20020329153053.00acd280@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sat, 30 Mar 2002 15:55:15 -0500
To: Tom Wu <tom@arcot.com>
From: David Jablon <dpj@theworld.com>
Subject: Re: iSCSI: SRP status
Cc: ips@ece.cmu.edu
In-Reply-To: <3CA3A5F5.1010100@arcot.com>
References: <5.1.0.14.0.20020326193133.00a43100@pop.theworld.com>
 <5.1.0.14.0.20020327234154.00a4bd50@pop.theworld.com>
 <5.1.0.14.0.20020328134747.00a60e30@pop.theworld.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Regarding feedback on draft-jablon-speke-00.txt ...

First, this draft is an informational document, and as such does
not have to strictly adhere to the requirements for an RFC.
Some relevant advice is found in RFC 3160:

>6.4.5 Patents in IETF Standards
>...
>   If you are writing an Internet Draft and you know of a patent that
>   applies to the technology you're writing about, don't list the patent
>   in the document.  Instead, send a note to the IETF Secretariat ...
>... Intellectual property rights aren't
>   mentioned in RFCs because RFCs never change after they are published,
>   but knowledge of IPR can change at any time.  Therefore, an IPR list
>   in a RFC could be incomplete and mislead the reader. ...

The reason for not including patent references is apparently to insure that
RFCs do not have out-of-date or incomplete information.  But the short
lifetime of Internet-Drafts, and the fact that they can be easily and quickly
updated at any time, would seem to warrant including specific information.
RFC 3160 refers to RFC 2026, which says nothing on this point.
Does anyone know of other reasons for not having full and complete
information in a draft?

On the subject of whether the draft includes "unsupported opinions",
At 03:23 PM 3/28/02 -0800, Tom Wu wrote:
>In my opinion, section 4.10 of that I-D, in its entirety, crosses this line and sticks out like a sore thumb.  It presents no new facts about the techniques being discussed; the math behind SPEKE is already disclosed elsewhere in the draft, while the math behind SRP is disclosed in RFC2945.  What it does do, is present the author's unsupported opinion on what techniques are similar or different to/from other techniques.  I ask that it be removed.

I think section 4.10 of the draft and reference to specific patents is
important, given the current state of awareness of these issues,
and rumors that abound.  Comparison of related techniques is essential
for an understanding of these methods, regarding patents or otherwise.
I think more specific facts, rather than less, encourages discussion and review.

If I said that I think that your opinion is unsupported, because I believe
the draft statements are supported, we could talk in circles forever.
Obviously we disagree on some things.

Nevertheless, I'll amend the draft to use simpler factual statements,
and I'll try harder to avoid statements that might be viewed
as opinions, however supported I may think they are.

-- David



From owner-ips@ece.cmu.edu  Sat Mar 30 12:34:09 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA02375
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 12:34:08 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UGouE27272
	for ips-outgoing; Sat, 30 Mar 2002 11:50:56 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from TheWorld.com (pcls1.std.com [199.172.62.103])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UFmLw24076
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 10:48:21 -0500 (EST)
Received: from westboro-1.theworld.com (218-14-189-66.wo.cpe.charter-ne.com [66.189.14.218])
	by TheWorld.com (8.9.3/8.9.3) with ESMTP id KAA05743;
	Sat, 30 Mar 2002 10:48:17 -0500
Message-Id: <5.1.0.14.0.20020330133834.04883bf0@pop.theworld.com>
X-Sender: dpj@pop.theworld.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sat, 30 Mar 2002 14:51:17 -0500
To: Black_David@emc.com
From: David Jablon <dpj@theworld.com>
Subject: RE: iSCSI: New Lucent stmt on SRP
Cc: amir@astutenetworks.com, ips@ece.cmu.edu
In-Reply-To: <277DD60FB639D511AC0400B0D068B71E0293769E@CORPMX14>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


>> From: Amir Shalit [mailto:amir@astutenetworks.com]
>> Does [the new Lucent letter] solve the SRP dilemma?

At 01:58 PM 3/29/02 -0500, Black_David@emc.com wrote:
>Not completely, but it helps. ...

David, can you elaborate on how it helps, what is missing, etc.?

>... The IESG is now requesting
>that the WG consider use of a version of CHAP strengthened
>by an anonymous Diffie-Hellman key exchange as an alternative
>to SRP. ...

I'm not sure what "alternative" means in this context.  An alternative
"option" in addition to something like SRP would achieve the
goal of guaranteed free interoperability.  Or has the IESG suggested
"replacement", which is something else entirely?

>Ted Ts'o has done us the favor of posting many of the issues
>that the IESG expects the WG to consider in his post from
>this past Wednesday:
>http://www.pdl.cmu.edu/mailinglists/ips/mail/msg09358.html

Have these IESG requests to the WG and expectations of the WG
been formally posted directly to the list?  It would be nice to
know what the other issues are too, that weren't included in
Ted's post.

>I would hope that a strawman design for this mechanism
>could be posted in the next week, and apologize for the
>delay ... I'm afraid that all attempts to clone me have
>failed, and I need to ensure that some real cryptographers
>check the resulting design before it is posted  ;-).

As legitimate review is an open process, I assume your wink
means that the secret initial checking by "real cryptographers"
is just a necessary first step.  Ted's post has stimulated an
initial thread of security discussion, which can continue
after the design is posted.

-- David



From owner-ips@ece.cmu.edu  Sat Mar 30 17:50:22 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06476
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 17:50:22 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UMQ2K14611
	for ips-outgoing; Sat, 30 Mar 2002 17:26:02 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UMQ0w14606
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:26:00 -0500 (EST)
Received: from westrelay03.boulder.ibm.com (westrelay03.boulder.ibm.com [9.17.194.24])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id RAA109262
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:22:34 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay03.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2UMPx893246
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 15:25:59 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: iSCSI: Text request/response spanning - security issue?
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF3DAB9B60.9DEFC314-ON88256B8C.007A7696@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 30 Mar 2002 14:25:16 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/30/2002 03:25:58 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


If you do not have enough buffers to support the Max certificate that you
support, then you can not receive the Max certificate that you support.

Again, I see no problem.  I do not think we need to put the obvious into
the draft.

We need to move into the thought process of:  if it is not really broken
"Don't Fix it".  We can spend much time, clarifying the obvious, along with
the increasing length of the draft, in fact there is no end to clarifying
the obvious.  The Draft is long enough as it is.  Lets move on.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


Paul Koning <ni1d@arrl.net> on 03/30/2002 02:10:30 PM

To:    John Hufferd/San Jose/IBM@IBMUS
cc:    ips@ece.cmu.edu
Subject:    Re: iSCSI: Text request/response spanning - security issue?



Excerpt of message (sent 29 March 2002) by John Hufferd:
>
> Before we run off to far in this direction, ....
>
> Each Key of the Key=value pairs, supplies enough information to
understand
> the Max length of the value that follows.  The length permitted by each
> keyword that is supported, should  be enough to define the approprate
> length for any key=value pair.  I think that the implementation can
> determine the Max amount of buffer it needs by computing the Max size
based
> on the keywords supported.

Maybe not if you want to be picky.  Is there a limit on the number of
leading zeroes that a numeric value may have?  I suppose a way to
handle that is "a receiver is not required to accept values other than
zero that begin with 0".

> I think the item that got us into the Multi PDU  spanning of a key=value
is
> the Certificates associated with authentication.  So depending on the
type
> of Authentication supported, and the Max size of Certificates supported,
> you can compute the Max size of the total key=value buffer needed.

From what I remember about certificates, it isn't easy -- or even
feasible -- to specify a sensible upper bound on their size.
Especially as people start putting more and more crud into
certificates.

> I do not see anything broken here.  Hence, I do not think a fix is
needed.

Let's make sure that we can indeed specify an upper bound on each
value for each key -- and document in the spec what that limit is.  If
that can be done then indeed we're done.

(I wouldn't worry about X-foo keys; if you don't support them then it
doesn't matter how long they are, and if you do support a particular
one, then it's up to the spec of that specific key to bound its size.)

     paul






From owner-ips@ece.cmu.edu  Sat Mar 30 17:52:11 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06519
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 17:52:10 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UMAh413863
	for ips-outgoing; Sat, 30 Mar 2002 17:10:43 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from cygnus.equallogic.com (cygnus.equallogic.com [65.170.102.10])
	by ece.cmu.edu (8.11.0/8.10.2) with SMTP id g2UMAdw13858
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:10:40 -0500 (EST)
Received: from cygnus.equallogic.com (localhost.localdomain [127.0.0.1])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2UMAW001824
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:10:32 -0500
Received: from deneb.dev.equallogic.com (deneb.dev.equallogic.com [172.16.1.99])
	by cygnus.equallogic.com (8.11.6/8.11.6) with ESMTP id g2UMAVK01815;
	Sat, 30 Mar 2002 17:10:31 -0500
Received: from PKONING.equallogic.com (localhost.localdomain [127.0.0.1])
	by deneb.dev.equallogic.com (8.11.6/8.11.2) with ESMTP id g2UMAUt25171;
	Sat, 30 Mar 2002 17:10:31 -0500
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15526.14294.558000.382763@gargle.gargle.HOWL>
Date: Sat, 30 Mar 2002 17:10:30 -0500
From: Paul Koning <ni1d@arrl.net>
To: hufferd@us.ibm.com
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: Text request/response spanning - security issue?
References: <OF69D16339.9EEB047A-ON88256B8B.008343CD@boulder.ibm.com>
X-Mailer: VM 6.95 under 21.4 (patch 3) "Academic Rigor" XEmacs Lucid
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
Content-Transfer-Encoding: 7bit

Excerpt of message (sent 29 March 2002) by John Hufferd:
> 
> Before we run off to far in this direction, ....
> 
> Each Key of the Key=value pairs, supplies enough information to understand
> the Max length of the value that follows.  The length permitted by each
> keyword that is supported, should  be enough to define the approprate
> length for any key=value pair.  I think that the implementation can
> determine the Max amount of buffer it needs by computing the Max size based
> on the keywords supported.

Maybe not if you want to be picky.  Is there a limit on the number of
leading zeroes that a numeric value may have?  I suppose a way to
handle that is "a receiver is not required to accept values other than
zero that begin with 0".
 
> I think the item that got us into the Multi PDU  spanning of a key=value is
> the Certificates associated with authentication.  So depending on the type
> of Authentication supported, and the Max size of Certificates supported,
> you can compute the Max size of the total key=value buffer needed.

From what I remember about certificates, it isn't easy -- or even
feasible -- to specify a sensible upper bound on their size.
Especially as people start putting more and more crud into
certificates.
 
> I do not see anything broken here.  Hence, I do not think a fix is needed.

Let's make sure that we can indeed specify an upper bound on each
value for each key -- and document in the spec what that limit is.  If
that can be done then indeed we're done.

(I wouldn't worry about X-foo keys; if you don't support them then it
doesn't matter how long they are, and if you do support a particular
one, then it's up to the spec of that specific key to bound its size.)

     paul



From owner-ips@ece.cmu.edu  Sat Mar 30 17:53:38 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06568
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 17:53:37 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2UMiw215557
	for ips-outgoing; Sat, 30 Mar 2002 17:44:58 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2UMivw15553
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:44:57 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id RAA109132
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 17:41:31 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2UMitc56966
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 15:44:55 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: iSCSI:SRP
To: ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OF4988CD08.2C987C3C-ON88256B8C.007B82BF@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 30 Mar 2002 14:44:12 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/30/2002 03:44:55 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk

Folks,
With the new statement from Lucent, we are now back to the point were we
were previously when we agreed to make SRP Must implement.

I propose that we go to the position we had before all this flap developed
about patent statement, and declare SRP MUST implement (as we did before),
and get that out of the way of our last call.

The code is available from Stanford's web site, and the Patent issue is now
just like others within the IETF.

I know there are some folks that are attempting to wrap additional security
around Chap, and that may be a good thing -- but we do not need to hold up
Last call as folks check out other options.  Remember, it is always the
quickly produced "fixes" at the last moment, that have a higher probability
of having a problem.

Again, lets make SRP Must implement, and Chap at least May implement,
declare the proposed additional Chap security as May Implement, and move
on.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com



From owner-ips@ece.cmu.edu  Sat Mar 30 21:37:23 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA08546
	for <ips-archive@odin.ietf.org>; Sat, 30 Mar 2002 21:37:23 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2V1xC724886
	for ips-outgoing; Sat, 30 Mar 2002 20:59:12 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2V1xAw24877
	for <ips@ece.cmu.edu>; Sat, 30 Mar 2002 20:59:10 -0500 (EST)
Received: from westrelay01.boulder.ibm.com (westrelay01.boulder.ibm.com [9.17.194.22])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id UAA33852;
	Sat, 30 Mar 2002 20:55:44 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay01.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2V1x8G49916;
	Sat, 30 Mar 2002 18:59:08 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: IPSEC target and transport mode
To: "Bernard Aboba" <bernard_aboba@hotmail.com>
Cc: thorpej@wasabisystems.com, ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFBB81B055.AAE54432-ON88256B8D.0008E6A3@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 30 Mar 2002 17:58:24 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/30/2002 06:59:08 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


These reasons you mentioned here, and the resulting performance were some
of the reasons I thought we voted to make Transport a "Must implement".  It
is also true that David Black may have caused some of the Tunnel folks to
have rolled over on this issue, but I believe, a number of folks understood
various aspects of what you have said here, and wanted to use Tunnel mode,
and wanted it to be a "Must Implement" since if Tunnel mode, is not
implemented by the other side, it can cause your side to have poorer
performance, even if you can support the higher performance that come with
Transport mode.

But more then David's statements, the thing that I understood helped get
agreement on the MUST/MUST for Transport and Tunnel, was the fact that
almost all the IPsec stacks that are available on the market come with both
Transport and Tunnel.  So it is now possible for iSCSI to not only operate
at high speed, and support the key features mentioned below, but can
interoperate with HW that can only pass through Tunnel mode.

I feel that Transport is the most capable and high performance mode, but
feel that tunnel is also needed for firewalls that do not accept Transport
at this time.  But, it seems clear to me, that if we have Transport mode as
a MUST (along with Tunnel), that the various hardware along the way, such
as the firewalls, will be quickly adjusted to support Transport, since each
vendor will see the potential advantages of having their product support
iSCSI traffic in the most efficient manner.  However, we will be able to
operate with Tunnel mode until most vendors HW will be able to support
Transport mode through their equipment (such as firewalls etc.)

So again, I feel that our original vote to support both Transport and
Tunnel as Must implements, was the right decision, and best for iSCSI and
the customer.

I propose we let the original agreement stand.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Bernard Aboba" <bernard_aboba@hotmail.com>@ece.cmu.edu on 03/30/2002
05:51:18 AM

Sent by:    owner-ips@ece.cmu.edu


To:    thorpej@wasabisystems.com, ips@ece.cmu.edu
cc:
Subject:    Re: IPSEC target and transport mode



>I really don't like this idea.
>
>While it is true that Tunnel Mode
>does not require the use of a gateway, Transport Mode is actually
>the more general mode.
>
>It is possible to combine Transport Mode with any arbitrary
something-in-IP
>tunneling protocol (IP-IP, GRE, etc.).  In the case of >Transport Mode +
>IP-IP tunneling, you achieve something that is equivalent to Tunnel Mode,
>thus satisfying those who need it (I >suggest that everyone read
>draft-touch-ipsec-vpn-03.txt).

Having worked with transport mode tunnels for a few years now (L2TP), we
have come to the same conclusion. By linking SA selection to next hop
forwarding, tunnel mode complicates routing considerably. Transport mode
tunnels are more compatible with dynamic routing protocols. Today most
tunnel mode vendors only support either static routing or BGP run down the
tunnel, and that makes it very difficult for enterprise customers to manage
and deploy large numbers of tunnels.

Although it can be done, Tunnel mode is also more difficult to implement as
an interface than Transport mode IP-IP. There already is pushback on iSCSI
HBAs that cannot act as a full fledged interface; this will ensure that
this
continues to be a problem many years into the future.

>Transport Mode is also less expensive from a processing point of view.
>If you use Tunnel Mode with no gateway (i.e. inner-dest==outer-dest,
>outer-source==inner-source), you still have to de-encap the packet and
>re-process it, which is something you don't have to do in Transport >Mode.

It would seem to me that this additional cost might be a concern in the 10
Gbps case in particular.


_________________________________________________________________
Chat with friends online, try MSN Messenger: http://messenger.msn.com






From owner-ips@ece.cmu.edu  Sun Mar 31 01:09:25 2002
Received: from ece.cmu.edu (ECE.CMU.EDU [128.2.136.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA11881
	for <ips-archive@odin.ietf.org>; Sun, 31 Mar 2002 01:09:25 -0500 (EST)
Received: (from majordom@localhost)
	by ece.cmu.edu (8.11.0/8.10.2) id g2V5Onn03566
	for ips-outgoing; Sun, 31 Mar 2002 00:24:49 -0500 (EST)
X-Authentication-Warning: ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
Received: from e31.co.us.ibm.com (e31.co.us.ibm.com [32.97.110.129])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id g2V5Olw03562
	for <ips@ece.cmu.edu>; Sun, 31 Mar 2002 00:24:47 -0500 (EST)
Received: from westrelay02.boulder.ibm.com (westrelay02.boulder.ibm.com [9.17.194.23])
	by e31.co.us.ibm.com (8.9.3/8.9.3) with ESMTP id AAA23066;
	Sun, 31 Mar 2002 00:21:15 -0500
Received: from d03nm014.boulder.ibm.com (avpilot.boulder.ibm.com [9.17.188.135])
	by westrelay02.boulder.ibm.com (8.11.1m3/NCO/VER6.00) with ESMTP id g2V5Occ246476;
	Sat, 30 Mar 2002 22:24:38 -0700
X-Priority: 1 (High)
Importance: Normal
Subject: Re: IPSEC target and transport mode
To: "Bernard Aboba" <bernard_aboba@hotmail.com>
Cc: thorpej@wasabisystems.com, ips@ece.cmu.edu
X-Mailer: Lotus Notes Release 5.0.7  March 21, 2001
Message-ID: <OFBD81E40E.FF360A7B-ON88256B8D.001D81CB@boulder.ibm.com>
From: "John Hufferd" <hufferd@us.ibm.com>
Date: Sat, 30 Mar 2002 21:23:51 -0800
X-MIMETrack: Serialize by Router on D03NM014/03/M/IBM(Release 5.0.9a |January 7, 2002) at
 03/30/2002 10:24:38 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Sender: owner-ips@ece.cmu.edu
Precedence: bulk


Well, as usual, I replace the term Transport, with Tunnel  until no one can
understand what I intended to say.  Corrections below following the xxxxxx
which crossed out the word Tunnel.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


John Hufferd/San Jose/IBM@IBMUS@ece.cmu.edu on 03/30/2002 05:58:24 PM

Sent by:    owner-ips@ece.cmu.edu


To:    "Bernard Aboba" <bernard_aboba@hotmail.com>
cc:    thorpej@wasabisystems.com, ips@ece.cmu.edu
Subject:    Re: IPSEC target and transport mode




These reasons you mentioned here, and the resulting performance were some
of the reasons I thought we voted to make Transport a "Must implement".  It
is also true that David Black may have caused some of the Tunnel folks to
have rolled over on this issue, but I believe, a number of folks understood
various aspects of what you have said here, and wanted to use xxxxxx
Transport mode,
and wanted it to be a "Must Implement" since if xxxxxx Transport mode, is
not
implemented by the other side, it can cause your side to have poorer
performance, even if you can support the higher performance that come with
Transport mode.

But more then David's statements, the thing that I understood helped get
agreement on the MUST/MUST for Transport and Tunnel, was the fact that
almost all the IPsec stacks that are available on the market come with both
Transport and Tunnel.  So it is now possible for iSCSI to not only operate
at high speed, and support the key features mentioned below, but can
interoperate with HW that can only pass through Tunnel mode.

I feel that Transport is the most capable and high performance mode, but
feel that tunnel is also needed for firewalls that do not accept Transport
at this time.  But, it seems clear to me, that if we have Transport mode as
a MUST (along with Tunnel), that the various hardware along the way, such
as the firewalls, will be quickly adjusted to support Transport, since each
vendor will see the potential advantages of having their product support
iSCSI traffic in the most efficient manner.  However, we will be able to
operate with Tunnel mode until most vendors HW will be able to support
Transport mode through their equipment (such as firewalls etc.)

So again, I feel that our original vote to support both Transport and
Tunnel as Must implements, was the right decision, and best for iSCSI and
the customer.

I propose we let the original agreement stand.

.
.
.
John L. Hufferd
Senior Technical Staff Member (STSM)
IBM/SSG San Jose Ca
Main Office (408) 256-0403, Tie: 276-0403,  eFax: (408) 904-4688
Home Office (408) 997-6136, Cell: (408) 499-9702
Internet address: hufferd@us.ibm.com


"Bernard Aboba" <bernard_aboba@hotmail.com>@ece.cmu.edu on 03/30/2002
05:51:18 AM

Sent by:    owner-ips@ece.cmu.edu


To:    thorpej@wasabisystems.com, ips@ece.cmu.edu
cc:
Subject:    Re: IPSEC target and transport mode



>I really don't like this idea.
>
>While it is true that Tunnel Mode
>does not require the use of a gateway, Transport Mode is actually
>the more general mode.
>
>It is possible to combine Transport Mode with any arbitrary
something-in-IP
>tunneling protocol (IP-IP, GRE, etc.).  In the case of >Transport Mode +
>IP-IP tunneling, you achieve something that is equivalent to Tunnel Mode,
>thus satisfying those who need it (I >suggest that everyone read
>draft-touch-ipsec-vpn-03.txt).

Having worked with transport mode tunnels for a few years now (L2TP), we
have come to the same conclusion. By linking SA selection to next hop
forwarding, tunnel mode complicates routing considerably. Transport mode
tunnels are more compatible with dynamic routing protocols. Today most
tunnel mode vendors only support either static routing or BGP run down the
tunnel, and that makes it very difficult for enterprise customers to manage
and deploy large numbers of tunnels.

Although it can be done, Tunnel mode is also more difficult to implement as
an interface than Transport mode IP-IP. There already is pushback on iSCSI
HBAs that cannot act as a full fledged interface; this will ensure that
this
continues to be a problem many years into the future.

>Transport Mode is also less expensive from a processing point of view.
>If you use Tunnel Mode with no gateway (i.e. inner-dest==outer-dest,
>outer-source==inner-source), you still have to de-encap the packet and
>re-process it, which is something you don't have to do in Transport >Mode.

It would seem to me that this additional cost might be a concern in the 10
Gbps case in particular.


_________________________________________________________________
Chat with friends online, try MSN Messenger: http://messenger.msn.com









