From ips-bounces@ietf.org Wed Apr 05 12:39:34 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRB2b-0001qI-3p; Wed, 05 Apr 2006 12:39:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FRB2a-0001nl-Fv
	for ips@ietf.org; Wed, 05 Apr 2006 12:39:32 -0400
Received: from mms3.broadcom.com ([216.31.210.19])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRB2Y-0007Ej-3E
	for ips@ietf.org; Wed, 05 Apr 2006 12:39:32 -0400
Received: from 10.10.64.154 by MMS3.broadcom.com with ESMTP (Broadcom
	SMTP Relay (Email Firewall v6.2.0)); Wed, 05 Apr 2006 09:39:22 -0700
X-Server-Uuid: B238DE4C-2139-4D32-96A8-DD564EF2313E
Received: by mail-irva-10.broadcom.com (Postfix, from userid 47) id
	5EDB02AF; Wed, 5 Apr 2006 09:39:22 -0700 (PDT)
Received: from mail-irva-8.broadcom.com (mail-irva-8 [10.10.64.221]) by
	mail-irva-10.broadcom.com (Postfix) with ESMTP id 376CD2AE for
	<ips@ietf.org>; Wed, 5 Apr 2006 09:39:22 -0700 (PDT)
Received: from mail-irva-12.broadcom.com (mail-irva-12.broadcom.com
	[10.10.64.146]) by mail-irva-8.broadcom.com (MOS 3.7.3a-GA) with ESMTP
	id DFV81458; Wed, 5 Apr 2006 09:39:22 -0700 (PDT)
Received: from NT-IRVA-0751.brcm.ad.broadcom.com (nt-irva-0751
	[10.8.194.65]) by mail-irva-12.broadcom.com (Postfix) with ESMTP id
	00BCF69CA5 for <ips@ietf.org>; Wed, 5 Apr 2006 09:39:21 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 5 Apr 2006 09:39:21 -0700
Message-ID: <00DDB8FFD8F89A488797060F19D0BD82878019@NT-IRVA-0751.brcm.ad.broadcom.com>
Thread-Topic: RAIT 2006
Thread-Index: AcZYz31UQO8yDvxOSIe0ZL1ZSRtyOA==
From: "Hemal Shah" <hemal@broadcom.com>
To: ips@ietf.org
X-TMWD-Spam-Summary: SEV=1.1; DFV=A2006040504; IFV=2.0.6,4.0-7; RPD=4.00.0004;
	RPDID=303030312E30413039303230352E34343333463142442E303032442D412D;
	ENG=IBF; TS=20060405163922; CAT=NONE; CON=NONE;
X-MMS-Spam-Filter-ID: A2006040504_4.00.0004_2.0.6,4.0-7
X-WSS-ID: 682D2D303NG5589711-01-01
Content-Type: text/plain;
 charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7fa173a723009a6ca8ce575a65a5d813
Subject: [Ips] RAIT 2006
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

We would like to invite interested parties on this list to submit papers =
to the third workshop on RDMA: Applications, Implementations, and =
Technologies (RAIT 2006). See below for the detailed call for papers.

Hemal and Jim (RAIT 2006 Workshop co-chairs)

-------------------------------------------------------------------------=
---
Third=A0Workshop on Remote Direct Memory Access (RDMA): Applications, =
Implementations, and Technologies (RAIT 2006)
To be held on Sept 28th, 2006, in=A0Barcelona, Spain
in conjunction with the Cluster 2006 conference.
Barcelona, Spain.
=A0
________________________________________
* Call for papers=20
* Paper submission=20
* Important dates=20
* Organizers and program committee=20
________________________________________
=A0
Call for papers
=A0
Remote Direct Memory Access (RDMA) enables transfer of data across a =
network directly to and from application buffers without requiring any =
intermediate copies or buffers. RDMA, along with direct access to the =
networking hardware, also provides a low overhead mechanism for =
achieving low latency, high-bandwidth communication. RDMA has become a =
desirable feature in high-speed clusters and data-center networks.=20
=A0
Scope
The RAIT 2006 workshop is the third time that the RAIT workshop has been =
held. RAIT 2006 is intended to serve as a forum to present the latest =
research work by the researchers and developers from both academia and =
industry. The workshop focuses on the applications of RDMA, the =
implementation aspects of RDMA, and the technologies for RDMA. Topics of =
special interest include advanced new features such as TCP offload =
engines embedded within RDMA, virtualization technologies for RDMA, and =
new techniques to extend RDMA functionality, such as atomics, multicast, =
and broadcast operations. =A0=20

Topics of interest include, but are not limited to:

*=A0=A0=A0=A0=A0=A0=A0 RDMA hardware (RDMA-enabled Ethernet adapters, =
InfiniBand adapters, or other adapters)
*=A0=A0=A0=A0=A0=A0=A0 RDMA-aware networks and interfaces
*=A0=A0=A0=A0=A0=A0=A0 Middleware and network services for RDMA-based =
networking
*=A0=A0=A0=A0=A0=A0=A0Virtualization and RDMA
*=A0=A0=A0=A0=A0=A0=A0Applications of RDMA (iSCSI/iSER, NFS, DAFS, SDP, =
databases, clustering, storage networking, etc.)
*=A0=A0=A0=A0=A0=A0=A0 RDMA Protocols
*=A0=A0=A0=A0=A0=A0=A0 Protocol offload engines (TCP offload engines, =
RDMA offload engines, etc.)=20
*=A0=A0=A0=A0=A0=A0=A0Operating system infrastructure for RDMA
*=A0=A0=A0=A0=A0=A0=A0 RDMA performance evaluation (application =
performance, performance metrics, network performance, etc.)
*=A0=A0=A0=A0=A0=A0=A0 RDMA and security
*=A0=A0=A0=A0=A0=A0=A0 Future directions for RDMA=A0=A0 =A0=A0
=A0
________________________________________
=A0
Paper Submission
=A0
We invite submissions of technical papers, position papers, and case =
studies relevant to the workshop. Submission implies the willingness of =
at least one of the authors to present the paper and register. =
Submission should include on the front page the authors' name, =
affiliations, addresses, email addresses, and phone numbers.
=A0
Please submit a full paper not exceeding 8 single-spaced pages in PDF or =
Postscript form, page-numbered, in 10-point font or larger, and suitable =
for printing on 8.5"x11" paper with at least 1 inch margin all around. =
Please submit the full paper for consideration to this workshop to Hemal =
Shah (hemal@broadcom.com) and James Pinkerton (jpink@microsoft.com) by =
email. =A0
=A0
________________________________________
=A0
Important dates
Deadline for =
submission=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0May 31, 2006=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =

Notification of =
acceptance=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0June 19, 2006
Camera ready =
papers=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0July 10, 2006
Workshop =
date=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 September 28, 2006
=A0
________________________________________
=A0
Organizers
Program Co-chair: Hemal V. Shah,=A0Broadcom Corporation
Program Co-chair: James Pinkerton, Microsoft Corporation
=A0
Program Committee
Jeff Chase, Duke University
Uri Elzur, Broadcom Corporation
Dirk Grunwald, University of Colorado, Boulder
Mike Ko, IBM Research
Michael Krause, Hewlett-Packard Company
Kai Li, Princeton University
Dhabaleswar Panda, Ohio State University
Fabrizio Petrini, Los Alamos National Laboratory



_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Wed Apr 05 15:50:15 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRE13-0007wY-Cl; Wed, 05 Apr 2006 15:50:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRE0w-0007sx-IW; Wed, 05 Apr 2006 15:50:02 -0400
Received: from oak.neustar.com ([209.173.53.70])
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1FRE0v-0007Mi-Te; Wed, 05 Apr 2006 15:50:02 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com
	[10.31.47.10])
	by oak.neustar.com (8.12.8/8.12.8) with ESMTP id k35Jo1BX011945
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Wed, 5 Apr 2006 19:50:01 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43)
	id 1FRE0v-0003t8-Nt; Wed, 05 Apr 2006 15:50:01 -0400
Content-Type: Multipart/Mixed; Boundary="NextPart"
Mime-Version: 1.0
To: i-d-announce@ietf.org
From: Internet-Drafts@ietf.org
Message-Id: <E1FRE0v-0003t8-Nt@stiedprstage1.ietf.org>
Date: Wed, 05 Apr 2006 15:50:01 -0400
X-Spam-Score: 0.3 (/)
X-Scan-Signature: f66b12316365a3fe519e75911daf28a8
Cc: ips@ietf.org
Subject: [Ips] I-D ACTION:draft-ietf-ips-isns-mib-09.txt 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Storage Working Group of the IETF.

	Title		: Definitions of Managed Objects for iSNS (Internet Storage Name Service)
	Author(s)	: K. Gibbons, et al.
	Filename	: draft-ietf-ips-isns-mib-09.txt
	Pages		: 69
	Date		: 2006-4-5
	
The iSNS protocol provides storage name service functionality on 
   an IP network that is being used for iSCSI or iFCP storage. This 
   draft provides a mechanism to monitor multiple iSNS Servers, 
   including information about registered objects in an iSNS 
   Server. 
    
   This memo is a product of the IP Storage (IPS) working group 
   within the Internet Engineering Task Force.  Comments are 
   solicited and should be addressed to the working group's mailing 
   list at ips@ietf.org and/or the authors.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ips-isns-mib-09.txt

To remove yourself from the I-D Announcement list, send a message to 
i-d-announce-request@ietf.org with the word unsubscribe in the body of the message.  
You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce 
to change your subscription settings.


Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ips-isns-mib-09.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ips-isns-mib-09.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body; access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID: <2006-4-5113125.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ips-isns-mib-09.txt

--OtherAccess
Content-Type: Message/External-body; name="draft-ietf-ips-isns-mib-09.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2006-4-5113125.I-D@ietf.org>


--OtherAccess--

--NextPart
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--NextPart--




From ips-bounces@ietf.org Wed Apr 05 16:22:45 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FREWW-0004Fl-Gl; Wed, 05 Apr 2006 16:22:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FREWV-00045Y-1f
	for ips@ietf.org; Wed, 05 Apr 2006 16:22:39 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FREWV-0002yd-0B
	for ips@ietf.org; Wed, 05 Apr 2006 16:22:39 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FRESp-0006Di-Jf
	for ips@ietf.org; Wed, 05 Apr 2006 16:18:51 -0400
Received: from mailhub.lss.emc.com (uraeus.lss.emc.com [10.254.144.14])
	by mexforward.lss.emc.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
	k35KIpWQ021090; Wed, 5 Apr 2006 16:18:51 -0400 (EDT)
Received: from mxic2.corp.emc.com (mxic2.corp.emc.com [128.221.12.9])
	by mailhub.lss.emc.com (Switch-3.1.6/Switch-3.1.7) with ESMTP id
	k35KImrg022897; Wed, 5 Apr 2006 16:18:49 -0400 (EDT)
Received: by mxic2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D48NNYQD>; Wed, 5 Apr 2006 16:18:47 -0400
Message-ID: <F222151D3323874393F83102D614E05502B66955@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: postmaster@maxtor.com
Date: Wed, 5 Apr 2006 16:19:01 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.05.125107
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CT 0, __CT_TEXT_PLAIN 0,
	__FRAUD_419_MISC 0, __HAS_MSGID 0, __HAS_X_MAILER 0,
	__IMS_MSGID 0, __IMS_MUA 0, __MIME_TEXT_ONLY 0, __MIME_VERSION 0,
	__SANE_MSGID 0, __STOCK_CRUFT 0, __STOCK_SUBJ_7 0'
X-Spam-Score: -2.0 (--)
X-Scan-Signature: 52e1467c2184c31006318542db5614d5
Cc: ips@ietf.org
Subject: [Ips] (no subject)
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

Gentlemen,

Your email software is configured to reject an attachment type,
probably URL, that is part of IETF Internet-Draft announcements.
This mistaken policy prevents your employees from fully participating
in the process of standardizing protocols used in the Internet
(e.g., iSCSI).  I suggest that you change this policy.

Thanks,
--David (IETF IP Storage Working Group Chair)
p.s.  This has been publicly cc:'d to the IPS WG mailing list in
the hope that someone at Maxtor will cause it to be corrected.
In the words of the late Justice Brandeis, "sunlight is the best
disinfectant" ...

----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------
-----Original Message-----
From: PureMessage Admin [mailto:postmaster@maxtor.com] 
Sent: Wednesday, April 05, 2006 4:12 PM
Subject: Maxtor Attachment Policy Violation 

Due to viruses and malicious code found in email attachments your email was
blocked. Maxtor does not accept the transfer of files or attachments that do
not meet Maxtor's acceptable attachment policy. For example: ZIP, EXE, SCR,
COM, BAT, VBS, RAR, CMD, PIF, etc...

Maxtor does accept some ZIP attachments that meet certain criteria. For more
information please call or email your Maxtor contact.

PureMessage Admin <postmaster@maxtor.com>


_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Wed Apr 05 19:27:10 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRHP1-0005y4-Ly; Wed, 05 Apr 2006 19:27:07 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FRHP1-0005xi-0R
	for ips@ietf.org; Wed, 05 Apr 2006 19:27:07 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRHP0-0002eG-MS
	for ips@ietf.org; Wed, 05 Apr 2006 19:27:06 -0400
Received: from mailhub.lss.emc.com (nagas.lss.emc.com [10.254.144.11])
	by mexforward.lss.emc.com (Switch-3.1.8/Switch-3.1.7) with ESMTP id
	k35NR6Xb005366
	for <ips@ietf.org>; Wed, 5 Apr 2006 19:27:06 -0400 (EDT)
Received: from MAHO3MSX2.corp.emc.com (maho3msx2.corp.emc.com [128.221.11.32])
	by mailhub.lss.emc.com (Switch-3.1.8/Switch-3.1.7) with ESMTP id
	k35NR4l1021034
	for <ips@ietf.org>; Wed, 5 Apr 2006 19:27:04 -0400 (EDT)
Received: by maho3msx2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D4XPKAZJ>; Wed, 5 Apr 2006 19:27:03 -0400
Message-ID: <F222151D3323874393F83102D614E05502B6695D@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: ips@ietf.org
Date: Wed, 5 Apr 2006 19:26:56 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.05.161104
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_URI_IN_BODY 0, __CT 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __HAS_X_MAILER 0,
	__IMS_MSGID 0, __IMS_MUA 0, __MIME_TEXT_ONLY 0, __MIME_VERSION 0,
	__SANE_MSGID 0, __STOCK_CRUFT 0'
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 5d7a7e767f20255fce80fa0b77fb2433
Cc: Black_David@emc.com
Subject: [Ips] Publication Requested: iSNS MIB
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

Publication has just been requested on the iSNS MIB draft.  The
PROTO process (cf. draft-ietf-proto-wgchair-doc-shepherding-06.txt)
is being used.  Here is the PROTO writeup:

PROTO writeup: 
               Definitions of Managed Objects for iSNS 
                   (Internet Storage Name Service) 
                   draft-ietf-ips-isns-mib-09.txt

Requested Publication Status: Proposed Standard
PROTO shepherd: David L. Black (IPS WG Chair)
------------------------------------------------------------------------

   1.a) Have the chairs personally reviewed this version of the Internet
        Draft (ID), and in particular, do they believe this ID is ready
        to forward to the IESG for publication?

Yes.  The chair has reviewed the text portions of the draft, and is
relying upon the WG's MIB Expert (Keith McCloghrie)'s review of the
MIB content.

   1.b) Has the document had adequate review from both key WG members
        and key non-WG members?

Yes.
        Do you have any concerns about the
        depth or breadth of the reviews that have been performed?

No.

   1.c) Do you have concerns that the document needs more review from a
        particular (broader) perspective (e.g., security, operational
        complexity, someone familiar with AAA, etc.)?

Needs the usual IETF OPS Area MIB Doctor review.

   1.d) Do you have any specific concerns/issues with this document that
        you believe the ADs and/or IESG should be aware of?  For
        example, perhaps you are uncomfortable with certain parts of the
        document, or have concerns whether there really is a need for
        it.  In any event, if your issues have been discussed in the WG
        and the WG has indicated it that it still wishes to advance the
        document, detail those concerns in the write-up.

No.  The IESG should be aware that this is a monitoring-only MIB - it
cannot be used for configuration, as it contains no writeable objects.

   1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

There is solid support for this document within the WG, including
support for it being only for monitoring iSNS servers; it cannot do
configuration, and is not applicable to iSNS clients.

   1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarise the areas of conflict in
        separate email to the Responsible Area Director.

No.

   1.g) Have the chairs verified that the document adheres to all of the
        ID nits? (see http://www.ietf.org/ID-Checklist.html).

The online nits checker says everything is ok.

   1.h) Is the document split into normative and informative references?

Yes.

        Are there normative references to IDs, where the IDs are not
        also ready for advancement or are otherwise in an unclear state?
        (note here that the RFC editor will not publish an RFC with
        normative references to IDs, it will delay publication until all
        such IDs are also ready for publication as RFCs.)

There are no normative references to Internet Drafts.

   1.i) For Standards Track and BCP documents, the IESG approval
        announcement includes a write-up section with the following
        sections:

        *    Technical Summary

        *    Working Group Summary

        *    Protocol Quality

   1.j) Please provide such a write-up.  Recent examples can be found in
        the "protocol action" announcements for approved documents.

-- Technical Summary

   The iSNS protocol provides storage name service functionality on 
   an IP network that is being used for iSCSI or iFCP storage. This 
   draft provides a mechanism to monitor multiple iSNS Servers, 
   including information about registered objects in an iSNS 
   Server. 

--  Working Group Summary

   This MIB was originally undertaken as a MIB for monitoring and
   configuration of both iSNS servers and clients, but ran into
   significant complexity and structural issues.  The scope of the
   MIB was reduced to server monitoring in order, as that comprised
   most of the interest in (and perceived value of) the MIB.

-- Protocol Quality

   The protocol has been reviewed for the ips WG by Keith McCloghrie.
   An approval announcement should credit a MIB Doctor as having
   reviewed this for the IESG.

Thanks,
--David (ips WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Wed Apr 05 19:52:38 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRHnf-0000Q4-TX; Wed, 05 Apr 2006 19:52:35 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FRHne-0000Pz-Ce
	for ips@ietf.org; Wed, 05 Apr 2006 19:52:34 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRHne-0003N7-1P
	for ips@ietf.org; Wed, 05 Apr 2006 19:52:34 -0400
Received: from mailhub.lss.emc.com (nirah.lss.emc.com [10.254.144.13])
	by mexforward.lss.emc.com (Switch-3.1.8/Switch-3.1.7) with ESMTP id
	k35NqXh6018137
	for <ips@ietf.org>; Wed, 5 Apr 2006 19:52:33 -0400 (EDT)
Received: from MAHO3MSX2.corp.emc.com (maho3msx2.corp.emc.com [128.221.11.32])
	by mailhub.lss.emc.com (Switch-3.1.6/Switch-3.1.7) with ESMTP id
	k35NqUxm024408
	for <ips@ietf.org>; Wed, 5 Apr 2006 19:52:31 -0400 (EDT)
Received: by maho3msx2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D4XPKCHX>; Wed, 5 Apr 2006 19:52:30 -0400
Message-ID: <F222151D3323874393F83102D614E05502B6695E@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: Black_David@emc.com, ips@ietf.org
Date: Wed, 5 Apr 2006 19:52:24 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.05.161104
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_NOT_1 0, __CP_URI_IN_BODY 0,
	__CT 0, __CT_TEXT_PLAIN 0, __HAS_MSGID 0, __HAS_X_MAILER 0,
	__IMS_MSGID 0, __IMS_MUA 0, __MIME_TEXT_ONLY 0, __MIME_VERSION 0,
	__SANE_MSGID 0, __STOCK_CRUFT 0, __STOCK_SUBJ_7 0'
X-Spam-Score: 1.7 (+)
X-Scan-Signature: 21bf7a2f1643ae0bf20c1e010766eb78
Cc: lars.eggert@netlab.nec.de
Subject: [Ips] (no subject)
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

Minor correction - in the Working Group Summary, the words "in order"
should be removed from the following sentence:

>    The scope of the
>    MIB was reduced to server monitoring in order, as that comprised
>    most of the interest in (and perceived value of) the MIB.

My mistake, sorry, --David

> -----Original Message-----
> From: Black, David 
> Sent: Wednesday, April 05, 2006 7:27 PM
> To: ips@ietf.org
> Cc: Black, David
> Subject: Publication Requested: iSNS MIB
> 
> Publication has just been requested on the iSNS MIB draft.  The
> PROTO process (cf. draft-ietf-proto-wgchair-doc-shepherding-06.txt)
> is being used.  Here is the PROTO writeup:
> 
> PROTO writeup: 
>                Definitions of Managed Objects for iSNS 
>                    (Internet Storage Name Service) 
>                    draft-ietf-ips-isns-mib-09.txt
> 
> Requested Publication Status: Proposed Standard
> PROTO shepherd: David L. Black (IPS WG Chair)
> --------------------------------------------------------------
> ----------
> 
>    1.a) Have the chairs personally reviewed this version of 
> the Internet
>         Draft (ID), and in particular, do they believe this 
> ID is ready
>         to forward to the IESG for publication?
> 
> Yes.  The chair has reviewed the text portions of the draft, and is
> relying upon the WG's MIB Expert (Keith McCloghrie)'s review of the
> MIB content.
> 
>    1.b) Has the document had adequate review from both key WG members
>         and key non-WG members?
> 
> Yes.
>         Do you have any concerns about the
>         depth or breadth of the reviews that have been performed?
> 
> No.
> 
>    1.c) Do you have concerns that the document needs more 
> review from a
>         particular (broader) perspective (e.g., security, operational
>         complexity, someone familiar with AAA, etc.)?
> 
> Needs the usual IETF OPS Area MIB Doctor review.
> 
>    1.d) Do you have any specific concerns/issues with this 
> document that
>         you believe the ADs and/or IESG should be aware of?  For
>         example, perhaps you are uncomfortable with certain 
> parts of the
>         document, or have concerns whether there really is a need for
>         it.  In any event, if your issues have been discussed 
> in the WG
>         and the WG has indicated it that it still wishes to 
> advance the
>         document, detail those concerns in the write-up.
> 
> No.  The IESG should be aware that this is a monitoring-only MIB - it
> cannot be used for configuration, as it contains no writeable objects.
> 
>    1.e) How solid is the WG consensus behind this document? Does it
>         represent the strong concurrence of a few individuals, with
>         others being silent, or does the WG as a whole understand and
>         agree with it?
> 
> There is solid support for this document within the WG, including
> support for it being only for monitoring iSNS servers; it cannot do
> configuration, and is not applicable to iSNS clients.
> 
>    1.f) Has anyone threatened an appeal or otherwise indicated extreme
>         discontent?  If so, please summarise the areas of conflict in
>         separate email to the Responsible Area Director.
> 
> No.
> 
>    1.g) Have the chairs verified that the document adheres to 
> all of the
>         ID nits? (see http://www.ietf.org/ID-Checklist.html).
> 
> The online nits checker says everything is ok.
> 
>    1.h) Is the document split into normative and informative 
> references?
> 
> Yes.
> 
>         Are there normative references to IDs, where the IDs are not
>         also ready for advancement or are otherwise in an 
> unclear state?
>         (note here that the RFC editor will not publish an RFC with
>         normative references to IDs, it will delay 
> publication until all
>         such IDs are also ready for publication as RFCs.)
> 
> There are no normative references to Internet Drafts.
> 
>    1.i) For Standards Track and BCP documents, the IESG approval
>         announcement includes a write-up section with the following
>         sections:
> 
>         *    Technical Summary
> 
>         *    Working Group Summary
> 
>         *    Protocol Quality
> 
>    1.j) Please provide such a write-up.  Recent examples can 
> be found in
>         the "protocol action" announcements for approved documents.
> 
> -- Technical Summary
> 
>    The iSNS protocol provides storage name service functionality on 
>    an IP network that is being used for iSCSI or iFCP storage. This 
>    draft provides a mechanism to monitor multiple iSNS Servers, 
>    including information about registered objects in an iSNS 
>    Server. 
> 
> --  Working Group Summary
> 
>    This MIB was originally undertaken as a MIB for monitoring and
>    configuration of both iSNS servers and clients, but ran into
>    significant complexity and structural issues.  The scope of the
>    MIB was reduced to server monitoring in order, as that comprised
>    most of the interest in (and perceived value of) the MIB.
> 
> -- Protocol Quality
> 
>    The protocol has been reviewed for the ips WG by Keith McCloghrie.
>    An approval announcement should credit a MIB Doctor as having
>    reviewed this for the IESG.
> 
> Thanks,
> --David (ips WG chair)
> ----------------------------------------------------
> David L. Black, Senior Technologist
> EMC Corporation, 176 South St., Hopkinton, MA  01748
> +1 (508) 293-7953             FAX: +1 (508) 293-7786
> black_david@emc.com        Mobile: +1 (978) 394-7754
> ----------------------------------------------------
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Thu Apr 06 18:08:44 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRceg-0003vK-3C; Thu, 06 Apr 2006 18:08:42 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FRcee-0003vF-Lg
	for ips@ietf.org; Thu, 06 Apr 2006 18:08:40 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRcee-0000vY-8L
	for ips@ietf.org; Thu, 06 Apr 2006 18:08:40 -0400
Received: from mailhub.lss.emc.com (nirah.lss.emc.com [10.254.144.13])
	by mexforward.lss.emc.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
	k36M8dBv000050; Thu, 6 Apr 2006 18:08:39 -0400 (EDT)
Received: from MAHO3MSX2.corp.emc.com (maho3msx2.corp.emc.com [128.221.11.32])
	by mailhub.lss.emc.com (Switch-3.1.6/Switch-3.1.7) with ESMTP id
	k36M8aEb002499; Thu, 6 Apr 2006 18:08:36 -0400 (EDT)
Received: by maho3msx2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D4XP3RHD>; Thu, 6 Apr 2006 18:08:35 -0400
Message-ID: <F222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: davidw@netapp.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
Date: Thu, 6 Apr 2006 18:08:30 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.06.143605
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_MEDIA_2_BODY 0,
	__CP_NOT_1 0, __CT 0, __CT_TEXT_PLAIN 0, __HAS_MSGID 0,
	__HAS_X_MAILER 0, __IMS_MSGID 0, __IMS_MUA 0, __MIME_TEXT_ONLY 0,
	__MIME_VERSION 0, __SANE_MSGID 0, __STOCK_CRUFT 0'
X-Spam-Score: 0.2 (/)
X-Scan-Signature: bacfc6c7290e34d410f9bc22b825ce96
Cc: ips@ietf.org, Black_David@emc.com
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

Dave,

> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.

Good start, needs editing to something like:

    This extension key transmits specific implementation details
    about the node that sends it; such details may be considered
    sensitive in some environments.  For example, if a certain
    software or firmware version is known to contain security
    weaknesses, announcing the presence of that version via this
    key may not be desirable.  The countermeasures for this
    security concern are:
	- not sending the extension key, or
	- using IPsec to provide confidentiality for the iSCSI
		connection on  which the key is sent (see RFC 3720
		and RFC 3723).
    To support the first countermeasure, all implementations of
    this extension key MUST provide an administrative mechanism
    to disable sending the key.

Reasons for the edits:
- Focus on specific threat, not general "where security is a primary
	concern".
- Make the "MUST" for disabling transmission of the key globally
	applicable, vs. possibly scoped to specific environments.
	This is a "MUST implement" requirement, not "MUST use".
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.

> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.

This one is close - 3 suggestions:
- "proper" -> "intended"
- remove "and for better understanding of customer environments" or
	replace it with something more specific like "and to enable
	collection of iSCSI implementation usage information"
- The "such as ... or other uses not defined here" is not sufficiently
	precise.
The last one is crucial - it needs to be easy for an implementer to
determine whether s/he's stepped over this line.

I'm comfortable with not mentioning the JavaScript and browser versions
mess, as I think we all know that it's the motivating example for this
text.

Thanks,
--David (as individual participant, *not* as WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

> -----Original Message-----
> From: Dave Wysochanski [mailto:davidw@netapp.com] 
> Sent: Friday, March 31, 2006 9:35 PM
> To: Black, David
> Cc: ips@ietf.org
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> 
> Black_David@emc.com wrote:
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt
> >
> > This draft will be an official WG draft, but three things
> > need to happen first:
> >
> > (1) New security text.  The existing "SHOULD" in the security
> >         considerations text needs to be a "MUST".  In addition,
> >         there needs to be a sentence pointing out that it may
> >         be important to shield the contents of this key from
> >         observers of network traffic, and that IPsec as specified
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> >         appropriate tool for this purpose.
> >
> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.
> 
> 
> 
> Original text:      
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node. For these
>    environments, nodes implementing this public extension key
>    SHOULD provide a method to disable sending the key.
> 
>       
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> >         be used by iSCSI nodes for things such as ..." is well-
> >         intentioned but does not get the job done.  My recollection
> >         of discussion in Dallas is that saying that "functional behavior
> >         of the iSCSI node MUST NOT depend on this key (presence/absence
> >         or value)"  may be closer to the mark.  The only permitted
> >         (and intended) use of this key is to report it/log it in order
> >         to avoid the browser detection JavaScript disasters caused by
> >         the corresponding HTTP header fields.
> >
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left it
in.  Anyone
> have a preference?  Also wasn't sure whether it's worth putting in a
sentence or two at
> least acknowledging what has happened in the past with User-Agent --
intent would be
> the working group acknowledges this historical misuse and wishes to avoid
it.
> 
> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.
> 
> 
> 
> Original text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  The key MUST NOT be used by iSCSI
>    nodes for things such as interoperability, performance,
>    exclusion or deception of other nodes, or other uses not
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT
>    allow user modification of the key value(s), and SHOULD set
>    the value automatically based on standard internal interfaces.
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just
> >         reeks of marketing ;-) ).  Let's try:
> >
> >            The iSCSI X#NodeArchitecture Key
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> >
> Sounds fine to me.
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be
> > worked out on the list before the -00 version of the draft-ietf-ips-...
> > draft is submitted.  I've just sent the request to the secretariat for
> > an end-of-2006 completion milestone for this, but in practice, it
> > could be done shortly after Montreal, if not before.
> >
> Great, thanks.
> 
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Senior Technologist
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > black_david@emc.com        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> > _______________________________________________
> > Ips mailing list
> > Ips@ietf.org
> > https://www1.ietf.org/mailman/listinfo/ips
> >
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Fri Apr 07 08:38:49 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FRqEh-0004RG-M6; Fri, 07 Apr 2006 08:38:47 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FRqEg-0004Op-7m
	for ips@ietf.org; Fri, 07 Apr 2006 08:38:46 -0400
Received: from mtagate2.de.ibm.com ([195.212.29.151])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FRqEf-0002sQ-3D
	for ips@ietf.org; Fri, 07 Apr 2006 08:38:46 -0400
Received: from d12nrmr1607.megacenter.de.ibm.com
	(d12nrmr1607.megacenter.de.ibm.com [9.149.167.49])
	by mtagate2.de.ibm.com (8.13.6/8.13.6) with ESMTP id k37CciCD039654
	for <ips@ietf.org>; Fri, 7 Apr 2006 12:38:44 GMT
Received: from d12av04.megacenter.de.ibm.com (d12av04.megacenter.de.ibm.com
	[9.149.165.229])
	by d12nrmr1607.megacenter.de.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k37CdXIk226162 for <ips@ietf.org>; Fri, 7 Apr 2006 14:39:33 +0200
Received: from d12av04.megacenter.de.ibm.com (loopback [127.0.0.1])
	by d12av04.megacenter.de.ibm.com (8.12.11/8.13.3) with ESMTP id
	k37CchOA024393 for <ips@ietf.org>; Fri, 7 Apr 2006 14:38:43 +0200
Received: from d12mc102.megacenter.de.ibm.com (d12mc102.megacenter.de.ibm.com
	[9.149.167.114])
	by d12av04.megacenter.de.ibm.com (8.12.11/8.12.11) with ESMTP id
	k37CchPf024390; Fri, 7 Apr 2006 14:38:43 +0200
In-Reply-To: <F222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com>
To: Black_David@emc.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0 August 18, 2005
From: Julian Satran <Julian_Satran@il.ibm.com>
Message-ID: <OFF7F2A6B8.E5FF0281-ON85257149.00447A6E-85257149.00457544@il.ibm.com>
Date: Fri, 7 Apr 2006 08:39:30 -0400
X-MIMETrack: Serialize by Router on D12MC102/12/M/IBM(Release 7.0HF90 |
	November 16, 2005) at 07/04/2006 15:39:32,
	Serialize complete at 07/04/2006 15:39:32
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 645960076aa293effd9740db2f975dc3
Cc: ips@ietf.org, Black_David@emc.com
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0174542598=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============0174542598==
Content-Type: multipart/alternative;
	boundary="=_alternative 0044D3CC85257149_="

This is a multipart message in MIME format.
--=_alternative 0044D3CC85257149_=
Content-Type: text/plain; charset="US-ASCII"

I am not sure that not sending the key is that good a measure (not sending 
it when it was previously seen is a way of leaking information).
I guess what you want to mandate is that the value can be specifically 
faked (set) and/or responding "not understood".

Julo



Black_David@emc.com 
06/04/06 18:08

To
davidw@netapp.com
cc
ips@ietf.org, Black_David@emc.com
Subject
RE: [Ips] X#NodeArchitecture draft - next steps






Dave,

> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.

Good start, needs editing to something like:

    This extension key transmits specific implementation details
    about the node that sends it; such details may be considered
    sensitive in some environments.  For example, if a certain
    software or firmware version is known to contain security
    weaknesses, announcing the presence of that version via this
    key may not be desirable.  The countermeasures for this
    security concern are:
                 - not sending the extension key, or
                 - using IPsec to provide confidentiality for the iSCSI
                                 connection on  which the key is sent (see 
RFC 3720
                                 and RFC 3723).
    To support the first countermeasure, all implementations of
    this extension key MUST provide an administrative mechanism
    to disable sending the key.

Reasons for the edits:
- Focus on specific threat, not general "where security is a primary
                 concern".
- Make the "MUST" for disabling transmission of the key globally
                 applicable, vs. possibly scoped to specific environments.
                 This is a "MUST implement" requirement, not "MUST use".
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.

> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.

This one is close - 3 suggestions:
- "proper" -> "intended"
- remove "and for better understanding of customer environments" or
                 replace it with something more specific like "and to 
enable
                 collection of iSCSI implementation usage information"
- The "such as ... or other uses not defined here" is not sufficiently
                 precise.
The last one is crucial - it needs to be easy for an implementer to
determine whether s/he's stepped over this line.

I'm comfortable with not mentioning the JavaScript and browser versions
mess, as I think we all know that it's the motivating example for this
text.

Thanks,
--David (as individual participant, *not* as WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

> -----Original Message-----
> From: Dave Wysochanski [mailto:davidw@netapp.com] 
> Sent: Friday, March 31, 2006 9:35 PM
> To: Black, David
> Cc: ips@ietf.org
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> 
> Black_David@emc.com wrote:
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt
> >
> > This draft will be an official WG draft, but three things
> > need to happen first:
> >
> > (1) New security text.  The existing "SHOULD" in the security
> >         considerations text needs to be a "MUST".  In addition,
> >         there needs to be a sentence pointing out that it may
> >         be important to shield the contents of this key from
> >         observers of network traffic, and that IPsec as specified
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> >         appropriate tool for this purpose.
> >
> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.
> 
> 
> 
> Original text: 
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node. For these
>    environments, nodes implementing this public extension key
>    SHOULD provide a method to disable sending the key.
> 
> 
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> >         be used by iSCSI nodes for things such as ..." is well-
> >         intentioned but does not get the job done.  My recollection
> >         of discussion in Dallas is that saying that "functional 
behavior
> >         of the iSCSI node MUST NOT depend on this key 
(presence/absence
> >         or value)"  may be closer to the mark.  The only permitted
> >         (and intended) use of this key is to report it/log it in order
> >         to avoid the browser detection JavaScript disasters caused by
> >         the corresponding HTTP header fields.
> >
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left 
it
in.  Anyone
> have a preference?  Also wasn't sure whether it's worth putting in a
sentence or two at
> least acknowledging what has happened in the past with User-Agent --
intent would be
> the working group acknowledges this historical misuse and wishes to 
avoid
it.
> 
> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.
> 
> 
> 
> Original text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  The key MUST NOT be used by iSCSI
>    nodes for things such as interoperability, performance,
>    exclusion or deception of other nodes, or other uses not
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT
>    allow user modification of the key value(s), and SHOULD set
>    the value automatically based on standard internal interfaces.
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just
> >         reeks of marketing ;-) ).  Let's try:
> >
> >            The iSCSI X#NodeArchitecture Key
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> >
> Sounds fine to me.
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be
> > worked out on the list before the -00 version of the 
draft-ietf-ips-...
> > draft is submitted.  I've just sent the request to the secretariat for
> > an end-of-2006 completion milestone for this, but in practice, it
> > could be done shortly after Montreal, if not before.
> >
> Great, thanks.
> 
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Senior Technologist
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > black_david@emc.com        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> > _______________________________________________
> > Ips mailing list
> > Ips@ietf.org
> > https://www1.ietf.org/mailman/listinfo/ips
> >
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips


--=_alternative 0044D3CC85257149_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">I am not sure that not sending the key
is that good a measure (not sending it when it was previously seen is a
way of leaking information).</font>
<br><font size=2 face="sans-serif">I guess what you want to mandate is
that the value can be specifically faked (set) and/or responding &quot;not
understood&quot;.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>Black_David@emc.com</b>
</font>
<p><font size=1 face="sans-serif">06/04/06 18:08</font>
<td width=59%>
<table width=100%>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td><font size=1 face="sans-serif">davidw@netapp.com</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td><font size=1 face="sans-serif">ips@ietf.org, Black_David@emc.com</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td><font size=1 face="sans-serif">RE: [Ips] X#NodeArchitecture draft -
next steps</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><tt><font size=2>Dave,<br>
<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. &nbsp;For
these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;MUST provide a method to disable sending the key. &nbsp;In<br>
&gt; &nbsp; &nbsp;addition to providing a disable mechanism, security sensitive<br>
&gt; &nbsp; &nbsp;environments SHOULD consider use of IPsec, as specified
in <br>
&gt; &nbsp; &nbsp;RFC 3720 and 3723, as a means to shield the contents
of this<br>
&gt; &nbsp; &nbsp;key from observers of network traffic.<br>
<br>
Good start, needs editing to something like:<br>
<br>
 &nbsp; &nbsp;This extension key transmits specific implementation details<br>
 &nbsp; &nbsp;about the node that sends it; such details may be considered<br>
 &nbsp; &nbsp;sensitive in some environments. &nbsp;For example, if a certain<br>
 &nbsp; &nbsp;software or firmware version is known to contain security<br>
 &nbsp; &nbsp;weaknesses, announcing the presence of that version via this<br>
 &nbsp; &nbsp;key may not be desirable. &nbsp;The countermeasures for this<br>
 &nbsp; &nbsp;security concern are:<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
- not sending the extension key, or<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
- using IPsec to provide confidentiality for the iSCSI<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;connection
on &nbsp;which the key is sent (see RFC 3720<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;and
RFC 3723).<br>
 &nbsp; &nbsp;To support the first countermeasure, all implementations
of<br>
 &nbsp; &nbsp;this extension key MUST provide an administrative mechanism<br>
 &nbsp; &nbsp;to disable sending the key.<br>
<br>
Reasons for the edits:<br>
- Focus on specific threat, not general &quot;where security is a primary<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
concern&quot;.<br>
- Make the &quot;MUST&quot; for disabling transmission of the key globally<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
applicable, vs. possibly scoped to specific environments.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
This is a &quot;MUST implement&quot; requirement, not &quot;MUST use&quot;.<br>
- Avoid the &quot;SHOULD ... use ... IPsec&quot; phrasing, at least for
now.<br>
<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;Functional behavior of
the iSCSI<br>
&gt; &nbsp; &nbsp;node MUST NOT depend on the presence, absence, or content
of<br>
&gt; &nbsp; &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes
for things<br>
&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion or deception<br>
&gt; &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To
enforce<br>
&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user modification
of<br>
&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the value automatically
based<br>
&gt; &nbsp; &nbsp;on standard internal interfaces.<br>
<br>
This one is close - 3 suggestions:<br>
- &quot;proper&quot; -&gt; &quot;intended&quot;<br>
- remove &quot;and for better understanding of customer environments&quot;
or<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
replace it with something more specific like &quot;and to enable<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
collection of iSCSI implementation usage information&quot;<br>
- The &quot;such as ... or other uses not defined here&quot; is not sufficiently<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
precise.<br>
The last one is crucial - it needs to be easy for an implementer to<br>
determine whether s/he's stepped over this line.<br>
<br>
I'm comfortable with not mentioning the JavaScript and browser versions<br>
mess, as I think we all know that it's the motivating example for this<br>
text.<br>
<br>
Thanks,<br>
--David (as individual participant, *not* as WG chair)<br>
----------------------------------------------------<br>
David L. Black, Senior Technologist<br>
EMC Corporation, 176 South St., Hopkinton, MA &nbsp;01748<br>
+1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; FAX: +1 (508)
293-7786<br>
black_david@emc.com &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978) 394-7754<br>
----------------------------------------------------<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: Dave Wysochanski [mailto:davidw@netapp.com] <br>
&gt; Sent: Friday, March 31, 2006 9:35 PM<br>
&gt; To: Black, David<br>
&gt; Cc: ips@ietf.org<br>
&gt; Subject: Re: [Ips] X#NodeArchitecture draft - next steps<br>
&gt; <br>
&gt; Black_David@emc.com wrote:<br>
&gt; <br>
&gt; &gt; This draft is better known as: <br>
&gt; &gt; draft-wysochanski-xkey-iscsi-support-00.txt<br>
&gt; &gt;<br>
&gt; &gt; This draft will be an official WG draft, but three things<br>
&gt; &gt; need to happen first:<br>
&gt; &gt;<br>
&gt; &gt; (1) New security text. &nbsp;The existing &quot;SHOULD&quot;
in the security<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; considerations text needs to be a
&quot;MUST&quot;. &nbsp;In addition,<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; there needs to be a sentence pointing
out that it may<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be important to shield the contents
of this key from<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; observers of network traffic, and
that IPsec as specified<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; for iSCSI in RFC 3720 and 3723 (cite
both of them) is an<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; appropriate tool for this purpose.<br>
&gt; &gt;<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. &nbsp;For
these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;MUST provide a method to disable sending the key. &nbsp;In<br>
&gt; &nbsp; &nbsp;addition to providing a disable mechanism, security sensitive<br>
&gt; &nbsp; &nbsp;environments SHOULD consider use of IPsec, as specified
in <br>
&gt; &nbsp; &nbsp;RFC 3720 and 3723, as a means to shield the contents
of this<br>
&gt; &nbsp; &nbsp;key from observers of network traffic.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Original text: &nbsp; &nbsp; &nbsp;<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. For these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;SHOULD provide a method to disable sending the key.<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; <br>
&gt; <br>
&gt; &gt; (2) New &quot;prevention of abuse&quot; text. &nbsp;The current
&quot;The key MUST NOT<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be used by iSCSI nodes for things
such as ...&quot; is well-<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; intentioned but does not get the
job done. &nbsp;My recollection<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of discussion in Dallas is that saying
that &quot;functional behavior<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of the iSCSI node MUST NOT depend
on this key (presence/absence<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; or value)&quot; &nbsp;may be closer
to the mark. &nbsp;The only permitted<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; (and intended) use of this key is
to report it/log it in order<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; to avoid the browser detection JavaScript
disasters caused by<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; the corresponding HTTP header fields.<br>
&gt; &gt;<br>
&gt; <br>
&gt; I wasn't sure about deleting the original &quot;MUST NOT&quot; sentence
so I left it<br>
in. &nbsp;Anyone<br>
&gt; have a preference? &nbsp;Also wasn't sure whether it's worth putting
in a<br>
sentence or two at<br>
&gt; least acknowledging what has happened in the past with User-Agent
--<br>
intent would be<br>
&gt; the working group acknowledges this historical misuse and wishes to
avoid<br>
it.<br>
&gt; <br>
&gt; New proposed text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;Functional behavior of
the iSCSI<br>
&gt; &nbsp; &nbsp;node MUST NOT depend on the presence, absence, or content
of<br>
&gt; &nbsp; &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes
for things<br>
&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion or deception<br>
&gt; &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To
enforce<br>
&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user modification
of<br>
&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the value automatically
based<br>
&gt; &nbsp; &nbsp;on standard internal interfaces.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Original text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;The key MUST NOT be used
by iSCSI<br>
&gt; &nbsp; &nbsp;nodes for things such as interoperability, performance,<br>
&gt; &nbsp; &nbsp;exclusion or deception of other nodes, or other uses
not<br>
&gt; &nbsp; &nbsp;defined here. &nbsp;To enforce proper use, iSCSI nodes
MUST NOT<br>
&gt; &nbsp; &nbsp;allow user modification of the key value(s), and SHOULD
set<br>
&gt; &nbsp; &nbsp;the value automatically based on standard internal interfaces.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; &gt; (3) The draft needs a new title and file name (&quot;supportability&quot;
just<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; reeks of marketing ;-) ). &nbsp;Let's
try:<br>
&gt; &gt;<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The iSCSI X#NodeArchitecture
Key<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-ips-iscsi-nodearch-key-00.txt<br>
&gt; &gt;<br>
&gt; Sounds fine to me.<br>
&gt; <br>
&gt; <br>
&gt; &gt; Text for (1) and (2), or at least initial versions of it should
be<br>
&gt; &gt; worked out on the list before the -00 version of the draft-ietf-ips-...<br>
&gt; &gt; draft is submitted. &nbsp;I've just sent the request to the secretariat
for<br>
&gt; &gt; an end-of-2006 completion milestone for this, but in practice,
it<br>
&gt; &gt; could be done shortly after Montreal, if not before.<br>
&gt; &gt;<br>
&gt; Great, thanks.<br>
&gt; <br>
&gt; &gt; Thanks,<br>
&gt; &gt; --David<br>
&gt; &gt; ----------------------------------------------------<br>
&gt; &gt; David L. Black, Senior Technologist<br>
&gt; &gt; EMC Corporation, 176 South St., Hopkinton, MA &nbsp;01748<br>
&gt; &gt; +1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; FAX:
+1 (508) 293-7786<br>
&gt; &gt; black_david@emc.com &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978)
394-7754<br>
&gt; &gt; ----------------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; Ips mailing list<br>
&gt; &gt; Ips@ietf.org<br>
&gt; &gt; https://www1.ietf.org/mailman/listinfo/ips<br>
&gt; &gt;<br>
&gt; <br>
<br>
_______________________________________________<br>
Ips mailing list<br>
Ips@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/ips<br>
</font></tt>
<br>
--=_alternative 0044D3CC85257149_=--


--===============0174542598==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0174542598==--




From ips-bounces@ietf.org Fri Apr 07 23:26:01 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FS43m-0002SR-7Q; Fri, 07 Apr 2006 23:24:26 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FS43l-0002SM-O5
	for ips@ietf.org; Fri, 07 Apr 2006 23:24:25 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FS43j-0001eG-TS
	for ips@ietf.org; Fri, 07 Apr 2006 23:24:25 -0400
Received: from mailhub.lss.emc.com (sesha.lss.emc.com [10.254.144.12])
	by mexforward.lss.emc.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
	k383OM3a020601; Fri, 7 Apr 2006 23:24:23 -0400 (EDT)
Received: from MAHO3MSX2.corp.emc.com (maho3msx2.corp.emc.com [128.221.11.32])
	by mailhub.lss.emc.com (Switch-3.1.6/Switch-3.1.7) with ESMTP id
	k383OG5I026522; Fri, 7 Apr 2006 23:24:17 -0400 (EDT)
Received: by maho3msx2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D4XPTK5K>; Fri, 7 Apr 2006 23:24:16 -0400
Message-ID: <F222151D3323874393F83102D614E05502B66987@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: Julian_Satran@il.ibm.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
Date: Fri, 7 Apr 2006 23:24:13 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.07.195105
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_MEDIA_2_BODY 0,
	__CP_NOT_1 0, __CT 0, __CTYPE_HAS_BOUNDARY 0,
	__CTYPE_MULTIPART 0, __CTYPE_MULTIPART_ALT 0, __HAS_MSGID 0,
	__HAS_X_MAILER 0, __IMS_MSGID 0, __IMS_MUA 0, __MIME_HTML 0,
	__MIME_VERSION 0, __SANE_MSGID 0, __STOCK_CRUFT 0,
	__TAG_EXISTS_HTML 0'
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 9b157e6e8a3799aef911c0bc37fc93a6
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1617919707=="
Errors-To: ips-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1617919707==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C65ABB.7C9D26A3"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C65ABB.7C9D26A3
Content-Type: text/plain

IMHO, a site-wide policy of not using the key is within reason.
Obfuscating the value defeats the primary purpose of the key -
the interest is in what is *actually* running, not the name
of some other implementation that this one ought to be
behaviorally indistinguishable from.  Not sending the key is
a better means of dealing with this concern.
 
Thanks,
--David


  _____  

From: Julian Satran [mailto:Julian_Satran@il.ibm.com] 
Sent: Friday, April 07, 2006 8:40 AM
To: Black, David
Cc: Black, David; davidw@netapp.com; ips@ietf.org
Subject: RE: [Ips] X#NodeArchitecture draft - next steps



I am not sure that not sending the key is that good a measure (not sending
it when it was previously seen is a way of leaking information). 
I guess what you want to mandate is that the value can be specifically faked
(set) and/or responding "not understood". 

Julo 



Black_David@emc.com 


06/04/06 18:08 


To
davidw@netapp.com 

cc
ips@ietf.org, Black_David@emc.com 

Subject
RE: [Ips] X#NodeArchitecture draft - next steps

	




Dave,

> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.

Good start, needs editing to something like:

   This extension key transmits specific implementation details
   about the node that sends it; such details may be considered
   sensitive in some environments.  For example, if a certain
   software or firmware version is known to contain security
   weaknesses, announcing the presence of that version via this
   key may not be desirable.  The countermeasures for this
   security concern are:
                - not sending the extension key, or
                - using IPsec to provide confidentiality for the iSCSI
                                 connection on  which the key is sent (see
RFC 3720
                                 and RFC 3723).
   To support the first countermeasure, all implementations of
   this extension key MUST provide an administrative mechanism
   to disable sending the key.

Reasons for the edits:
- Focus on specific threat, not general "where security is a primary
                concern".
- Make the "MUST" for disabling transmission of the key globally
                applicable, vs. possibly scoped to specific environments.
                This is a "MUST implement" requirement, not "MUST use".
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.

> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.

This one is close - 3 suggestions:
- "proper" -> "intended"
- remove "and for better understanding of customer environments" or
                replace it with something more specific like "and to enable
                collection of iSCSI implementation usage information"
- The "such as ... or other uses not defined here" is not sufficiently
                precise.
The last one is crucial - it needs to be easy for an implementer to
determine whether s/he's stepped over this line.

I'm comfortable with not mentioning the JavaScript and browser versions
mess, as I think we all know that it's the motivating example for this
text.

Thanks,
--David (as individual participant, *not* as WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

> -----Original Message-----
> From: Dave Wysochanski [mailto:davidw@netapp.com] 
> Sent: Friday, March 31, 2006 9:35 PM
> To: Black, David
> Cc: ips@ietf.org
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> 
> Black_David@emc.com wrote:
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt
> >
> > This draft will be an official WG draft, but three things
> > need to happen first:
> >
> > (1) New security text.  The existing "SHOULD" in the security
> >         considerations text needs to be a "MUST".  In addition,
> >         there needs to be a sentence pointing out that it may
> >         be important to shield the contents of this key from
> >         observers of network traffic, and that IPsec as specified
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> >         appropriate tool for this purpose.
> >
> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.
> 
> 
> 
> Original text:      
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node. For these
>    environments, nodes implementing this public extension key
>    SHOULD provide a method to disable sending the key.
> 
>       
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> >         be used by iSCSI nodes for things such as ..." is well-
> >         intentioned but does not get the job done.  My recollection
> >         of discussion in Dallas is that saying that "functional behavior
> >         of the iSCSI node MUST NOT depend on this key (presence/absence
> >         or value)"  may be closer to the mark.  The only permitted
> >         (and intended) use of this key is to report it/log it in order
> >         to avoid the browser detection JavaScript disasters caused by
> >         the corresponding HTTP header fields.
> >
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left it
in.  Anyone
> have a preference?  Also wasn't sure whether it's worth putting in a
sentence or two at
> least acknowledging what has happened in the past with User-Agent --
intent would be
> the working group acknowledges this historical misuse and wishes to avoid
it.
> 
> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.
> 
> 
> 
> Original text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  The key MUST NOT be used by iSCSI
>    nodes for things such as interoperability, performance,
>    exclusion or deception of other nodes, or other uses not
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT
>    allow user modification of the key value(s), and SHOULD set
>    the value automatically based on standard internal interfaces.
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just
> >         reeks of marketing ;-) ).  Let's try:
> >
> >            The iSCSI X#NodeArchitecture Key
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> >
> Sounds fine to me.
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be
> > worked out on the list before the -00 version of the draft-ietf-ips-...
> > draft is submitted.  I've just sent the request to the secretariat for
> > an end-of-2006 completion milestone for this, but in practice, it
> > could be done shortly after Montreal, if not before.
> >
> Great, thanks.
> 
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Senior Technologist
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > black_david@emc.com        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> > _______________________________________________
> > Ips mailing list
> > Ips@ietf.org
> > https://www1.ietf.org/mailman/listinfo/ips
> >
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips




------_=_NextPart_001_01C65ABB.7C9D26A3
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">


<META content="MSHTML 6.00.2800.1528" name=GENERATOR></HEAD>
<BODY>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>IMHO,&nbsp;a site-wide policy of not using the key is within 
reason.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>Obfuscating the value defeats the primary purpose of the key 
-</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>the interest is in what is *actually* running, not the 
name</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>of some other implementation that this one ought to 
be</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>behaviorally </FONT></SPAN><SPAN class=520302003-08042006><FONT 
face="Courier New" size=2>indistinguishable from.&nbsp; Not sending the key 
is</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>a better means of dealing with this concern.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>Thanks,</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=520302003-08042006><FONT face="Courier New" 
size=2>--David</FONT></SPAN></DIV><BR>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
  <HR tabIndex=-1>
  <FONT face=Tahoma size=2><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com] <BR><B>Sent:</B> Friday, April 07, 2006 8:40 
  AM<BR><B>To:</B> Black, David<BR><B>Cc:</B> Black, David; davidw@netapp.com; 
  ips@ietf.org<BR><B>Subject:</B> RE: [Ips] X#NodeArchitecture draft - next 
  steps<BR></FONT><BR></DIV>
  <DIV></DIV><BR><FONT face=sans-serif size=2>I am not sure that not sending the 
  key is that good a measure (not sending it when it was previously seen is a 
  way of leaking information).</FONT> <BR><FONT face=sans-serif size=2>I guess 
  what you want to mandate is that the value can be specifically faked (set) 
  and/or responding "not understood".</FONT> <BR><BR><FONT face=sans-serif 
  size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD width="40%"><FONT face=sans-serif size=1><B>Black_David@emc.com</B> 
        </FONT>
        <P><FONT face=sans-serif size=1>06/04/06 18:08</FONT> </P>
      <TD width="59%">
        <TABLE width="100%">
          <TBODY>
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>To</FONT></DIV>
            <TD><FONT face=sans-serif size=1>davidw@netapp.com</FONT> 
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>cc</FONT></DIV>
            <TD><FONT face=sans-serif size=1>ips@ietf.org, 
              Black_David@emc.com</FONT> 
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>Subject</FONT></DIV>
            <TD><FONT face=sans-serif size=1>RE: [Ips] X#NodeArchitecture 
              draft - next steps</FONT></TR></TBODY></TABLE><BR>
        <TABLE>
          <TBODY>
          <TR vAlign=top>
            <TD>
            <TD></TR></TBODY></TABLE><BR></TR></TBODY></TABLE><BR><BR><BR><TT><FONT 
  size=2>Dave,<BR><BR>&gt; New proposed text:<BR>&gt; <BR>&gt; 3. &nbsp;Security 
  Considerations <BR>&gt; <BR>&gt; &nbsp; &nbsp;In certain environments where 
  security is a primary concern,<BR>&gt; &nbsp; &nbsp;the use of this extension 
  key may not be appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details 
  about an iSCSI node. &nbsp;For these<BR>&gt; &nbsp; &nbsp;environments, nodes 
  implementing this public extension key<BR>&gt; &nbsp; &nbsp;MUST provide a 
  method to disable sending the key. &nbsp;In<BR>&gt; &nbsp; &nbsp;addition to 
  providing a disable mechanism, security sensitive<BR>&gt; &nbsp; 
  &nbsp;environments SHOULD consider use of IPsec, as specified in <BR>&gt; 
  &nbsp; &nbsp;RFC 3720 and 3723, as a means to shield the contents of 
  this<BR>&gt; &nbsp; &nbsp;key from observers of network traffic.<BR><BR>Good 
  start, needs editing to something like:<BR><BR>&nbsp; &nbsp;This extension key 
  transmits specific implementation details<BR>&nbsp; &nbsp;about the node that 
  sends it; such details may be considered<BR>&nbsp; &nbsp;sensitive in some 
  environments. &nbsp;For example, if a certain<BR>&nbsp; &nbsp;software or 
  firmware version is known to contain security<BR>&nbsp; &nbsp;weaknesses, 
  announcing the presence of that version via this<BR>&nbsp; &nbsp;key may not 
  be desirable. &nbsp;The countermeasures for this<BR>&nbsp; &nbsp;security 
  concern are:<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; - not 
  sending the extension key, or<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; - using IPsec to provide confidentiality for the iSCSI<BR>&nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;connection on &nbsp;which the key is sent 
  (see RFC 3720<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;and RFC 
  3723).<BR>&nbsp; &nbsp;To support the first countermeasure, all 
  implementations of<BR>&nbsp; &nbsp;this extension key MUST provide an 
  administrative mechanism<BR>&nbsp; &nbsp;to disable sending the 
  key.<BR><BR>Reasons for the edits:<BR>- Focus on specific threat, not general 
  "where security is a primary<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; concern".<BR>- Make the "MUST" for disabling transmission of the 
  key globally<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  applicable, vs. possibly scoped to specific environments.<BR>&nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; This is a "MUST implement" 
  requirement, not "MUST use".<BR>- Avoid the "SHOULD ... use ... IPsec" 
  phrasing, at least for now.<BR><BR>&gt; New proposed text:<BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;The following described Public Extension Key is sent 
  during<BR>&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. 
  &nbsp;It is important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this 
  key is to provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support 
  capabilities, and for better understanding<BR>&gt; &nbsp; &nbsp;of customer 
  environments. &nbsp;Functional behavior of the iSCSI<BR>&gt; &nbsp; &nbsp;node 
  MUST NOT depend on the presence, absence, or content of<BR>&gt; &nbsp; 
  &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes for 
  things<BR>&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion 
  or deception<BR>&gt; &nbsp; &nbsp;of other nodes, or other uses not defined 
  here. &nbsp;To enforce<BR>&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT 
  allow user modification of<BR>&gt; &nbsp; &nbsp;the key value(s), and SHOULD 
  set the value automatically based<BR>&gt; &nbsp; &nbsp;on standard internal 
  interfaces.<BR><BR>This one is close - 3 suggestions:<BR>- "proper" -&gt; 
  "intended"<BR>- remove "and for better understanding of customer environments" 
  or<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; replace it with 
  something more specific like "and to enable<BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; collection of iSCSI implementation usage 
  information"<BR>- The "such as ... or other uses not defined here" is not 
  sufficiently<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  precise.<BR>The last one is crucial - it needs to be easy for an implementer 
  to<BR>determine whether s/he's stepped over this line.<BR><BR>I'm comfortable 
  with not mentioning the JavaScript and browser versions<BR>mess, as I think we 
  all know that it's the motivating example for 
  this<BR>text.<BR><BR>Thanks,<BR>--David (as individual participant, *not* as 
  WG chair)<BR>----------------------------------------------------<BR>David L. 
  Black, Senior Technologist<BR>EMC Corporation, 176 South St., Hopkinton, MA 
  &nbsp;01748<BR>+1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  FAX: +1 (508) 293-7786<BR>black_david@emc.com &nbsp; &nbsp; &nbsp; 
  &nbsp;Mobile: +1 (978) 
  394-7754<BR>----------------------------------------------------<BR><BR>&gt; 
  -----Original Message-----<BR>&gt; From: Dave Wysochanski 
  [mailto:davidw@netapp.com] <BR>&gt; Sent: Friday, March 31, 2006 9:35 
  PM<BR>&gt; To: Black, David<BR>&gt; Cc: ips@ietf.org<BR>&gt; Subject: Re: 
  [Ips] X#NodeArchitecture draft - next steps<BR>&gt; <BR>&gt; 
  Black_David@emc.com wrote:<BR>&gt; <BR>&gt; &gt; This draft is better known 
  as: <BR>&gt; &gt; draft-wysochanski-xkey-iscsi-support-00.txt<BR>&gt; 
  &gt;<BR>&gt; &gt; This draft will be an official WG draft, but three 
  things<BR>&gt; &gt; need to happen first:<BR>&gt; &gt;<BR>&gt; &gt; (1) New 
  security text. &nbsp;The existing "SHOULD" in the security<BR>&gt; &gt; &nbsp; 
  &nbsp; &nbsp; &nbsp; considerations text needs to be a "MUST". &nbsp;In 
  addition,<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; there needs to be a 
  sentence pointing out that it may<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be 
  important to shield the contents of this key from<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; observers of network traffic, and that IPsec as 
  specified<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; for iSCSI in RFC 3720 and 
  3723 (cite both of them) is an<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  appropriate tool for this purpose.<BR>&gt; &gt;<BR>&gt; New proposed 
  text:<BR>&gt; <BR>&gt; 3. &nbsp;Security Considerations <BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;In certain environments where security is a primary 
  concern,<BR>&gt; &nbsp; &nbsp;the use of this extension key may not be 
  appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details about an iSCSI 
  node. &nbsp;For these<BR>&gt; &nbsp; &nbsp;environments, nodes implementing 
  this public extension key<BR>&gt; &nbsp; &nbsp;MUST provide a method to 
  disable sending the key. &nbsp;In<BR>&gt; &nbsp; &nbsp;addition to providing a 
  disable mechanism, security sensitive<BR>&gt; &nbsp; &nbsp;environments SHOULD 
  consider use of IPsec, as specified in <BR>&gt; &nbsp; &nbsp;RFC 3720 and 
  3723, as a means to shield the contents of this<BR>&gt; &nbsp; &nbsp;key from 
  observers of network traffic.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; Original 
  text: &nbsp; &nbsp; &nbsp;<BR>&gt; <BR>&gt; 3. &nbsp;Security Considerations 
  <BR>&gt; <BR>&gt; &nbsp; &nbsp;In certain environments where security is a 
  primary concern,<BR>&gt; &nbsp; &nbsp;the use of this extension key may not be 
  appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details about an iSCSI 
  node. For these<BR>&gt; &nbsp; &nbsp;environments, nodes implementing this 
  public extension key<BR>&gt; &nbsp; &nbsp;SHOULD provide a method to disable 
  sending the key.<BR>&gt; <BR>&gt; &nbsp; &nbsp; &nbsp; <BR>&gt; <BR>&gt; &gt; 
  (2) New "prevention of abuse" text. &nbsp;The current "The key MUST 
  NOT<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be used by iSCSI nodes for things 
  such as ..." is well-<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; intentioned but 
  does not get the job done. &nbsp;My recollection<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; of discussion in Dallas is that saying that "functional 
  behavior<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of the iSCSI node MUST NOT 
  depend on this key (presence/absence<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  or value)" &nbsp;may be closer to the mark. &nbsp;The only permitted<BR>&gt; 
  &gt; &nbsp; &nbsp; &nbsp; &nbsp; (and intended) use of this key is to report 
  it/log it in order<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; to avoid the 
  browser detection JavaScript disasters caused by<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; the corresponding HTTP header fields.<BR>&gt; &gt;<BR>&gt; 
  <BR>&gt; I wasn't sure about deleting the original "MUST NOT" sentence so I 
  left it<BR>in. &nbsp;Anyone<BR>&gt; have a preference? &nbsp;Also wasn't sure 
  whether it's worth putting in a<BR>sentence or two at<BR>&gt; least 
  acknowledging what has happened in the past with User-Agent --<BR>intent would 
  be<BR>&gt; the working group acknowledges this historical misuse and wishes to 
  avoid<BR>it.<BR>&gt; <BR>&gt; New proposed text:<BR>&gt; <BR>&gt; &nbsp; 
  &nbsp;The following described Public Extension Key is sent during<BR>&gt; 
  &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It is 
  important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this key is to 
  provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support capabilities, and 
  for better understanding<BR>&gt; &nbsp; &nbsp;of customer environments. 
  &nbsp;Functional behavior of the iSCSI<BR>&gt; &nbsp; &nbsp;node MUST NOT 
  depend on the presence, absence, or content of<BR>&gt; &nbsp; &nbsp;the key. 
  &nbsp;The key MUST NOT be used by iSCSI nodes for things<BR>&gt; &nbsp; 
  &nbsp;such as interoperability, performance, exclusion or deception<BR>&gt; 
  &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To 
  enforce<BR>&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user 
  modification of<BR>&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the 
  value automatically based<BR>&gt; &nbsp; &nbsp;on standard internal 
  interfaces.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; Original text:<BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;The following described Public Extension Key is sent 
  during<BR>&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. 
  &nbsp;It is important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this 
  key is to provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support 
  capabilities, and for better understanding<BR>&gt; &nbsp; &nbsp;of customer 
  environments. &nbsp;The key MUST NOT be used by iSCSI<BR>&gt; &nbsp; 
  &nbsp;nodes for things such as interoperability, performance,<BR>&gt; &nbsp; 
  &nbsp;exclusion or deception of other nodes, or other uses not<BR>&gt; &nbsp; 
  &nbsp;defined here. &nbsp;To enforce proper use, iSCSI nodes MUST NOT<BR>&gt; 
  &nbsp; &nbsp;allow user modification of the key value(s), and SHOULD 
  set<BR>&gt; &nbsp; &nbsp;the value automatically based on standard internal 
  interfaces.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; &gt; 
  (3) The draft needs a new title and file name ("supportability" just<BR>&gt; 
  &gt; &nbsp; &nbsp; &nbsp; &nbsp; reeks of marketing ;-) ). &nbsp;Let's 
  try:<BR>&gt; &gt;<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The 
  iSCSI X#NodeArchitecture Key<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  draft-ietf-ips-iscsi-nodearch-key-00.txt<BR>&gt; &gt;<BR>&gt; Sounds fine to 
  me.<BR>&gt; <BR>&gt; <BR>&gt; &gt; Text for (1) and (2), or at least initial 
  versions of it should be<BR>&gt; &gt; worked out on the list before the -00 
  version of the draft-ietf-ips-...<BR>&gt; &gt; draft is submitted. &nbsp;I've 
  just sent the request to the secretariat for<BR>&gt; &gt; an end-of-2006 
  completion milestone for this, but in practice, it<BR>&gt; &gt; could be done 
  shortly after Montreal, if not before.<BR>&gt; &gt;<BR>&gt; Great, 
  thanks.<BR>&gt; <BR>&gt; &gt; Thanks,<BR>&gt; &gt; --David<BR>&gt; &gt; 
  ----------------------------------------------------<BR>&gt; &gt; David L. 
  Black, Senior Technologist<BR>&gt; &gt; EMC Corporation, 176 South St., 
  Hopkinton, MA &nbsp;01748<BR>&gt; &gt; +1 (508) 293-7953 &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; FAX: +1 (508) 293-7786<BR>&gt; &gt; black_david@emc.com 
  &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978) 394-7754<BR>&gt; &gt; 
  ----------------------------------------------------<BR>&gt; &gt;<BR>&gt; &gt; 
  _______________________________________________<BR>&gt; &gt; Ips mailing 
  list<BR>&gt; &gt; Ips@ietf.org<BR>&gt; &gt; 
  https://www1.ietf.org/mailman/listinfo/ips<BR>&gt; &gt;<BR>&gt; 
  <BR><BR>_______________________________________________<BR>Ips mailing 
  list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips<BR></FONT></TT><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C65ABB.7C9D26A3--


--===============1617919707==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1617919707==--




From ips-bounces@ietf.org Sat Apr 08 07:43:18 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FSBqT-0003bN-H1; Sat, 08 Apr 2006 07:43:13 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FSBqQ-0003Vo-Nh
	for ips@ietf.org; Sat, 08 Apr 2006 07:43:10 -0400
Received: from mtagate2.de.ibm.com ([195.212.29.151])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FSBqP-0000oe-FM
	for ips@ietf.org; Sat, 08 Apr 2006 07:43:10 -0400
Received: from d12nrmr1607.megacenter.de.ibm.com
	(d12nrmr1607.megacenter.de.ibm.com [9.149.167.49])
	by mtagate2.de.ibm.com (8.13.6/8.13.6) with ESMTP id k38Bh8IL110000
	for <ips@ietf.org>; Sat, 8 Apr 2006 11:43:08 GMT
Received: from d12av02.megacenter.de.ibm.com (d12av02.megacenter.de.ibm.com
	[9.149.165.228])
	by d12nrmr1607.megacenter.de.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k38Bhxna133556 for <ips@ietf.org>; Sat, 8 Apr 2006 13:43:59 +0200
Received: from d12av02.megacenter.de.ibm.com (loopback [127.0.0.1])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.13.3) with ESMTP id
	k38Bh8NV004255 for <ips@ietf.org>; Sat, 8 Apr 2006 13:43:08 +0200
Received: from d12mc102.megacenter.de.ibm.com (d12mc102.megacenter.de.ibm.com
	[9.149.167.114])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.12.11) with ESMTP id
	k38Bh8th004252; Sat, 8 Apr 2006 13:43:08 +0200
In-Reply-To: <F222151D3323874393F83102D614E05502B66987@CORPUSMX20A.corp.emc.com>
To: Black_David@emc.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0 August 18, 2005
From: Julian Satran <Julian_Satran@il.ibm.com>
Message-ID: <OF4B0B6F87.3CA74C0A-ON8525714A.003FB4BB-8525714A.00405E70@il.ibm.com>
Date: Sat, 8 Apr 2006 07:43:56 -0400
X-MIMETrack: Serialize by Router on D12MC102/12/M/IBM(Release 7.0HF90 |
	November 16, 2005) at 08/04/2006 14:43:57,
	Serialize complete at 08/04/2006 14:43:57
X-Spam-Score: 0.1 (/)
X-Scan-Signature: e02509f7a15c0aaea12155beed3396f0
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1489213573=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============1489213573==
Content-Type: multipart/alternative;
	boundary="=_alternative 00405D888525714A_="

This is a multipart message in MIME format.
--=_alternative 00405D888525714A_=
Content-Type: text/plain; charset="US-ASCII"

David,

Sites might be small. If a given target code has a known weakness just not 
answering or even answering "not understood" invites an attack by a 
scanner.
IMHO the best solution would be for the draft to say nothing.

Julo



Black_David@emc.com 
07/04/06 23:24

To
Julian Satran/Haifa/IBM@IBMIL
cc
davidw@netapp.com, ips@ietf.org
Subject
RE: [Ips] X#NodeArchitecture draft - next steps






IMHO, a site-wide policy of not using the key is within reason.
Obfuscating the value defeats the primary purpose of the key -
the interest is in what is *actually* running, not the name
of some other implementation that this one ought to be
behaviorally indistinguishable from.  Not sending the key is
a better means of dealing with this concern.
 
Thanks,
--David

From: Julian Satran [mailto:Julian_Satran@il.ibm.com] 
Sent: Friday, April 07, 2006 8:40 AM
To: Black, David
Cc: Black, David; davidw@netapp.com; ips@ietf.org
Subject: RE: [Ips] X#NodeArchitecture draft - next steps


I am not sure that not sending the key is that good a measure (not sending 
it when it was previously seen is a way of leaking information). 
I guess what you want to mandate is that the value can be specifically 
faked (set) and/or responding "not understood". 

Julo 


Black_David@emc.com 
06/04/06 18:08 


To
davidw@netapp.com 
cc
ips@ietf.org, Black_David@emc.com 
Subject
RE: [Ips] X#NodeArchitecture draft - next steps








Dave,

> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.

Good start, needs editing to something like:

   This extension key transmits specific implementation details
   about the node that sends it; such details may be considered
   sensitive in some environments.  For example, if a certain
   software or firmware version is known to contain security
   weaknesses, announcing the presence of that version via this
   key may not be desirable.  The countermeasures for this
   security concern are:
                - not sending the extension key, or
                - using IPsec to provide confidentiality for the iSCSI
                                 connection on  which the key is sent (see 
RFC 3720
                                 and RFC 3723).
   To support the first countermeasure, all implementations of
   this extension key MUST provide an administrative mechanism
   to disable sending the key.

Reasons for the edits:
- Focus on specific threat, not general "where security is a primary
                concern".
- Make the "MUST" for disabling transmission of the key globally
                applicable, vs. possibly scoped to specific environments.
                This is a "MUST implement" requirement, not "MUST use".
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.

> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.

This one is close - 3 suggestions:
- "proper" -> "intended"
- remove "and for better understanding of customer environments" or
                replace it with something more specific like "and to 
enable
                collection of iSCSI implementation usage information"
- The "such as ... or other uses not defined here" is not sufficiently
                precise.
The last one is crucial - it needs to be easy for an implementer to
determine whether s/he's stepped over this line.

I'm comfortable with not mentioning the JavaScript and browser versions
mess, as I think we all know that it's the motivating example for this
text.

Thanks,
--David (as individual participant, *not* as WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

> -----Original Message-----
> From: Dave Wysochanski [mailto:davidw@netapp.com] 
> Sent: Friday, March 31, 2006 9:35 PM
> To: Black, David
> Cc: ips@ietf.org
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> 
> Black_David@emc.com wrote:
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt
> >
> > This draft will be an official WG draft, but three things
> > need to happen first:
> >
> > (1) New security text.  The existing "SHOULD" in the security
> >         considerations text needs to be a "MUST".  In addition,
> >         there needs to be a sentence pointing out that it may
> >         be important to shield the contents of this key from
> >         observers of network traffic, and that IPsec as specified
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> >         appropriate tool for this purpose.
> >
> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.
> 
> 
> 
> Original text: 
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node. For these
>    environments, nodes implementing this public extension key
>    SHOULD provide a method to disable sending the key.
> 
> 
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> >         be used by iSCSI nodes for things such as ..." is well-
> >         intentioned but does not get the job done.  My recollection
> >         of discussion in Dallas is that saying that "functional 
behavior
> >         of the iSCSI node MUST NOT depend on this key 
(presence/absence
> >         or value)"  may be closer to the mark.  The only permitted
> >         (and intended) use of this key is to report it/log it in order
> >         to avoid the browser detection JavaScript disasters caused by
> >         the corresponding HTTP header fields.
> >
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left 
it
in.  Anyone
> have a preference?  Also wasn't sure whether it's worth putting in a
sentence or two at
> least acknowledging what has happened in the past with User-Agent --
intent would be
> the working group acknowledges this historical misuse and wishes to 
avoid
it.
> 
> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.
> 
> 
> 
> Original text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  The key MUST NOT be used by iSCSI
>    nodes for things such as interoperability, performance,
>    exclusion or deception of other nodes, or other uses not
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT
>    allow user modification of the key value(s), and SHOULD set
>    the value automatically based on standard internal interfaces.
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just
> >         reeks of marketing ;-) ).  Let's try:
> >
> >            The iSCSI X#NodeArchitecture Key
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> >
> Sounds fine to me.
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be
> > worked out on the list before the -00 version of the 
draft-ietf-ips-...
> > draft is submitted.  I've just sent the request to the secretariat for
> > an end-of-2006 completion milestone for this, but in practice, it
> > could be done shortly after Montreal, if not before.
> >
> Great, thanks.
> 
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Senior Technologist
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > black_david@emc.com        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> > _______________________________________________
> > Ips mailing list
> > Ips@ietf.org
> > https://www1.ietf.org/mailman/listinfo/ips
> >
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips


--=_alternative 00405D888525714A_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">David,</font>
<br>
<br><font size=2 face="sans-serif">Sites might be small. If a given target
code has a known weakness just not answering or even answering &quot;not
understood&quot; invites an attack by a scanner.</font>
<br><font size=2 face="sans-serif">IMHO the best solution would be for
the draft to say nothing.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>Black_David@emc.com</b>
</font>
<p><font size=1 face="sans-serif">07/04/06 23:24</font>
<td width=59%>
<table width=100%>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td><font size=1 face="sans-serif">Julian Satran/Haifa/IBM@IBMIL</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td><font size=1 face="sans-serif">davidw@netapp.com, ips@ietf.org</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td><font size=1 face="sans-serif">RE: [Ips] X#NodeArchitecture draft -
next steps</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=2 face="Courier New">IMHO, a site-wide policy of not using
the key is within reason.</font>
<br><font size=2 face="Courier New">Obfuscating the value defeats the primary
purpose of the key -</font>
<br><font size=2 face="Courier New">the interest is in what is *actually*
running, not the name</font>
<br><font size=2 face="Courier New">of some other implementation that this
one ought to be</font>
<br><font size=2 face="Courier New">behaviorally indistinguishable from.
&nbsp;Not sending the key is</font>
<br><font size=2 face="Courier New">a better means of dealing with this
concern.</font>
<br><font size=3>&nbsp;</font>
<br><font size=2 face="Courier New">Thanks,</font>
<br><font size=2 face="Courier New">--David</font>
<br>
<br>
<hr><font size=2 face="Tahoma"><b>From:</b> Julian Satran [mailto:Julian_Satran@il.ibm.com]
<b><br>
Sent:</b> Friday, April 07, 2006 8:40 AM<b><br>
To:</b> Black, David<b><br>
Cc:</b> Black, David; davidw@netapp.com; ips@ietf.org<b><br>
Subject:</b> RE: [Ips] X#NodeArchitecture draft - next steps</font><font size=3><br>
</font>
<br><font size=2 face="sans-serif"><br>
I am not sure that not sending the key is that good a measure (not sending
it when it was previously seen is a way of leaking information).</font><font size=3>
</font><font size=2 face="sans-serif"><br>
I guess what you want to mandate is that the value can be specifically
faked (set) and/or responding &quot;not understood&quot;.</font><font size=3>
<br>
</font><font size=2 face="sans-serif"><br>
Julo</font><font size=3> <br>
<br>
</font>
<table width=100%>
<tr valign=top>
<td width=34%><font size=1 face="sans-serif"><b>Black_David@emc.com</b>
</font>
<p><font size=1 face="sans-serif">06/04/06 18:08</font><font size=3> </font>
<td width=65%>
<br>
<table width=100%>
<tr valign=top>
<td width=14%>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td width=85%><font size=1 face="sans-serif">davidw@netapp.com</font><font size=3>
</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td><font size=1 face="sans-serif">ips@ietf.org, Black_David@emc.com</font><font size=3>
</font>
<tr valign=top>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td><font size=1 face="sans-serif">RE: [Ips] X#NodeArchitecture draft -
next steps</font></table>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=50%>
<td width=50%></table>
<br></table>
<br><font size=3><br>
<br>
</font><tt><font size=2><br>
Dave,<br>
<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. &nbsp;For
these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;MUST provide a method to disable sending the key. &nbsp;In<br>
&gt; &nbsp; &nbsp;addition to providing a disable mechanism, security sensitive<br>
&gt; &nbsp; &nbsp;environments SHOULD consider use of IPsec, as specified
in <br>
&gt; &nbsp; &nbsp;RFC 3720 and 3723, as a means to shield the contents
of this<br>
&gt; &nbsp; &nbsp;key from observers of network traffic.<br>
<br>
Good start, needs editing to something like:<br>
<br>
 &nbsp; This extension key transmits specific implementation details<br>
 &nbsp; about the node that sends it; such details may be considered<br>
 &nbsp; sensitive in some environments. &nbsp;For example, if a certain<br>
 &nbsp; software or firmware version is known to contain security<br>
 &nbsp; weaknesses, announcing the presence of that version via this<br>
 &nbsp; key may not be desirable. &nbsp;The countermeasures for this<br>
 &nbsp; security concern are:<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;- not sending the
extension key, or<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;- using IPsec to
provide confidentiality for the iSCSI<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; connection on &nbsp;which the
key is sent (see RFC 3720<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; and RFC 3723).<br>
 &nbsp; To support the first countermeasure, all implementations of<br>
 &nbsp; this extension key MUST provide an administrative mechanism<br>
 &nbsp; to disable sending the key.<br>
<br>
Reasons for the edits:<br>
- Focus on specific threat, not general &quot;where security is a primary<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;concern&quot;.<br>
- Make the &quot;MUST&quot; for disabling transmission of the key globally<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;applicable, vs.
possibly scoped to specific environments.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;This is a &quot;MUST
implement&quot; requirement, not &quot;MUST use&quot;.<br>
- Avoid the &quot;SHOULD ... use ... IPsec&quot; phrasing, at least for
now.<br>
<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;Functional behavior of
the iSCSI<br>
&gt; &nbsp; &nbsp;node MUST NOT depend on the presence, absence, or content
of<br>
&gt; &nbsp; &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes
for things<br>
&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion or deception<br>
&gt; &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To
enforce<br>
&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user modification
of<br>
&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the value automatically
based<br>
&gt; &nbsp; &nbsp;on standard internal interfaces.<br>
<br>
This one is close - 3 suggestions:<br>
- &quot;proper&quot; -&gt; &quot;intended&quot;<br>
- remove &quot;and for better understanding of customer environments&quot;
or<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;replace it with
something more specific like &quot;and to enable<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;collection of iSCSI
implementation usage information&quot;<br>
- The &quot;such as ... or other uses not defined here&quot; is not sufficiently<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;precise.<br>
The last one is crucial - it needs to be easy for an implementer to<br>
determine whether s/he's stepped over this line.<br>
<br>
I'm comfortable with not mentioning the JavaScript and browser versions<br>
mess, as I think we all know that it's the motivating example for this<br>
text.<br>
<br>
Thanks,<br>
--David (as individual participant, *not* as WG chair)<br>
----------------------------------------------------<br>
David L. Black, Senior Technologist<br>
EMC Corporation, 176 South St., Hopkinton, MA &nbsp;01748<br>
+1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; FAX: +1 (508)
293-7786<br>
black_david@emc.com &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978) 394-7754<br>
----------------------------------------------------<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: Dave Wysochanski [mailto:davidw@netapp.com] <br>
&gt; Sent: Friday, March 31, 2006 9:35 PM<br>
&gt; To: Black, David<br>
&gt; Cc: ips@ietf.org<br>
&gt; Subject: Re: [Ips] X#NodeArchitecture draft - next steps<br>
&gt; <br>
&gt; Black_David@emc.com wrote:<br>
&gt; <br>
&gt; &gt; This draft is better known as: <br>
&gt; &gt; draft-wysochanski-xkey-iscsi-support-00.txt<br>
&gt; &gt;<br>
&gt; &gt; This draft will be an official WG draft, but three things<br>
&gt; &gt; need to happen first:<br>
&gt; &gt;<br>
&gt; &gt; (1) New security text. &nbsp;The existing &quot;SHOULD&quot;
in the security<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; considerations text needs to be a
&quot;MUST&quot;. &nbsp;In addition,<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; there needs to be a sentence pointing
out that it may<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be important to shield the contents
of this key from<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; observers of network traffic, and
that IPsec as specified<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; for iSCSI in RFC 3720 and 3723 (cite
both of them) is an<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; appropriate tool for this purpose.<br>
&gt; &gt;<br>
&gt; New proposed text:<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. &nbsp;For
these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;MUST provide a method to disable sending the key. &nbsp;In<br>
&gt; &nbsp; &nbsp;addition to providing a disable mechanism, security sensitive<br>
&gt; &nbsp; &nbsp;environments SHOULD consider use of IPsec, as specified
in <br>
&gt; &nbsp; &nbsp;RFC 3720 and 3723, as a means to shield the contents
of this<br>
&gt; &nbsp; &nbsp;key from observers of network traffic.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Original text: &nbsp; &nbsp; &nbsp;<br>
&gt; <br>
&gt; 3. &nbsp;Security Considerations <br>
&gt; <br>
&gt; &nbsp; &nbsp;In certain environments where security is a primary concern,<br>
&gt; &nbsp; &nbsp;the use of this extension key may not be appropriate
as it<br>
&gt; &nbsp; &nbsp;reveals specific details about an iSCSI node. For these<br>
&gt; &nbsp; &nbsp;environments, nodes implementing this public extension
key<br>
&gt; &nbsp; &nbsp;SHOULD provide a method to disable sending the key.<br>
&gt; <br>
&gt; &nbsp; &nbsp; &nbsp; <br>
&gt; <br>
&gt; &gt; (2) New &quot;prevention of abuse&quot; text. &nbsp;The current
&quot;The key MUST NOT<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be used by iSCSI nodes for things
such as ...&quot; is well-<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; intentioned but does not get the
job done. &nbsp;My recollection<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of discussion in Dallas is that saying
that &quot;functional behavior<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of the iSCSI node MUST NOT depend
on this key (presence/absence<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; or value)&quot; &nbsp;may be closer
to the mark. &nbsp;The only permitted<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; (and intended) use of this key is
to report it/log it in order<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; to avoid the browser detection JavaScript
disasters caused by<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; the corresponding HTTP header fields.<br>
&gt; &gt;<br>
&gt; <br>
&gt; I wasn't sure about deleting the original &quot;MUST NOT&quot; sentence
so I left it<br>
in. &nbsp;Anyone<br>
&gt; have a preference? &nbsp;Also wasn't sure whether it's worth putting
in a<br>
sentence or two at<br>
&gt; least acknowledging what has happened in the past with User-Agent
--<br>
intent would be<br>
&gt; the working group acknowledges this historical misuse and wishes to
avoid<br>
it.<br>
&gt; <br>
&gt; New proposed text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;Functional behavior of
the iSCSI<br>
&gt; &nbsp; &nbsp;node MUST NOT depend on the presence, absence, or content
of<br>
&gt; &nbsp; &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes
for things<br>
&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion or deception<br>
&gt; &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To
enforce<br>
&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user modification
of<br>
&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the value automatically
based<br>
&gt; &nbsp; &nbsp;on standard internal interfaces.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; Original text:<br>
&gt; <br>
&gt; &nbsp; &nbsp;The following described Public Extension Key is sent
during<br>
&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It
is important<br>
&gt; &nbsp; &nbsp;to note that the proper use of this key is to provide
enhanced<br>
&gt; &nbsp; &nbsp;logging and support capabilities, and for better understanding<br>
&gt; &nbsp; &nbsp;of customer environments. &nbsp;The key MUST NOT be used
by iSCSI<br>
&gt; &nbsp; &nbsp;nodes for things such as interoperability, performance,<br>
&gt; &nbsp; &nbsp;exclusion or deception of other nodes, or other uses
not<br>
&gt; &nbsp; &nbsp;defined here. &nbsp;To enforce proper use, iSCSI nodes
MUST NOT<br>
&gt; &nbsp; &nbsp;allow user modification of the key value(s), and SHOULD
set<br>
&gt; &nbsp; &nbsp;the value automatically based on standard internal interfaces.<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; &gt; (3) The draft needs a new title and file name (&quot;supportability&quot;
just<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; reeks of marketing ;-) ). &nbsp;Let's
try:<br>
&gt; &gt;<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The iSCSI X#NodeArchitecture
Key<br>
&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; draft-ietf-ips-iscsi-nodearch-key-00.txt<br>
&gt; &gt;<br>
&gt; Sounds fine to me.<br>
&gt; <br>
&gt; <br>
&gt; &gt; Text for (1) and (2), or at least initial versions of it should
be<br>
&gt; &gt; worked out on the list before the -00 version of the draft-ietf-ips-...<br>
&gt; &gt; draft is submitted. &nbsp;I've just sent the request to the secretariat
for<br>
&gt; &gt; an end-of-2006 completion milestone for this, but in practice,
it<br>
&gt; &gt; could be done shortly after Montreal, if not before.<br>
&gt; &gt;<br>
&gt; Great, thanks.<br>
&gt; <br>
&gt; &gt; Thanks,<br>
&gt; &gt; --David<br>
&gt; &gt; ----------------------------------------------------<br>
&gt; &gt; David L. Black, Senior Technologist<br>
&gt; &gt; EMC Corporation, 176 South St., Hopkinton, MA &nbsp;01748<br>
&gt; &gt; +1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; FAX:
+1 (508) 293-7786<br>
&gt; &gt; black_david@emc.com &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978)
394-7754<br>
&gt; &gt; ----------------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; Ips mailing list<br>
&gt; &gt; Ips@ietf.org<br>
&gt; &gt; https://www1.ietf.org/mailman/listinfo/ips<br>
&gt; &gt;<br>
&gt; <br>
<br>
_______________________________________________<br>
Ips mailing list<br>
Ips@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/ips</font></tt><font size=3><br>
</font>
<br>
--=_alternative 00405D888525714A_=--


--===============1489213573==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1489213573==--




From ips-bounces@ietf.org Mon Apr 10 08:15:55 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FSvJ4-0007qF-3F; Mon, 10 Apr 2006 08:15:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FSvJ2-0007pI-NL
	for ips@ietf.org; Mon, 10 Apr 2006 08:15:44 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FSv4G-00067R-BB
	for ips@ietf.org; Mon, 10 Apr 2006 08:00:29 -0400
Received: from mailhub.lss.emc.com (nirah.lss.emc.com [10.254.144.13])
	by mexforward.lss.emc.com (Switch-3.1.8/Switch-3.1.7) with ESMTP id
	k3AC0Rvt004776; Mon, 10 Apr 2006 08:00:27 -0400 (EDT)
Received: from MAHO3MSX2.corp.emc.com (maho3msx2.corp.emc.com [128.221.11.32])
	by mailhub.lss.emc.com (Switch-3.1.6/Switch-3.1.7) with ESMTP id
	k3AC0JY7010180; Mon, 10 Apr 2006 08:00:20 -0400 (EDT)
Received: by maho3msx2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D4XPXNBX>; Mon, 10 Apr 2006 08:00:18 -0400
Message-ID: <F222151D3323874393F83102D614E05502B6698F@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: Julian_Satran@il.ibm.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
Date: Mon, 10 Apr 2006 08:00:12 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.10.043222
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_MEDIA_2_BODY 0,
	__CP_NOT_1 0, __CT 0, __CTYPE_HAS_BOUNDARY 0,
	__CTYPE_MULTIPART 0, __CTYPE_MULTIPART_ALT 0, __HAS_MSGID 0,
	__HAS_X_MAILER 0, __IMS_MSGID 0, __IMS_MUA 0, __MIME_HTML 0,
	__MIME_VERSION 0, __SANE_MSGID 0, __STOCK_CRUFT 0,
	__TAG_EXISTS_HTML 0'
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 06321bb70e4329e24fb56a67c5eca3a0
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1153174691=="
Errors-To: ips-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1153174691==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C65C96.52C1D4CC"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C65C96.52C1D4CC
Content-Type: text/plain

But sites might not be small, plus some sites might have this
concern even when there is no known vulnerability to hide.  This
security concern is similar to one addressed in the standard SNMP
security "boilerplate" - the concern needs to be addressed in something
like this fashion, and disabling off sending the key "just in
case" is fine.  I also disagree with your "invites an attack
rationale" - not sending the key might be indicative of a more
thorough/aggressive site security policy/posture, in which case
an attacker might look elsewhere (e.g., for a site that may be
less diligent about keeping patch levels up to date).
 
Thanks,
--David
---------------------------------------------------- 
David L. Black, Senior Technologist 
EMC Corporation, 176 South St., Hopkinton, MA  01748 
+1 (508) 293-7953             FAX: +1 (508) 293-7786 
black_david@emc.com        Mobile: +1 (978) 394-7754 
---------------------------------------------------- 
 

  _____  

From: Julian Satran [mailto:Julian_Satran@il.ibm.com] 
Sent: Saturday, April 08, 2006 7:44 AM
To: Black, David
Cc: davidw@netapp.com; ips@ietf.org
Subject: RE: [Ips] X#NodeArchitecture draft - next steps



David, 

Sites might be small. If a given target code has a known weakness just not
answering or even answering "not understood" invites an attack by a scanner.

IMHO the best solution would be for the draft to say nothing. 

Julo 



Black_David@emc.com 


07/04/06 23:24 


To
Julian Satran/Haifa/IBM@IBMIL 

cc
davidw@netapp.com, ips@ietf.org 

Subject
RE: [Ips] X#NodeArchitecture draft - next steps

	




IMHO, a site-wide policy of not using the key is within reason. 
Obfuscating the value defeats the primary purpose of the key - 
the interest is in what is *actually* running, not the name 
of some other implementation that this one ought to be 
behaviorally indistinguishable from.  Not sending the key is 
a better means of dealing with this concern. 
  
Thanks, 
--David 


  _____  

From: Julian Satran [mailto:Julian_Satran@il.ibm.com] 
Sent: Friday, April 07, 2006 8:40 AM
To: Black, David
Cc: Black, David; davidw@netapp.com; ips@ietf.org
Subject: RE: [Ips] X#NodeArchitecture draft - next steps


I am not sure that not sending the key is that good a measure (not sending
it when it was previously seen is a way of leaking information). 
I guess what you want to mandate is that the value can be specifically faked
(set) and/or responding "not understood". 

Julo 


Black_David@emc.com 


06/04/06 18:08 




To
davidw@netapp.com 

cc
ips@ietf.org, Black_David@emc.com 

Subject
RE: [Ips] X#NodeArchitecture draft - next steps


	





Dave,

> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.

Good start, needs editing to something like:

  This extension key transmits specific implementation details
  about the node that sends it; such details may be considered
  sensitive in some environments.  For example, if a certain
  software or firmware version is known to contain security
  weaknesses, announcing the presence of that version via this
  key may not be desirable.  The countermeasures for this
  security concern are:
               - not sending the extension key, or
               - using IPsec to provide confidentiality for the iSCSI
                                connection on  which the key is sent (see
RFC 3720
                                and RFC 3723).
  To support the first countermeasure, all implementations of
  this extension key MUST provide an administrative mechanism
  to disable sending the key.

Reasons for the edits:
- Focus on specific threat, not general "where security is a primary
               concern".
- Make the "MUST" for disabling transmission of the key globally
               applicable, vs. possibly scoped to specific environments.
               This is a "MUST implement" requirement, not "MUST use".
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.

> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.

This one is close - 3 suggestions:
- "proper" -> "intended"
- remove "and for better understanding of customer environments" or
               replace it with something more specific like "and to enable
               collection of iSCSI implementation usage information"
- The "such as ... or other uses not defined here" is not sufficiently
               precise.
The last one is crucial - it needs to be easy for an implementer to
determine whether s/he's stepped over this line.

I'm comfortable with not mentioning the JavaScript and browser versions
mess, as I think we all know that it's the motivating example for this
text.

Thanks,
--David (as individual participant, *not* as WG chair)
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
black_david@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------

> -----Original Message-----
> From: Dave Wysochanski [mailto:davidw@netapp.com] 
> Sent: Friday, March 31, 2006 9:35 PM
> To: Black, David
> Cc: ips@ietf.org
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> 
> Black_David@emc.com wrote:
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt
> >
> > This draft will be an official WG draft, but three things
> > need to happen first:
> >
> > (1) New security text.  The existing "SHOULD" in the security
> >         considerations text needs to be a "MUST".  In addition,
> >         there needs to be a sentence pointing out that it may
> >         be important to shield the contents of this key from
> >         observers of network traffic, and that IPsec as specified
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> >         appropriate tool for this purpose.
> >
> New proposed text:
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node.  For these
>    environments, nodes implementing this public extension key
>    MUST provide a method to disable sending the key.  In
>    addition to providing a disable mechanism, security sensitive
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this
>    key from observers of network traffic.
> 
> 
> 
> Original text:      
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern,
>    the use of this extension key may not be appropriate as it
>    reveals specific details about an iSCSI node. For these
>    environments, nodes implementing this public extension key
>    SHOULD provide a method to disable sending the key.
> 
>       
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> >         be used by iSCSI nodes for things such as ..." is well-
> >         intentioned but does not get the job done.  My recollection
> >         of discussion in Dallas is that saying that "functional behavior
> >         of the iSCSI node MUST NOT depend on this key (presence/absence
> >         or value)"  may be closer to the mark.  The only permitted
> >         (and intended) use of this key is to report it/log it in order
> >         to avoid the browser detection JavaScript disasters caused by
> >         the corresponding HTTP header fields.
> >
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left it
in.  Anyone
> have a preference?  Also wasn't sure whether it's worth putting in a
sentence or two at
> least acknowledging what has happened in the past with User-Agent --
intent would be
> the working group acknowledges this historical misuse and wishes to avoid
it.
> 
> New proposed text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  Functional behavior of the iSCSI
>    node MUST NOT depend on the presence, absence, or content of
>    the key.  The key MUST NOT be used by iSCSI nodes for things
>    such as interoperability, performance, exclusion or deception
>    of other nodes, or other uses not defined here.  To enforce
>    proper use, iSCSI nodes MUST NOT allow user modification of
>    the key value(s), and SHOULD set the value automatically based
>    on standard internal interfaces.
> 
> 
> 
> Original text:
> 
>    The following described Public Extension Key is sent during
>    the login phase of an iSCSI normal session.  It is important
>    to note that the proper use of this key is to provide enhanced
>    logging and support capabilities, and for better understanding
>    of customer environments.  The key MUST NOT be used by iSCSI
>    nodes for things such as interoperability, performance,
>    exclusion or deception of other nodes, or other uses not
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT
>    allow user modification of the key value(s), and SHOULD set
>    the value automatically based on standard internal interfaces.
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just
> >         reeks of marketing ;-) ).  Let's try:
> >
> >            The iSCSI X#NodeArchitecture Key
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> >
> Sounds fine to me.
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be
> > worked out on the list before the -00 version of the draft-ietf-ips-...
> > draft is submitted.  I've just sent the request to the secretariat for
> > an end-of-2006 completion milestone for this, but in practice, it
> > could be done shortly after Montreal, if not before.
> >
> Great, thanks.
> 
> > Thanks,
> > --David
> > ----------------------------------------------------
> > David L. Black, Senior Technologist
> > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > black_david@emc.com        Mobile: +1 (978) 394-7754
> > ----------------------------------------------------
> >
> > _______________________________________________
> > Ips mailing list
> > Ips@ietf.org
> > https://www1.ietf.org/mailman/listinfo/ips
> >
> 

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips




------_=_NextPart_001_01C65C96.52C1D4CC
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">


<META content="MSHTML 6.00.2800.1528" name=GENERATOR></HEAD>
<BODY>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>But sites might not be small, plus some sites might have 
this</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>concern even when there is no known vulnerability to hide.&nbsp; 
This</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>security concern </FONT></SPAN><SPAN class=664565511-10042006><FONT 
face="Courier New" size=2>is similar to one addressed in the standard 
SNMP</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>security </FONT></SPAN><SPAN class=664565511-10042006><FONT 
face="Courier New" size=2>"boilerplate" </FONT></SPAN><SPAN 
class=664565511-10042006><FONT face="Courier New" size=2>- the concern needs to 
be addressed in something</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>like this fashion, and disabling off </FONT></SPAN><SPAN 
class=664565511-10042006><FONT face="Courier New" size=2>sending the key "just 
in</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>case" is fine.&nbsp; I also disagree with&nbsp;your "invites an 
attack</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>rationale" - not sending the key might be indicative of a 
more</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>thorough/aggressive site security policy/posture, in which 
case</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>an attacker might look elsewhere (e.g., for a site that may 
be</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>less diligent about keeping patch levels up to date).</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>Thanks,</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006><FONT face="Courier New" 
size=2>--David</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=664565511-10042006></SPAN><SPAN 
class=664565511-10042006><SPAN lang=en-us><FONT face="Courier New" 
size=2>----------------------------------------------------</FONT></SPAN> 
<BR><SPAN lang=en-us><FONT face="Courier New" size=2>David L. Black, Senior 
Technologist</FONT></SPAN> <BR><SPAN lang=en-us><FONT face="Courier New" 
size=2>EMC Corporation, 176 South St., Hopkinton, MA&nbsp; 01748</FONT></SPAN> 
<BR><SPAN lang=en-us><FONT face="Courier New" size=2>+1 (508) 
293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
FAX: +1 (508) 293-7786</FONT></SPAN> <BR><SPAN lang=en-us><FONT 
face="Courier New" 
size=2>black_david@emc.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile: +1 
(978) 394-7754</FONT></SPAN> <BR><SPAN lang=en-us><FONT face="Courier New" 
size=2>----------------------------------------------------</FONT></SPAN> 
</DIV></SPAN>
<DIV dir=ltr align=left><FONT face="Courier New" size=2></FONT>&nbsp;</DIV>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
  <HR tabIndex=-1>
  <FONT face=Tahoma size=2><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com] <BR><B>Sent:</B> Saturday, April 08, 2006 
  7:44 AM<BR><B>To:</B> Black, David<BR><B>Cc:</B> davidw@netapp.com; 
  ips@ietf.org<BR><B>Subject:</B> RE: [Ips] X#NodeArchitecture draft - next 
  steps<BR></FONT><BR></DIV>
  <DIV></DIV><BR><FONT face=sans-serif size=2>David,</FONT> <BR><BR><FONT 
  face=sans-serif size=2>Sites might be small. If a given target code has a 
  known weakness just not answering or even answering "not understood" invites 
  an attack by a scanner.</FONT> <BR><FONT face=sans-serif size=2>IMHO the best 
  solution would be for the draft to say nothing.</FONT> <BR><BR><FONT 
  face=sans-serif size=2>Julo</FONT> <BR><BR><BR>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD width="40%"><FONT face=sans-serif size=1><B>Black_David@emc.com</B> 
        </FONT>
        <P><FONT face=sans-serif size=1>07/04/06 23:24</FONT> </P>
      <TD width="59%">
        <TABLE width="100%">
          <TBODY>
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>To</FONT></DIV>
            <TD><FONT face=sans-serif size=1>Julian 
              Satran/Haifa/IBM@IBMIL</FONT> 
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>cc</FONT></DIV>
            <TD><FONT face=sans-serif size=1>davidw@netapp.com, 
              ips@ietf.org</FONT> 
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>Subject</FONT></DIV>
            <TD><FONT face=sans-serif size=1>RE: [Ips] X#NodeArchitecture 
              draft - next steps</FONT></TR></TBODY></TABLE><BR>
        <TABLE>
          <TBODY>
          <TR vAlign=top>
            <TD>
            <TD></TR></TBODY></TABLE><BR></TR></TBODY></TABLE><BR><BR><BR><FONT 
  face="Courier New" size=2>IMHO, a site-wide policy of not using the key is 
  within reason.</FONT> <BR><FONT face="Courier New" size=2>Obfuscating the 
  value defeats the primary purpose of the key -</FONT> <BR><FONT 
  face="Courier New" size=2>the interest is in what is *actually* running, not 
  the name</FONT> <BR><FONT face="Courier New" size=2>of some other 
  implementation that this one ought to be</FONT> <BR><FONT face="Courier New" 
  size=2>behaviorally indistinguishable from. &nbsp;Not sending the key 
  is</FONT> <BR><FONT face="Courier New" size=2>a better means of dealing with 
  this concern.</FONT> <BR><FONT size=3>&nbsp;</FONT> <BR><FONT 
  face="Courier New" size=2>Thanks,</FONT> <BR><FONT face="Courier New" 
  size=2>--David</FONT> <BR><BR>
  <HR>
  <FONT face=Tahoma size=2><B>From:</B> Julian Satran 
  [mailto:Julian_Satran@il.ibm.com] <B><BR>Sent:</B> Friday, April 07, 2006 8:40 
  AM<B><BR>To:</B> Black, David<B><BR>Cc:</B> Black, David; davidw@netapp.com; 
  ips@ietf.org<B><BR>Subject:</B> RE: [Ips] X#NodeArchitecture draft - next 
  steps</FONT><FONT size=3><BR></FONT><BR><FONT face=sans-serif size=2><BR>I am 
  not sure that not sending the key is that good a measure (not sending it when 
  it was previously seen is a way of leaking information).</FONT><FONT size=3> 
  </FONT><FONT face=sans-serif size=2><BR>I guess what you want to mandate is 
  that the value can be specifically faked (set) and/or responding "not 
  understood".</FONT><FONT size=3> <BR></FONT><FONT face=sans-serif 
  size=2><BR>Julo</FONT><FONT size=3> <BR><BR></FONT>
  <TABLE width="100%">
    <TBODY>
    <TR vAlign=top>
      <TD width="34%"><FONT face=sans-serif size=1><B>Black_David@emc.com</B> 
        </FONT>
        <P><FONT face=sans-serif size=1>06/04/06 18:08</FONT><FONT size=3> 
        </FONT></P>
      <TD width="65%"><BR>
        <TABLE width="100%">
          <TBODY>
          <TR vAlign=top>
            <TD width="14%">
              <DIV align=right><FONT face=sans-serif size=1>To</FONT></DIV>
            <TD width="85%"><FONT face=sans-serif 
              size=1>davidw@netapp.com</FONT><FONT size=3> </FONT>
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>cc</FONT></DIV>
            <TD><FONT face=sans-serif size=1>ips@ietf.org, 
              Black_David@emc.com</FONT><FONT size=3> </FONT>
          <TR vAlign=top>
            <TD>
              <DIV align=right><FONT face=sans-serif size=1>Subject</FONT></DIV>
            <TD><FONT face=sans-serif size=1>RE: [Ips] X#NodeArchitecture 
              draft - next steps</FONT></TR></TBODY></TABLE><BR><BR>
        <TABLE width="100%">
          <TBODY>
          <TR vAlign=top>
            <TD width="50%">
            <TD width="50%"></TR></TBODY></TABLE><BR></TR></TBODY></TABLE><BR><FONT 
  size=3><BR><BR></FONT><TT><FONT size=2><BR>Dave,<BR><BR>&gt; New proposed 
  text:<BR>&gt; <BR>&gt; 3. &nbsp;Security Considerations <BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;In certain environments where security is a primary 
  concern,<BR>&gt; &nbsp; &nbsp;the use of this extension key may not be 
  appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details about an iSCSI 
  node. &nbsp;For these<BR>&gt; &nbsp; &nbsp;environments, nodes implementing 
  this public extension key<BR>&gt; &nbsp; &nbsp;MUST provide a method to 
  disable sending the key. &nbsp;In<BR>&gt; &nbsp; &nbsp;addition to providing a 
  disable mechanism, security sensitive<BR>&gt; &nbsp; &nbsp;environments SHOULD 
  consider use of IPsec, as specified in <BR>&gt; &nbsp; &nbsp;RFC 3720 and 
  3723, as a means to shield the contents of this<BR>&gt; &nbsp; &nbsp;key from 
  observers of network traffic.<BR><BR>Good start, needs editing to something 
  like:<BR><BR>&nbsp; This extension key transmits specific implementation 
  details<BR>&nbsp; about the node that sends it; such details may be 
  considered<BR>&nbsp; sensitive in some environments. &nbsp;For example, if a 
  certain<BR>&nbsp; software or firmware version is known to contain 
  security<BR>&nbsp; weaknesses, announcing the presence of that version via 
  this<BR>&nbsp; key may not be desirable. &nbsp;The countermeasures for 
  this<BR>&nbsp; security concern are:<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp;- not sending the extension key, or<BR>&nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;- using IPsec to provide 
  confidentiality for the iSCSI<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  connection on &nbsp;which the key is sent (see RFC 3720<BR>&nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; and RFC 3723).<BR>&nbsp; To support the first 
  countermeasure, all implementations of<BR>&nbsp; this extension key MUST 
  provide an administrative mechanism<BR>&nbsp; to disable sending the 
  key.<BR><BR>Reasons for the edits:<BR>- Focus on specific threat, not general 
  "where security is a primary<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp;concern".<BR>- Make the "MUST" for disabling transmission of the 
  key globally<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;applicable, vs. possibly scoped to specific environments.<BR>&nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;This is a "MUST implement" 
  requirement, not "MUST use".<BR>- Avoid the "SHOULD ... use ... IPsec" 
  phrasing, at least for now.<BR><BR>&gt; New proposed text:<BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;The following described Public Extension Key is sent 
  during<BR>&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. 
  &nbsp;It is important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this 
  key is to provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support 
  capabilities, and for better understanding<BR>&gt; &nbsp; &nbsp;of customer 
  environments. &nbsp;Functional behavior of the iSCSI<BR>&gt; &nbsp; &nbsp;node 
  MUST NOT depend on the presence, absence, or content of<BR>&gt; &nbsp; 
  &nbsp;the key. &nbsp;The key MUST NOT be used by iSCSI nodes for 
  things<BR>&gt; &nbsp; &nbsp;such as interoperability, performance, exclusion 
  or deception<BR>&gt; &nbsp; &nbsp;of other nodes, or other uses not defined 
  here. &nbsp;To enforce<BR>&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT 
  allow user modification of<BR>&gt; &nbsp; &nbsp;the key value(s), and SHOULD 
  set the value automatically based<BR>&gt; &nbsp; &nbsp;on standard internal 
  interfaces.<BR><BR>This one is close - 3 suggestions:<BR>- "proper" -&gt; 
  "intended"<BR>- remove "and for better understanding of customer environments" 
  or<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;replace it with 
  something more specific like "and to enable<BR>&nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; &nbsp;collection of iSCSI implementation usage 
  information"<BR>- The "such as ... or other uses not defined here" is not 
  sufficiently<BR>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  &nbsp;precise.<BR>The last one is crucial - it needs to be easy for an 
  implementer to<BR>determine whether s/he's stepped over this line.<BR><BR>I'm 
  comfortable with not mentioning the JavaScript and browser versions<BR>mess, 
  as I think we all know that it's the motivating example for 
  this<BR>text.<BR><BR>Thanks,<BR>--David (as individual participant, *not* as 
  WG chair)<BR>----------------------------------------------------<BR>David L. 
  Black, Senior Technologist<BR>EMC Corporation, 176 South St., Hopkinton, MA 
  &nbsp;01748<BR>+1 (508) 293-7953 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 
  FAX: +1 (508) 293-7786<BR>black_david@emc.com &nbsp; &nbsp; &nbsp; 
  &nbsp;Mobile: +1 (978) 
  394-7754<BR>----------------------------------------------------<BR><BR>&gt; 
  -----Original Message-----<BR>&gt; From: Dave Wysochanski 
  [mailto:davidw@netapp.com] <BR>&gt; Sent: Friday, March 31, 2006 9:35 
  PM<BR>&gt; To: Black, David<BR>&gt; Cc: ips@ietf.org<BR>&gt; Subject: Re: 
  [Ips] X#NodeArchitecture draft - next steps<BR>&gt; <BR>&gt; 
  Black_David@emc.com wrote:<BR>&gt; <BR>&gt; &gt; This draft is better known 
  as: <BR>&gt; &gt; draft-wysochanski-xkey-iscsi-support-00.txt<BR>&gt; 
  &gt;<BR>&gt; &gt; This draft will be an official WG draft, but three 
  things<BR>&gt; &gt; need to happen first:<BR>&gt; &gt;<BR>&gt; &gt; (1) New 
  security text. &nbsp;The existing "SHOULD" in the security<BR>&gt; &gt; &nbsp; 
  &nbsp; &nbsp; &nbsp; considerations text needs to be a "MUST". &nbsp;In 
  addition,<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; there needs to be a 
  sentence pointing out that it may<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be 
  important to shield the contents of this key from<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; observers of network traffic, and that IPsec as 
  specified<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; for iSCSI in RFC 3720 and 
  3723 (cite both of them) is an<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  appropriate tool for this purpose.<BR>&gt; &gt;<BR>&gt; New proposed 
  text:<BR>&gt; <BR>&gt; 3. &nbsp;Security Considerations <BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;In certain environments where security is a primary 
  concern,<BR>&gt; &nbsp; &nbsp;the use of this extension key may not be 
  appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details about an iSCSI 
  node. &nbsp;For these<BR>&gt; &nbsp; &nbsp;environments, nodes implementing 
  this public extension key<BR>&gt; &nbsp; &nbsp;MUST provide a method to 
  disable sending the key. &nbsp;In<BR>&gt; &nbsp; &nbsp;addition to providing a 
  disable mechanism, security sensitive<BR>&gt; &nbsp; &nbsp;environments SHOULD 
  consider use of IPsec, as specified in <BR>&gt; &nbsp; &nbsp;RFC 3720 and 
  3723, as a means to shield the contents of this<BR>&gt; &nbsp; &nbsp;key from 
  observers of network traffic.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; Original 
  text: &nbsp; &nbsp; &nbsp;<BR>&gt; <BR>&gt; 3. &nbsp;Security Considerations 
  <BR>&gt; <BR>&gt; &nbsp; &nbsp;In certain environments where security is a 
  primary concern,<BR>&gt; &nbsp; &nbsp;the use of this extension key may not be 
  appropriate as it<BR>&gt; &nbsp; &nbsp;reveals specific details about an iSCSI 
  node. For these<BR>&gt; &nbsp; &nbsp;environments, nodes implementing this 
  public extension key<BR>&gt; &nbsp; &nbsp;SHOULD provide a method to disable 
  sending the key.<BR>&gt; <BR>&gt; &nbsp; &nbsp; &nbsp; <BR>&gt; <BR>&gt; &gt; 
  (2) New "prevention of abuse" text. &nbsp;The current "The key MUST 
  NOT<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; be used by iSCSI nodes for things 
  such as ..." is well-<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; intentioned but 
  does not get the job done. &nbsp;My recollection<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; of discussion in Dallas is that saying that "functional 
  behavior<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; of the iSCSI node MUST NOT 
  depend on this key (presence/absence<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  or value)" &nbsp;may be closer to the mark. &nbsp;The only permitted<BR>&gt; 
  &gt; &nbsp; &nbsp; &nbsp; &nbsp; (and intended) use of this key is to report 
  it/log it in order<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; to avoid the 
  browser detection JavaScript disasters caused by<BR>&gt; &gt; &nbsp; &nbsp; 
  &nbsp; &nbsp; the corresponding HTTP header fields.<BR>&gt; &gt;<BR>&gt; 
  <BR>&gt; I wasn't sure about deleting the original "MUST NOT" sentence so I 
  left it<BR>in. &nbsp;Anyone<BR>&gt; have a preference? &nbsp;Also wasn't sure 
  whether it's worth putting in a<BR>sentence or two at<BR>&gt; least 
  acknowledging what has happened in the past with User-Agent --<BR>intent would 
  be<BR>&gt; the working group acknowledges this historical misuse and wishes to 
  avoid<BR>it.<BR>&gt; <BR>&gt; New proposed text:<BR>&gt; <BR>&gt; &nbsp; 
  &nbsp;The following described Public Extension Key is sent during<BR>&gt; 
  &nbsp; &nbsp;the login phase of an iSCSI normal session. &nbsp;It is 
  important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this key is to 
  provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support capabilities, and 
  for better understanding<BR>&gt; &nbsp; &nbsp;of customer environments. 
  &nbsp;Functional behavior of the iSCSI<BR>&gt; &nbsp; &nbsp;node MUST NOT 
  depend on the presence, absence, or content of<BR>&gt; &nbsp; &nbsp;the key. 
  &nbsp;The key MUST NOT be used by iSCSI nodes for things<BR>&gt; &nbsp; 
  &nbsp;such as interoperability, performance, exclusion or deception<BR>&gt; 
  &nbsp; &nbsp;of other nodes, or other uses not defined here. &nbsp;To 
  enforce<BR>&gt; &nbsp; &nbsp;proper use, iSCSI nodes MUST NOT allow user 
  modification of<BR>&gt; &nbsp; &nbsp;the key value(s), and SHOULD set the 
  value automatically based<BR>&gt; &nbsp; &nbsp;on standard internal 
  interfaces.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; Original text:<BR>&gt; <BR>&gt; 
  &nbsp; &nbsp;The following described Public Extension Key is sent 
  during<BR>&gt; &nbsp; &nbsp;the login phase of an iSCSI normal session. 
  &nbsp;It is important<BR>&gt; &nbsp; &nbsp;to note that the proper use of this 
  key is to provide enhanced<BR>&gt; &nbsp; &nbsp;logging and support 
  capabilities, and for better understanding<BR>&gt; &nbsp; &nbsp;of customer 
  environments. &nbsp;The key MUST NOT be used by iSCSI<BR>&gt; &nbsp; 
  &nbsp;nodes for things such as interoperability, performance,<BR>&gt; &nbsp; 
  &nbsp;exclusion or deception of other nodes, or other uses not<BR>&gt; &nbsp; 
  &nbsp;defined here. &nbsp;To enforce proper use, iSCSI nodes MUST NOT<BR>&gt; 
  &nbsp; &nbsp;allow user modification of the key value(s), and SHOULD 
  set<BR>&gt; &nbsp; &nbsp;the value automatically based on standard internal 
  interfaces.<BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; <BR>&gt; &gt; 
  (3) The draft needs a new title and file name ("supportability" just<BR>&gt; 
  &gt; &nbsp; &nbsp; &nbsp; &nbsp; reeks of marketing ;-) ). &nbsp;Let's 
  try:<BR>&gt; &gt;<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The 
  iSCSI X#NodeArchitecture Key<BR>&gt; &gt; &nbsp; &nbsp; &nbsp; &nbsp; 
  draft-ietf-ips-iscsi-nodearch-key-00.txt<BR>&gt; &gt;<BR>&gt; Sounds fine to 
  me.<BR>&gt; <BR>&gt; <BR>&gt; &gt; Text for (1) and (2), or at least initial 
  versions of it should be<BR>&gt; &gt; worked out on the list before the -00 
  version of the draft-ietf-ips-...<BR>&gt; &gt; draft is submitted. &nbsp;I've 
  just sent the request to the secretariat for<BR>&gt; &gt; an end-of-2006 
  completion milestone for this, but in practice, it<BR>&gt; &gt; could be done 
  shortly after Montreal, if not before.<BR>&gt; &gt;<BR>&gt; Great, 
  thanks.<BR>&gt; <BR>&gt; &gt; Thanks,<BR>&gt; &gt; --David<BR>&gt; &gt; 
  ----------------------------------------------------<BR>&gt; &gt; David L. 
  Black, Senior Technologist<BR>&gt; &gt; EMC Corporation, 176 South St., 
  Hopkinton, MA &nbsp;01748<BR>&gt; &gt; +1 (508) 293-7953 &nbsp; &nbsp; &nbsp; 
  &nbsp; &nbsp; &nbsp; FAX: +1 (508) 293-7786<BR>&gt; &gt; black_david@emc.com 
  &nbsp; &nbsp; &nbsp; &nbsp;Mobile: +1 (978) 394-7754<BR>&gt; &gt; 
  ----------------------------------------------------<BR>&gt; &gt;<BR>&gt; &gt; 
  _______________________________________________<BR>&gt; &gt; Ips mailing 
  list<BR>&gt; &gt; Ips@ietf.org<BR>&gt; &gt; 
  https://www1.ietf.org/mailman/listinfo/ips<BR>&gt; &gt;<BR>&gt; 
  <BR><BR>_______________________________________________<BR>Ips mailing 
  list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips</FONT></TT><FONT 
  size=3><BR></FONT><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C65C96.52C1D4CC--


--===============1153174691==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1153174691==--




From ips-bounces@ietf.org Tue Apr 11 19:29:43 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTSIo-0002cq-Dz; Tue, 11 Apr 2006 19:29:42 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTSIl-0002Zt-6J; Tue, 11 Apr 2006 19:29:39 -0400
Received: from nit.isi.edu ([128.9.160.116])
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1FTSIk-0001zm-RL; Tue, 11 Apr 2006 19:29:39 -0400
Received: from nit.isi.edu (loopback [127.0.0.1])
	by nit.isi.edu (8.12.11.20060308/8.12.11) with ESMTP id k3BNTcY7023623; 
	Tue, 11 Apr 2006 16:29:38 -0700
Received: (from apache@localhost)
	by nit.isi.edu (8.12.11.20060308/8.12.11/Submit) id k3BNTbnA023622;
	Tue, 11 Apr 2006 16:29:37 -0700
Date: Tue, 11 Apr 2006 16:29:37 -0700
Message-Id: <200604112329.k3BNTbnA023622@nit.isi.edu>
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
From: rfc-editor@rfc-editor.org
X-Spam-Score: -14.8 (--------------)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d
Cc: ips@ietf.org, rfc-editor@rfc-editor.org
Subject: [Ips] RFC 4455 on Definition of Managed Objects for Small Computer
	System Interface (SCSI) Entities
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org


A new Request for Comments is now available in online RFC libraries.

        
        RFC 4455

        Title:      Definition of Managed Objects for 
                    Small Computer System Interface (SCSI) Entities 
        Author:     M. Hallak-Stamler, M. Bakke,
                    Y. Lederman, M. Krueger,
                    K. McCloghrie
        Status:     Standards Track
        Date:       April 2006
        Mailbox:    michele@sanrad.com, 
                    mbakke@cisco.com, 
                    yaronled@bezeqint.net, marjorie_krueger@hp.com, 
                    kzm@cisco.com
        Pages:      88
        Characters: 178947
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-ips-scsi-mib-09.txt

        URL:        http://www.rfc-editor.org/rfc/rfc4455.txt

This memo defines a portion of the Management Information Base (MIB),
for use with network management protocols in the Internet community.
In particular, it describes managed objects for Small Computer System
Interface (SCSI) entities, independently of the interconnect
subsystem layer.  [STANDARDS TRACK]

This document is a product of the IP Storage
Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and 
suggestions for improvements.Please refer to the current edition of the 
Internet Official Protocol Standards (STD 1) for the standardization 
state and status of this protocol.  Distribution of this memo is 
unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to IETF-REQUEST@IETF.ORG.  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to RFC-DIST-REQUEST@RFC-EDITOR.ORG.

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to rfc-info@RFC-EDITOR.ORG with the message body 

help: ways_to_get_rfcs. For example:

        To: rfc-info@RFC-EDITOR.ORG
        Subject: getting rfcs

        help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to RFC-Manager@RFC-EDITOR.ORG.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
RFC-EDITOR@RFC-EDITOR.ORG.  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...



_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Fri Apr 14 07:57:27 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FUMvH-0002z3-MW; Fri, 14 Apr 2006 07:57:11 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FUMvG-0002u3-80
	for ips@ietf.org; Fri, 14 Apr 2006 07:57:10 -0400
Received: from mx2.netapp.com ([216.240.18.37])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FUMvE-00074T-1g
	for ips@ietf.org; Fri, 14 Apr 2006 07:57:10 -0400
Received: from smtp2.corp.netapp.com ([10.57.159.114])
	by mx2.netapp.com with ESMTP; 14 Apr 2006 04:57:08 -0700
X-IronPort-AV: i="4.04,120,1144047600"; 
	d="scan'208,217"; a="374483002:sNHT37221636"
Received: from [10.30.24.89] ([10.30.24.89])
	by smtp2.corp.netapp.com (8.13.1/8.13.1/NTAP-1.6) with ESMTP id
	k3EBv58B021076; Fri, 14 Apr 2006 04:57:05 -0700 (PDT)
Message-ID: <443F8E11.2090502@netapp.com>
Date: Fri, 14 Apr 2006 07:57:05 -0400
From: Dave Wysochanski <davidw@netapp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
	rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Black_David@emc.com
Subject: Re: [Ips] X#NodeArchitecture draft - next steps
References: <F222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com>
In-Reply-To: <F222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com>
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 826b8da4948b827b02e4b599895c9e48
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0338111322=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.
--===============0338111322==
Content-Type: multipart/alternative;
	boundary="------------020200090200020201050605"

This is a multi-part message in MIME format.
--------------020200090200020201050605
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Black_David@emc.com wrote:

> Dave,
>
> > New proposed text:
> >
> > 3.  Security Considerations
> >
> >    In certain environments where security is a primary concern,
> >    the use of this extension key may not be appropriate as it
> >    reveals specific details about an iSCSI node.  For these
> >    environments, nodes implementing this public extension key
> >    MUST provide a method to disable sending the key.  In
> >    addition to providing a disable mechanism, security sensitive
> >    environments SHOULD consider use of IPsec, as specified in
> >    RFC 3720 and 3723, as a means to shield the contents of this
> >    key from observers of network traffic.
>
> Good start, needs editing to something like:
>
>     This extension key transmits specific implementation details
>     about the node that sends it; such details may be considered
>     sensitive in some environments.  For example, if a certain
>     software or firmware version is known to contain security
>     weaknesses, announcing the presence of that version via this
>     key may not be desirable.  The countermeasures for this
>     security concern are:
>
How about another option:
             - sending less detailed information in the key values

Security concerns could also be lessened by sending less
detailed information, such as omitting the version numbers of
things (for example, send "Microsoft Windows, software initiator"
instead of  "Microsoft Windows 2003, software initiator version 1.2.3.4").
I will have to rework the format of the key a bit but this seems
worth doing.  Hopefully there is a reasonable level of information
that most people will find acceptable transmitting by default while
not greatly compromising security.


>         - not sending the extension key, or
>




>         - using IPsec to provide confidentiality for the iSCSI
>                 connection on  which the key is sent (see RFC 3720
>                 and RFC 3723).
>     To support the first countermeasure, all implementations of
>     this extension key MUST provide an administrative mechanism
>     to disable sending the key.
>
This sentence then becomes something like.

To support the first and second countermeasures, all implementations
of this extension key SHOULD provide a way to configure different
levels of detail in the extension key values and MUST provide an
administrative mechanism to disable sending the key.

> Reasons for the edits:
> - Focus on specific threat, not general "where security is a primary
>         concern".
> - Make the "MUST" for disabling transmission of the key globally
>         applicable, vs. possibly scoped to specific environments.
>         This is a "MUST implement" requirement, not "MUST use".
> - Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now.
>
> > New proposed text:
> >
> >    The following described Public Extension Key is sent during
> >    the login phase of an iSCSI normal session.  It is important
> >    to note that the proper use of this key is to provide enhanced
> >    logging and support capabilities, and for better understanding
> >    of customer environments.  Functional behavior of the iSCSI
> >    node MUST NOT depend on the presence, absence, or content of
> >    the key.  The key MUST NOT be used by iSCSI nodes for things
> >    such as interoperability, performance, exclusion or deception
> >    of other nodes, or other uses not defined here.  To enforce
> >    proper use, iSCSI nodes MUST NOT allow user modification of
> >    the key value(s), and SHOULD set the value automatically based
> >    on standard internal interfaces.
>
> This one is close - 3 suggestions:
> - "proper" -> "intended"
> - remove "and for better understanding of customer environments" or
>         replace it with something more specific like "and to enable
>         collection of iSCSI implementation usage information"
> - The "such as ... or other uses not defined here" is not sufficiently
>         precise.
> The last one is crucial - it needs to be easy for an implementer to
> determine whether s/he's stepped over this line.
>
> I'm comfortable with not mentioning the JavaScript and browser versions
> mess, as I think we all know that it's the motivating example for this
> text.
>
> Thanks,
> --David (as individual participant, *not* as WG chair)
> ----------------------------------------------------
> David L. Black, Senior Technologist
> EMC Corporation, 176 South St., Hopkinton, MA  01748
> +1 (508) 293-7953             FAX: +1 (508) 293-7786
> black_david@emc.com        Mobile: +1 (978) 394-7754
> ----------------------------------------------------
>
> > -----Original Message-----
> > From: Dave Wysochanski [mailto:davidw@netapp.com]
> > Sent: Friday, March 31, 2006 9:35 PM
> > To: Black, David
> > Cc: ips@ietf.org
> > Subject: Re: [Ips] X#NodeArchitecture draft - next steps
> >
> > Black_David@emc.com wrote:
> >
> > > This draft is better known as:
> > > draft-wysochanski-xkey-iscsi-support-00.txt
> > >
> > > This draft will be an official WG draft, but three things
> > > need to happen first:
> > >
> > > (1) New security text.  The existing "SHOULD" in the security
> > >         considerations text needs to be a "MUST".  In addition,
> > >         there needs to be a sentence pointing out that it may
> > >         be important to shield the contents of this key from
> > >         observers of network traffic, and that IPsec as specified
> > >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an
> > >         appropriate tool for this purpose.
> > >
> > New proposed text:
> >
> > 3.  Security Considerations
> >
> >    In certain environments where security is a primary concern,
> >    the use of this extension key may not be appropriate as it
> >    reveals specific details about an iSCSI node.  For these
> >    environments, nodes implementing this public extension key
> >    MUST provide a method to disable sending the key.  In
> >    addition to providing a disable mechanism, security sensitive
> >    environments SHOULD consider use of IPsec, as specified in
> >    RFC 3720 and 3723, as a means to shield the contents of this
> >    key from observers of network traffic.
> >
> >
> >
> > Original text:     
> >
> > 3.  Security Considerations
> >
> >    In certain environments where security is a primary concern,
> >    the use of this extension key may not be appropriate as it
> >    reveals specific details about an iSCSI node. For these
> >    environments, nodes implementing this public extension key
> >    SHOULD provide a method to disable sending the key.
> >
> >      
> >
> > > (2) New "prevention of abuse" text.  The current "The key MUST NOT
> > >         be used by iSCSI nodes for things such as ..." is well-
> > >         intentioned but does not get the job done.  My recollection
> > >         of discussion in Dallas is that saying that "functional 
> behavior
> > >         of the iSCSI node MUST NOT depend on this key 
> (presence/absence
> > >         or value)"  may be closer to the mark.  The only permitted
> > >         (and intended) use of this key is to report it/log it in 
> order
> > >         to avoid the browser detection JavaScript disasters caused by
> > >         the corresponding HTTP header fields.
> > >
> >
> > I wasn't sure about deleting the original "MUST NOT" sentence so I 
> left it
> in.  Anyone
> > have a preference?  Also wasn't sure whether it's worth putting in a
> sentence or two at
> > least acknowledging what has happened in the past with User-Agent --
> intent would be
> > the working group acknowledges this historical misuse and wishes to 
> avoid
> it.
> >
> > New proposed text:
> >
> >    The following described Public Extension Key is sent during
> >    the login phase of an iSCSI normal session.  It is important
> >    to note that the proper use of this key is to provide enhanced
> >    logging and support capabilities, and for better understanding
> >    of customer environments.  Functional behavior of the iSCSI
> >    node MUST NOT depend on the presence, absence, or content of
> >    the key.  The key MUST NOT be used by iSCSI nodes for things
> >    such as interoperability, performance, exclusion or deception
> >    of other nodes, or other uses not defined here.  To enforce
> >    proper use, iSCSI nodes MUST NOT allow user modification of
> >    the key value(s), and SHOULD set the value automatically based
> >    on standard internal interfaces.
> >
> >
> >
> > Original text:
> >
> >    The following described Public Extension Key is sent during
> >    the login phase of an iSCSI normal session.  It is important
> >    to note that the proper use of this key is to provide enhanced
> >    logging and support capabilities, and for better understanding
> >    of customer environments.  The key MUST NOT be used by iSCSI
> >    nodes for things such as interoperability, performance,
> >    exclusion or deception of other nodes, or other uses not
> >    defined here.  To enforce proper use, iSCSI nodes MUST NOT
> >    allow user modification of the key value(s), and SHOULD set
> >    the value automatically based on standard internal interfaces.
> >
> >
> >
> >
> >
> >
> > > (3) The draft needs a new title and file name ("supportability" just
> > >         reeks of marketing ;-) ).  Let's try:
> > >
> > >            The iSCSI X#NodeArchitecture Key
> > >         draft-ietf-ips-iscsi-nodearch-key-00.txt
> > >
> > Sounds fine to me.
> >
> >
> > > Text for (1) and (2), or at least initial versions of it should be
> > > worked out on the list before the -00 version of the 
> draft-ietf-ips-...
> > > draft is submitted.  I've just sent the request to the secretariat 
> for
> > > an end-of-2006 completion milestone for this, but in practice, it
> > > could be done shortly after Montreal, if not before.
> > >
> > Great, thanks.
> >
> > > Thanks,
> > > --David
> > > ----------------------------------------------------
> > > David L. Black, Senior Technologist
> > > EMC Corporation, 176 South St., Hopkinton, MA  01748
> > > +1 (508) 293-7953             FAX: +1 (508) 293-7786
> > > black_david@emc.com        Mobile: +1 (978) 394-7754
> > > ----------------------------------------------------
> > >
> > > _______________________________________________
> > > Ips mailing list
> > > Ips@ietf.org
> > > https://www1.ietf.org/mailman/listinfo/ips
> > >
> >
>


--------------020200090200020201050605
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
  <title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
<a class="moz-txt-link-abbreviated" href="mailto:Black_David@emc.com">Black_David@emc.com</a> wrote:
<blockquote
 cite="midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com"
 type="cite">
  <meta http-equiv="Content-Type" content="text/html; ">
  <meta name="Generator" content="MS Exchange Server version 6.0.6603.0">
  <title>RE: [Ips] X#NodeArchitecture draft - next steps</title>
<!-- Converted from text/plain format -->
  <p><font size="2">Dave,</font>
  </p>
  <p><font size="2">&gt; New proposed text:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; 3.&nbsp; Security Considerations </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; In certain environments where security is a
primary concern,</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may not be
appropriate as it</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; reveals specific details about an iSCSI node.&nbsp;
For these</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing this public
extension key</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; MUST provide a method to disable sending the
key.&nbsp; In</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; addition to providing a disable mechanism,
security sensitive</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; environments SHOULD consider use of IPsec, as
specified in </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; RFC 3720 and 3723, as a means to shield the
contents of this</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; key from observers of network traffic.</font>
  </p>
  <p><font size="2">Good start, needs editing to something like:</font>
  </p>
  <p><font size="2">&nbsp;&nbsp;&nbsp; This extension key transmits specific
implementation details</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; about the node that sends it; such details may be
considered</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; sensitive in some environments.&nbsp; For example, if a
certain</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; software or firmware version is known to contain
security</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; weaknesses, announcing the presence of that
version via this</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; key may not be desirable.&nbsp; The countermeasures for
this</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; security concern are:</font>
  <br>
  </p>
</blockquote>
How about another option:<br>
&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; - sending less detailed information in the key values<br>
<br>
Security concerns could also be lessened by sending less<br>
detailed information, such as omitting the version numbers of<br>
things (for example, send "Microsoft Windows, software initiator"<br>
instead of&nbsp; "Microsoft Windows 2003, software initiator version
1.2.3.4").<br>
I will have to rework the format of the key a bit but this seems<br>
worth doing.&nbsp; Hopefully there is a reasonable level of information<br>
that most people will find acceptable transmitting by default while<br>
not greatly compromising security.<br>
<br>
<br>
<blockquote
 cite="midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com"
 type="cite">
  <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">- not sending the extension key, or</font>
  <br>
  </p>
</blockquote>
<br>
<br>
<br>
<br>
<blockquote
 cite="midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com"
 type="cite">
  <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">- using IPsec to provide confidentiality
for the iSCSI</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">connection on&nbsp; which the key is sent
(see RFC 3720</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">and RFC 3723).</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; To support the first countermeasure, all
implementations of</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; this extension key MUST provide an administrative
mechanism</font>
  <br>
  <font size="2">&nbsp;&nbsp;&nbsp; to disable sending the key.</font>
  </p>
</blockquote>
This sentence then becomes something like.<br>
<br>
To support the first and second countermeasures, all implementations<br>
of this extension key SHOULD provide a way to configure different<br>
levels of detail in the extension key values and MUST provide an<br>
administrative mechanism to disable sending the key.<br>
<br>
<blockquote
 cite="midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com"
 type="cite">
  <p><font size="2">Reasons for the edits:</font>
  <br>
  <font size="2">- Focus on specific threat, not general "where
security is a primary</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">concern".</font>
  <br>
  <font size="2">- Make the "MUST" for disabling transmission of the
key globally</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">applicable, vs. possibly scoped to specific
environments.</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">This is a "MUST implement" requirement, not
"MUST use".</font>
  <br>
  <font size="2">- Avoid the "SHOULD ... use ... IPsec" phrasing, at
least for now.</font>
  </p>
  <p><font size="2">&gt; New proposed text:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; The following described Public Extension Key
is sent during</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the login phase of an iSCSI normal session.&nbsp;
It is important</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to
provide enhanced</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; logging and support capabilities, and for
better understanding</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; Functional behavior
of the iSCSI</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; node MUST NOT depend on the presence, absence,
or content of</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the key.&nbsp; The key MUST NOT be used by iSCSI
nodes for things</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; such as interoperability, performance,
exclusion or deception</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; of other nodes, or other uses not defined
here.&nbsp; To enforce</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; proper use, iSCSI nodes MUST NOT allow user
modification of</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the key value(s), and SHOULD set the value
automatically based</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; on standard internal interfaces.</font>
  </p>
  <p><font size="2">This one is close - 3 suggestions:</font>
  <br>
  <font size="2">- "proper" -&gt; "intended"</font>
  <br>
  <font size="2">- remove "and for better understanding of customer
environments" or</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">replace it with something more specific like
"and to enable</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">collection of iSCSI implementation usage
information"</font>
  <br>
  <font size="2">- The "such as ... or other uses not defined here" is
not sufficiently</font>
  <br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <font size="2">precise.</font>
  <br>
  <font size="2">The last one is crucial - it needs to be easy for an
implementer to</font>
  <br>
  <font size="2">determine whether s/he's stepped over this line.</font>
  </p>
  <p><font size="2">I'm comfortable with not mentioning the JavaScript
and browser versions</font>
  <br>
  <font size="2">mess, as I think we all know that it's the motivating
example for this</font>
  <br>
  <font size="2">text.</font>
  </p>
  <p><font size="2">Thanks,</font>
  <br>
  <font size="2">--David (as individual participant, *not* as WG chair)</font>
  <br>
  <font size="2">----------------------------------------------------</font>
  <br>
  <font size="2">David L. Black, Senior Technologist</font>
  <br>
  <font size="2">EMC Corporation, 176 South St., Hopkinton, MA&nbsp; 01748</font>
  <br>
  <font size="2">+1 (508) 293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; FAX: +1 (508) 293-7786</font>
  <br>
  <font size="2"><a class="moz-txt-link-abbreviated" href="mailto:black_david@emc.com">black_david@emc.com</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile: +1 (978) 394-7754</font>
  <br>
  <font size="2">----------------------------------------------------</font>
  </p>
  <p><font size="2">&gt; -----Original Message-----</font>
  <br>
  <font size="2">&gt; From: Dave Wysochanski [<a
 href="mailto:davidw@netapp.com">mailto:davidw@netapp.com</a>] </font>
  <br>
  <font size="2">&gt; Sent: Friday, March 31, 2006 9:35 PM</font>
  <br>
  <font size="2">&gt; To: Black, David</font>
  <br>
  <font size="2">&gt; Cc: <a class="moz-txt-link-abbreviated" href="mailto:ips@ietf.org">ips@ietf.org</a></font>
  <br>
  <font size="2">&gt; Subject: Re: [Ips] X#NodeArchitecture draft -
next steps</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; <a class="moz-txt-link-abbreviated" href="mailto:Black_David@emc.com">Black_David@emc.com</a> wrote:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; &gt; This draft is better known as: </font>
  <br>
  <font size="2">&gt; &gt; draft-wysochanski-xkey-iscsi-support-00.txt</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; &gt; This draft will be an official WG draft, but
three things</font>
  <br>
  <font size="2">&gt; &gt; need to happen first:</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; &gt; (1) New security text.&nbsp; The existing
"SHOULD" in the security</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; considerations text needs to be a
"MUST".&nbsp; In addition,</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; there needs to be a sentence
pointing out that it may</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be important to shield the contents
of this key from</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; observers of network traffic, and
that IPsec as specified</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for iSCSI in RFC 3720 and 3723 (cite
both of them) is an</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; appropriate tool for this purpose.</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; New proposed text:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; 3.&nbsp; Security Considerations </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; In certain environments where security is a
primary concern,</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may not be
appropriate as it</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; reveals specific details about an iSCSI node.&nbsp;
For these</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing this public
extension key</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; MUST provide a method to disable sending the
key.&nbsp; In</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; addition to providing a disable mechanism,
security sensitive</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; environments SHOULD consider use of IPsec, as
specified in </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; RFC 3720 and 3723, as a means to shield the
contents of this</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; key from observers of network traffic.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; Original text:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; 3.&nbsp; Security Considerations </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; In certain environments where security is a
primary concern,</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may not be
appropriate as it</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; reveals specific details about an iSCSI node.
For these</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing this public
extension key</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; SHOULD provide a method to disable sending the
key.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; &gt; (2) New "prevention of abuse" text.&nbsp; The
current "The key MUST NOT</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be used by iSCSI nodes for things
such as ..." is well-</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; intentioned but does not get the job
done.&nbsp; My recollection</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of discussion in Dallas is that
saying that "functional behavior</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of the iSCSI node MUST NOT depend on
this key (presence/absence</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or value)"&nbsp; may be closer to the
mark.&nbsp; The only permitted</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (and intended) use of this key is to
report it/log it in order</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to avoid the browser detection
JavaScript disasters caused by</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the corresponding HTTP header fields.</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; I wasn't sure about deleting the original "MUST
NOT" sentence so I left it</font>
  <br>
  <font size="2">in.&nbsp; Anyone</font>
  <br>
  <font size="2">&gt; have a preference?&nbsp; Also wasn't sure whether it's
worth putting in a</font>
  <br>
  <font size="2">sentence or two at</font>
  <br>
  <font size="2">&gt; least acknowledging what has happened in the past
with User-Agent --</font>
  <br>
  <font size="2">intent would be</font>
  <br>
  <font size="2">&gt; the working group acknowledges this historical
misuse and wishes to avoid</font>
  <br>
  <font size="2">it.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; New proposed text:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; The following described Public Extension Key
is sent during</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the login phase of an iSCSI normal session.&nbsp;
It is important</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to
provide enhanced</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; logging and support capabilities, and for
better understanding</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; Functional behavior
of the iSCSI</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; node MUST NOT depend on the presence, absence,
or content of</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the key.&nbsp; The key MUST NOT be used by iSCSI
nodes for things</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; such as interoperability, performance,
exclusion or deception</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; of other nodes, or other uses not defined
here.&nbsp; To enforce</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; proper use, iSCSI nodes MUST NOT allow user
modification of</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the key value(s), and SHOULD set the value
automatically based</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; on standard internal interfaces.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; Original text:</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; The following described Public Extension Key
is sent during</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the login phase of an iSCSI normal session.&nbsp;
It is important</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to
provide enhanced</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; logging and support capabilities, and for
better understanding</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; The key MUST NOT be
used by iSCSI</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; nodes for things such as interoperability,
performance,</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; exclusion or deception of other nodes, or
other uses not</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; defined here.&nbsp; To enforce proper use, iSCSI
nodes MUST NOT</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; allow user modification of the key value(s),
and SHOULD set</font>
  <br>
  <font size="2">&gt;&nbsp;&nbsp;&nbsp; the value automatically based on standard
internal interfaces.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; &gt; (3) The draft needs a new title and file
name ("supportability" just</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reeks of marketing ;-) ).&nbsp; Let's try:</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The iSCSI X#NodeArchitecture Key</font>
  <br>
  <font size="2">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
draft-ietf-ips-iscsi-nodearch-key-00.txt</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; Sounds fine to me.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; &gt; Text for (1) and (2), or at least initial
versions of it should be</font>
  <br>
  <font size="2">&gt; &gt; worked out on the list before the -00
version of the draft-ietf-ips-...</font>
  <br>
  <font size="2">&gt; &gt; draft is submitted.&nbsp; I've just sent the
request to the secretariat for</font>
  <br>
  <font size="2">&gt; &gt; an end-of-2006 completion milestone for
this, but in practice, it</font>
  <br>
  <font size="2">&gt; &gt; could be done shortly after Montreal, if not
before.</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; Great, thanks.</font>
  <br>
  <font size="2">&gt; </font>
  <br>
  <font size="2">&gt; &gt; Thanks,</font>
  <br>
  <font size="2">&gt; &gt; --David</font>
  <br>
  <font size="2">&gt; &gt;
----------------------------------------------------</font>
  <br>
  <font size="2">&gt; &gt; David L. Black, Senior Technologist</font>
  <br>
  <font size="2">&gt; &gt; EMC Corporation, 176 South St., Hopkinton,
MA&nbsp; 01748</font>
  <br>
  <font size="2">&gt; &gt; +1 (508) 293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; FAX: +1 (508)
293-7786</font>
  <br>
  <font size="2">&gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:black_david@emc.com">black_david@emc.com</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile: +1 (978)
394-7754</font>
  <br>
  <font size="2">&gt; &gt;
----------------------------------------------------</font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; &gt;
_______________________________________________</font>
  <br>
  <font size="2">&gt; &gt; Ips mailing list</font>
  <br>
  <font size="2">&gt; &gt; <a class="moz-txt-link-abbreviated" href="mailto:Ips@ietf.org">Ips@ietf.org</a></font>
  <br>
  <font size="2">&gt; &gt; <a
 href="https://www1.ietf.org/mailman/listinfo/ips">https://www1.ietf.org/mailman/listinfo/ips</a></font>
  <br>
  <font size="2">&gt; &gt;</font>
  <br>
  <font size="2">&gt; </font>
  </p>
</blockquote>
<br>
</body>
</html>

--------------020200090200020201050605--


--===============0338111322==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0338111322==--




From ips-bounces@ietf.org Mon Apr 17 14:55:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVYsL-0005qD-7K; Mon, 17 Apr 2006 14:55:05 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVYsK-0005q7-0Z
	for ips@ietf.org; Mon, 17 Apr 2006 14:55:04 -0400
Received: from sccrmhc14.comcast.net ([204.127.200.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVYsI-0006ev-PI
	for ips@ietf.org; Mon, 17 Apr 2006 14:55:03 -0400
Received: from ivvtdkv0981 (c-66-177-56-218.hsd1.fl.comcast.net[66.177.56.218])
	by comcast.net (sccrmhc14) with SMTP
	id <200604171855010140089fb6e>; Mon, 17 Apr 2006 18:55:02 +0000
Message-ID: <000801c66250$6ecf8f80$06031eac@ivivity.com>
From: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>
To: <ips@ietf.org>
Date: Mon, 17 Apr 2006 14:55:01 -0400
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2869
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5
Subject: [Ips] MPA alignment
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0041113922=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0041113922==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0005_01C6622E.E71BE320"

This is a multi-part message in MIME format.

------=_NextPart_000_0005_01C6622E.E71BE320
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

It is preferable to have TCP sender to align MPA header where a TCP =
segment begins and to keep the MPA FPDU within a TCP segment, so that =
the receiver hardware doesn't need to temporarily buffer the FPDU for =
the CRC checking. =20

Does anyone know of any software or hardware that is not an FPDU =
alignment sender?
Does anyone have a feel for the likelihood of software or hardware to =
not align FPDU's on a TCP segment?

Eddy
------=_NextPart_000_0005_01C6622E.E71BE320
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2873" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">It is =
preferable to have=20
TCP sender to align MPA header where a TCP segment begins and to =
keep&nbsp;the=20
MPA FPDU within a TCP segment, so that the receiver hardware doesn=92t=20
need&nbsp;to temporarily buffer the FPDU for the CRC checking.&nbsp;=20
</SPAN></DIV>
<DIV><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"></SPAN>&nbsp;</DIV>
<DIV><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Does anyone =
know of any=20
software or hardware that is not an FPDU alignment sender?</SPAN></DIV>
<DIV><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Does anyone =
have a feel=20
for the likelihood of software or hardware to not align FPDU's on a TCP=20
segment?</SPAN></DIV>
<DIV><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"></SPAN>&nbsp;</DIV>
<DIV><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Eddy</SPAN></DIV></BODY></HTML>

------=_NextPart_000_0005_01C6622E.E71BE320--



--===============0041113922==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0041113922==--





From ips-bounces@ietf.org Mon Apr 17 17:49:02 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVbac-00037j-Jm; Mon, 17 Apr 2006 17:48:58 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVbab-00037b-04
	for ips@ietf.org; Mon, 17 Apr 2006 17:48:57 -0400
Received: from ausc60pc101.us.dell.com ([143.166.85.206])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVbaZ-0007T9-L8
	for ips@ietf.org; Mon, 17 Apr 2006 17:48:56 -0400
DomainKey-Signature: s=smtpout; d=dell.com; c=nofws; q=dns;
	b=e44hxeu+oBbbYHw3F11Q47sd7dp9xxyA1KAhDj6av9bG2ONE2osQevEtx6358F0Mc06kd6kana21tG5zZMXNEvarfhIiCWvBt2uq0nRgRT/JY63yEmbObbMoBnv1GJ0V;
Received: from ausx3bpc102.aus.amer.dell.com ([10.30.101.52])
	by ausc60pc101.us.dell.com with ESMTP; 17 Apr 2006 16:48:55 -0500
X-IronPort-AV: i="4.04,127,1144040400"; 
	d="scan'208,217"; a="1300056:sNHT54913599"
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 17 Apr 2006 16:48:49 -0500
Message-ID: <389040536173ED4AADA5EFEA9633358601677A0C@ausx3mpc106.aus.amer.dell.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Target Behavior Clarifications
Thread-Index: AcZiaKyilbQPptAyRXCgqwphG3vJGw==
From: <Jacob_Cherian@Dell.com>
To: <ips@ietf.org>
X-OriginalArrivalTime: 17 Apr 2006 21:48:52.0474 (UTC)
	FILETIME=[B7B34DA0:01C66268]
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 2086112c730e13d5955355df27e3074b
Subject: [Ips] Target Behavior Clarifications
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1154509896=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1154509896==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66268.B6242447"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66268.B6242447
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

A couple of quick questions?

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:
- If the PDU is part of a SCSI command?=20
- If the PDU is part of a login?

2) What should the target behaviour be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

Any clarification would be greatly appreciated.=20

Thanks,
Jacob




------_=_NextPart_001_01C66268.B6242447
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
6.5.7232.60">
<TITLE>Target Behavior Clarifications</TITLE>
</HEAD>
<BODY>
<!-- Converted from text/rtf format -->

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"></SPAN><A NAME=3D""><SPAN =
LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial">A couple of quick =
questions?</FONT></SPAN></A></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">1)</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 FACE=3D"Arial">What should =
the</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT =
SIZE=3D2 FACE=3D"Arial">behavior</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial"> of a</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 FACE=3D"Arial">target</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial"> be if it receives a PDU</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">on a connection,</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">larger than what it declared</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">with</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">MaxRecvDataSegmentLength</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">:</FONT></SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">-</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 FACE=3D"Arial">If the PDU is part of a =
SCSI command?</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> </SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial">- =
I</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT =
SIZE=3D2 FACE=3D"Arial">f</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial"> the PDU is part of a =
login?</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"></SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT COLOR=3D"#0000A0" SIZE=3D2 =
FACE=3D"Arial">2)</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT COLOR=3D"#0000A0" =
SIZE=3D2 FACE=3D"Arial">What should the target behaviour be =
if</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> <FONT COLOR=3D"#0000A0" =
SIZE=3D2 FACE=3D"Arial">the initiator sends it more data =
than</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> =
<FONT SIZE=3D2 FACE=3D"Arial">MaxBurstLength</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">?</FONT></SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial">3) =
What should the target</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">behavior</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial"> be if the initiator sends =
more data than</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"> <FONT SIZE=3D2 =
FACE=3D"Arial">FirstBurstLength</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">?</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"></SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 FACE=3D"Arial">Any =
clarification would be greatly appreciated.</FONT></SPAN><SPAN =
LANG=3D"en-us"></SPAN><SPAN LANG=3D"en-us"> </SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">Thanks,</FONT></SPAN></P>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"><FONT SIZE=3D2 =
FACE=3D"Arial">Jacob</FONT></SPAN><SPAN LANG=3D"en-us"></SPAN><SPAN =
LANG=3D"en-us"></SPAN></P>
<BR>

<P ALIGN=3DLEFT><SPAN LANG=3D"en-us"></SPAN></P>

</BODY>
</HTML>
------_=_NextPart_001_01C66268.B6242447--


--===============1154509896==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1154509896==--




From ips-bounces@ietf.org Mon Apr 17 18:09:27 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVbuK-0000uc-Pp; Mon, 17 Apr 2006 18:09:20 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVbuJ-0000uL-G3
	for ips@ietf.org; Mon, 17 Apr 2006 18:09:19 -0400
Received: from mexforward.lss.emc.com ([168.159.213.200])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVbuI-0000Og-IF
	for ips@ietf.org; Mon, 17 Apr 2006 18:09:19 -0400
Received: from mailhub.lss.emc.com (nagas.lss.emc.com [10.254.144.11])
	by mexforward.lss.emc.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
	k3HM9Ih5004060; Mon, 17 Apr 2006 18:09:18 -0400 (EDT)
Received: from mxic2.corp.emc.com (mxic2.corp.emc.com [128.221.12.9])
	by mailhub.lss.emc.com (Switch-3.1.8/Switch-3.1.7) with ESMTP id
	k3HM9Dot027374; Mon, 17 Apr 2006 18:09:13 -0400 (EDT)
Received: by mxic2.corp.emc.com with Internet Mail Service (5.5.2653.19)
	id <D483L0Q7>; Mon, 17 Apr 2006 18:09:13 -0400
Message-ID: <F222151D3323874393F83102D614E05502B669D8@CORPUSMX20A.corp.emc.com>
From: Black_David@emc.com
To: davidw@netapp.com
Subject: RE: [Ips] X#NodeArchitecture draft - next steps
Date: Mon, 17 Apr 2006 18:09:07 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.3.0.1,
	Antispam-Data: 2006.04.17.143105
X-PerlMx-Spam: Gauge=, SPAM=0%, Reason='EMC_BODY_1+ -3, EMC_FROM_0+ -2,
	NO_REAL_NAME 0, __C230066_P5 0, __CP_MEDIA_2_BODY 0,
	__CP_NOT_1 0, __CT 0, __CTYPE_HAS_BOUNDARY 0,
	__CTYPE_MULTIPART 0, __CTYPE_MULTIPART_ALT 0, __HAS_MSGID 0,
	__HAS_X_MAILER 0, __IMS_MSGID 0, __IMS_MUA 0, __MIME_HTML 0,
	__MIME_VERSION 0, __SANE_MSGID 0, __STOCK_CRUFT 0,
	__TAG_EXISTS_HTML 0'
X-Spam-Score: 0.3 (/)
X-Scan-Signature: dd055ca905b7a8538e016a7989511901
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1333493010=="
Errors-To: ips-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1333493010==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C6626B.1577E8E8"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C6626B.1577E8E8
Content-Type: text/plain

> How about another option:
>              - sending less detailed information in the key values
 
Sounds reasonable.  I think you can take the results of the list
discussion to date and submit a -00 WG draft for further discussion
and editing.
 
Thanks,
--David (as WG chair)
---------------------------------------------------- 
David L. Black, Senior Technologist 
EMC Corporation, 176 South St., Hopkinton, MA  01748 
+1 (508) 293-7953             FAX: +1 (508) 293-7786 
black_david@emc.com        Mobile: +1 (978) 394-7754 
----------------------------------------------------


  _____  

From: Dave Wysochanski [mailto:davidw@netapp.com] 
Sent: Friday, April 14, 2006 7:57 AM
To: Black, David
Cc: ips@ietf.org
Subject: Re: [Ips] X#NodeArchitecture draft - next steps


Black_David@emc.com <mailto:Black_David@emc.com>  wrote: 

Dave, 

> New proposed text: 
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern, 
>    the use of this extension key may not be appropriate as it 
>    reveals specific details about an iSCSI node.  For these 
>    environments, nodes implementing this public extension key 
>    MUST provide a method to disable sending the key.  In 
>    addition to providing a disable mechanism, security sensitive 
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this 
>    key from observers of network traffic. 

Good start, needs editing to something like: 

    This extension key transmits specific implementation details 
    about the node that sends it; such details may be considered 
    sensitive in some environments.  For example, if a certain 
    software or firmware version is known to contain security 
    weaknesses, announcing the presence of that version via this 
    key may not be desirable.  The countermeasures for this 
    security concern are: 


How about another option:
             - sending less detailed information in the key values

Security concerns could also be lessened by sending less
detailed information, such as omitting the version numbers of
things (for example, send "Microsoft Windows, software initiator"
instead of  "Microsoft Windows 2003, software initiator version 1.2.3.4").
I will have to rework the format of the key a bit but this seems
worth doing.  Hopefully there is a reasonable level of information
that most people will find acceptable transmitting by default while
not greatly compromising security.




        - not sending the extension key, or 






        - using IPsec to provide confidentiality for the iSCSI 
                connection on  which the key is sent (see RFC 3720 
                and RFC 3723). 
    To support the first countermeasure, all implementations of 
    this extension key MUST provide an administrative mechanism 
    to disable sending the key. 

This sentence then becomes something like.

To support the first and second countermeasures, all implementations
of this extension key SHOULD provide a way to configure different
levels of detail in the extension key values and MUST provide an
administrative mechanism to disable sending the key.



Reasons for the edits: 
- Focus on specific threat, not general "where security is a primary 
        concern". 
- Make the "MUST" for disabling transmission of the key globally 
        applicable, vs. possibly scoped to specific environments. 
        This is a "MUST implement" requirement, not "MUST use". 
- Avoid the "SHOULD ... use ... IPsec" phrasing, at least for now. 

> New proposed text: 
> 
>    The following described Public Extension Key is sent during 
>    the login phase of an iSCSI normal session.  It is important 
>    to note that the proper use of this key is to provide enhanced 
>    logging and support capabilities, and for better understanding 
>    of customer environments.  Functional behavior of the iSCSI 
>    node MUST NOT depend on the presence, absence, or content of 
>    the key.  The key MUST NOT be used by iSCSI nodes for things 
>    such as interoperability, performance, exclusion or deception 
>    of other nodes, or other uses not defined here.  To enforce 
>    proper use, iSCSI nodes MUST NOT allow user modification of 
>    the key value(s), and SHOULD set the value automatically based 
>    on standard internal interfaces. 

This one is close - 3 suggestions: 
- "proper" -> "intended" 
- remove "and for better understanding of customer environments" or 
        replace it with something more specific like "and to enable 
        collection of iSCSI implementation usage information" 
- The "such as ... or other uses not defined here" is not sufficiently 
        precise. 
The last one is crucial - it needs to be easy for an implementer to 
determine whether s/he's stepped over this line. 

I'm comfortable with not mentioning the JavaScript and browser versions 
mess, as I think we all know that it's the motivating example for this 
text. 

Thanks, 
--David (as individual participant, *not* as WG chair) 
---------------------------------------------------- 
David L. Black, Senior Technologist 
EMC Corporation, 176 South St., Hopkinton, MA  01748 
+1 (508) 293-7953             FAX: +1 (508) 293-7786 
black_david@emc.com <mailto:black_david@emc.com>         Mobile: +1 (978)
394-7754 
---------------------------------------------------- 

> -----Original Message----- 
> From: Dave Wysochanski [mailto:davidw@netapp.com
<mailto:davidw@netapp.com> ] 
> Sent: Friday, March 31, 2006 9:35 PM 
> To: Black, David 
> Cc: ips@ietf.org <mailto:ips@ietf.org>  
> Subject: Re: [Ips] X#NodeArchitecture draft - next steps 
> 
> Black_David@emc.com <mailto:Black_David@emc.com>  wrote: 
> 
> > This draft is better known as: 
> > draft-wysochanski-xkey-iscsi-support-00.txt 
> > 
> > This draft will be an official WG draft, but three things 
> > need to happen first: 
> > 
> > (1) New security text.  The existing "SHOULD" in the security 
> >         considerations text needs to be a "MUST".  In addition, 
> >         there needs to be a sentence pointing out that it may 
> >         be important to shield the contents of this key from 
> >         observers of network traffic, and that IPsec as specified 
> >         for iSCSI in RFC 3720 and 3723 (cite both of them) is an 
> >         appropriate tool for this purpose. 
> > 
> New proposed text: 
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern, 
>    the use of this extension key may not be appropriate as it 
>    reveals specific details about an iSCSI node.  For these 
>    environments, nodes implementing this public extension key 
>    MUST provide a method to disable sending the key.  In 
>    addition to providing a disable mechanism, security sensitive 
>    environments SHOULD consider use of IPsec, as specified in 
>    RFC 3720 and 3723, as a means to shield the contents of this 
>    key from observers of network traffic. 
> 
> 
> 
> Original text:      
> 
> 3.  Security Considerations 
> 
>    In certain environments where security is a primary concern, 
>    the use of this extension key may not be appropriate as it 
>    reveals specific details about an iSCSI node. For these 
>    environments, nodes implementing this public extension key 
>    SHOULD provide a method to disable sending the key. 
> 
>       
> 
> > (2) New "prevention of abuse" text.  The current "The key MUST NOT 
> >         be used by iSCSI nodes for things such as ..." is well- 
> >         intentioned but does not get the job done.  My recollection 
> >         of discussion in Dallas is that saying that "functional behavior

> >         of the iSCSI node MUST NOT depend on this key (presence/absence 
> >         or value)"  may be closer to the mark.  The only permitted 
> >         (and intended) use of this key is to report it/log it in order 
> >         to avoid the browser detection JavaScript disasters caused by 
> >         the corresponding HTTP header fields. 
> > 
> 
> I wasn't sure about deleting the original "MUST NOT" sentence so I left it

in.  Anyone 
> have a preference?  Also wasn't sure whether it's worth putting in a 
sentence or two at 
> least acknowledging what has happened in the past with User-Agent -- 
intent would be 
> the working group acknowledges this historical misuse and wishes to avoid 
it. 
> 
> New proposed text: 
> 
>    The following described Public Extension Key is sent during 
>    the login phase of an iSCSI normal session.  It is important 
>    to note that the proper use of this key is to provide enhanced 
>    logging and support capabilities, and for better understanding 
>    of customer environments.  Functional behavior of the iSCSI 
>    node MUST NOT depend on the presence, absence, or content of 
>    the key.  The key MUST NOT be used by iSCSI nodes for things 
>    such as interoperability, performance, exclusion or deception 
>    of other nodes, or other uses not defined here.  To enforce 
>    proper use, iSCSI nodes MUST NOT allow user modification of 
>    the key value(s), and SHOULD set the value automatically based 
>    on standard internal interfaces. 
> 
> 
> 
> Original text: 
> 
>    The following described Public Extension Key is sent during 
>    the login phase of an iSCSI normal session.  It is important 
>    to note that the proper use of this key is to provide enhanced 
>    logging and support capabilities, and for better understanding 
>    of customer environments.  The key MUST NOT be used by iSCSI 
>    nodes for things such as interoperability, performance, 
>    exclusion or deception of other nodes, or other uses not 
>    defined here.  To enforce proper use, iSCSI nodes MUST NOT 
>    allow user modification of the key value(s), and SHOULD set 
>    the value automatically based on standard internal interfaces. 
> 
> 
> 
> 
> 
> 
> > (3) The draft needs a new title and file name ("supportability" just 
> >         reeks of marketing ;-) ).  Let's try: 
> > 
> >            The iSCSI X#NodeArchitecture Key 
> >         draft-ietf-ips-iscsi-nodearch-key-00.txt 
> > 
> Sounds fine to me. 
> 
> 
> > Text for (1) and (2), or at least initial versions of it should be 
> > worked out on the list before the -00 version of the draft-ietf-ips-... 
> > draft is submitted.  I've just sent the request to the secretariat for 
> > an end-of-2006 completion milestone for this, but in practice, it 
> > could be done shortly after Montreal, if not before. 
> > 
> Great, thanks. 
> 
> > Thanks, 
> > --David 
> > ---------------------------------------------------- 
> > David L. Black, Senior Technologist 
> > EMC Corporation, 176 South St., Hopkinton, MA  01748 
> > +1 (508) 293-7953             FAX: +1 (508) 293-7786 
> > black_david@emc.com <mailto:black_david@emc.com>         Mobile: +1
(978) 394-7754 
> > ---------------------------------------------------- 
> > 
> > _______________________________________________ 
> > Ips mailing list 
> > Ips@ietf.org <mailto:Ips@ietf.org>  
> > https://www1.ietf.org/mailman/listinfo/ips
<https://www1.ietf.org/mailman/listinfo/ips>  
> > 
> 



------_=_NextPart_001_01C6626B.1577E8E8
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<TITLE></TITLE>

<META content="MSHTML 6.00.2800.1528" name=GENERATOR></HEAD>
<BODY text=#000000 bgColor=#ffffff>
<DIV dir=ltr align=left><SPAN class=321360522-17042006>&gt; </SPAN>How about 
another option:<BR><SPAN class=321360522-17042006>&gt; 
</SPAN>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
- sending less detailed information in the key values</DIV>
<DIV dir=ltr align=left>&nbsp;</DIV>
<DIV dir=ltr align=left><SPAN class=321360522-17042006></SPAN><FONT 
face="Courier New"><FONT size=2>S<SPAN class=321360522-17042006>ounds 
reasonable.&nbsp; I think you can take the results of the 
list</SPAN></FONT></FONT></DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006>discussion to date&nbsp;</SPAN></FONT></FONT><FONT 
face="Courier New"><FONT size=2><SPAN class=321360522-17042006>and submit a -00 
WG draft for further discussion</SPAN></FONT></FONT></DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006>and editing.</SPAN></FONT></FONT></DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006></SPAN></FONT></FONT>&nbsp;</DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006>Thanks,</SPAN></FONT></FONT></DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006>--David (as WG chair)</SPAN></FONT></FONT></DIV>
<DIV dir=ltr align=left><FONT face="Courier New"><FONT size=2><SPAN 
class=321360522-17042006><!-- Converted from text/rtf format -->
<P><SPAN lang=en-us><FONT face="Courier New" 
size=2>----------------------------------------------------</FONT></SPAN> 
<BR><SPAN lang=en-us><FONT face="Courier New" size=2>David L. Black, Senior 
Technologist</FONT></SPAN> <BR><SPAN lang=en-us><FONT face="Courier New" 
size=2>EMC Corporation, 176 South St., Hopkinton, MA&nbsp; 01748</FONT></SPAN> 
<BR><SPAN lang=en-us><FONT face="Courier New" size=2>+1 (508) 
293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
FAX: +1 (508) 293-7786</FONT></SPAN> <BR><SPAN lang=en-us><FONT 
face="Courier New" 
size=2>black_david@emc.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mobile: +1 
(978) 394-7754</FONT></SPAN> <BR><SPAN lang=en-us><FONT face="Courier New" 
size=2>----------------------------------------------------</FONT></SPAN></SPAN></FONT></FONT></P></DIV><BR>
<BLOCKQUOTE 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
  <HR tabIndex=-1>
  <FONT face=Tahoma size=2><B>From:</B> Dave Wysochanski 
  [mailto:davidw@netapp.com] <BR><B>Sent:</B> Friday, April 14, 2006 7:57 
  AM<BR><B>To:</B> Black, David<BR><B>Cc:</B> ips@ietf.org<BR><B>Subject:</B> 
  Re: [Ips] X#NodeArchitecture draft - next steps<BR></FONT><BR></DIV>
  <DIV></DIV><A class=moz-txt-link-abbreviated 
  href="mailto:Black_David@emc.com">Black_David@emc.com</A> wrote: 
  <BLOCKQUOTE 
  cite=midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com 
  type="cite">
    <META content="MS Exchange Server version 6.0.6603.0" name=Generator><!-- Converted from text/plain format -->
    <P><FONT size=2>Dave,</FONT> </P>
    <P><FONT size=2>&gt; New proposed text:</FONT> <BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt; 3.&nbsp; Security Considerations 
    </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    In certain environments where security is a primary concern,</FONT> 
    <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may 
    not be appropriate as it</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    reveals specific details about an iSCSI node.&nbsp; For these</FONT> 
    <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing 
    this public extension key</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    MUST provide a method to disable sending the key.&nbsp; In</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; addition to providing a disable mechanism, 
    security sensitive</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    environments SHOULD consider use of IPsec, as specified in </FONT><BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; RFC 3720 and 3723, as a means to shield the 
    contents of this</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; key from 
    observers of network traffic.</FONT> </P>
    <P><FONT size=2>Good start, needs editing to something like:</FONT> </P>
    <P><FONT size=2>&nbsp;&nbsp;&nbsp; This extension key transmits specific 
    implementation details</FONT> <BR><FONT size=2>&nbsp;&nbsp;&nbsp; about the 
    node that sends it; such details may be considered</FONT> <BR><FONT 
    size=2>&nbsp;&nbsp;&nbsp; sensitive in some environments.&nbsp; For example, 
    if a certain</FONT> <BR><FONT size=2>&nbsp;&nbsp;&nbsp; software or firmware 
    version is known to contain security</FONT> <BR><FONT 
    size=2>&nbsp;&nbsp;&nbsp; weaknesses, announcing the presence of that 
    version via this</FONT> <BR><FONT size=2>&nbsp;&nbsp;&nbsp; key may not be 
    desirable.&nbsp; The countermeasures for this</FONT> <BR><FONT 
    size=2>&nbsp;&nbsp;&nbsp; security concern are:</FONT> 
  <BR></P></BLOCKQUOTE>How about another option:<BR>&nbsp;&nbsp;&nbsp; 
  &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; - sending less detailed information in 
  the key values<BR><BR>Security concerns could also be lessened by sending 
  less<BR>detailed information, such as omitting the version numbers 
  of<BR>things (for example, send "Microsoft Windows, software 
  initiator"<BR>instead of&nbsp; "Microsoft Windows 2003, software initiator 
  version 1.2.3.4").<BR>I will have to rework the format of the key a bit but 
  this seems<BR>worth doing.&nbsp; Hopefully there is a reasonable level of 
  information<BR>that most people will find acceptable transmitting by default 
  while<BR>not greatly compromising security.<BR><BR><BR>
  <BLOCKQUOTE 
  cite=midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com 
  type="cite">
    <P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>- not sending the 
    extension key, or</FONT> <BR></P></BLOCKQUOTE><BR><BR><BR><BR>
  <BLOCKQUOTE 
  cite=midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com 
  type="cite">
    <P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>- using IPsec to 
    provide confidentiality for the iSCSI</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>connection on&nbsp; 
    which the key is sent (see RFC 3720</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>and RFC 
    3723).</FONT> <BR><FONT size=2>&nbsp;&nbsp;&nbsp; To support the first 
    countermeasure, all implementations of</FONT> <BR><FONT 
    size=2>&nbsp;&nbsp;&nbsp; this extension key MUST provide an administrative 
    mechanism</FONT> <BR><FONT size=2>&nbsp;&nbsp;&nbsp; to disable sending the 
    key.</FONT> </P></BLOCKQUOTE>This sentence then becomes something 
  like.<BR><BR>To support the first and second countermeasures, all 
  implementations<BR>of this extension key SHOULD provide a way to configure 
  different<BR>levels of detail in the extension key values and MUST provide 
  an<BR>administrative mechanism to disable sending the key.<BR><BR>
  <BLOCKQUOTE 
  cite=midF222151D3323874393F83102D614E05502B6696D@CORPUSMX20A.corp.emc.com 
  type="cite">
    <P><FONT size=2>Reasons for the edits:</FONT> <BR><FONT size=2>- Focus on 
    specific threat, not general "where security is a primary</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>concern".</FONT> 
    <BR><FONT size=2>- Make the "MUST" for disabling transmission of the key 
    globally</FONT> <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT 
    size=2>applicable, vs. possibly scoped to specific environments.</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>This is a "MUST 
    implement" requirement, not "MUST use".</FONT> <BR><FONT size=2>- Avoid the 
    "SHOULD ... use ... IPsec" phrasing, at least for now.</FONT> </P>
    <P><FONT size=2>&gt; New proposed text:</FONT> <BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; The following described 
    Public Extension Key is sent during</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the login phase of an iSCSI normal 
    session.&nbsp; It is important</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to 
    provide enhanced</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; logging and 
    support capabilities, and for better understanding</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; Functional 
    behavior of the iSCSI</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; node 
    MUST NOT depend on the presence, absence, or content of</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the key.&nbsp; The key MUST NOT be used by 
    iSCSI nodes for things</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; such 
    as interoperability, performance, exclusion or deception</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; of other nodes, or other uses not defined 
    here.&nbsp; To enforce</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; proper 
    use, iSCSI nodes MUST NOT allow user modification of</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the key value(s), and SHOULD set the value 
    automatically based</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; on 
    standard internal interfaces.</FONT> </P>
    <P><FONT size=2>This one is close - 3 suggestions:</FONT> <BR><FONT size=2>- 
    "proper" -&gt; "intended"</FONT> <BR><FONT size=2>- remove "and for better 
    understanding of customer environments" or</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>replace it with 
    something more specific like "and to enable</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>collection of 
    iSCSI implementation usage information"</FONT> <BR><FONT size=2>- The "such 
    as ... or other uses not defined here" is not sufficiently</FONT> 
    <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT size=2>precise.</FONT> 
    <BR><FONT size=2>The last one is crucial - it needs to be easy for an 
    implementer to</FONT> <BR><FONT size=2>determine whether s/he's stepped over 
    this line.</FONT> </P>
    <P><FONT size=2>I'm comfortable with not mentioning the JavaScript and 
    browser versions</FONT> <BR><FONT size=2>mess, as I think we all know that 
    it's the motivating example for this</FONT> <BR><FONT size=2>text.</FONT> 
    </P>
    <P><FONT size=2>Thanks,</FONT> <BR><FONT size=2>--David (as individual 
    participant, *not* as WG chair)</FONT> <BR><FONT 
    size=2>----------------------------------------------------</FONT> <BR><FONT 
    size=2>David L. Black, Senior Technologist</FONT> <BR><FONT size=2>EMC 
    Corporation, 176 South St., Hopkinton, MA&nbsp; 01748</FONT> <BR><FONT 
    size=2>+1 (508) 
    293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    FAX: +1 (508) 293-7786</FONT> <BR><FONT size=2><A 
    class=moz-txt-link-abbreviated 
    href="mailto:black_david@emc.com">black_david@emc.com</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    Mobile: +1 (978) 394-7754</FONT> <BR><FONT 
    size=2>----------------------------------------------------</FONT> </P>
    <P><FONT size=2>&gt; -----Original Message-----</FONT> <BR><FONT size=2>&gt; 
    From: Dave Wysochanski [<A 
    href="mailto:davidw@netapp.com">mailto:davidw@netapp.com</A>] 
    </FONT><BR><FONT size=2>&gt; Sent: Friday, March 31, 2006 9:35 PM</FONT> 
    <BR><FONT size=2>&gt; To: Black, David</FONT> <BR><FONT size=2>&gt; Cc: <A 
    class=moz-txt-link-abbreviated 
    href="mailto:ips@ietf.org">ips@ietf.org</A></FONT> <BR><FONT size=2>&gt; 
    Subject: Re: [Ips] X#NodeArchitecture draft - next steps</FONT> <BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; <A class=moz-txt-link-abbreviated 
    href="mailto:Black_David@emc.com">Black_David@emc.com</A> wrote:</FONT> 
    <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt; This draft is better 
    known as: </FONT><BR><FONT size=2>&gt; &gt; 
    draft-wysochanski-xkey-iscsi-support-00.txt</FONT> <BR><FONT size=2>&gt; 
    &gt;</FONT> <BR><FONT size=2>&gt; &gt; This draft will be an official WG 
    draft, but three things</FONT> <BR><FONT size=2>&gt; &gt; need to happen 
    first:</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; 
    (1) New security text.&nbsp; The existing "SHOULD" in the security</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    considerations text needs to be a "MUST".&nbsp; In addition,</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    there needs to be a sentence pointing out that it may</FONT> <BR><FONT 
    size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; be 
    important to shield the contents of this key from</FONT> <BR><FONT 
    size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; observers 
    of network traffic, and that IPsec as specified</FONT> <BR><FONT size=2>&gt; 
    &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for iSCSI in RFC 3720 
    and 3723 (cite both of them) is an</FONT> <BR><FONT size=2>&gt; 
    &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; appropriate tool for 
    this purpose.</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; 
    New proposed text:</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; 
    3.&nbsp; Security Considerations </FONT><BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; In certain environments where 
    security is a primary concern,</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may not be 
    appropriate as it</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; reveals 
    specific details about an iSCSI node.&nbsp; For these</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing this public 
    extension key</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; MUST provide a 
    method to disable sending the key.&nbsp; In</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; addition to providing a disable mechanism, 
    security sensitive</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    environments SHOULD consider use of IPsec, as specified in </FONT><BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; RFC 3720 and 3723, as a means to shield the 
    contents of this</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; key from 
    observers of network traffic.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; 
    Original text:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT><BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt; 3.&nbsp; Security Considerations 
    </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    In certain environments where security is a primary concern,</FONT> 
    <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; the use of this extension key may 
    not be appropriate as it</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; 
    reveals specific details about an iSCSI node. For these</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; environments, nodes implementing this public 
    extension key</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; SHOULD provide 
    a method to disable sending the key.</FONT> <BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt; (2) New 
    "prevention of abuse" text.&nbsp; The current "The key MUST NOT</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    be used by iSCSI nodes for things such as ..." is well-</FONT> <BR><FONT 
    size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; intentioned 
    but does not get the job done.&nbsp; My recollection</FONT> <BR><FONT 
    size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of 
    discussion in Dallas is that saying that "functional behavior</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    of the iSCSI node MUST NOT depend on this key (presence/absence</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    or value)"&nbsp; may be closer to the mark.&nbsp; The only permitted</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    (and intended) use of this key is to report it/log it in order</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    to avoid the browser detection JavaScript disasters caused by</FONT> 
    <BR><FONT size=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    the corresponding HTTP header fields.</FONT> <BR><FONT size=2>&gt; 
    &gt;</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; I wasn't sure 
    about deleting the original "MUST NOT" sentence so I left it</FONT> 
    <BR><FONT size=2>in.&nbsp; Anyone</FONT> <BR><FONT size=2>&gt; have a 
    preference?&nbsp; Also wasn't sure whether it's worth putting in a</FONT> 
    <BR><FONT size=2>sentence or two at</FONT> <BR><FONT size=2>&gt; least 
    acknowledging what has happened in the past with User-Agent --</FONT> 
    <BR><FONT size=2>intent would be</FONT> <BR><FONT size=2>&gt; the working 
    group acknowledges this historical misuse and wishes to avoid</FONT> 
    <BR><FONT size=2>it.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt; New proposed text:</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; The following described Public Extension Key 
    is sent during</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; the login 
    phase of an iSCSI normal session.&nbsp; It is important</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to 
    provide enhanced</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; logging and 
    support capabilities, and for better understanding</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; Functional 
    behavior of the iSCSI</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; node 
    MUST NOT depend on the presence, absence, or content of</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the key.&nbsp; The key MUST NOT be used by 
    iSCSI nodes for things</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; such 
    as interoperability, performance, exclusion or deception</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; of other nodes, or other uses not defined 
    here.&nbsp; To enforce</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; proper 
    use, iSCSI nodes MUST NOT allow user modification of</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; the key value(s), and SHOULD set the value 
    automatically based</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; on 
    standard internal interfaces.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; 
    Original text:</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; The following described Public Extension Key 
    is sent during</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; the login 
    phase of an iSCSI normal session.&nbsp; It is important</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; to note that the proper use of this key is to 
    provide enhanced</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; logging and 
    support capabilities, and for better understanding</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; of customer environments.&nbsp; The key MUST 
    NOT be used by iSCSI</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; nodes 
    for things such as interoperability, performance,</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; exclusion or deception of other nodes, or 
    other uses not</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; defined 
    here.&nbsp; To enforce proper use, iSCSI nodes MUST NOT</FONT> <BR><FONT 
    size=2>&gt;&nbsp;&nbsp;&nbsp; allow user modification of the key value(s), 
    and SHOULD set</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; the value 
    automatically based on standard internal interfaces.</FONT> <BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt; (3) The draft needs a new 
    title and file name ("supportability" just</FONT> <BR><FONT size=2>&gt; 
    &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reeks of marketing ;-) 
    ).&nbsp; Let's try:</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT 
    size=2>&gt; 
    &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The 
    iSCSI X#NodeArchitecture Key</FONT> <BR><FONT size=2>&gt; 
    &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    draft-ietf-ips-iscsi-nodearch-key-00.txt</FONT> <BR><FONT size=2>&gt; 
    &gt;</FONT> <BR><FONT size=2>&gt; Sounds fine to me.</FONT> <BR><FONT 
    size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt; 
    Text for (1) and (2), or at least initial versions of it should be</FONT> 
    <BR><FONT size=2>&gt; &gt; worked out on the list before the -00 version of 
    the draft-ietf-ips-...</FONT> <BR><FONT size=2>&gt; &gt; draft is 
    submitted.&nbsp; I've just sent the request to the secretariat for</FONT> 
    <BR><FONT size=2>&gt; &gt; an end-of-2006 completion milestone for this, but 
    in practice, it</FONT> <BR><FONT size=2>&gt; &gt; could be done shortly 
    after Montreal, if not before.</FONT> <BR><FONT size=2>&gt; &gt;</FONT> 
    <BR><FONT size=2>&gt; Great, thanks.</FONT> <BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt; &gt; Thanks,</FONT> <BR><FONT size=2>&gt; &gt; 
    --David</FONT> <BR><FONT size=2>&gt; &gt; 
    ----------------------------------------------------</FONT> <BR><FONT 
    size=2>&gt; &gt; David L. Black, Senior Technologist</FONT> <BR><FONT 
    size=2>&gt; &gt; EMC Corporation, 176 South St., Hopkinton, MA&nbsp; 
    01748</FONT> <BR><FONT size=2>&gt; &gt; +1 (508) 
    293-7953&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    FAX: +1 (508) 293-7786</FONT> <BR><FONT size=2>&gt; &gt; <A 
    class=moz-txt-link-abbreviated 
    href="mailto:black_david@emc.com">black_david@emc.com</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
    Mobile: +1 (978) 394-7754</FONT> <BR><FONT size=2>&gt; &gt; 
    ----------------------------------------------------</FONT> <BR><FONT 
    size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; 
    _______________________________________________</FONT> <BR><FONT size=2>&gt; 
    &gt; Ips mailing list</FONT> <BR><FONT size=2>&gt; &gt; <A 
    class=moz-txt-link-abbreviated 
    href="mailto:Ips@ietf.org">Ips@ietf.org</A></FONT> <BR><FONT size=2>&gt; 
    &gt; <A 
    href="https://www1.ietf.org/mailman/listinfo/ips">https://www1.ietf.org/mailman/listinfo/ips</A></FONT> 
    <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; 
  </FONT></P></BLOCKQUOTE><BR></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C6626B.1577E8E8--


--===============1333493010==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1333493010==--




From ips-bounces@ietf.org Mon Apr 17 19:00:09 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVchM-0004Ea-70; Mon, 17 Apr 2006 19:00:00 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVchL-0004EQ-IV
	for ips@ietf.org; Mon, 17 Apr 2006 18:59:59 -0400
Received: from mother.pmc-sierra.com ([216.241.224.12]
	helo=mother.pmc-sierra.bc.ca)
	by ietf-mx.ietf.org with smtp (Exim 4.43) id 1FVchL-0002oP-24
	for ips@ietf.org; Mon, 17 Apr 2006 18:59:59 -0400
Received: (qmail 21791 invoked by uid 101); 17 Apr 2006 22:53:17 -0000
Received: from unknown (HELO ogyruan.pmc-sierra.bc.ca) (216.241.226.236)
	by mother.pmc-sierra.com with SMTP; 17 Apr 2006 22:53:17 -0000
Received: from bby1exi01.pmc_nt.nt.pmc-sierra.bc.ca
	(bby1exi01.pmc-sierra.bc.ca [216.241.231.251])
	by ogyruan.pmc-sierra.bc.ca (8.13.3/8.12.7) with ESMTP id
	k3HMrHRW029807; Mon, 17 Apr 2006 15:53:17 -0700
Received: by bby1exi01.pmc-sierra.bc.ca with Internet Mail Service
	(5.5.2656.59) id <132HSX7P>; Mon, 17 Apr 2006 15:53:16 -0700
Message-ID: <5C1FD43E5F1B824E83985A74F396286E01BCE5FB@bby1exm08.pmc_nt.nt.pmc-sierra.bc.ca>
From: Sanjay Goyal <Sanjay_Goyal@pmc-sierra.com>
To: Jacob_Cherian@Dell.com, ips@ietf.org
Subject: RE: [Ips] Target Behavior Clarifications
Date: Mon, 17 Apr 2006 15:52:34 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0
Cc: 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0321741012=="
Errors-To: ips-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0321741012==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66271.9DE51277"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C66271.9DE51277
Content-Type: text/plain

Hi,
 
What it indicates is that the other side is misbehaving. It should be treated as protocol error and the session should be terminated.
 
-Sanjay

  _____  

From: Jacob_Cherian@Dell.com [mailto:Jacob_Cherian@Dell.com] 
Sent: Monday, April 17, 2006 2:49 PM
To: ips@ietf.org
Subject: [Ips] Target Behavior Clarifications



A couple of quick questions?

1) What should the behavior of a target be if it receives a PDU on a connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command? 

- If the PDU is part of a login?

2) What should the target behaviour be if the initiator sends it more data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data than FirstBurstLength?

Any clarification would be greatly appreciated. 

Thanks,

Jacob



------_=_NextPart_001_01C66271.9DE51277
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=US-ASCII">
<TITLE>Target Behavior Clarifications</TITLE>

<META content="MSHTML 6.00.2800.1400" name=GENERATOR></HEAD>
<BODY>
<DIV dir=ltr align=left><SPAN class=799034922-17042006><FONT face=Arial 
color=#0000ff size=2>Hi,</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=799034922-17042006><FONT face=Arial 
color=#0000ff size=2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=ltr align=left><SPAN class=799034922-17042006><FONT face=Arial 
color=#0000ff size=2>What it indicates is that the other side is misbehaving. It 
should be treated as protocol error and the session should be 
terminated.</FONT></SPAN></DIV>
<DIV dir=ltr align=left><SPAN class=799034922-17042006><FONT face=Arial 
color=#0000ff size=2></FONT></SPAN>&nbsp;</DIV>
<DIV dir=ltr align=left><SPAN class=799034922-17042006><FONT face=Arial 
color=#0000ff size=2>-Sanjay</FONT></SPAN></DIV><BR>
<DIV class=OutlookMessageHeader lang=en-us dir=ltr align=left>
<HR tabIndex=-1>
<FONT face=Tahoma size=2><B>From:</B> Jacob_Cherian@Dell.com 
[mailto:Jacob_Cherian@Dell.com] <BR><B>Sent:</B> Monday, April 17, 2006 2:49 
PM<BR><B>To:</B> ips@ietf.org<BR><B>Subject:</B> [Ips] Target Behavior 
Clarifications<BR></FONT><BR></DIV>
<DIV></DIV><!-- Converted from text/rtf format -->
<P align=left><SPAN lang=en-us></SPAN><A name=""><SPAN lang=en-us><FONT 
face=Arial size=2>A couple of quick questions?</FONT></SPAN></A></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>1)</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial size=2>What should 
the</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial 
size=2>behavior</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us><FONT 
face=Arial size=2> of a</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> 
<FONT face=Arial size=2>target</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us><FONT face=Arial size=2> be if it receives a PDU</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial size=2>on a 
connection,</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> <FONT 
face=Arial size=2>larger than what it declared</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial 
size=2>with</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> <FONT 
face=Arial size=2>MaxRecvDataSegmentLength</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us><FONT face=Arial size=2>:</FONT></SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>-</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial size=2>If the PDU is part 
of a SCSI command?</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> 
</SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>- I</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us><FONT face=Arial size=2>f</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us><FONT face=Arial size=2> the PDU is part of a 
login?</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us></SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial color=#0000a0 
size=2>2)</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us> <FONT face=Arial color=#0000a0 size=2>What should the target 
behaviour be if</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial color=#0000a0 size=2>the 
initiator sends it more data than</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us> <FONT face=Arial size=2>MaxBurstLength</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us><FONT face=Arial size=2>?</FONT></SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>3) What should the 
target</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial 
size=2>behavior</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us><FONT 
face=Arial size=2> be if the initiator sends more data than</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us> <FONT face=Arial 
size=2>FirstBurstLength</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us><FONT face=Arial size=2>?</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN 
lang=en-us></SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>Any clarification would 
be greatly appreciated.</FONT></SPAN><SPAN lang=en-us></SPAN><SPAN lang=en-us> 
</SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>Thanks,</FONT></SPAN></P>
<P align=left><SPAN lang=en-us><FONT face=Arial size=2>Jacob</FONT></SPAN><SPAN 
lang=en-us></SPAN><SPAN lang=en-us></SPAN></P><BR>
<P align=left><SPAN lang=en-us></SPAN></P></BODY></HTML>

------_=_NextPart_001_01C66271.9DE51277--


--===============0321741012==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0321741012==--




From ips-bounces@ietf.org Mon Apr 17 19:07:07 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVcoC-0005Kw-NK; Mon, 17 Apr 2006 19:07:04 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVcoC-0005Kr-53
	for ips@ietf.org; Mon, 17 Apr 2006 19:07:04 -0400
Received: from ausc60pc101.us.dell.com ([143.166.85.206])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVcoA-0003I5-Hh
	for ips@ietf.org; Mon, 17 Apr 2006 19:07:04 -0400
DomainKey-Signature: s=smtpout; d=dell.com; c=nofws; q=dns;
	b=D9u/y3VHPJJmIUI4T72/qis97UIXu4PdhzdEk0hWSkB93oiCXqk1e9TL5L3Aj+HLYkAmYchNHwPiLZdbMGOUR/a/dYTLOTyKyMrQJFWZ3JhKdpxnIIZP7PWOwFSQfV64;
Received: from ausx3bpc102.aus.amer.dell.com ([10.30.101.52])
	by ausc60pc101.us.dell.com with ESMTP; 17 Apr 2006 18:07:02 -0500
X-IronPort-AV: i="4.04,127,1144040400"; 
	d="scan'208,217"; a="1326662:sNHT77024628"
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] Target Behavior Clarifications
Date: Mon, 17 Apr 2006 18:07:01 -0500
Message-ID: <389040536173ED4AADA5EFEA9633358601677A0E@ausx3mpc106.aus.amer.dell.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] Target Behavior Clarifications
Thread-Index: AcZicbj0fjQ/Ok5DQLam+pNEMGfQCwAAVC7A
From: <Jacob_Cherian@Dell.com>
To: <Sanjay_Goyal@pmc-sierra.com>,
	<ips@ietf.org>
X-OriginalArrivalTime: 17 Apr 2006 23:07:01.0813 (UTC)
	FILETIME=[A2C3A650:01C66273]
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 9b281509fec590bb711c36d4c3ba4f74
Cc: 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1626107677=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1626107677==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66273.A2665434"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66273.A2665434
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Sanjay,

  Thanks.

=20

 There seems to be an inconsistency in the spec in terms of how the
target is expected to behave when it detects initiator behavior that is
not in line with the negotiated operational parameters. As per the spec
if the target receives any non-immediate unsolicited data when
InitialR2T=3DYes, it shall fail the command with a CHECK CONDITION
(0B/0C/0C - COMMAND ABORTED, WRITE ERROR - UNEXPECTED UNSOLICITED DATA)
- Why is this a special case?

=20

Thanks,

Jacob

=20

________________________________

From: Sanjay Goyal [mailto:Sanjay_Goyal@pmc-sierra.com]=20
Sent: Monday, April 17, 2006 5:53 PM
To: Cherian, Jacob; ips@ietf.org
Subject: RE: [Ips] Target Behavior Clarifications

=20

Hi,

=20

What it indicates is that the other side is misbehaving. It should be
treated as protocol error and the session should be terminated.

=20

-Sanjay

=20

________________________________

From: Jacob_Cherian@Dell.com [mailto:Jacob_Cherian@Dell.com]=20
Sent: Monday, April 17, 2006 2:49 PM
To: ips@ietf.org
Subject: [Ips] Target Behavior Clarifications

A couple of quick questions?

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command?=20

- If the PDU is part of a login?

2) What should the target behaviour be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

Any clarification would be greatly appreciated.=20

Thanks,

Jacob

=20


------_=_NextPart_001_01C66273.A2665434
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>Target Behavior Clarifications</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
h2
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:55.8pt;
	text-indent:-.4in;
	page-break-after:avoid;
	mso-list:l0 level2 lfo6;
	font-size:14.0pt;
	font-family:Arial;
	font-weight:bold;
	font-style:italic;}
h5
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:54.9pt;
	text-indent:-.7in;
	mso-list:l0 level5 lfo6;
	font-size:12.0pt;
	font-family:Arial;
	font-weight:bold;}
p.MsoToc4, li.MsoToc4, div.MsoToc4
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
p.MsoToc5, li.MsoToc5, div.MsoToc5
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:48.0pt;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
p.Heading2-TNR, li.Heading2-TNR, div.Heading2-TNR
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:.4in;
	text-indent:-.4in;
	page-break-after:avoid;
	mso-list:l1 level2 lfo5;
	font-size:14.0pt;
	font-family:"Times New Roman";
	font-weight:bold;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 27.35pt 1.0in 27.35pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:251858005;
	mso-list-template-ids:1648100940;}
@list l0:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l0:level2
	{mso-level-style-link:"Heading 2";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:55.8pt;
	mso-level-number-position:left;
	margin-left:55.8pt;
	text-indent:-.4in;}
@list l0:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l0:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:0in;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level5
	{mso-level-style-link:"Heading 5";
	mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:54.9pt;
	mso-level-number-position:left;
	margin-left:54.9pt;
	text-indent:-.7in;}
@list l0:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l0:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l0:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l0:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l1
	{mso-list-id:1942570602;
	mso-list-template-ids:-1987138506;}
@list l1:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l1:level2
	{mso-level-style-link:"Heading 2 - TNR";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.4in;
	text-indent:-.4in;}
@list l1:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l1:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.6in;}
@list l1:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.7in;
	mso-level-number-position:left;
	margin-left:.7in;
	text-indent:-.7in;}
@list l1:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l1:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l1:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l1:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Sanjay,<o:p></o:p></span></font></p>=


<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp; =
Thanks.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&nbsp;</span></font><font size=3D2
color=3Dblack face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:black'>There seems to be an inconsistency in the spec in terms of =
how the
target is expected to behave when it detects initiator behavior that is =
not in
line with the negotiated operational parameters. As per the spec =
</span></font><font
size=3D2 color=3Dblack face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:black'>if the target receives any </span></font><font size=3D2 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:black'>non-immediate</s=
pan></font><font
size=3D2 color=3Dblack face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;
color:black'> unsolicited data when InitialR2T=3DYes, it shall fail the =
command
with a CHECK CONDITION (0B/0C/0C &#8211; COMMAND ABORTED, WRITE ERROR -
UNEXPECTED UNSOLICITED DATA) &#8211; Why is this a special =
case?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Thanks,<o:p></o:p></span></font></p>=


<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Jacob<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
Sanjay Goyal
[mailto:Sanjay_Goyal@pmc-sierra.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, April 17, =
2006 5:53
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Cherian,
 Jacob</st1:PersonName>; ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [Ips] Target =
Behavior
Clarifications</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Hi,</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>What it indicates is that the other =
side
is misbehaving. It should be treated as protocol error and the session =
should
be terminated.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>-Sanjay</span></font><o:p></o:p></p>=


<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabIndex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</spa=
n></font></b><font
size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma'>
Jacob_Cherian@Dell.com [mailto:Jacob_Cherian@Dell.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Monday, April 17, =
2006 2:49
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [Ips] Target =
Behavior
Clarifications</span></font><o:p></o:p></p>

<p><a name=3D""><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial'><!-- Converted from text/rtf format -->A couple of quick =
questions?</span></font></a><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>What
should the</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>behavior of a</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>target be if it receives a =
PDU</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>on a
connection,</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>larger than what it declared</span></font> <font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>with</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>MaxRecvDataSegmentLength:</s=
pan></font><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>If the
PDU is part of a SCSI command?</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-
If the PDU is part of a login?</span></font><o:p></o:p></p>

<p><font size=3D2 color=3D"#0000a0" face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:#0000A0'>2)</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>What
should the target behaviour be if</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>the
initiator sends it more data than</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>MaxBurstLength?</span></font=
><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3)
What should the target</span></font> <font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>behavior be if the =
initiator sends
more data than</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>FirstBurstLength?</span></font><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Any
clarification would be greatly appreciated.</span></font> =
<o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Thanks,</span></font><o:p></=
o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Jacob</span></font><o:p></o:=
p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

------_=_NextPart_001_01C66273.A2665434--


--===============1626107677==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1626107677==--




From ips-bounces@ietf.org Tue Apr 18 02:11:25 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVjQo-00042n-KN; Tue, 18 Apr 2006 02:11:22 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVjQn-00042i-Bt
	for ips@ietf.org; Tue, 18 Apr 2006 02:11:21 -0400
Received: from mtagate2.de.ibm.com ([195.212.29.151])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVjQi-0007SL-QZ
	for ips@ietf.org; Tue, 18 Apr 2006 02:11:21 -0400
Received: from d12nrmr1607.megacenter.de.ibm.com
	(d12nrmr1607.megacenter.de.ibm.com [9.149.167.49])
	by mtagate2.de.ibm.com (8.13.6/8.13.6) with ESMTP id k3I6BFFU036850
	for <ips@ietf.org>; Tue, 18 Apr 2006 06:11:15 GMT
Received: from d12av02.megacenter.de.ibm.com (d12av02.megacenter.de.ibm.com
	[9.149.165.228])
	by d12nrmr1607.megacenter.de.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k3I6CEmw013974 for <ips@ietf.org>; Tue, 18 Apr 2006 08:12:14 +0200
Received: from d12av02.megacenter.de.ibm.com (loopback [127.0.0.1])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.13.3) with ESMTP id
	k3I6BFPC031190 for <ips@ietf.org>; Tue, 18 Apr 2006 08:11:15 +0200
Received: from d12mc102.megacenter.de.ibm.com (d12mc102.megacenter.de.ibm.com
	[9.149.167.114])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.12.11) with ESMTP id
	k3I6BF5i031186; Tue, 18 Apr 2006 08:11:15 +0200
In-Reply-To: <389040536173ED4AADA5EFEA9633358601677A0C@ausx3mpc106.aus.amer.dell.com>
To: <Jacob_Cherian@Dell.com>
Subject: Re: [Ips] Target Behavior Clarifications
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0 August 18, 2005
From: Julian Satran <Julian_Satran@il.ibm.com>
Message-ID: <OF51C400A6.F9672E49-ONC2257154.001D3711-C2257154.0021F898@il.ibm.com>
Date: Tue, 18 Apr 2006 09:12:10 +0300
X-MIMETrack: Serialize by Router on D12MC102/12/M/IBM(Release 7.0HF90 |
	November 16, 2005) at 18/04/2006 09:12:13,
	Serialize complete at 18/04/2006 09:12:13
X-Spam-Score: 0.1 (/)
X-Scan-Signature: f60d0f7806b0c40781eee6b9cd0b2135
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0842869812=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============0842869812==
Content-Type: multipart/alternative;
	boundary="=_alternative 001D9251C2257154_="

This is a multipart message in MIME format.
--=_alternative 001D9251C2257154_=
Content-Type: text/plain; charset="US-ASCII"

<Jacob_Cherian@Dell.com> wrote on 18/04/2006 00:48:49:

> A couple of quick questions?
> 1) What should the behavior of a target be if it receives a PDU on a
> connection, larger than what it declared with MaxRecvDataSegmentLength:
> - If the PDU is part of a SCSI command? 
protocol error but you will have also to terminate the SCSI command
> - If the PDU is part of a login?
The MaxRecvDataSegmentLength is not "fixed" untill login is finished so 
the target must be ready to accept the default length.
> 2) What should the target behaviour be if the initiator sends it 
> more data than MaxBurstLength?
As above
> 3) What should the target behavior be if the initiator sends more data 
than 
> FirstBurstLength?
that is specially bad as the target may have already issued R2Ts - drop 
the session but terminate the command.
> Any clarification would be greatly appreciated. 
> Thanks,
> Jacob
> _______________________________________________
> Ips mailing list
> Ips@ietf.org
> https://www1.ietf.org/mailman/listinfo/ips

--=_alternative 001D9251C2257154_=
Content-Type: text/html; charset="US-ASCII"


<br>
<br><tt><font size=2>&lt;Jacob_Cherian@Dell.com&gt; wrote on 18/04/2006
00:48:49:<br>
<br>
&gt; A couple of quick questions?</font></tt>
<br><tt><font size=2>&gt; 1) What should the behavior of a target be if
it receives a PDU on a<br>
&gt; connection, larger than what it declared with MaxRecvDataSegmentLength:</font></tt>
<br><tt><font size=2>&gt; - If the PDU is part of a SCSI command? </font></tt>
<br><tt><font size=2>protocol error but you will have also to terminate
the SCSI command</font></tt>
<br><tt><font size=2>&gt; - If the PDU is part of a login?</font></tt>
<br><tt><font size=2>The MaxRecvDataSegmentLength is not &quot;fixed&quot;
untill login is finished so the target must be ready to accept the default
length.</font></tt>
<br><tt><font size=2>&gt; 2) What should the target behaviour be if the
initiator sends it <br>
&gt; more data than MaxBurstLength?</font></tt>
<br><tt><font size=2>As above</font></tt>
<br><tt><font size=2>&gt; 3) What should the target behavior be if the
initiator sends more data than <br>
&gt; FirstBurstLength?</font></tt>
<br><tt><font size=2>that is specially bad as the target may have already
issued R2Ts - drop the session but terminate the command.</font></tt>
<br><tt><font size=2>&gt; Any clarification would be greatly appreciated.
</font></tt>
<br><tt><font size=2>&gt; Thanks,</font></tt>
<br><tt><font size=2>&gt; Jacob</font></tt>
<br><tt><font size=2>&gt; _______________________________________________<br>
&gt; Ips mailing list<br>
&gt; Ips@ietf.org<br>
&gt; https://www1.ietf.org/mailman/listinfo/ips<br>
</font></tt>
--=_alternative 001D9251C2257154_=--


--===============0842869812==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0842869812==--




From ips-bounces@ietf.org Tue Apr 18 02:11:28 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVjQu-0004EW-1h; Tue, 18 Apr 2006 02:11:28 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVjQs-0004ER-72
	for ips@ietf.org; Tue, 18 Apr 2006 02:11:26 -0400
Received: from mtagate2.de.ibm.com ([195.212.29.151])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVjQl-0007SM-G2
	for ips@ietf.org; Tue, 18 Apr 2006 02:11:26 -0400
Received: from d12nrmr1607.megacenter.de.ibm.com
	(d12nrmr1607.megacenter.de.ibm.com [9.149.167.49])
	by mtagate2.de.ibm.com (8.13.6/8.13.6) with ESMTP id k3I6BIeL109022
	for <ips@ietf.org>; Tue, 18 Apr 2006 06:11:18 GMT
Received: from d12av04.megacenter.de.ibm.com (d12av04.megacenter.de.ibm.com
	[9.149.165.229])
	by d12nrmr1607.megacenter.de.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k3I6CHmw038688 for <ips@ietf.org>; Tue, 18 Apr 2006 08:12:17 +0200
Received: from d12av04.megacenter.de.ibm.com (loopback [127.0.0.1])
	by d12av04.megacenter.de.ibm.com (8.12.11/8.13.3) with ESMTP id
	k3I6BIU1031995 for <ips@ietf.org>; Tue, 18 Apr 2006 08:11:18 +0200
Received: from d12mc102.megacenter.de.ibm.com (d12mc102.megacenter.de.ibm.com
	[9.149.167.114])
	by d12av04.megacenter.de.ibm.com (8.12.11/8.12.11) with ESMTP id
	k3I6BIa2031992; Tue, 18 Apr 2006 08:11:18 +0200
In-Reply-To: <389040536173ED4AADA5EFEA9633358601677A0E@ausx3mpc106.aus.amer.dell.com>
To: <Jacob_Cherian@Dell.com>
Subject: RE: [Ips] Target Behavior Clarifications
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0 August 18, 2005
From: Julian Satran <Julian_Satran@il.ibm.com>
Message-ID: <OF166B3FA9.097E64F0-ONC2257154.001DD46E-C2257154.0021F976@il.ibm.com>
Date: Tue, 18 Apr 2006 09:12:12 +0300
X-MIMETrack: Serialize by Router on D12MC102/12/M/IBM(Release 7.0HF90 |
	November 16, 2005) at 18/04/2006 09:12:16,
	Serialize complete at 18/04/2006 09:12:16
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 0ff9c467ad7f19c2a6d058acd7faaec8
Cc: ips@ietf.org, Sanjay_Goyal@pmc-sierra.com
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0455256943=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============0455256943==
Content-Type: multipart/alternative;
	boundary="=_alternative 001DFB12C2257154_="

This is a multipart message in MIME format.
--=_alternative 001DFB12C2257154_=
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

As far as I remember this was done to keep in line with FCP behavior (FCP=20
has no immediate data but can operate with unsolicited data).

Julo

<Jacob=5FCherian@Dell.com> wrote on 18/04/2006 02:07:01:

> Sanjay,
>   Thanks.
>=20
>  There seems to be an inconsistency in the spec in terms of how the=20
> target is expected to behave when it detects initiator behavior that
> is not in line with the negotiated operational parameters. As per=20
> the spec if the target receives any non-immediate unsolicited data=20
> when InitialR2T=3DYes, it shall fail the command with a CHECK=20
> CONDITION (0B/0C/0C ? COMMAND ABORTED, WRITE ERROR - UNEXPECTED=20
> UNSOLICITED DATA) ? Why is this a special case?
>=20
> Thanks,
> Jacob
>=20
>=20
> From: Sanjay Goyal [mailto:Sanjay=5FGoyal@pmc-sierra.com]=20
> Sent: Monday, April 17, 2006 5:53 PM
> To: Cherian, Jacob; ips@ietf.org
> Subject: RE: [Ips] Target Behavior Clarifications
>=20
> Hi,
>=20
> What it indicates is that the other side is misbehaving. It should=20
> be treated as protocol error and the session should be terminated.
>=20
> -Sanjay
>=20
>=20
> From: Jacob=5FCherian@Dell.com [mailto:Jacob=5FCherian@Dell.com]=20
> Sent: Monday, April 17, 2006 2:49 PM
> To: ips@ietf.org
> Subject: [Ips] Target Behavior Clarifications
> A couple of quick questions?
> 1) What should the behavior of a target be if it receives a PDU on a
> connection, larger than what it declared with MaxRecvDataSegmentLength:
> - If the PDU is part of a SCSI command?=20
> - If the PDU is part of a login?
> 2) What should the target behaviour be if the initiator sends it=20
> more data than MaxBurstLength?
> 3) What should the target behavior be if the initiator sends more data=20
than=20
> FirstBurstLength?
> Any clarification would be greatly appreciated.=20
> Thanks,
> Jacob
>  =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> Ips mailing list
> Ips@ietf.org
> https://www1.ietf.org/mailman/listinfo/ips

--=_alternative 001DFB12C2257154_=
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable


<br><font size=3D2 face=3D"sans-serif">As far as I remember this was done to
keep in line with FCP behavior (FCP has no immediate data but can operate
with unsolicited data).</font>
<br>
<br><font size=3D2 face=3D"sans-serif">Julo</font>
<br>
<br><tt><font size=3D2>&lt;Jacob=5FCherian@Dell.com&gt; wrote on 18/04/2006
02:07:01:<br>
<br>
&gt; Sanjay,</font></tt>
<br><tt><font size=3D2>&gt; &nbsp; Thanks.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;There seems to be an inconsistency in the
spec in terms of how the <br>
&gt; target is expected to behave when it detects initiator behavior that<b=
r>
&gt; is not in line with the negotiated operational parameters. As per
<br>
&gt; the spec if the target receives any non-immediate unsolicited data
<br>
&gt; when InitialR2T=3DYes, it shall fail the command with a CHECK <br>
&gt; CONDITION (0B/0C/0C &#8211; COMMAND ABORTED, WRITE ERROR - UNEXPECTED =
<br>
&gt; UNSOLICITED DATA) &#8211; Why is this a special case?</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Thanks,</font></tt>
<br><tt><font size=3D2>&gt; Jacob</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; <br>
&gt; From: Sanjay Goyal [mailto:Sanjay=5FGoyal@pmc-sierra.com] <br>
&gt; Sent: Monday, April 17, 2006 5:53 PM<br>
&gt; To: Cherian, Jacob; ips@ietf.org<br>
&gt; Subject: RE: [Ips] Target Behavior Clarifications</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Hi,</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; What it indicates is that the other side is mis=
behaving.
It should <br>
&gt; be treated as protocol error and the session should be terminated.</fo=
nt></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; -Sanjay</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; <br>
&gt; From: Jacob=5FCherian@Dell.com [mailto:Jacob=5FCherian@Dell.com] <br>
&gt; Sent: Monday, April 17, 2006 2:49 PM<br>
&gt; To: ips@ietf.org<br>
&gt; Subject: [Ips] Target Behavior Clarifications</font></tt>
<br><tt><font size=3D2>&gt; A couple of quick questions?</font></tt>
<br><tt><font size=3D2>&gt; 1) What should the behavior of a target be if
it receives a PDU on a<br>
&gt; connection, larger than what it declared with MaxRecvDataSegmentLength=
:</font></tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a SCSI command? </font>=
</tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a login?</font></tt>
<br><tt><font size=3D2>&gt; 2) What should the target behaviour be if the
initiator sends it <br>
&gt; more data than MaxBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; 3) What should the target behavior be if the
initiator sends more data than <br>
&gt; FirstBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; Any clarification would be greatly appreciated.
</font></tt>
<br><tt><font size=3D2>&gt; Thanks,</font></tt>
<br><tt><font size=3D2>&gt; Jacob</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F<br>
&gt; Ips mailing list<br>
&gt; Ips@ietf.org<br>
&gt; https://www1.ietf.org/mailman/listinfo/ips<br>
</font></tt>
--=_alternative 001DFB12C2257154_=--


--===============0455256943==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0455256943==--




From ips-bounces@ietf.org Tue Apr 18 02:17:04 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVjWD-0006dj-6M; Tue, 18 Apr 2006 02:16:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVjWC-0006dd-6Z
	for ips@ietf.org; Tue, 18 Apr 2006 02:16:56 -0400
Received: from e5.ny.us.ibm.com ([32.97.182.145])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVjW4-0007Zd-0b
	for ips@ietf.org; Tue, 18 Apr 2006 02:16:55 -0400
Received: from d01relay04.pok.ibm.com (d01relay04.pok.ibm.com [9.56.227.236])
	by e5.ny.us.ibm.com (8.12.11.20060308/8.12.11) with ESMTP id
	k3I6GlDp020317 for <ips@ietf.org>; Tue, 18 Apr 2006 02:16:47 -0400
Received: from d01av03.pok.ibm.com (d01av03.pok.ibm.com [9.56.224.217])
	by d01relay04.pok.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k3I6GlMj158044 for <ips@ietf.org>; Tue, 18 Apr 2006 02:16:47 -0400
Received: from d01av03.pok.ibm.com (loopback [127.0.0.1])
	by d01av03.pok.ibm.com (8.12.11/8.13.3) with ESMTP id k3I6GlLs007176
	for <ips@ietf.org>; Tue, 18 Apr 2006 02:16:47 -0400
Received: from d01ml604.pok.ibm.com (d01ml604.pok.ibm.com [9.56.227.90])
	by d01av03.pok.ibm.com (8.12.11/8.12.11) with ESMTP id k3I6Gl3T007173; 
	Tue, 18 Apr 2006 02:16:47 -0400
In-Reply-To: <000801c66250$6ecf8f80$06031eac@ivivity.com>
Importance: Normal
MIME-Version: 1.0
Sensitivity: 
To: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>
Subject: Re: [Ips] MPA alignment
X-Mailer: Lotus Notes Release 6.5.2 June 01, 2004
Message-ID: <OFCC4E82D7.DB1F28F0-ON85257154.002025C5-88257154.00227E1B@us.ibm.com>
From: Mike Ko <mako@almaden.ibm.com>
Date: Mon, 17 Apr 2006 23:16:45 -0700
X-MIMETrack: Serialize by Router on D01ML604/01/M/IBM(Release 7.0.1HF91 |
	March 28, 2006) at 04/18/2006 02:16:46,
	Serialize complete at 04/18/2006 02:16:46
X-Spam-Score: 0.1 (/)
X-Scan-Signature: a8a20a483a84f747e56475e290ee868e
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1411197814=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============1411197814==
Content-Type: multipart/alternative;
	boundary="=_alternative 00227E1A88257154_="

This is a multipart message in MIME format.
--=_alternative 00227E1A88257154_=
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

Eddy,

If your question is about MPA behavior in general, then it should be=20
directed to the rddp forum.

Assuming your question is related to iSER, then if iWARP is implemented in =

software and uses the existing TCP/IP stack, then it cannot guarantee that =

FPDU's will be aligned with TCP segments.  For the general case where=20
iWARP is implemented in an RNIC with an integrated TCP/IP stack, then it=20
is to the RNIC vendor's advantage to optimize his product's performance=20
and therefore FPDU's should be aligned with TCP segments.  However, the=20
receiver can still receive FPDU's which are not aligned with TCP segments=20
if there are resegmenting middleboxes somewhere in the connection path.

Mike=20
To:     <ips@ietf.org>
cc:     =20
Subject:        [Ips] MPA alignment


It is preferable to have TCP sender to align MPA header where a TCP=20
segment begins and to keep the MPA FPDU within a TCP segment, so that the=20
receiver hardware doesn?t need to temporarily buffer the FPDU for the CRC=20
checking.=20
=20
Does anyone know of any software or hardware that is not an FPDU alignment =

sender?
Does anyone have a feel for the likelihood of software or hardware to not=20
align FPDU's on a TCP segment?
=20
Eddy=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips


--=_alternative 00227E1A88257154_=
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable


<br><font size=3D2 face=3D"sans-serif">Eddy,</font>
<br>
<br><font size=3D2 face=3D"sans-serif">If your question is about MPA behavi=
or
in general, then it should be directed to the rddp forum.</font>
<br>
<br><font size=3D2 face=3D"sans-serif">Assuming your question is related to
iSER, then if iWARP is implemented in software and uses the existing TCP/IP
stack, then it cannot guarantee that FPDU's will be aligned with TCP segmen=
ts.
&nbsp;For the general case where iWARP is implemented in an RNIC with an
integrated TCP/IP stack, then it is to the RNIC vendor's advantage to optim=
ize
his product's performance and therefore FPDU's should be aligned with TCP
segments. &nbsp;However, the receiver can still receive FPDU's which are
not aligned with TCP segments if there are resegmenting middleboxes somewhe=
re
in the connection path.</font>
<br>
<br><font size=3D2 face=3D"sans-serif">Mike &nbsp;</font>
<p><font size=3D1 color=3D#800080 face=3D"sans-serif">To: &nbsp; &nbsp; &nb=
sp;
&nbsp;</font><font size=3D1 face=3D"sans-serif">&lt;ips@ietf.org&gt;</font>
<br><font size=3D1 color=3D#800080 face=3D"sans-serif">cc: &nbsp; &nbsp; &n=
bsp;
&nbsp; </font>
<br><font size=3D1 color=3D#800080 face=3D"sans-serif">Subject: &nbsp; &nbs=
p;
&nbsp; &nbsp;</font><font size=3D1 face=3D"sans-serif">[Ips] MPA alignment<=
/font>
<br>
<br>
<br><font size=3D2 face=3D"Arial">It is preferable to have TCP sender to al=
ign
MPA header where a TCP segment begins and to keep the MPA FPDU within a
TCP segment, so that the receiver hardware doesn&#8217;t need to temporarily
buffer the FPDU for the CRC checking. &nbsp;</font>
<br><font size=3D3>&nbsp;</font>
<br><font size=3D2 face=3D"Arial">Does anyone know of any software or hardw=
are
that is not an FPDU alignment sender?</font>
<br><font size=3D2 face=3D"Arial">Does anyone have a feel for the likelihood
of software or hardware to not align FPDU's on a TCP segment?</font>
<br><font size=3D3>&nbsp;</font>
<br><font size=3D2 face=3D"Arial">Eddy</font><font size=3D2><tt>=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F<br>
Ips mailing list<br>
Ips@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/ips<br>
</tt></font>
<br>
--=_alternative 00227E1A88257154_=--


--===============1411197814==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1411197814==--




From ips-bounces@ietf.org Tue Apr 18 08:47:56 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVpcQ-0006ua-9r; Tue, 18 Apr 2006 08:47:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVpcP-0006uV-An
	for ips@ietf.org; Tue, 18 Apr 2006 08:47:45 -0400
Received: from sccrmhc11.comcast.net ([204.127.200.81])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVpcP-0004vF-0W
	for ips@ietf.org; Tue, 18 Apr 2006 08:47:45 -0400
Received: from ivvtdkv0981 (unknown[72.158.100.2])
	by comcast.net (sccrmhc11) with SMTP
	id <2006041812474401100eij0he>; Tue, 18 Apr 2006 12:47:44 +0000
Message-ID: <001201c662e6$47f84190$7b08010a@ivivity.com>
From: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>
To: "Mike Ko" <mako@almaden.ibm.com>
References: <OFCC4E82D7.DB1F28F0-ON85257154.002025C5-88257154.00227E1B@us.ibm.com>
Subject: Re: [Ips] MPA alignment
Date: Tue, 18 Apr 2006 08:47:40 -0400
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2869
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
X-Spam-Score: 0.1 (/)
X-Scan-Signature: bf422c85703d3d847fb014987125ac48
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1529990364=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1529990364==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000F_01C662C4.C065D8D0"

This is a multi-part message in MIME format.

------=_NextPart_000_000F_01C662C4.C065D8D0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Thanks,

Here is my feeling on this. If one were to use a standard TCP/IP stack =
(that does copying) then it is a bit silly to use iSER. If one were to =
use a software implementation and write/modify the stack to get the =
desired effects of DDP then he will probably heed to the alignment notes =
in the spec. So if one were to support misaligned segments using a =
slower method then it would be OK.


Eddy
  ----- Original Message -----=20
  From: Mike Ko=20
  To: Eddy Quicksall=20
  Cc: ips@ietf.org=20
  Sent: Tuesday, April 18, 2006 2:16 AM
  Subject: Re: [Ips] MPA alignment



  Eddy,=20

  If your question is about MPA behavior in general, then it should be =
directed to the rddp forum.=20

  Assuming your question is related to iSER, then if iWARP is =
implemented in software and uses the existing TCP/IP stack, then it =
cannot guarantee that FPDU's will be aligned with TCP segments.  For the =
general case where iWARP is implemented in an RNIC with an integrated =
TCP/IP stack, then it is to the RNIC vendor's advantage to optimize his =
product's performance and therefore FPDU's should be aligned with TCP =
segments.  However, the receiver can still receive FPDU's which are not =
aligned with TCP segments if there are resegmenting middleboxes =
somewhere in the connection path.=20

  Mike  =20
  To:        <ips@ietf.org>=20
  cc:        =20
  Subject:        [Ips] MPA alignment=20


  It is preferable to have TCP sender to align MPA header where a TCP =
segment begins and to keep the MPA FPDU within a TCP segment, so that =
the receiver hardware doesn't need to temporarily buffer the FPDU for =
the CRC checking.  =20
   =20
  Does anyone know of any software or hardware that is not an FPDU =
alignment sender?=20
  Does anyone have a feel for the likelihood of software or hardware to =
not align FPDU's on a TCP segment?=20
   =20
  Eddy_______________________________________________
  Ips mailing list
  Ips@ietf.org
  https://www1.ietf.org/mailman/listinfo/ips





-------------------------------------------------------------------------=
-----


  _______________________________________________
  Ips mailing list
  Ips@ietf.org
  https://www1.ietf.org/mailman/listinfo/ips

------=_NextPart_000_000F_01C662C4.C065D8D0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2873" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>Thanks,</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3DVerdana size=3D2>
<P class=3DMsoNormal style=3D"MARGIN: 0in 0in 0pt">Here is my feeling on =
this. If=20
one were to use a standard TCP/IP stack (that does copying)&nbsp;then it =
is a=20
bit silly to use iSER. If one were to use a software implementation and=20
write/modify the stack to get the desired effects of DDP then he will =
probably=20
heed to the alignment notes in the spec. So if one were to support =
misaligned=20
segments using a slower method then it would be OK.</P></FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Eddy</FONT></DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
  <A title=3Dmako@almaden.ibm.com =
href=3D"mailto:mako@almaden.ibm.com">Mike Ko</A>=20
  </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A=20
  title=3Deddy_quicksall_iVivity_iSCSI@Comcast.net=20
  href=3D"mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net">Eddy =
Quicksall</A>=20
  </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A title=3Dips@ietf.org=20
  href=3D"mailto:ips@ietf.org">ips@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Tuesday, April 18, 2006 =
2:16=20
  AM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> Re: [Ips] MPA =
alignment</DIV>
  <DIV><BR></DIV><BR><FONT face=3Dsans-serif size=3D2>Eddy,</FONT> =
<BR><BR><FONT=20
  face=3Dsans-serif size=3D2>If your question is about MPA behavior in =
general, then=20
  it should be directed to the rddp forum.</FONT> <BR><BR><FONT =
face=3Dsans-serif=20
  size=3D2>Assuming your question is related to iSER, then if iWARP is =
implemented=20
  in software and uses the existing TCP/IP stack, then it cannot =
guarantee that=20
  FPDU's will be aligned with TCP segments. &nbsp;For the general case =
where=20
  iWARP is implemented in an RNIC with an integrated TCP/IP stack, then =
it is to=20
  the RNIC vendor's advantage to optimize his product's performance and=20
  therefore FPDU's should be aligned with TCP segments. &nbsp;However, =
the=20
  receiver can still receive FPDU's which are not aligned with TCP =
segments if=20
  there are resegmenting middleboxes somewhere in the connection =
path.</FONT>=20
  <BR><BR><FONT face=3Dsans-serif size=3D2>Mike &nbsp;</FONT>=20
  <P><FONT face=3Dsans-serif color=3D#800080 size=3D1>To: &nbsp; &nbsp; =
&nbsp;=20
  &nbsp;</FONT><FONT face=3Dsans-serif =
size=3D1>&lt;ips@ietf.org&gt;</FONT>=20
  <BR><FONT face=3Dsans-serif color=3D#800080 size=3D1>cc: &nbsp; &nbsp; =
&nbsp; &nbsp;=20
  </FONT><BR><FONT face=3Dsans-serif color=3D#800080 size=3D1>Subject: =
&nbsp; &nbsp;=20
  &nbsp; &nbsp;</FONT><FONT face=3Dsans-serif size=3D1>[Ips] MPA =
alignment</FONT>=20
  <BR><BR><BR><FONT face=3DArial size=3D2>It is preferable to have TCP =
sender to=20
  align MPA header where a TCP segment begins and to keep the MPA FPDU =
within a=20
  TCP segment, so that the receiver hardware doesn=92t need to =
temporarily buffer=20
  the FPDU for the CRC checking. &nbsp;</FONT> <BR><FONT =
size=3D3>&nbsp;</FONT>=20
  <BR><FONT face=3DArial size=3D2>Does anyone know of any software or =
hardware that=20
  is not an FPDU alignment sender?</FONT> <BR><FONT face=3DArial =
size=3D2>Does=20
  anyone have a feel for the likelihood of software or hardware to not =
align=20
  FPDU's on a TCP segment?</FONT> <BR><FONT size=3D3>&nbsp;</FONT> =
<BR><FONT=20
  face=3DArial size=3D2>Eddy</FONT><FONT=20
  size=3D2><TT>_______________________________________________<BR>Ips =
mailing=20
  =
list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips<BR></T=
T></FONT><BR>
  <P>
  <HR>

  <P></P>_______________________________________________<BR>Ips mailing=20
  =
list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips<BR></B=
LOCKQUOTE></BODY></HTML>

------=_NextPart_000_000F_01C662C4.C065D8D0--



--===============1529990364==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1529990364==--





From ips-bounces@ietf.org Tue Apr 18 13:33:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVu4U-0003Aa-2C; Tue, 18 Apr 2006 13:33:02 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVu4S-0003AR-60
	for ips@ietf.org; Tue, 18 Apr 2006 13:33:00 -0400
Received: from mononoke.wasabisystems.com ([66.173.145.228])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVu4Q-0003ul-Nv
	for ips@ietf.org; Tue, 18 Apr 2006 13:33:00 -0400
Received: from [10.0.0.10] (h-66-166-188-91.sndacagl.covad.net [66.166.188.91])
	by mononoke.wasabisystems.com (Postfix) with ESMTP
	id 765EA87181; Tue, 18 Apr 2006 13:32:57 -0400 (EDT)
In-Reply-To: <389040536173ED4AADA5EFEA9633358601677A0C@ausx3mpc106.aus.amer.dell.com>
References: <389040536173ED4AADA5EFEA9633358601677A0C@ausx3mpc106.aus.amer.dell.com>
Mime-Version: 1.0 (Apple Message framework v749.3)
Message-Id: <C54BD73D-7050-462C-8379-586E4FEB2061@wasabisystems.com>
From: William Studenmund <wrstuden@wasabisystems.com>
Subject: Re: [Ips] Target Behavior Clarifications
Date: Tue, 18 Apr 2006 10:32:51 -0700
To: <Jacob_Cherian@Dell.com>
X-Pgp-Agent: GPGMail 1.1.2 (Tiger)
X-Mailer: Apple Mail (2.749.3)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0770535483960d190d4a0d020e7060bd
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1129477558=="
Errors-To: ips-bounces@ietf.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============1129477558==
Content-Type: multipart/signed; protocol="application/pgp-signature";
	micalg=pgp-sha1; boundary="Apple-Mail-2--429353136"
Content-Transfer-Encoding: 7bit

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--Apple-Mail-2--429353136
Content-Type: multipart/alternative; boundary=Apple-Mail-1--429353241


--Apple-Mail-1--429353241
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	delsp=yes;
	format=flowed

On Apr 17, 2006, at 2:48 PM, <Jacob_Cherian@Dell.com>  
<Jacob_Cherian@Dell.com> wrote:

> A couple of quick questions?
>
> 1) What should the behavior of a target be if it receives a PDU on  
> a connection, larger than what it declared with  
> MaxRecvDataSegmentLength:
>
> - If the PDU is part of a SCSI command?
>
> - If the PDU is part of a login?

Drop the connection. Note, the session may still stick around as part  
of recovery processing.

Also, during login (before FFP), the MaxRecvDataSegmentLength in  
force is 8k, regardless of announced values.

> 2) What should the target behaviour be if the initiator sends it  
> more data than MaxBurstLength?
>
> 3) What should the target behavior be if the initiator sends more  
> data than FirstBurstLength?
There are specific sense and ASC/Q values for these errors.

These are treated as SCSI errors 1) because you have to give some  
explanation for why you killed the SCSI task, and 2) because it is  
not obvious which PDU in the burst was "too much." While you might  
want to say it was the last one, that isn't necessarily true.

Note also that to trigger these errors, all the data placement had to  
stay within the TTT bounds and you have to be in DataPDUInOrder=No.  
That's the only way you can really write the same area twice. Most  
other errors involved in sending too much data in a burst would  
trigger an iSCSI protocol error by placing data outside the bounds of  
the TTT.

Take care,

Bill
--Apple-Mail-1--429353241
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=US-ASCII

<HTML><BODY style=3D"word-wrap: break-word; -khtml-nbsp-mode: space; =
-khtml-line-break: after-white-space; "><DIV><DIV>On Apr 17, 2006, at =
2:48 PM, &lt;<A =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</A>&gt; =
&lt;<A =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</A>&gt; =
wrote:</DIV><BR class=3D"Apple-interchange-newline"><BLOCKQUOTE =
type=3D"cite"><P align=3D"LEFT"><SPAN lang=3D"en-us"></SPAN><A =
name=3D""><SPAN lang=3D"en-us"><FONT size=3D"2" face=3D"Arial">A couple =
of quick questions?</FONT></SPAN></A></P><P align=3D"LEFT"><SPAN =
lang=3D"en-us"><FONT size=3D"2" face=3D"Arial">1)</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">What should the</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">behavior</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN =
lang=3D"en-us"><FONT size=3D"2" face=3D"Arial"> of a</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">target</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN =
lang=3D"en-us"><FONT size=3D"2" face=3D"Arial"> be if it receives a =
PDU</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT =
size=3D"2" face=3D"Arial">on a connection,</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">larger than what it declared</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">with</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN =
lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">MaxRecvDataSegmentLength</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"><FONT size=3D"2" =
face=3D"Arial">:</FONT></SPAN></P><P align=3D"LEFT"><SPAN =
lang=3D"en-us"><FONT size=3D"2" face=3D"Arial">-</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT size=3D"2" =
face=3D"Arial">If the PDU is part of a SCSI command?</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> </SPAN></P><P =
align=3D"LEFT"><SPAN lang=3D"en-us"><FONT size=3D"2" face=3D"Arial">- =
I</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"><FONT =
size=3D"2" face=3D"Arial">f</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN=
 lang=3D"en-us"><FONT size=3D"2" face=3D"Arial"> the PDU is part of a =
login?</FONT></SPAN></P></BLOCKQUOTE><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Drop the connection. Note, =
the session may still stick around as part of recovery =
processing.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Also, during login (before =
FFP), the MaxRecvDataSegmentLength in force is 8k, regardless of =
announced values.</DIV><BR><BLOCKQUOTE type=3D"cite"><P =
align=3D"LEFT"><SPAN lang=3D"en-us"></SPAN><SPAN =
lang=3D"en-us"></SPAN></P><P align=3D"LEFT"><SPAN lang=3D"en-us"><FONT =
color=3D"#0000A0" size=3D"2" face=3D"Arial">2)</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> =
<FONT color=3D"#0000A0" size=3D"2" face=3D"Arial">What should the target =
behaviour be if</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> <FONT color=3D"#0000A0" =
size=3D"2" face=3D"Arial">the initiator sends it more data =
than</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> =
<FONT size=3D"2" face=3D"Arial">MaxBurstLength</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"><FONT size=3D"2" =
face=3D"Arial">?</FONT></SPAN></P><P align=3D"LEFT"><SPAN =
lang=3D"en-us"><FONT size=3D"2" face=3D"Arial">3) What should the =
target</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> =
<FONT size=3D"2" face=3D"Arial">behavior</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"><FONT size=3D"2" =
face=3D"Arial"> be if the initiator sends more data =
than</FONT></SPAN><SPAN lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"> =
<FONT size=3D"2" face=3D"Arial">FirstBurstLength</FONT></SPAN><SPAN =
lang=3D"en-us"></SPAN><SPAN lang=3D"en-us"><FONT size=3D"2" =
face=3D"Arial">?</FONT></SPAN></P></BLOCKQUOTE></DIV><DIV>There are =
specific sense and ASC/Q values for these errors.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>These are treated as SCSI =
errors 1) because you have to give some explanation for why you killed =
the SCSI task, and 2) because it is not obvious which PDU in the burst =
was "too much." While you might want to say it was the last one, that =
isn't necessarily true.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Note also that to trigger =
these errors, all the data placement had to stay within the TTT bounds =
and you have to be in DataPDUInOrder=3DNo. That's the only way you can =
really write the same area twice. Most other errors involved in sending =
too much data in a burst would trigger an iSCSI protocol error by =
placing data outside the bounds of the TTT.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Take care,</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Bill</DIV></BODY></HTML>=

--Apple-Mail-1--429353241--

--Apple-Mail-2--429353136
content-type: application/pgp-signature; x-mac-type=70674453;
	name=PGP.sig
content-description: This is a digitally signed message part
content-disposition: inline; filename=PGP.sig
content-transfer-encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFERSLJDJT2Egh26K0RAsx+AJ9xXLPmrbxskkVT4tNmV39MEPUo5wCbBuE5
nnUy7ilglMWkA+qx2Cly+SE=
=gCfr
-----END PGP SIGNATURE-----

--Apple-Mail-2--429353136--


--===============1129477558==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1129477558==--




From ips-bounces@ietf.org Tue Apr 18 14:11:06 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVuf5-0004wK-2I; Tue, 18 Apr 2006 14:10:51 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVuf3-0004wF-FZ
	for ips@ietf.org; Tue, 18 Apr 2006 14:10:49 -0400
Received: from ausc60pc101.us.dell.com ([143.166.85.206])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVuf2-0006UP-OG
	for ips@ietf.org; Tue, 18 Apr 2006 14:10:49 -0400
DomainKey-Signature: s=smtpout; d=dell.com; c=nofws; q=dns;
	b=Je3Ku6IaioOIeBLYqcAMXbwCO24peLlaTsruOgCo73VO/0lEP3DeCHvvytgYMcT+px4flG6D1SccUIBACA3WYREpG6qE/ZgngwkL6P12Jot2Y8wuPdsaIHT44ZHGGbX9;
Received: from ausx3bpc102.aus.amer.dell.com ([10.30.101.52])
	by ausc60pc101.us.dell.com with ESMTP; 18 Apr 2006 13:10:48 -0500
X-IronPort-AV: i="4.04,131,1144040400"; 
	d="scan'208,217"; a="1775791:sNHT89100585"
Content-class: urn:content-classes:message
MIME-Version: 1.0
x-mimeole: Produced By Microsoft Exchange V6.5.7226.0
Subject: RE: [Ips] Target Behavior Clarifications
Date: Tue, 18 Apr 2006 13:10:46 -0500
Message-ID: <389040536173ED4AADA5EFEA9633358601677A30@ausx3mpc106.aus.amer.dell.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] Target Behavior Clarifications
Thread-Index: AcZjDiOFcXbd7cbXTn+dIttlYI/OSAAAe1bg
From: <Jacob_Cherian@Dell.com>
To: <wrstuden@wasabisystems.com>,
	<ips@ietf.org>
X-OriginalArrivalTime: 18 Apr 2006 18:10:47.0718 (UTC)
	FILETIME=[6AFDBC60:01C66313]
X-Spam-Score: 0.2 (/)
X-Scan-Signature: dce614827510b4050294eeec86a3642d
Cc: 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1588358593=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1588358593==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66313.6A17F30E"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66313.6A17F30E
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Based on the responses from Bill and Julian this is what I have:

=20

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command?=20

<JC> I will drop the connection and terminate the task and generate a UA
with ASC/ASCQ value of 47h/7Fh - "SOME COMMANDS CLEARED BY ISCSI
PROTOCOL EVENT". If this is only connection in the session then I
generate a UA (06/29/00).

- If the PDU is part of a login?

<JC> I will drop the connection. Agreed that the default value of 8K
should be supported since login is not complete.

=20

2) What should the target behavior be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

<JC> I have two options here:=20

=20

a)    As per the spec: The target reports the "Incorrect amount of data"
condition if during data output the total data length to output is
greater than FirstBurstLength and the initiator sent unsolicited
non-immediate data but the total amount of unsolicited data is different
than FirstBurstLength. The target reports the same error when the amount
of data sent as a reply to an R2T does not match the amount requested.
(0B/0C/0D - Write Error, Incorrect Amount of Data). This should work.

=20

The only issue here is that the definition of the sense code does not
match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT
ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.

=20

=20

b)    Treat this as a really bad error and assume that I have an
initiator that does not play well and drop the session and kill the
command.

=20

=20

I am leaning towards (b). Help!!! Suggestions/Comments/Discussion.

=20

Thanks,=20
 =20
Jacob Cherian=20
Dell Inc.=20
Ph: (512) 723 3247=20

________________________________

From: William Studenmund [mailto:wrstuden@wasabisystems.com]=20
Sent: Tuesday, April 18, 2006 12:33 PM
To: Cherian, Jacob
Cc: ips@ietf.org
Subject: Re: [Ips] Target Behavior Clarifications

=20

On Apr 17, 2006, at 2:48 PM, <Jacob_Cherian@Dell.com>
<Jacob_Cherian@Dell.com> wrote:





A couple of quick questions?

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command?=20

- If the PDU is part of a login?

=20

Drop the connection. Note, the session may still stick around as part of
recovery processing.

=20

Also, during login (before FFP), the MaxRecvDataSegmentLength in force
is 8k, regardless of announced values.





2) What should the target behaviour be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

There are specific sense and ASC/Q values for these errors.

=20

These are treated as SCSI errors 1) because you have to give some
explanation for why you killed the SCSI task, and 2) because it is not
obvious which PDU in the burst was "too much." While you might want to
say it was the last one, that isn't necessarily true.

=20

Note also that to trigger these errors, all the data placement had to
stay within the TTT bounds and you have to be in DataPDUInOrder=3DNo.
That's the only way you can really write the same area twice. Most other
errors involved in sending too much data in a burst would trigger an
iSCSI protocol error by placing data outside the bounds of the TTT.

=20

Take care,

=20

Bill


------_=_NextPart_001_01C66313.6A17F30E
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
h2
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-indent:0in;
	page-break-after:avoid;
	mso-list:l0 level2 lfo6;
	font-size:14.0pt;
	font-family:Arial;
	font-weight:bold;
	font-style:italic;}
h5
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:54.9pt;
	text-indent:-.7in;
	mso-list:l0 level5 lfo6;
	font-size:12.0pt;
	font-family:Arial;
	font-weight:bold;}
p.MsoToc4, li.MsoToc4, div.MsoToc4
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
p.MsoToc5, li.MsoToc5, div.MsoToc5
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:48.0pt;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
p.Heading2-TNR, li.Heading2-TNR, div.Heading2-TNR
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-indent:0in;
	page-break-after:avoid;
	mso-list:l2 level2 lfo5;
	font-size:14.0pt;
	font-family:"Times New Roman";
	font-weight:bold;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 27.35pt 1.0in 27.35pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:251858005;
	mso-list-template-ids:1648100940;}
@list l0:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l0:level2
	{mso-level-style-link:"Heading 2";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:55.8pt;
	mso-level-number-position:left;
	margin-left:55.8pt;
	text-indent:-.4in;}
@list l0:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l0:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:0in;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level5
	{mso-level-style-link:"Heading 5";
	mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:54.9pt;
	mso-level-number-position:left;
	margin-left:54.9pt;
	text-indent:-.7in;}
@list l0:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l0:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l0:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l0:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l1
	{mso-list-id:308243067;
	mso-list-type:hybrid;
	mso-list-template-ids:-2143794388 67698711 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%1\)";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2
	{mso-list-id:1942570602;
	mso-list-template-ids:-1987138506;}
@list l2:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l2:level2
	{mso-level-style-link:"Heading 2 - TNR";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.4in;
	text-indent:-.4in;}
@list l2:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l2:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.6in;}
@list l2:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.7in;
	mso-level-number-position:left;
	margin-left:.7in;
	text-indent:-.7in;}
@list l2:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l2:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l2:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l2:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l3
	{mso-list-id:2018653805;
	mso-list-type:hybrid;
	mso-list-template-ids:-1653725056 67698705 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l3:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue style=3D'word-wrap: =
break-word;-khtml-nbsp-mode: space;
-khtml-line-break: after-white-space'>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Based on the responses from Bill =
and Julian
this is what I have:<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>What
should the</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>behavior of a</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>target be if it receives a =
PDU</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>on a
connection,</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>larger than what it declared</span></font> <font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>with</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>MaxRecvDataSegmentLength:</s=
pan></font><o:p></o:p></p>

<p style=3D'text-indent:.5in'><font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>-</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>If the PDU is part of a =
SCSI command?</span></font>
<o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>&lt;JC&gt;
I will drop the connection and terminate the task and generate a UA with =
ASC/ASCQ
value of 47h/7Fh - &quot;SOME COMMANDS CLEARED BY ISCSI PROTOCOL =
EVENT&quot;.
If this is only connection in the session then I generate a UA =
(06/29/00).<o:p></o:p></span></font></p>

<p style=3D'text-indent:.5in'><font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>- If the PDU is part of a =
login?<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.5in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>&lt;JC&gt;
I will drop the connection. Agreed that the default value of 8K should =
be
supported since login is not complete.</span></font><o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'text-indent:.5in;text-autospace:none'><font size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p><font size=3D2 color=3D"#0000a0" face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:#0000A0'>2)</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>What
should the target behavior be if</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>the
initiator sends it more data than</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>MaxBurstLength?<o:p></o:p></=
span></font></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3)
What should the target</span></font> <font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>behavior be if the =
initiator sends
more data than</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>FirstBurstLength?<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>&lt;JC&gt; I have =
two options
here: <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo8;
text-autospace:none'><![if !supportLists]><font size=3D2 face=3D"Courier =
New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'><span =
style=3D'mso-list:Ignore'>a)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>As per the spec: The =
target
reports the &quot;Incorrect amount of data&quot; condition if during =
data
output the total data length to output is greater than FirstBurstLength =
and the
initiator sent unsolicited non-immediate data but the total amount of
unsolicited data is different than FirstBurstLength. The target reports =
the
same error when the amount of data sent as a reply to an R2T does not =
match the
amount requested. (0B/0C/0D &#8211; Write Error, Incorrect Amount of =
Data).
This should work.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>The
only issue here is that the definition of the sense code does not match =
the definition
in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT ENOUGH UNSOLICITED =
DATA), which
is not quite what the iSCSI says.<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo8;
text-autospace:none'><![if !supportLists]><font size=3D2 face=3D"Courier =
New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'><span =
style=3D'mso-list:Ignore'>b)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>Treat this as a =
really bad
error and assume that I have an initiator that does not play well and =
drop the
session and kill the command.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>I am leaning towards (b). Help!!! =
Suggestions/Comments/Discussion.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Thanks,</span></font><font color=3Dnavy><span =
style=3D'color:
navy'> <br>
</span></font><font size=3D2 color=3Dnavy><span =
style=3D'font-size:10.0pt;color:navy'>&nbsp;</span></font><font
color=3Dnavy><span style=3D'color:navy'> <br>
</span></font><b><i><font size=3D2 color=3Dnavy face=3DTahoma><span =
style=3D'font-size:
10.0pt;font-family:Tahoma;color:navy;font-weight:bold;font-style:italic'>=
Jacob
Cherian</span></font></i></b><font color=3Dnavy><span =
style=3D'color:navy'> <br>
</span></font><i><font size=3D1 color=3Dnavy face=3DTahoma><span =
style=3D'font-size:
7.5pt;font-family:Tahoma;color:navy;font-style:italic'>Dell =
Inc.</span></font></i><font
color=3Dnavy><span style=3D'color:navy'> <br>
</span></font><i><font size=3D1 color=3Dnavy face=3DTahoma><span =
style=3D'font-size:
7.5pt;font-family:Tahoma;color:navy;font-style:italic'>Ph: (512) 723 =
3247</span></font></i><font
color=3Dnavy><span style=3D'color:navy'> </span></font><o:p></o:p></p>

</div>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
William
Studenmund [mailto:wrstuden@wasabisystems.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 18, =
2006
12:33 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Cherian,
 Jacob</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [Ips] Target =
Behavior
Clarifications</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>On Apr 17, 2006, at 2:48 PM, &lt;<a =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</a>&gt;
&lt;<a =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</a>&gt;
wrote:<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><br>
<br>
<o:p></o:p></span></font></p>

<p><a name=3D""><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial'>A couple of quick questions?</span></font></a><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>What
should the</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>behavior of a</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>target be if it receives a =
PDU</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>on a
connection,</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>larger than what it declared</span></font> <font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>with</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>MaxRecvDataSegmentLength:</s=
pan></font><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>If the
PDU is part of a SCSI command?</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-
If the PDU is part of a login?</span></font><o:p></o:p></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Drop the connection. Note, the session may still stick around as =
part
of recovery processing.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Also, during login (before FFP), the MaxRecvDataSegmentLength in =
force
is 8k, regardless of announced values.<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><br>
<br>
<o:p></o:p></span></font></p>

<p><font size=3D2 color=3D"#0000a0" face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:#0000A0'>2)</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>What
should the target behaviour be if</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>the
initiator sends it more data than</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>MaxBurstLength?</span></font=
><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3)
What should the target</span></font> <font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>behavior be if the =
initiator sends
more data than</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>FirstBurstLength?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>There are specific sense and ASC/Q values for these =
errors.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>These are treated as SCSI errors 1) because you have to give =
some
explanation for why you killed the SCSI task, and 2) because it is not =
obvious
which PDU in the burst was &quot;too much.&quot; While you might want to =
say it
was the last one, that isn't necessarily =
true.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Note also that to trigger these errors, all the data placement =
had to
stay within the TTT bounds and you have to be in DataPDUInOrder=3DNo. =
That's the
only way you can really write the same area twice. Most other errors =
involved
in sending too much data in a burst would trigger an iSCSI protocol =
error by
placing data outside the bounds of the TTT.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Take care,<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Bill<o:p></o:p></span></font></p>

</div>

</div>

</body>

</html>

------_=_NextPart_001_01C66313.6A17F30E--


--===============1588358593==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1588358593==--




From ips-bounces@ietf.org Tue Apr 18 14:15:11 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVujF-0005y5-0V; Tue, 18 Apr 2006 14:15:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVujD-0005y0-3v
	for ips@ietf.org; Tue, 18 Apr 2006 14:15:07 -0400
Received: from ausc60pc101.us.dell.com ([143.166.85.206])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVujC-0006n4-Cn
	for ips@ietf.org; Tue, 18 Apr 2006 14:15:07 -0400
DomainKey-Signature: s=smtpout; d=dell.com; c=nofws; q=dns;
	b=B/1aHj5AchbA1rNst1hF/ajEgOpZEsZZMJuG7FodMI/Jrts9XlLkMmq35c11GbjkMeJZhPWL4ayFcK3s+IaVSuOV/enfRKF6U3J2+P6a8j5fMHMl1mXd955X8+4nwd8P;
Received: from ausx3bps305.aus.amer.dell.com ([10.3.153.43])
	by ausc60pc101.us.dell.com with ESMTP; 18 Apr 2006 13:15:06 -0500
X-IronPort-AV: i="4.04,131,1144040400"; 
	d="scan'208,217"; a="1777701:sNHT95754456"
Content-class: urn:content-classes:message
MIME-Version: 1.0
x-mimeole: Produced By Microsoft Exchange V6.5.7226.0
Subject: RE: [Ips] Target Behavior Clarifications (with corrections)
Date: Tue, 18 Apr 2006 13:15:04 -0500
Message-ID: <389040536173ED4AADA5EFEA9633358601677A31@ausx3mpc106.aus.amer.dell.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] Target Behavior Clarifications (with corrections)
Thread-Index: AcZjDiOFcXbd7cbXTn+dIttlYI/OSAAAe1bgAADfleA=
From: <Jacob_Cherian@Dell.com>
To: <Jacob_Cherian@Dell.com>,
	<wrstuden@wasabisystems.com>,
	<ips@ietf.org>
X-OriginalArrivalTime: 18 Apr 2006 18:15:05.0283 (UTC)
	FILETIME=[04830930:01C66314]
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 9824e5c813daed951dd476ca8f06ed95
Cc: 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0676845234=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0676845234==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66314.03E967D6"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66314.03E967D6
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Based on the responses from Bill and Julian this is what I have:

=20

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command?=20

<JC> I will drop the connection and terminate all tasks allegiant on
that connection and generate a UA with ASC/ASCQ value of 47h/7Fh - "SOME
COMMANDS CLEARED BY ISCSI PROTOCOL EVENT". If this is only connection in
the session then I generate a UA (06/29/00) since when the session is
reestablished there wont be any tasks.

- If the PDU is part of a login?

<JC> I will drop the connection. Agreed that the default value of 8K
should be supported since login is not complete.

=20

2) What should the target behavior be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

<JC> I have two options here:=20

=20

a)    As per the spec: The target reports the "Incorrect amount of data"
condition if during data output the total data length to output is
greater than FirstBurstLength and the initiator sent unsolicited
non-immediate data but the total amount of unsolicited data is different
than FirstBurstLength. The target reports the same error when the amount
of data sent as a reply to an R2T does not match the amount requested.
(0B/0C/0D - Write Error, Incorrect Amount of Data). This should work.

=20

The only issue here is that the definition of the sense code does not
match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT
ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.

=20

=20

b)    Treat this as a really bad error and assume that I have an
initiator that does not play well and drop the session and kill the
command.

=20

=20

I am leaning towards (b). Help!!! Suggestions/Comments/Discussion.=20

Thanks,=20
 =20
Jacob Cherian=20



________________________________

From: William Studenmund [mailto:wrstuden@wasabisystems.com]=20
Sent: Tuesday, April 18, 2006 12:33 PM
To: Cherian, Jacob
Cc: ips@ietf.org
Subject: Re: [Ips] Target Behavior Clarifications

=20

On Apr 17, 2006, at 2:48 PM, <Jacob_Cherian@Dell.com>
<Jacob_Cherian@Dell.com> wrote:

=20

A couple of quick questions?

1) What should the behavior of a target be if it receives a PDU on a
connection, larger than what it declared with MaxRecvDataSegmentLength:

- If the PDU is part of a SCSI command?=20

- If the PDU is part of a login?

=20

Drop the connection. Note, the session may still stick around as part of
recovery processing.

=20

Also, during login (before FFP), the MaxRecvDataSegmentLength in force
is 8k, regardless of announced values.

=20

2) What should the target behaviour be if the initiator sends it more
data than MaxBurstLength?

3) What should the target behavior be if the initiator sends more data
than FirstBurstLength?

There are specific sense and ASC/Q values for these errors.

=20

These are treated as SCSI errors 1) because you have to give some
explanation for why you killed the SCSI task, and 2) because it is not
obvious which PDU in the burst was "too much." While you might want to
say it was the last one, that isn't necessarily true.

=20

Note also that to trigger these errors, all the data placement had to
stay within the TTT bounds and you have to be in DataPDUInOrder=3DNo.
That's the only way you can really write the same area twice. Most other
errors involved in sending too much data in a burst would trigger an
iSCSI protocol error by placing data outside the bounds of the TTT.

=20

Take care,

=20

Bill


------_=_NextPart_001_01C66314.03E967D6
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
h2
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-indent:0in;
	page-break-after:avoid;
	mso-list:l0 level2 lfo2;
	font-size:14.0pt;
	font-family:Arial;
	font-weight:bold;
	font-style:italic;}
h5
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:54.9pt;
	text-indent:-.7in;
	mso-list:l0 level5 lfo2;
	font-size:12.0pt;
	font-family:Arial;
	font-weight:bold;}
p.MsoToc4, li.MsoToc4, div.MsoToc4
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
p.MsoToc5, li.MsoToc5, div.MsoToc5
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:48.0pt;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
p.Heading2-TNR, li.Heading2-TNR, div.Heading2-TNR
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:.4in;
	text-indent:-.4in;
	page-break-after:avoid;
	mso-list:l2 level2 lfo1;
	font-size:14.0pt;
	font-family:"Times New Roman";
	font-weight:bold;}
p.heading2-tnr0, li.heading2-tnr0, div.heading2-tnr0
	{margin-top:12.0pt;
	margin-right:0in;
	margin-bottom:3.0pt;
	margin-left:0in;
	text-indent:0in;
	page-break-after:avoid;
	mso-list:l2 level2 lfo3;
	font-size:14.0pt;
	font-family:"Times New Roman";
	font-weight:bold;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 27.35pt 1.0in 27.35pt;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:251858005;
	mso-list-template-ids:1648100940;}
@list l0:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l0:level2
	{mso-level-style-link:"Heading 2";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:55.8pt;
	mso-level-number-position:left;
	margin-left:55.8pt;
	text-indent:-.4in;}
@list l0:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l0:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:0in;
	mso-level-number-position:left;
	margin-left:0in;
	text-indent:0in;}
@list l0:level5
	{mso-level-style-link:"Heading 5";
	mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:54.9pt;
	mso-level-number-position:left;
	margin-left:54.9pt;
	text-indent:-.7in;}
@list l0:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l0:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l0:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l0:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
@list l1
	{mso-list-id:308243067;
	mso-list-type:hybrid;
	mso-list-template-ids:-2143794388 67698711 67698713 67698715 67698703 =
67698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%1\)";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level4
	{mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level7
	{mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l2
	{mso-list-id:1942570602;
	mso-list-template-ids:-1987138506;}
@list l2:level1
	{mso-level-text:%1;
	mso-level-tab-stop:.3in;
	mso-level-number-position:left;
	margin-left:.3in;
	text-indent:-.3in;}
@list l2:level2
	{mso-level-style-link:"Heading 2 - TNR";
	mso-level-text:"%1\.%2";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.4in;
	text-indent:-.4in;}
@list l2:level3
	{mso-level-text:"%1\.%2\.%3";
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	margin-left:.5in;
	text-indent:-.5in;}
@list l2:level4
	{mso-level-text:"%1\.%2\.%3\.%4";
	mso-level-tab-stop:.6in;
	mso-level-number-position:left;
	margin-left:.6in;
	text-indent:-.6in;}
@list l2:level5
	{mso-level-text:"%1\.%2\.%3\.%4\.%5";
	mso-level-tab-stop:.7in;
	mso-level-number-position:left;
	margin-left:.7in;
	text-indent:-.7in;}
@list l2:level6
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6";
	mso-level-tab-stop:.8in;
	mso-level-number-position:left;
	margin-left:.8in;
	text-indent:-.8in;}
@list l2:level7
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7";
	mso-level-tab-stop:.9in;
	mso-level-number-position:left;
	margin-left:.9in;
	text-indent:-.9in;}
@list l2:level8
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8";
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	margin-left:1.0in;
	text-indent:-1.0in;}
@list l2:level9
	{mso-level-text:"%1\.%2\.%3\.%4\.%5\.%6\.%7\.%8\.%9";
	mso-level-tab-stop:1.1in;
	mso-level-number-position:left;
	margin-left:1.1in;
	text-indent:-1.1in;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue style=3D'word-wrap: =
break-word;-khtml-nbsp-mode: space;
-khtml-line-break: after-white-space'>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Based on the responses from Bill =
and
Julian this is what I have:<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>What
should the</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>behavior of a</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>target be if it receives a =
PDU</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>on a
connection,</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>larger than what it declared</span></font> <font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>with</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>MaxRecvDataSegmentLength:</s=
pan></font><o:p></o:p></p>

<p style=3D'text-indent:.5in'><font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>-</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>If the PDU is part of a =
SCSI
command?</span></font> <o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>&lt;JC&gt;
I will drop the connection and terminate <font color=3Dnavy><span
style=3D'color:navy'>all</span></font> task<font color=3Dnavy><span
style=3D'color:navy'>s allegiant on that connection</span></font> and =
generate a
UA with ASC/ASCQ value of 47h/7Fh - &quot;SOME COMMANDS CLEARED BY ISCSI
PROTOCOL EVENT&quot;. If this is only connection in the session then I =
generate
a UA (06/29/00) since when the session is reestablished there wont be =
any tasks.<o:p></o:p></span></font></p>

<p style=3D'text-indent:.5in'><font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>- If the PDU is part of a =
login?<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.5in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>&lt;JC&gt;
I will drop the connection. Agreed that the default value of 8K should =
be
supported since login is not complete.</span></font><o:p></o:p></p>

<p class=3DMsoNormal =
style=3D'text-indent:.5in;text-autospace:none'><font size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></fo=
nt></p>

<p><font size=3D2 color=3D"#0000a0" face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:#0000A0'>2)</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>What
should the target behavior be if</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>the
initiator sends it more data than</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>MaxBurstLength?<o:p></o:p></=
span></font></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3)
What should the target</span></font> <font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>behavior be if the =
initiator sends
more data than</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>FirstBurstLength?<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>&lt;JC&gt; I have =
two options
here: <o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo4;
text-autospace:none'><![if !supportLists]><font size=3D2 face=3D"Courier =
New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'><span =
style=3D'mso-list:Ignore'>a)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>As per the spec: The =
target
reports the &quot;Incorrect amount of data&quot; condition if during =
data
output the total data length to output is greater than FirstBurstLength =
and the
initiator sent unsolicited non-immediate data but the total amount of
unsolicited data is different than FirstBurstLength. The target reports =
the
same error when the amount of data sent as a reply to an R2T does not =
match the
amount requested. (0B/0C/0D &#8211; Write Error, Incorrect Amount of =
Data).
This should work.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'>The
only issue here is that the definition of the sense code does not match =
the
definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT ENOUGH =
UNSOLICITED
DATA), which is not quite what the iSCSI =
says.<o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'text-indent:.25in;text-autospace:none'><font size=3D2
face=3D"Courier New"><span style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo4;
text-autospace:none'><![if !supportLists]><font size=3D2 face=3D"Courier =
New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'><span =
style=3D'mso-list:Ignore'>b)<font
size=3D1 face=3D"Times New Roman"><span style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;
</span></font></span></span></font><![endif]><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier New"'>Treat this as a =
really bad
error and assume that I have an initiator that does not play well and =
drop the
session and kill the command.<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'text-autospace:none'><font size=3D2 =
face=3D"Courier New"><span
style=3D'font-size:9.5pt;font-family:"Courier =
New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:9.5pt;
font-family:"Courier New"'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3D"Courier New"><span =
style=3D'font-size:9.5pt;
font-family:"Courier New"'>I am leaning towards (b). Help!!!
Suggestions/Comments/Discussion.<font color=3Dnavy><span =
style=3D'color:navy'> <o:p></o:p></span></font></span></font></p>

<div>

<p><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial;color:navy'>Thanks,</span></font><font color=3Dnavy><span =
style=3D'color:
navy'> <br>
</span></font><font size=3D2 color=3Dnavy><span =
style=3D'font-size:10.0pt;color:navy'>&nbsp;</span></font><font
color=3Dnavy><span style=3D'color:navy'> <br>
</span></font><b><i><font size=3D2 color=3Dnavy face=3DTahoma><span =
style=3D'font-size:
10.0pt;font-family:Tahoma;color:navy;font-weight:bold;font-style:italic'>=
Jacob
Cherian</span></font></i></b><font color=3Dnavy><span =
style=3D'color:navy'> <br>
<br>
</span></font><o:p></o:p></p>

</div>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
William
Studenmund [mailto:wrstuden@wasabisystems.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 18, =
2006
12:33 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> <st1:PersonName =
w:st=3D"on">Cherian,
 Jacob</st1:PersonName><br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [Ips] Target =
Behavior
Clarifications</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>On Apr 17, 2006, at 2:48 PM, &lt;<a =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</a>&gt;
&lt;<a =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</a>&gt;
wrote:<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><a name=3D""><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial'>A couple of quick questions?</span></font></a><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>1)</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>What
should the</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>behavior of a</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>target be if it receives a =
PDU</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>on a
connection,</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>larger than what it declared</span></font> <font =
size=3D2
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>with</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>MaxRecvDataSegmentLength:</s=
pan></font><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-</span></font>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>If the
PDU is part of a SCSI command?</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>-
If the PDU is part of a login?</span></font><o:p></o:p></p>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Drop the connection. Note, the session may still stick around as =
part
of recovery processing.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Also, during login (before FFP), the MaxRecvDataSegmentLength in =
force
is 8k, regardless of announced values.<o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 color=3D"#0000a0" face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:#0000A0'>2)</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>What
should the target behaviour be if</span></font> <font size=3D2 =
color=3D"#0000a0"
face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial;color:#0000A0'>the
initiator sends it more data than</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>MaxBurstLength?</span></font=
><o:p></o:p></p>

<p><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>3)
What should the target</span></font> <font size=3D2 face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'>behavior be if the =
initiator sends
more data than</span></font> <font size=3D2 face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial'>FirstBurstLength?</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>There are specific sense and ASC/Q values for these =
errors.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>These are treated as SCSI errors 1) because you have to give =
some
explanation for why you killed the SCSI task, and 2) because it is not =
obvious
which PDU in the burst was &quot;too much.&quot; While you might want to =
say it
was the last one, that isn't necessarily =
true.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Note also that to trigger these errors, all the data placement =
had to
stay within the TTT bounds and you have to be in DataPDUInOrder=3DNo. =
That's the
only way you can really write the same area twice. Most other errors =
involved
in sending too much data in a burst would trigger an iSCSI protocol =
error by
placing data outside the bounds of the TTT.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Take care,<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Bill<o:p></o:p></span></font></p>

</div>

</div>

</body>

</html>

------_=_NextPart_001_01C66314.03E967D6--


--===============0676845234==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0676845234==--




From ips-bounces@ietf.org Tue Apr 18 14:56:37 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVvNH-0007Wq-Cb; Tue, 18 Apr 2006 14:56:31 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVvNF-0007WN-Uo
	for ips@ietf.org; Tue, 18 Apr 2006 14:56:29 -0400
Received: from mail94.messagelabs.com ([216.82.240.115])
	by ietf-mx.ietf.org with smtp (Exim 4.43) id 1FVvNF-0008Rm-Da
	for ips@ietf.org; Tue, 18 Apr 2006 14:56:29 -0400
X-VirusChecked: Checked
X-Env-Sender: jhufferd@Brocade.COM
X-Msg-Ref: server-5.tower-94.messagelabs.com!1145386585!55341094!1
X-StarScan-Version: 5.5.9.1; banners=-,-,-
X-Originating-IP: [66.243.153.112]
Received: (qmail 1522 invoked from network); 18 Apr 2006 18:56:25 -0000
Received: from f112.brocade.com (HELO blasphemy.brocade.com) (66.243.153.112)
	by server-5.tower-94.messagelabs.com with SMTP;
	18 Apr 2006 18:56:25 -0000
Received: from hq-ex-6.corp.brocade.com (hq-ex-6 [192.168.38.36])
	by blasphemy.brocade.com (Postfix) with ESMTP id F0F4B1425F;
	Tue, 18 Apr 2006 11:56:24 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.0.6487.1
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] MPA alignment
Date: Tue, 18 Apr 2006 11:56:24 -0700
Message-ID: <EE86A2987768164188932981F6EBE69E02CD12CF@hq-ex-6.brocade.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] MPA alignment
thread-index: AcZi5mdxG+AaU3IYTD+P4zcY/aHSUAAMRZ/g
From: "John Hufferd" <jhufferd@Brocade.COM>
To: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>,
	"Mike Ko" <mako@almaden.ibm.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9668dd9718e12afaf579fddf1143437a
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2058681031=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============2058681031==
Content-Class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66319.CA75F18A"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66319.CA75F18A
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Eddy,

I agree with your statement about software RDMA being a bit silly, but
only when the thought is about implementations on servers.

There is at least one type of environment where using RDMA with a
software iWARP stack may not be too silly, and that is when the object
of the interconnect is to optimize the over all costs and save Server
Cycles.  In that case is may make sense to operate with a software RDMA
stack on the desktop systems or workstations.  Those environments often
have a plentiful amount of available CPU cycles on the
desktop/workstation.  So, the approach is to burn CPU cycles at the
desktop/workstation and save CPU cycles on the servers, which have
RNICs.  This type of a configuration actually seems to be a useful
configuration.

=20

The same argument can be used with iSCSI and iSER, but only in the case
where there are RNICs in the target.  It is a little bit strange, as you
point out, to have the storage controller implement a software version
of iSER, except perhaps for some type of compatibility or migration
reasons.

=20

.

.

.

John L Hufferd

Sr. Executive Director of Technology

Brocade Communications Systems, Inc

jhufferd@brocade.com

Office Phone: (408) 333-5244; eFAX: (408) 904-4688

Alt Office Phone: (408) 997-6136; Cell: (408) 627-9606

=20

  _____ =20

From: Eddy Quicksall [mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net]=20
Sent: Tuesday, April 18, 2006 5:48 AM
To: Mike Ko
Cc: ips@ietf.org
Subject: Re: [Ips] MPA alignment

=20

Thanks,

=20

Here is my feeling on this. If one were to use a standard TCP/IP stack
(that does copying) then it is a bit silly to use iSER. If one were to
use a software implementation and write/modify the stack to get the
desired effects of DDP then he will probably heed to the alignment notes
in the spec. So if one were to support misaligned segments using a
slower method then it would be OK.

=20

Eddy

	----- Original Message -----=20

	From: Mike Ko <mailto:mako@almaden.ibm.com> =20

	To: Eddy Quicksall
<mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net> =20

	Cc: ips@ietf.org=20

	Sent: Tuesday, April 18, 2006 2:16 AM

	Subject: Re: [Ips] MPA alignment

	=20

=09
	Eddy,=20
=09
	If your question is about MPA behavior in general, then it
should be directed to the rddp forum.=20
=09
	Assuming your question is related to iSER, then if iWARP is
implemented in software and uses the existing TCP/IP stack, then it
cannot guarantee that FPDU's will be aligned with TCP segments.  For the
general case where iWARP is implemented in an RNIC with an integrated
TCP/IP stack, then it is to the RNIC vendor's advantage to optimize his
product's performance and therefore FPDU's should be aligned with TCP
segments.  However, the receiver can still receive FPDU's which are not
aligned with TCP segments if there are resegmenting middleboxes
somewhere in the connection path.=20
=09
	Mike  =20

	To:        <ips@ietf.org>=20
	cc:        =20
	Subject:        [Ips] MPA alignment=20
=09
=09
	It is preferable to have TCP sender to align MPA header where a
TCP segment begins and to keep the MPA FPDU within a TCP segment, so
that the receiver hardware doesn't need to temporarily buffer the FPDU
for the CRC checking.  =20
	 =20
	Does anyone know of any software or hardware that is not an FPDU
alignment sender?=20
	Does anyone have a feel for the likelihood of software or
hardware to not align FPDU's on a TCP segment?=20
	 =20
	Eddy_______________________________________________
	Ips mailing list
	Ips@ietf.org
	https://www1.ietf.org/mailman/listinfo/ips

=09
  _____ =20


	_______________________________________________
	Ips mailing list
	Ips@ietf.org
	https://www1.ietf.org/mailman/listinfo/ips


------_=_NextPart_001_01C66319.CA75F18A
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:sans-serif;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
tt
	{font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Eddy,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I agree with your statement about =
software
RDMA being a bit silly, but only when the thought is about =
implementations on servers.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>There is at least one type of =
environment where
using RDMA with a software iWARP stack may not be too silly, and that is =
when
the object of the interconnect is to optimize the over all costs and =
save Server
Cycles. &nbsp;In that case is may make sense to operate with a software =
RDMA
stack on the desktop systems or workstations.&nbsp; Those environments =
often
have a plentiful amount of available CPU cycles on the =
desktop/workstation.&nbsp;
So, the approach is to burn CPU cycles at the desktop/workstation and =
save CPU
cycles on the servers, which have RNICs.&nbsp; This type of a =
configuration
actually seems to be a useful =
configuration.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>The same argument can be used with =
iSCSI
and iSER, but only in the case where there are RNICs in the target. =
&nbsp;It is
a little bit strange, as you point out, to have the storage controller =
implement
a software version of iSER, except perhaps for some type of =
compatibility or
migration reasons.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>John L Hufferd</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Sr. Executive Director of =
Technology</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Brocade Communications Systems, =
Inc</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'><a =
href=3D"mailto:jhufferd@brocade.com"
title=3D"mailto:jhufferd@brocade.com">jhufferd@brocade.com</a></span></fo=
nt><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Office Phone: (408) 333-5244; =
eFAX: (408)
904-4688</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Alt Office Phone: (408) 997-6136; =
Cell:
(408) 627-9606</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Eddy =
Quicksall
[mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 18, =
2006 5:48
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Mike Ko<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [Ips] MPA =
alignment</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
10.0pt'>Thanks,</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Here is my feeling on this. If one were to use a standard TCP/IP =
stack
(that does copying)&nbsp;then it is a bit silly to use iSER. If one were =
to use
a software implementation and write/modify the stack to get the desired =
effects
of DDP then he will probably heed to the alignment notes in the spec. So =
if one
were to support misaligned segments using a slower method then it would =
be OK.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
10.0pt'>Eddy</span></font><o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid black =
1.5pt;padding:0in 0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'=
>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----- Original Message ----- =
<o:p></o:p></span></font></p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span=
></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:mako@almaden.ibm.com" title=3D"mako@almaden.ibm.com">Mike =
Ko</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net"
title=3D"eddy_quicksall_iVivity_iSCSI@Comcast.net">Eddy Quicksall</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Cc:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ips@ietf.org" title=3D"ips@ietf.org">ips@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> =
Tuesday, April 18,
2006 2:16 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: =
[Ips] MPA
alignment<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><br>
</span></font><font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;
font-family:sans-serif'>Eddy,</span></font> <br>
<br>
<font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;font-family:sans-serif'>If
your question is about MPA behavior in general, then it should be =
directed to
the rddp forum.</span></font> <br>
<br>
<font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;font-family:sans-serif'>Assuming
your question is related to iSER, then if iWARP is implemented in =
software and
uses the existing TCP/IP stack, then it cannot guarantee that FPDU's =
will be
aligned with TCP segments. &nbsp;For the general case where iWARP is
implemented in an RNIC with an integrated TCP/IP stack, then it is to =
the RNIC
vendor's advantage to optimize his product's performance and therefore =
FPDU's
should be aligned with TCP segments. &nbsp;However, the receiver can =
still
receive FPDU's which are not aligned with TCP segments if there are
resegmenting middleboxes somewhere in the connection path.</span></font> =
<br>
<br>
<font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;font-family:sans-serif'>Mike
&nbsp;</span></font> <o:p></o:p></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D1 color=3Dpurple =
face=3Dsans-serif><span
style=3D'font-size:7.5pt;font-family:sans-serif;color:purple'>To: &nbsp; =
&nbsp; &nbsp;
&nbsp;</span></font><font size=3D1 face=3Dsans-serif><span =
style=3D'font-size:7.5pt;
font-family:sans-serif'>&lt;ips@ietf.org&gt;</span></font> <br>
<font size=3D1 color=3Dpurple face=3Dsans-serif><span =
style=3D'font-size:7.5pt;
font-family:sans-serif;color:purple'>cc: &nbsp; &nbsp; &nbsp; &nbsp; =
</span></font><br>
<font size=3D1 color=3Dpurple face=3Dsans-serif><span =
style=3D'font-size:7.5pt;
font-family:sans-serif;color:purple'>Subject: &nbsp; &nbsp; &nbsp; =
&nbsp;</span></font><font
size=3D1 face=3Dsans-serif><span =
style=3D'font-size:7.5pt;font-family:sans-serif'>[Ips]
MPA alignment</span></font> <br>
<br>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>It is
preferable to have TCP sender to align MPA header where a TCP segment =
begins
and to keep the MPA FPDU within a TCP segment, so that the receiver =
hardware
doesn&#8217;t need to temporarily buffer the FPDU for the CRC checking. =
&nbsp;</span></font>
<br>
&nbsp; <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Does
anyone know of any software or hardware that is not an FPDU alignment =
sender?</span></font>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Does
anyone have a feel for the likelihood of software or hardware to not =
align
FPDU's on a TCP segment?</span></font> <br>
&nbsp; <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Eddy</span></font><tt><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font></tt><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;font-family:"Courier New"'><br>
<tt><font face=3D"Courier New">Ips mailing list</font></tt><br>
<tt><font face=3D"Courier New">Ips@ietf.org</font></tt><br>
<tt><font face=3D"Courier =
New">https://www1.ietf.org/mailman/listinfo/ips</font></tt></span></font>=
<o:p></o:p></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>_______________________________________________<br>
Ips mailing list<br>
Ips@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/ips<o:p></o:p></span></font></p>

</blockquote>

</div>

</body>

</html>

------_=_NextPart_001_01C66319.CA75F18A--


--===============2058681031==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============2058681031==--




From ips-bounces@ietf.org Tue Apr 18 15:27:47 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVvrW-0007fQ-8d; Tue, 18 Apr 2006 15:27:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVvrU-0007fL-SX
	for ips@ietf.org; Tue, 18 Apr 2006 15:27:44 -0400
Received: from mtagate1.de.ibm.com ([195.212.29.150])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVvrU-0001wp-2K
	for ips@ietf.org; Tue, 18 Apr 2006 15:27:44 -0400
Received: from d12nrmr1607.megacenter.de.ibm.com
	(d12nrmr1607.megacenter.de.ibm.com [9.149.167.49])
	by mtagate1.de.ibm.com (8.13.6/8.13.6) with ESMTP id k3IJRh8g077172
	for <ips@ietf.org>; Tue, 18 Apr 2006 19:27:43 GMT
Received: from d12av02.megacenter.de.ibm.com (d12av02.megacenter.de.ibm.com
	[9.149.165.228])
	by d12nrmr1607.megacenter.de.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id
	k3IJSgmw083558 for <ips@ietf.org>; Tue, 18 Apr 2006 21:28:42 +0200
Received: from d12av02.megacenter.de.ibm.com (loopback [127.0.0.1])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.13.3) with ESMTP id
	k3IJRgd9001990 for <ips@ietf.org>; Tue, 18 Apr 2006 21:27:43 +0200
Received: from d12mc102.megacenter.de.ibm.com (d12mc102.megacenter.de.ibm.com
	[9.149.167.114])
	by d12av02.megacenter.de.ibm.com (8.12.11/8.12.11) with ESMTP id
	k3IJRgI7001985; Tue, 18 Apr 2006 21:27:42 +0200
In-Reply-To: <389040536173ED4AADA5EFEA9633358601677A30@ausx3mpc106.aus.amer.dell.com>
To: <Jacob_Cherian@Dell.com>
Subject: RE: [Ips] Target Behavior Clarifications
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 7.0 August 18, 2005
From: Julian Satran <Julian_Satran@il.ibm.com>
Message-ID: <OFC55A704C.823D7101-ONC2257154.006AA36F-C2257154.006AE722@il.ibm.com>
Date: Tue, 18 Apr 2006 22:28:45 +0300
X-MIMETrack: Serialize by Router on D12MC102/12/M/IBM(Release 7.0HF90 |
	November 16, 2005) at 18/04/2006 22:28:41,
	Serialize complete at 18/04/2006 22:28:41
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 223e3c753032a50d5dc4443c921c3fcd
Cc: ips@ietf.org, wrstuden@wasabisystems.com
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0182388602=="
Errors-To: ips-bounces@ietf.org

This is a multipart message in MIME format.
--===============0182388602==
Content-Type: multipart/alternative;
	boundary="=_alternative 006AE65BC2257154_="

This is a multipart message in MIME format.
--=_alternative 006AE65BC2257154_=
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<Jacob=5FCherian@Dell.com> wrote on 18/04/2006 21:10:46:

> Based on the responses from Bill and Julian this is what I have:
>=20
> 1) What should the behavior of a target be if it receives a PDU on a
> connection, larger than what it declared with MaxRecvDataSegmentLength:
> - If the PDU is part of a SCSI command?=20
> <JC> I will drop the connection and terminate the task and generate=20
> a UA with ASC/ASCQ value of 47h/7Fh - "SOME COMMANDS CLEARED BY=20
> ISCSI PROTOCOL EVENT". If this is only connection in the session=20
> then I generate a UA (06/29/00).
> - If the PDU is part of a login?
> <JC> I will drop the connection. Agreed that the default value of 8K
> should be supported since login is not complete.
>=20
> 2) What should the target behavior be if the initiator sends it moredata =

than
> MaxBurstLength?
> 3) What should the target behavior be if the initiator sends more data=20
than=20
> FirstBurstLength?
> <JC> I have two options here:=20
>=20
> a)    As per the spec: The target reports the "Incorrect amount of=20
> data" condition if during data output the total data length to=20
> output is greater than FirstBurstLength and the initiator sent=20
> unsolicited non-immediate data but the total amount of unsolicited=20
> data is different than FirstBurstLength. The target reports the same
> error when the amount of data sent as a reply to an R2T does not=20
> match the amount requested. (0B/0C/0D ? Write Error, Incorrect=20
> Amount of Data). This should work.
>=20
> The only issue here is that the definition of the sense code does=20
> not match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR -
> NOT ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.
>=20
>=20
> b)    Treat this as a really bad error and assume that I have an=20
> initiator that does not play well and drop the session and kill the=20
command.
>=20
That's what I would do too=20
>=20
> I am leaning towards (b). Help!!! Suggestions/Comments/Discussion.
>=20
> Thanks,=20
>=20
> Jacob Cherian=20
> Dell Inc.=20
> Ph: (512) 723 3247=20
>=20
> From: William Studenmund [mailto:wrstuden@wasabisystems.com]=20
> Sent: Tuesday, April 18, 2006 12:33 PM
> To: Cherian, Jacob
> Cc: ips@ietf.org
> Subject: Re: [Ips] Target Behavior Clarifications
>=20
> On Apr 17, 2006, at 2:48 PM, <Jacob=5FCherian@Dell.com>=20
<Jacob=5FCherian@Dell.com
> > wrote:
>=20

> A couple of quick questions?
> 1) What should the behavior of a target be if it receives a PDU on a
> connection, larger than what it declared with MaxRecvDataSegmentLength:
> - If the PDU is part of a SCSI command?=20
> - If the PDU is part of a login?
>=20
> Drop the connection. Note, the session may still stick around as=20
> part of recovery processing.
>=20
> Also, during login (before FFP), the MaxRecvDataSegmentLength in=20
> force is 8k, regardless of announced values.
>=20

> 2) What should the target behaviour be if the initiator sends it=20
> more data than MaxBurstLength?
> 3) What should the target behavior be if the initiator sends more data=20
than=20
> FirstBurstLength?
> There are specific sense and ASC/Q values for these errors.
>=20
> These are treated as SCSI errors 1) because you have to give some=20
> explanation for why you killed the SCSI task, and 2) because it is=20
> not obvious which PDU in the burst was "too much." While you might=20
> want to say it was the last one, that isn't necessarily true.
>=20
> Note also that to trigger these errors, all the data placement had=20
> to stay within the TTT bounds and you have to be in=20
> DataPDUInOrder=3DNo. That's the only way you can really write the same
> area twice. Most other errors involved in sending too much data in a
> burst would trigger an iSCSI protocol error by placing data outside=20
> the bounds of the TTT.
>=20
> Take care,
>=20
> Bill=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> Ips mailing list
> Ips@ietf.org
> https://www1.ietf.org/mailman/listinfo/ips

--=_alternative 006AE65BC2257154_=
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable


<br>
<br><tt><font size=3D2>&lt;Jacob=5FCherian@Dell.com&gt; wrote on 18/04/2006
21:10:46:<br>
<br>
&gt; Based on the responses from Bill and Julian this is what I have:</font=
></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; 1) What should the behavior of a target be if
it receives a PDU on a<br>
&gt; connection, larger than what it declared with MaxRecvDataSegmentLength=
:</font></tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a SCSI command? </font>=
</tt>
<br><tt><font size=3D2>&gt; &lt;JC&gt; I will drop the connection and termi=
nate
the task and generate <br>
&gt; a UA with ASC/ASCQ value of 47h/7Fh - &quot;SOME COMMANDS CLEARED
BY <br>
&gt; ISCSI PROTOCOL EVENT&quot;. If this is only connection in the session
<br>
&gt; then I generate a UA (06/29/00).</font></tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a login?</font></tt>
<br><tt><font size=3D2>&gt; &lt;JC&gt; I will drop the connection. Agreed
that the default value of 8K<br>
&gt; should be supported since login is not complete.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; 2) What should the target behavior be if the
initiator sends it moredata than<br>
&gt; MaxBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; 3) What should the target behavior be if the
initiator sends more data than <br>
&gt; FirstBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; &lt;JC&gt; I have two options here: </font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; a) &nbsp; &nbsp;As per the spec: The target rep=
orts
the &quot;Incorrect amount of <br>
&gt; data&quot; condition if during data output the total data length to
<br>
&gt; output is greater than FirstBurstLength and the initiator sent <br>
&gt; unsolicited non-immediate data but the total amount of unsolicited
<br>
&gt; data is different than FirstBurstLength. The target reports the same<b=
r>
&gt; error when the amount of data sent as a reply to an R2T does not <br>
&gt; match the amount requested. (0B/0C/0D &#8211; Write Error, Incorrect <=
br>
&gt; Amount of Data). This should work.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; The only issue here is that the definition of
the sense code does <br>
&gt; not match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR
-<br>
&gt; NOT ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.<=
/font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; b) &nbsp; &nbsp;Treat this as a really bad error
and assume that I have an <br>
&gt; initiator that does not play well and drop the session and kill the
command.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>That's what I would do too </font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; I am leaning towards (b). Help!!! Suggestions/C=
omments/Discussion.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Thanks, <br>
&gt; &nbsp; <br>
&gt; Jacob Cherian <br>
&gt; Dell Inc. <br>
&gt; Ph: (512) 723 3247 </font></tt>
<br><tt><font size=3D2>&gt; <br>
&gt; From: William Studenmund [mailto:wrstuden@wasabisystems.com] <br>
&gt; Sent: Tuesday, April 18, 2006 12:33 PM<br>
&gt; To: Cherian, Jacob<br>
&gt; Cc: ips@ietf.org<br>
&gt; Subject: Re: [Ips] Target Behavior Clarifications</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; On Apr 17, 2006, at 2:48 PM, &lt;Jacob=5FCheria=
n@Dell.com&gt;
&lt;Jacob=5FCherian@Dell.com<br>
&gt; &gt; wrote:</font></tt>
<br><tt><font size=3D2>&gt; <br>
</font></tt>
<br><tt><font size=3D2>&gt; A couple of quick questions?</font></tt>
<br><tt><font size=3D2>&gt; 1) What should the behavior of a target be if
it receives a PDU on a<br>
&gt; connection, larger than what it declared with MaxRecvDataSegmentLength=
:</font></tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a SCSI command? </font>=
</tt>
<br><tt><font size=3D2>&gt; - If the PDU is part of a login?</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Drop the connection. Note, the session may still
stick around as <br>
&gt; part of recovery processing.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Also, during login (before FFP), the MaxRecvDat=
aSegmentLength
in <br>
&gt; force is 8k, regardless of announced values.</font></tt>
<br><tt><font size=3D2>&gt; <br>
</font></tt>
<br><tt><font size=3D2>&gt; 2) What should the target behaviour be if the
initiator sends it <br>
&gt; more data than MaxBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; 3) What should the target behavior be if the
initiator sends more data than <br>
&gt; FirstBurstLength?</font></tt>
<br><tt><font size=3D2>&gt; There are specific sense and ASC/Q values for
these errors.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; These are treated as SCSI errors 1) because you
have to give some <br>
&gt; explanation for why you killed the SCSI task, and 2) because it is
<br>
&gt; not obvious which PDU in the burst was &quot;too much.&quot; While
you might <br>
&gt; want to say it was the last one, that isn't necessarily true.</font></=
tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Note also that to trigger these errors, all the
data placement had <br>
&gt; to stay within the TTT bounds and you have to be in <br>
&gt; DataPDUInOrder=3DNo. That's the only way you can really write the same=
<br>
&gt; area twice. Most other errors involved in sending too much data in
a<br>
&gt; burst would trigger an iSCSI protocol error by placing data outside
<br>
&gt; the bounds of the TTT.</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Take care,</font></tt>
<br><tt><font size=3D2>&gt; &nbsp;</font></tt>
<br><tt><font size=3D2>&gt; Bill=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F<br>
&gt; Ips mailing list<br>
&gt; Ips@ietf.org<br>
&gt; https://www1.ietf.org/mailman/listinfo/ips<br>
</font></tt>
--=_alternative 006AE65BC2257154_=--


--===============0182388602==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0182388602==--




From ips-bounces@ietf.org Tue Apr 18 17:00:23 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVxJ4-0006GQ-QL; Tue, 18 Apr 2006 17:00:18 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVxJ1-0006GL-TF
	for ips@ietf.org; Tue, 18 Apr 2006 17:00:15 -0400
Received: from mononoke.wasabisystems.com ([66.173.145.228])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVxJ1-000642-37
	for ips@ietf.org; Tue, 18 Apr 2006 17:00:15 -0400
Received: from [10.0.0.10] (h-66-166-188-91.sndacagl.covad.net [66.166.188.91])
	by mononoke.wasabisystems.com (Postfix) with ESMTP
	id 2D1CF87144; Tue, 18 Apr 2006 17:00:10 -0400 (EDT)
In-Reply-To: <389040536173ED4AADA5EFEA9633358601677A31@ausx3mpc106.aus.amer.dell.com>
References: <389040536173ED4AADA5EFEA9633358601677A31@ausx3mpc106.aus.amer.dell.com>
Mime-Version: 1.0 (Apple Message framework v749.3)
Message-Id: <0B6B2C4E-DE77-431F-9715-5CE9EF785ED6@wasabisystems.com>
From: William Studenmund <wrstuden@wasabisystems.com>
Subject: Re: [Ips] Target Behavior Clarifications (with corrections)
Date: Tue, 18 Apr 2006 14:00:05 -0700
To: Jacob_Cherian@Dell.com
X-Pgp-Agent: GPGMail 1.1.2 (Tiger)
X-Mailer: Apple Mail (2.749.3)
X-Spam-Score: 1.2 (+)
X-Scan-Signature: 442d80051e0361a34f3560325c4a7092
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0234748010=="
Errors-To: ips-bounces@ietf.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0234748010==
Content-Type: multipart/signed; protocol="application/pgp-signature";
	micalg=pgp-sha1; boundary="Apple-Mail-4--416919007"
Content-Transfer-Encoding: 7bit

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--Apple-Mail-4--416919007
Content-Type: multipart/alternative; boundary=Apple-Mail-3--416919106


--Apple-Mail-3--416919106
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=WINDOWS-1252;
	delsp=yes;
	format=flowed

On Apr 18, 2006, at 11:15 AM, <Jacob_Cherian@Dell.com> wrote:

> Based on the responses from Bill and Julian this is what I have:
>
>
>
> 1) What should the behavior of a target be if it receives a PDU on =20
> a connection, larger than what it declared with =20
> MaxRecvDataSegmentLength:
>
> - If the PDU is part of a SCSI command?
>
> <JC> I will drop the connection and terminate all tasks allegiant =20
> on that connection and generate a UA with ASC/ASCQ value of 47h/7Fh =20=

> - "SOME COMMANDS CLEARED BY ISCSI PROTOCOL EVENT". If this is only =20
> connection in the session then I generate a UA (06/29/00) since =20
> when the session is reestablished there wont be any tasks.
Actually 06/29/00 is wrong. If the initiator gets another connection =20
in within Time2Wait + Time2Retain, then you really should be doing an =20=

06/29/07. The advantage of that is that you could also do the =20
06/47/7e after the nexus loss.

To be honest, I think all of this is governed by the standard =20
connection recovery procedures. :-)
> - If the PDU is part of a login?
>
> <JC> I will drop the connection. Agreed that the default value of =20
> 8K should be supported since login is not complete.
>
>
>
> 2) What should the target behavior be if the initiator sends it =20
> more data than MaxBurstLength?
>
> 3) What should the target behavior be if the initiator sends more =20
> data than FirstBurstLength?
>
> <JC> I have two options here:
>
>
>
> a)    As per the spec: The target reports the "Incorrect amount of =20
> data" condition if during data output the total data length to =20
> output is greater than FirstBurstLength and the initiator sent =20
> unsolicited non-immediate data but the total amount of unsolicited =20
> data is different than FirstBurstLength. The target reports the =20
> same error when the amount of data sent as a reply to an R2T does =20
> not match the amount requested. (0B/0C/0D =96 Write Error, Incorrect =20=

> Amount of Data). This should work.
>
>
>
> The only issue here is that the definition of the sense code does =20
> not match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR =20
> - NOT ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI =20
> says.

I'd say go with what the RFC says.

> b)    Treat this as a really bad error and assume that I have an =20
> initiator that does not play well and drop the session and kill the =20=

> command.
>
>
>
>
> I am leaning towards (b). Help!!!
I think (a) is enough. Actually, I think it's not (a) or (b), but (a) =20=

or (a) and (b); I think you really need to do the processing in (a). =20
Even if you slam the session down, there are internal processing =20
consequences of (a). :-)

Take care,

Bill=

--Apple-Mail-3--416919106
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=WINDOWS-1252

<HTML><BODY style=3D"word-wrap: break-word; -khtml-nbsp-mode: space; =
-khtml-line-break: after-white-space; "><DIV><DIV>On Apr 18, 2006, at =
11:15 AM, &lt;<A =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</A>&gt; =
wrote:</DIV><BR class=3D"Apple-interchange-newline"><BLOCKQUOTE =
type=3D"cite"><SPAN class=3D"Apple-style-span" style=3D"border-collapse: =
separate; border-spacing: 0px 0px; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
text-align: auto; -khtml-text-decorations-in-effect: none; text-indent: =
0px; -apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><O:SMARTTAGTYPE =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"><DIV class=3D"Section1"><P class=3D"MsoNormal"><FONT =
size=3D"2" color=3D"navy" face=3D"Arial"><SPAN style=3D"font-size: =
10.0pt;font-family:Arial;color:navy; color: rgb(0, 0, 128); font-size: =
13.3333px; "><SPAN class=3D"Apple-style-span" style=3D"color: rgb(0, 0, =
128); font-family: Arial; font-size: 13.3333px; ">Based on the responses =
from Bill and Julian this is what I have:</SPAN><O:P style=3D"color: =
rgb(0, 0, 128); font-family: Arial; font-size: 13.3333px; =
"></O:P></SPAN></FONT></P><P class=3D"MsoNormal"><FONT size=3D"2" =
color=3D"navy" face=3D"Arial"><SPAN style=3D"font-size: =
10.0pt;font-family:Arial;color:navy; color: rgb(0, 0, 128); font-size: =
13.3333px; "><O:P style=3D"color: rgb(0, 0, 128); font-family: Arial; =
font-size: 13.3333px; "><SPAN class=3D"Apple-style-span" style=3D"color: =
rgb(0, 0, 128); font-family: Arial; font-size: 13.3333px; =
">=A0</SPAN></O:P></SPAN></FONT></P><P style=3D"font-family: Times New =
Roman; font-size: 16px; "><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">1)</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">What should the</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt; font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">behavior of a</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">target be if it receives a =
PDU</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">on a connection,</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt; font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">larger than what it =
declared</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">with</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; =
">MaxRecvDataSegmentLength:</SPAN></SPAN></FONT><O:P style=3D"font-family:=
 Times New Roman; font-size: 16px; "></O:P></P><P =
style=3D"text-indent:.5in; font-family: Times New Roman; font-size: =
16px; text-indent: 48px; "><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size: 10.0pt;font-family:Arial; font-size: 13.3333px; =
text-indent: 48px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Arial; font-size: 13.3333px; text-indent: 48px; =
">-</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; text-indent: =
48px; "> </SPAN><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
text-indent: 48px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Arial; font-size: 13.3333px; text-indent: 48px; =
">If the PDU is part of a SCSI command?</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; text-indent: 48px; "></SPAN><O:P style=3D"font-family: =
Times New Roman; font-size: 16px; text-indent: 48px; "></O:P></P><P =
class=3D"MsoNormal" style=3D"margin-left:.5in;text-autospace:none; =
font-family: Times New Roman; font-size: 16px; "><FONT size=3D"2" =
face=3D"Courier New"><SPAN style=3D"font-size:9.5pt;font-family:" =
courier=3D"" new";=3D"" font-size:=3D"" 12.6667px;=3D""><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Courier New; font-size: =
12.6667px; ">&lt;JC&gt; I will drop the connection and terminate =
</SPAN><FONT color=3D"navy"><SPAN style=3D"color:navy; color: rgb(0, 0, =
128); font-family: Courier New; font-size: 12.6667px; "><SPAN =
class=3D"Apple-style-span" style=3D"color: rgb(0, 0, 128); font-family: =
Courier New; font-size: 12.6667px; ">all</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Courier New; font-size: =
12.6667px; "> task</SPAN><FONT color=3D"navy"><SPAN style=3D"color:navy; =
color: rgb(0, 0, 128); font-family: Courier New; font-size: 12.6667px; =
"><SPAN class=3D"Apple-style-span" style=3D"color: rgb(0, 0, 128); =
font-family: Courier New; font-size: 12.6667px; ">s allegiant on that =
connection</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; "> and generate =
a UA with ASC/ASCQ value of 47h/7Fh - "SOME COMMANDS CLEARED BY ISCSI =
PROTOCOL EVENT". If this is only connection in the session then I =
generate a UA (06/29/00) since when the session is reestablished there =
wont be any =
tasks.</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOTE>=
Actually 06/29/00 is wrong. If the initiator gets another connection in =
within Time2Wait + Time2Retain, then you really should be doing an =
06/29/07. The advantage of that is that you could also do the 06/47/7e =
after the nexus loss.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>To be honest, I think all =
of this is governed by the standard connection recovery procedures. =
:-)<BR><BLOCKQUOTE type=3D"cite"><SPAN class=3D"Apple-style-span" =
style=3D"border-collapse: separate; border-spacing: 0px 0px; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><O:SMARTTAGTYPE =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"><DIV class=3D"Section1"><P class=3D"MsoNormal" =
style=3D"margin-left:.5in;text-autospace:none; font-family: Times New =
Roman; font-size: 16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "></O:P></SPAN></FONT></P><P =
style=3D"text-indent:.5in; font-family: Times New Roman; font-size: =
16px; text-indent: 48px; "><FONT size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size: 10.0pt;font-family:Arial; font-size: 13.3333px; =
text-indent: 48px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Arial; font-size: 13.3333px; text-indent: 48px; =
">- If the PDU is part of a login?</SPAN><O:P style=3D"font-family: =
Arial; font-size: 13.3333px; text-indent: 48px; =
"></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"text-indent:.5in;text-autospace:none; font-family: Times New =
Roman; font-size: 16px; text-indent: 48px; "><FONT size=3D"2" =
face=3D"Courier New"><SPAN style=3D"font-size:9.5pt;font-family:" =
courier=3D"" new";=3D"" font-size:=3D"" 12.6667px;=3D"" text-indent:=3D"" =
48px;=3D""><SPAN class=3D"Apple-style-span" style=3D"font-family: =
Courier New; font-size: 12.6667px; text-indent: 48px; ">&lt;JC&gt; I =
will drop the connection. Agreed that the default value of 8K should be =
supported since login is not complete.</SPAN></SPAN></FONT><O:P =
style=3D"font-family: Times New Roman; font-size: 16px; text-indent: =
48px; "></O:P></P><P class=3D"MsoNormal" =
style=3D"text-indent:.5in;text-autospace:none; font-family: Times New =
Roman; font-size: 16px; text-indent: 48px; "><FONT size=3D"2" =
face=3D"Arial"><SPAN style=3D"font-size:10.0pt;font-family:Arial; =
font-size: 13.3333px; text-indent: 48px; "><O:P style=3D"font-family: =
Arial; font-size: 13.3333px; text-indent: 48px; "><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Arial; font-size: =
13.3333px; text-indent: 48px; ">=A0</SPAN></O:P></SPAN></FONT></P><P =
style=3D"font-family: Times New Roman; font-size: 16px; "><FONT size=3D"2"=
 color=3D"#0000a0" face=3D"Arial"><SPAN style=3D"font-size:10.0pt; =
font-family:Arial;color:#0000A0; font-size: 13.3333px; "><SPAN =
class=3D"Apple-style-span" style=3D"color: rgb(0, 0, 160); font-family: =
Arial; font-size: 13.3333px; ">2)</SPAN></SPAN></FONT><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Times New Roman; =
font-size: 16px; "> </SPAN><FONT size=3D"2" color=3D"#0000a0" =
face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial;color:#0000A0; font-size: =
13.3333px; "><SPAN class=3D"Apple-style-span" style=3D"color: rgb(0, 0, =
160); font-family: Arial; font-size: 13.3333px; ">What should the target =
behavior be if</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" color=3D"#0000a0" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial;color:#0000A0; font-size: =
13.3333px; "><SPAN class=3D"Apple-style-span" style=3D"color: rgb(0, 0, =
160); font-family: Arial; font-size: 13.3333px; ">the initiator sends it =
more data than</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">MaxBurstLength?</SPAN><O:P style=3D"font-family: =
Arial; font-size: 13.3333px; "></O:P></SPAN></FONT></P><P =
style=3D"font-family: Times New Roman; font-size: 16px; "><FONT size=3D"2"=
 face=3D"Arial"><SPAN style=3D"font-size:10.0pt;font-family:Arial; =
font-size: 13.3333px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Arial; font-size: 13.3333px; ">3) What should the =
target</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" face=3D"Arial"><SPAN =
style=3D"font-size:10.0pt;font-family:Arial; font-size: 13.3333px; =
"><SPAN class=3D"Apple-style-span" style=3D"font-family: Arial; =
font-size: 13.3333px; ">behavior be if the initiator sends more data =
than</SPAN></SPAN></FONT><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Times New Roman; font-size: 16px; "> </SPAN><FONT =
size=3D"2" face=3D"Arial"><SPAN style=3D"font-size: =
10.0pt;font-family:Arial; font-size: 13.3333px; "><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Arial; font-size: =
13.3333px; ">FirstBurstLength?</SPAN><O:P style=3D"font-family: Arial; =
font-size: 13.3333px; "></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"text-autospace:none; font-family: Times New Roman; font-size: =
16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; ">&lt;JC&gt; I =
have two options here:</SPAN><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"text-autospace:none; font-family: Times New Roman; font-size: =
16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; =
">=A0</SPAN></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo4; =
text-autospace:none; font-family: Times New Roman; font-size: 16px; =
text-indent: -24px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D"" text-indent:=3D"" -24px;=3D""><SPAN =
style=3D"mso-list:Ignore; font-family: Courier New; font-size: =
12.6667px; text-indent: -24px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; text-indent: =
-24px; ">a)</SPAN><FONT size=3D"1" face=3D"Times New Roman"><SPAN =
style=3D"font:7.0pt " times=3D"" new=3D"" roman";=3D"" font-family:=3D"" =
roman;=3D"" font-size:=3D"" 9.33333px;=3D"" text-indent:=3D"" =
-24px;=3D""><SPAN class=3D"Apple-style-span" style=3D"font-family: Times =
New Roman; font-size: 9.33333px; text-indent: -24px; ">=A0=A0=A0 =
</SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT size=3D"2" face=3D"Courier=
 New"><SPAN style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D""=
 font-size:=3D"" 12.6667px;=3D"" text-indent:=3D"" -24px;=3D""><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Courier New; font-size: =
12.6667px; text-indent: -24px; ">As per the spec: The target reports the =
"Incorrect amount of data" condition if during data output the total =
data length to output is greater than FirstBurstLength and the initiator =
sent unsolicited non-immediate data but the total amount of unsolicited =
data is different than FirstBurstLength. The target reports the same =
error when the amount of data sent as a reply to an R2T does not match =
the amount requested. (0B/0C/0D =96 Write Error, Incorrect Amount of =
Data). This should work.</SPAN><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; text-indent: -24px; "></O:P></SPAN></FONT></P><P =
class=3D"MsoNormal" style=3D"text-autospace:none; font-family: Times New =
Roman; font-size: 16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; =
">=A0</SPAN></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"margin-left:.25in;text-autospace:none; font-family: Times New =
Roman; font-size: 16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; ">The only =
issue here is that the definition of the sense code does not match the =
definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT ENOUGH =
UNSOLICITED DATA), which is not quite what the iSCSI =
says.</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOTE><=
DIV><BR class=3D"khtml-block-placeholder"></DIV><DIV>I'd say go with =
what the RFC says.</DIV><BR><BLOCKQUOTE type=3D"cite"><SPAN =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
border-spacing: 0px 0px; color: rgb(0, 0, 0); font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; text-align: auto; =
-khtml-text-decorations-in-effect: none; text-indent: 0px; =
-apple-text-size-adjust: auto; text-transform: none; orphans: 2; =
white-space: normal; widows: 2; word-spacing: 0px; "><O:SMARTTAGTYPE =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName"><DIV class=3D"Section1"><P class=3D"MsoNormal" =
style=3D"margin-left:.25in;text-autospace:none; font-family: Times New =
Roman; font-size: 16px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "></O:P></SPAN></FONT></P><P class=3D"MsoNormal" =
style=3D"margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo4; =
text-autospace:none; font-family: Times New Roman; font-size: 16px; =
text-indent: -24px; "><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D"" text-indent:=3D"" -24px;=3D""><SPAN =
style=3D"mso-list:Ignore; font-family: Courier New; font-size: =
12.6667px; text-indent: -24px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; text-indent: =
-24px; ">b)</SPAN><FONT size=3D"1" face=3D"Times New Roman"><SPAN =
style=3D"font:7.0pt " times=3D"" new=3D"" roman";=3D"" font-family:=3D"" =
roman;=3D"" font-size:=3D"" 9.33333px;=3D"" text-indent:=3D"" =
-24px;=3D""><SPAN class=3D"Apple-style-span" style=3D"font-family: Times =
New Roman; font-size: 9.33333px; text-indent: -24px; ">=A0=A0=A0 =
</SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT size=3D"2" face=3D"Courier=
 New"><SPAN style=3D"font-size:9.5pt;font-family:" courier=3D"" new";=3D""=
 font-size:=3D"" 12.6667px;=3D"" text-indent:=3D"" -24px;=3D""><SPAN =
class=3D"Apple-style-span" style=3D"font-family: Courier New; font-size: =
12.6667px; text-indent: -24px; ">Treat this as a really bad error and =
assume that I have an initiator that does not play well and drop the =
session and kill the command.</SPAN></SPAN></FONT></P><P =
class=3D"MsoNormal" style=3D""><FONT class=3D"Apple-style-span" =
face=3D"Courier New" size=3D"3"><SPAN class=3D"Apple-style-span" =
style=3D"font-size: 12.6667px;"></SPAN></FONT></P><P =
class=3D"MsoNormal"><FONT size=3D"2" face=3D"Courier New"><SPAN =
style=3D"font-size:9.5pt; font-family:" courier=3D"" new";=3D"" =
font-size:=3D"" 12.6667px;=3D""><O:P style=3D"font-family: Courier New; =
font-size: 12.6667px; "><SPAN class=3D"Apple-style-span" =
style=3D"font-family: Courier New; font-size: 12.6667px; =
">=A0</SPAN></O:P></SPAN></FONT></P><P class=3D"MsoNormal"><FONT =
size=3D"2" face=3D"Courier New"><SPAN style=3D"font-size:9.5pt; =
font-family:" courier=3D"" new";=3D"" font-size:=3D"" =
12.6667px;=3D""><SPAN class=3D"Apple-style-span" style=3D"font-family: =
Courier New; font-size: 12.6667px; ">I am leaning towards (b). =
Help!!!</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOTE=
></DIV><DIV>I think (a) is enough. Actually, I think it's not (a) or =
(b), but (a) or (a) and (b); I think you really need to do the =
processing in (a). Even if you slam the session down, there are internal =
processing consequences of (a). :-)</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Take care,</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Bill</DIV></BODY></HTML>=

--Apple-Mail-3--416919106--

--Apple-Mail-4--416919007
content-type: application/pgp-signature; x-mac-type=70674453;
	name=PGP.sig
content-description: This is a digitally signed message part
content-disposition: inline; filename=PGP.sig
content-transfer-encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFERVNbDJT2Egh26K0RAo4CAJ0T37A7rrXGnlo6fIHmDeQ090RuAwCdHI1l
ywbbb86da/Xp86a+2bLr8+E=
=HgaJ
-----END PGP SIGNATURE-----

--Apple-Mail-4--416919007--


--===============0234748010==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0234748010==--




From ips-bounces@ietf.org Tue Apr 18 19:14:56 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVzPA-0001Wh-FY; Tue, 18 Apr 2006 19:14:44 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVzP8-0001WY-PK
	for ips@ietf.org; Tue, 18 Apr 2006 19:14:42 -0400
Received: from mms3.broadcom.com ([216.31.210.19])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVzP8-00055z-6p
	for ips@ietf.org; Tue, 18 Apr 2006 19:14:42 -0400
Received: from 10.10.64.154 by MMS3.broadcom.com with ESMTP (Broadcom
	SMTP Relay (Email Firewall v6.2.0)); Tue, 18 Apr 2006 16:14:27 -0700
X-Server-Uuid: B238DE4C-2139-4D32-96A8-DD564EF2313E
Received: by mail-irva-10.broadcom.com (Postfix, from userid 47) id
	AF7AA2B0; Tue, 18 Apr 2006 16:14:27 -0700 (PDT)
Received: from mail-irva-8.broadcom.com (mail-irva-8 [10.10.64.221]) by
	mail-irva-10.broadcom.com (Postfix) with ESMTP id 8AF752AF; Tue, 18 Apr
	2006 16:14:27 -0700 (PDT)
Received: from mail-sj1-12.sj.broadcom.com (mail-sj1-12.sj.broadcom.com
	[10.16.128.215]) by mail-irva-8.broadcom.com (MOS 3.7.5-GA) with ESMTP
	id DIK73859; Tue, 18 Apr 2006 16:14:24 -0700 (PDT)
Received: from NT-SJCA-0750.brcm.ad.broadcom.com (nt-sjca-0750
	[10.16.192.220]) by mail-sj1-12.sj.broadcom.com (Postfix) with ESMTP id
	CBEF720501; Tue, 18 Apr 2006 16:14:24 -0700 (PDT)
Received: from NT-SJCA-0752.brcm.ad.broadcom.com ([10.16.192.222]) by
	NT-SJCA-0750.brcm.ad.broadcom.com with Microsoft
	SMTPSVC(6.0.3790.1830); Tue, 18 Apr 2006 16:14:24 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] Target Behavior Clarifications (with corrections)
Date: Tue, 18 Apr 2006 16:14:14 -0700
Message-ID: <710F16C36810444CA2F5821E5EAB7F23036362@NT-SJCA-0752.brcm.ad.broadcom.com>
Thread-Topic: [Ips] Target Behavior Clarifications (with corrections)
Thread-Index: AcZjKzO0Wp4vFEkfSxGE7j/J83dzWgAEb8Nw
From: "Pat Thaler" <pthaler@broadcom.com>
To: "William Studenmund" <wrstuden@wasabisystems.com>, Jacob_Cherian@Dell.com
X-OriginalArrivalTime: 18 Apr 2006 23:14:24.0701 (UTC)
	FILETIME=[D528BED0:01C6633D]
X-TMWD-Spam-Summary: SEV=1.1; DFV=A2006041809; IFV=2.0.6,4.0-7; RPD=4.00.0004;
	RPDID=303030312E30413039303230332E34343435373137372E303032302D412D;
	ENG=IBF; TS=20060418231432; CAT=NONE; CON=NONE;
X-MMS-Spam-Filter-ID: A2006041809_4.00.0004_2.0.6,4.0-7
X-WSS-ID: 685BAD593NG8836736-01-01
X-Spam-Score: 0.0 (/)
X-Scan-Signature: db284e046c8702920c1c6125bc4d0b7a
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1451534815=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1451534815==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C6633D.D4FCE065"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C6633D.D4FCE065
Content-Type: text/plain;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

=20

________________________________

From: William Studenmund [mailto:wrstuden@wasabisystems.com]=20
Sent: Tuesday, April 18, 2006 2:00 PM
To: Jacob_Cherian@Dell.com
Cc: ips@ietf.org
Subject: Re: [Ips] Target Behavior Clarifications (with corrections)


 <snip>=20

	2) What should the target behavior be if the initiator sends it
more data than MaxBurstLength?

	3) What should the target behavior be if the initiator sends
more data than FirstBurstLength?

	<JC> I have two options here:

=09

	a)    As per the spec: The target reports the "Incorrect amount
of data" condition if during data output the total data length to output
is greater than FirstBurstLength and the initiator sent unsolicited
non-immediate data but the total amount of unsolicited data is different
than FirstBurstLength. The target reports the same error when the amount
of data sent as a reply to an R2T does not match the amount requested.
(0B/0C/0D - Write Error, Incorrect Amount of Data). This should work.

=09

	The only issue here is that the definition of the sense code
does not match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR
- NOT ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.


I'd say go with what the RFC says.=20
<PAT> When we wrote that, IMO, we were mainly addressing the case where
the initiator didn't send enough data because when the command starts we
need to know how much unsolicited data there will be so we can construct
the first R2T. There really is no reason that the initiator should be
sending more than was requested. I have no problem with deciding to do
b) instead of a).


=09

=09

	b)    Treat this as a really bad error and assume that I have an
initiator that does not play well and drop the session and kill the
command.

=09

=09

	I am leaning towards (b). Help!!!

I think (a) is enough. Actually, I think it's not (a) or (b), but (a) or
(a) and (b); I think you really need to do the processing in (a). Even
if you slam the session down, there are internal processing consequences
of (a). :-)

Take care,

Bill

------_=_NextPart_001_01C6633D.D4FCE065
Content-Type: text/html;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.2802" name=3DGENERATOR></HEAD>
<BODY=20
style=3D"WORD-WRAP: break-word; khtml-nbsp-mode: space; =
khtml-line-break: after-white-space">
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#000080=20
size=3D2></FONT>&nbsp;</DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> William Studenmund=20
[mailto:wrstuden@wasabisystems.com] <BR><B>Sent:</B> Tuesday, April 18, =
2006=20
2:00 PM<BR><B>To:</B> Jacob_Cherian@Dell.com<BR><B>Cc:</B>=20
ips@ietf.org<BR><B>Subject:</B> Re: [Ips] Target Behavior Clarifications =
(with=20
corrections)<BR></FONT><BR></DIV>
<DIV></DIV>
<DIV>
<DIV><SPAN class=3D873040823-18042006><FONT face=3DArial color=3D#000080 =

size=3D2>&nbsp;&lt;snip&gt;&nbsp;</FONT></SPAN><SPAN =
class=3DApple-style-span=20
style=3D"WORD-SPACING: 0px; FONT: 12px Helvetica; TEXT-TRANSFORM: none; =
COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; =
LETTER-SPACING: normal; BORDER-COLLAPSE: separate; border-spacing: 0px =
0px; khtml-text-decorations-in-effect: none; apple-text-size-adjust: =
auto; orphans: 2; widows: 2"></O:P></DIV></DIV>
<DIV>
<BLOCKQUOTE type=3D"cite">
  <DIV class=3DSection1>
  <P style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT =
face=3DArial=20
  color=3D#0000a0 size=3D2><SPAN=20
  style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: =
Arial">2)</SPAN></SPAN></FONT><SPAN=20
  class=3DApple-style-span style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times =
New Roman">=20
  </SPAN><FONT face=3DArial color=3D#0000a0 size=3D2><SPAN=20
  style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: =
Arial">What should=20
  the target behavior be if</SPAN></SPAN></FONT><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> </SPAN><FONT =
face=3DArial=20
  color=3D#0000a0 size=3D2><SPAN=20
  style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: Arial">the =
initiator=20
  sends it more data than</SPAN></SPAN></FONT><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> </SPAN><FONT =
face=3DArial=20
  size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">MaxBurstLength?</SPAN><O:P=20
  style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"></O:P></SPAN></FONT></P>
  <P style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT =
face=3DArial=20
  size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">3) What=20
  should the target</SPAN></SPAN></FONT><SPAN class=3DApple-style-span=20
  style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> </SPAN><FONT =
face=3DArial=20
  size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"><SPAN=20
  class=3DApple-style-span style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">behavior be=20
  if the initiator sends more data than</SPAN></SPAN></FONT><SPAN=20
  class=3DApple-style-span style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times =
New Roman">=20
  </SPAN><FONT face=3DArial size=3D2><SPAN=20
  style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">FirstBurstLength?</SPAN><O:P=20
  style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New =
Roman"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D""><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">&lt;JC&gt; I have =
two=20
  options here:</SPAN><O:P=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New =
Roman"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D""><O:P=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New"><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal=20
  style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.5in; TEXT-INDENT: -24px; =
FONT-FAMILY: Times New Roman; mso-list: l1 level1 lfo4"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D"" =
text-indent:=3D""=20
  -24px;=3D""><SPAN=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New; mso-list: Ignore"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">a)</SPAN><FONT=20
  face=3D"Times New Roman" size=3D1><SPAN=20
  style=3D"FONT-WEIGHT: normal; FONT-SIZE: 7pt; LINE-HEIGHT: normal; =
FONT-STYLE: normal; FONT-VARIANT: normal"=20
  font-size:=3D"" text-indent:=3D"" -24px;=3D"" 9.33333px;=3D"" =
roman;=3D""=20
  font-family:=3D"" roman?;=3D"" new=3D"" times=3D""><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 9px; TEXT-INDENT: -24px; FONT-FAMILY: Times New =
Roman">&nbsp;&nbsp;&nbsp;=20
  </SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT face=3D"Courier New"=20
  size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " =
12.6667px;=3D""=20
  font-size:=3D"" new?;=3D"" courier=3D"" text-indent:=3D"" =
-24px;=3D""><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">As per=20
  the spec: The target reports the "Incorrect amount of data" condition =
if=20
  during data output the total data length to output is greater than=20
  FirstBurstLength and the initiator sent unsolicited non-immediate data =
but the=20
  total amount of unsolicited data is different than FirstBurstLength. =
The=20
  target reports the same error when the amount of data sent as a reply =
to an=20
  R2T does not match the amount requested. (0B/0C/0D &#8211; Write =
Error, Incorrect=20
  Amount of Data). This should work.</SPAN><O:P=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New =
Roman"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D""><O:P=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New"><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal=20
  style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.25in; FONT-FAMILY: Times New =
Roman"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D""><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">The only issue =
here is that=20
  the definition of the sense code does not match the definition in =
SPC-3 which=20
  says 0Ch 0Dh - WRITE ERROR - NOT ENOUGH UNSOLICITED DATA), which is =
not quite=20
  what the iSCSI=20
says.</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOTE>=

<DIV><BR class=3Dkhtml-block-placeholder></DIV>
<DIV>I'd say go with what the RFC says.<SPAN =
class=3D873040823-18042006><FONT=20
face=3DArial color=3D#000080 size=3D2>&nbsp;</FONT></SPAN></DIV>
<DIV><SPAN class=3D873040823-18042006><FONT face=3DArial color=3D#000080 =

size=3D2>&lt;PAT&gt; When we wrote that,&nbsp;IMO, we were mainly =
addressing the=20
case where the initiator didn't send enough&nbsp;data&nbsp;because when =
the=20
command starts we need to&nbsp;know how much unsolicited data&nbsp;there =
will be=20
so we can construct the first R2T. There really is no reason that the =
initiator=20
should be sending more than was requested. I have no problem with =
deciding to do=20
b) instead of a).</FONT></SPAN><BR></DIV>
<BLOCKQUOTE type=3D"cite"><SPAN class=3DApple-style-span=20
  style=3D"WORD-SPACING: 0px; FONT: 12px Helvetica; TEXT-TRANSFORM: =
none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; =
LETTER-SPACING: normal; BORDER-COLLAPSE: separate; border-spacing: 0px =
0px; khtml-text-decorations-in-effect: none; apple-text-size-adjust: =
auto; orphans: 2; widows: 2"><O:SMARTTAGTYPE=20
  name=3D"PersonName" =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags">
  <DIV class=3DSection1>
  <P class=3DMsoNormal=20
  style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.25in; FONT-FAMILY: Times New =
Roman"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D""><O:P=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal=20
  style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.5in; TEXT-INDENT: -24px; =
FONT-FAMILY: Times New Roman; mso-list: l1 level1 lfo4"><FONT=20
  face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
  12.6667px;=3D"" font-size:=3D"" new?;=3D"" courier=3D"" =
text-indent:=3D""=20
  -24px;=3D""><SPAN=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New; mso-list: Ignore"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">b)</SPAN><FONT=20
  face=3D"Times New Roman" size=3D1><SPAN=20
  style=3D"FONT-WEIGHT: normal; FONT-SIZE: 7pt; LINE-HEIGHT: normal; =
FONT-STYLE: normal; FONT-VARIANT: normal"=20
  font-size:=3D"" text-indent:=3D"" -24px;=3D"" 9.33333px;=3D"" =
roman;=3D""=20
  font-family:=3D"" roman?;=3D"" new=3D"" times=3D""><SPAN =
class=3DApple-style-span=20
  style=3D"FONT-SIZE: 9px; TEXT-INDENT: -24px; FONT-FAMILY: Times New =
Roman">&nbsp;&nbsp;&nbsp;=20
  </SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT face=3D"Courier New"=20
  size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " =
12.6667px;=3D""=20
  font-size:=3D"" new?;=3D"" courier=3D"" text-indent:=3D"" =
-24px;=3D""><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">Treat=20
  this as a really bad error and assume that I have an initiator that =
does not=20
  play well and drop the session and kill the =
command.</SPAN></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT class=3DApple-style-span face=3D"Courier =
New"=20
  size=3D3><SPAN class=3DApple-style-span style=3D"FONT-SIZE: =
12px"></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Courier New" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " 12.6667px;=3D"" =
font-size:=3D"" new?;=3D""=20
  courier=3D""><O:P style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"><SPAN=20
  class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Courier New" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " 12.6667px;=3D"" =
font-size:=3D"" new?;=3D""=20
  courier=3D""><SPAN class=3DApple-style-span=20
  style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">I am leaning =
towards (b).=20
  =
Help!!!</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOT=
E></DIV>
<DIV>I think (a) is enough. Actually, I think it's not (a) or (b), but =
(a) or=20
(a) and (b); I think you really need to do the processing in (a). Even =
if you=20
slam the session down, there are internal processing consequences of =
(a).=20
:-)</DIV>
<DIV><BR class=3Dkhtml-block-placeholder></DIV>
<DIV>Take care,</DIV>
<DIV><BR class=3Dkhtml-block-placeholder></DIV>
<DIV>Bill</DIV></BODY></HTML>

------_=_NextPart_001_01C6633D.D4FCE065--



--===============1451534815==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1451534815==--





From ips-bounces@ietf.org Thu Apr 20 10:33:50 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FWaE7-0003rJ-P2; Thu, 20 Apr 2006 10:33:47 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FWH7E-0002kK-Qs
	for ips@ietf.org; Wed, 19 Apr 2006 14:09:24 -0400
Received: from [64.238.111.98] (helo=thoth.ivivity.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FWH7A-0007tm-GI
	for ips@ietf.org; Wed, 19 Apr 2006 14:09:24 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 19 Apr 2006 14:09:17 -0400
Message-ID: <2EE025E2262D3B43A44884B0EF01C9C354F4EF@thoth.ivivity.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: DDP message interleaving
Thread-Index: AcZj3F+peuDtl8wKRnysoOLVlHhzxQ==
From: "Ben Sum" <bens@ivivity.com>
To: <ips@ietf.org>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 36fb765c89ed47dab364ab702a78e8fd
X-Mailman-Approved-At: Thu, 20 Apr 2006 10:33:46 -0400
Subject: [Ips] DDP message interleaving
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0366994592=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0366994592==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C663DC.5FF7251D"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C663DC.5FF7251D
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Is sender ever multiplexing messages?  Considering following message:

Message1:    =20

FPDU frame MSN =3D 0, MO =3D 0, L =3D 0, T=3D 0=20

FPDU frame MSN =3D 0, MO =3D 1000, L =3D 1, T=3D 0=20
Message2:     =20

FPDU frame T =3D 1, TO =3D 0, L =3D 0=20
FPDU frame T =3D 1, TO =3D 1000, L =3D 1=20
=20
Can the sender transmit as following:=20
1)       FPDU frame MSN =3D 0, MO =3D 0, L =3D 0, T =3D 0=20
2)       FPDU frame T =3D 1, TO =3D 0, L =3D 0=20
3)       FPDU frame MSN =3D 0, MO =3D 1000, L =3D 1, T =3D 0=20
4)       FPDU frame T =3D 1, TO =3D 1000, L =3D 1

=20

Regards,

Ben

=20

Want to help me make miracles?

www.active.com/donate/tntga/tntgabsum

=20

Any content within this email is provided "AS IS" for informational
purposes only.  No contract will be formed between the parties by virtue
of this email. =20

=20


------_=_NextPart_001_01C663DC.5FF7251D
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:"Californian FB";
	panose-1:2 7 4 3 6 8 11 3 2 4;}
@font-face
	{font-family:Georgia;
	panose-1:2 4 5 2 5 4 5 2 3 3;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Is sender ever multiplexing messages?&nbsp; =
Considering following
message:<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>Message1:</span></font><font size=3D1><span =
style=3D'font-size:
7.5pt'> &nbsp; &nbsp; <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame MSN =3D 0, MO =3D 0, L =3D 0, T=3D 0 =
<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame MSN =3D 0, MO =3D 1000, L =3D 1, T=3D =
0</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><br>
Message2:</span></font><font size=3D1><span =
style=3D'font-size:7.5pt'>&nbsp; &nbsp;
&nbsp; <o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame T =3D 1, TO =3D 0, L =3D 0</span></font> =
<font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'><br>
FPDU frame T =3D 1, TO =3D 1000, L =3D 1</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><br>
</span></font>&nbsp;<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><br>
Can the sender transmit as following:</span></font> <font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><br>
1)</span></font><font size=3D1><span style=3D'font-size:7.5pt'> &nbsp; =
&nbsp;
&nbsp; </span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame MSN =3D 0, MO =3D 0, L =3D 0, T =3D =
0</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><br>
2)</span></font><font size=3D1><span style=3D'font-size:7.5pt'> &nbsp; =
&nbsp;
&nbsp; </span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame T =3D 1, TO =3D 0, L =3D 0</span></font> =
<font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'><br>
3)</span></font><font size=3D1><span style=3D'font-size:7.5pt'> &nbsp; =
&nbsp;
&nbsp; </span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame MSN =3D 0, MO =3D 1000, L =3D 1, T =3D =
0</span></font> <font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'><br>
4)</span></font><font size=3D1><span style=3D'font-size:7.5pt'> &nbsp; =
&nbsp;
&nbsp; </span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>FPDU frame T =3D 1, TO =3D 1000, L =3D =
1<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Regards,<o:p></o:p></span></font></p=
>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Ben</span></font><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial'><o:p></o:p></span></font></p=
>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D1 color=3Dnavy face=3DGeorgia><span =
style=3D'font-size:
7.5pt;font-family:Georgia;color:navy'>Want to help me make =
miracles?</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D1 color=3Dnavy face=3DGeorgia><span =
style=3D'font-size:
7.5pt;font-family:Georgia;color:navy'><a
href=3D"http://www.active.com/donate/tntga/tntgabsum">www.active.com/dona=
te/tntga/tntgabsum</a></span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D1 color=3Dnavy face=3DGeorgia><span =
style=3D'font-size:
7.5pt;font-family:Georgia;color:navy'>Any content within this email is =
provided
&#8220;AS IS&#8221; for informational purposes only.&nbsp; No contract =
will be
formed between the parties by virtue of this email.</span></font><font =
size=3D1
color=3Dnavy face=3D"Californian FB"><span =
style=3D'font-size:7.5pt;font-family:"Californian FB";
color:navy'>&nbsp; </span></font><font size=3D1 color=3Dnavy =
face=3D"Californian FB"><span
style=3D'font-size:7.5pt;font-family:"Californian =
FB";color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

------_=_NextPart_001_01C663DC.5FF7251D--


--===============0366994592==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0366994592==--




From ips-bounces@ietf.org Thu Apr 20 11:25:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FWb1j-0005Wz-Je; Thu, 20 Apr 2006 11:25:03 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FWb1i-0005Wu-IJ
	for ips@ietf.org; Thu, 20 Apr 2006 11:25:02 -0400
Received: from webmail4.speakeasy.net ([69.17.117.51]
	helo=webmail4.sea5.speakeasy.net)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FWb1i-0005WV-6y
	for ips@ietf.org; Thu, 20 Apr 2006 11:25:02 -0400
Received: (qmail 27563 invoked from network); 20 Apr 2006 15:25:01 -0000
Received: from localhost (HELO webmail4) ([127.0.0.1])
	(envelope-sender <cait@asomi.com>)
	by localhost (qmail-ldap-1.03) with SMTP
	for <bens@ivivity.com>; 20 Apr 2006 15:25:01 -0000
Received: from 216.31.211.11 (unverified [216.31.211.11])
	by webmail4 (VisualMail 4.0) with WEBMAIL id 25539;
	Thu, 20 Apr 2006 15:25:01 +0000
From: "Caitlin Bestler" <cait@asomi.com>
To: "Ben Sum" <bens@ivivity.com>, ips@ietf.org
Importance: Normal
Sensitivity: Normal
Message-ID: <W458292738255391145546701@webmail4>
X-Mailer: Mintersoft VisualMail, Build 4.0.111601
X-Originating-IP: [216.31.211.11]
Date: Thu, 20 Apr 2006 15:25:01 +0000
Subject: Re: [Ips] DDP message interleaving
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 1.5 (+)
X-Scan-Signature: 41c17b4b16d1eedaa8395c26e9a251c4
Cc: 
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org


> -----Original Message-----
> From: Ben Sum [mailto:bens@ivivity.com]
> Sent: Wednesday, April 19, 2006 06:09 PM
> To: ips@ietf.org
> Subject: [Ips] DDP message interleaving
> 
> Is sender ever multiplexing messages?  Considering following message:
> 
> Message1:     
> 
> FPDU frame MSN = 0, MO = 0, L = 0, T= 0 
> 
> FPDU frame MSN = 0, MO = 1000, L = 1, T= 0 
> Message2:      
> 
> FPDU frame T = 1, TO = 0, L = 0 
> FPDU frame T = 1, TO = 1000, L = 1 
>  
> Can the sender transmit as following: 
> 1)       FPDU frame MSN = 0, MO = 0, L = 0, T = 0 
> 2)       FPDU frame T = 1, TO = 0, L = 0 
> 3)       FPDU frame MSN = 0, MO = 1000, L = 1, T = 0 
> 4)       FPDU frame T = 1, TO = 1000, L = 1
> 
>  
> 
> Regards,
> 
> Ben
> 

There are two issues here: what you should accept,
and what you should send.

On the receive side, if you are processing the
incoming packets optimally you will not even notice
this type of anomolous ordering. A receiver definitely
SHOULD NOT add extra steps to attempt to detect something
of this nature.

On the other hand this is definitely something that
a sender SHOULD NOT send, possibly MUST NOT send.

The DDP spec clarifies that the DDP layer segments
messages and submits them to the LLP. It is clear
that the DDP layer MUST submit all of the segments
for a message in sequence and non-interleaved.

What is not clear is if the LLP layer MUST assign
these segments successive LLP sequences, or if it
can interleave in ways that do change the sequence
of L flags or the fact that the L flag is the last
segment of the message.

Nobody has identified a reason why a MPA layer would
do such a thing, and assigning the expected TCP
sequencing is at the minimum an implied SHOULD.
But this is not explicitly a constraint. The SCTP
Adaptation, which is under the exact same constraints
as the MPA/TCP adaptation explicitly recognizes that
SCTP stacks are allowed to re-order Data Chunks in
order to optimize transmission. IF DDP does not impose
a MUST behavior on SCTP, then it does not impose it
on MPA/TCP. But SCTP has a valid "SHOULD trumping" 
reason for reordering packets, MPA/TCP does not.




_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Sun Apr 23 04:47:22 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FXaFL-0007hy-Cb; Sun, 23 Apr 2006 04:47:11 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FXaFK-0007ht-ED
	for ips@ietf.org; Sun, 23 Apr 2006 04:47:10 -0400
Received: from taurus.voltaire.com ([193.47.165.240])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FXaFJ-0007tI-9K
	for ips@ietf.org; Sun, 23 Apr 2006 04:47:10 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] MPA alignment
Date: Sun, 23 Apr 2006 11:47:02 +0300
Message-ID: <D4F8F0B3820E754C887699BEF26A8940010CA5C4@taurus.voltaire.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] MPA alignment
Thread-Index: AcZi5mdxG+AaU3IYTD+P4zcY/aHSUAAMRZ/gAOavAjA=
From: "Dan Bar Dov" <danb@voltaire.com>
To: "John Hufferd" <jhufferd@Brocade.COM>,
	"Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>,
	"Mike Ko" <mako@almaden.ibm.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9361ae25efd9cff62e36f70ef966350e
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0805603212=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0805603212==
Content-class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C666B2.7E04DE86"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C666B2.7E04DE86
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I just wanted to note in addition to what John said, that ISER is not a =
symmetric protocol.
Only the target side performs the RDMA operations. The initiator does =
only the setup.
=20
Dan


________________________________

	From: John Hufferd [mailto:jhufferd@Brocade.COM]=20
	Sent: Tuesday, April 18, 2006 9:56 PM
	To: Eddy Quicksall; Mike Ko
	Cc: ips@ietf.org
	Subject: RE: [Ips] MPA alignment
=09
=09

	Eddy,

	I agree with your statement about software RDMA being a bit silly, but =
only when the thought is about implementations on servers.

	There is at least one type of environment where using RDMA with a =
software iWARP stack may not be too silly, and that is when the object =
of the interconnect is to optimize the over all costs and save Server =
Cycles.  In that case is may make sense to operate with a software RDMA =
stack on the desktop systems or workstations.  Those environments often =
have a plentiful amount of available CPU cycles on the =
desktop/workstation.  So, the approach is to burn CPU cycles at the =
desktop/workstation and save CPU cycles on the servers, which have =
RNICs.  This type of a configuration actually seems to be a useful =
configuration.

	=20

	The same argument can be used with iSCSI and iSER, but only in the case =
where there are RNICs in the target.  It is a little bit strange, as you =
point out, to have the storage controller implement a software version =
of iSER, except perhaps for some type of compatibility or migration =
reasons.

	=20

	.

	.

	.

	John L Hufferd

	Sr. Executive Director of Technology

	Brocade Communications Systems, Inc

	jhufferd@brocade.com

	Office Phone: (408) 333-5244; eFAX: (408) 904-4688

	Alt Office Phone: (408) 997-6136; Cell: (408) 627-9606

	=20

=09
________________________________


	From: Eddy Quicksall [mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net]=20
	Sent: Tuesday, April 18, 2006 5:48 AM
	To: Mike Ko
	Cc: ips@ietf.org
	Subject: Re: [Ips] MPA alignment

	=20

	Thanks,

	=20

	Here is my feeling on this. If one were to use a standard TCP/IP stack =
(that does copying) then it is a bit silly to use iSER. If one were to =
use a software implementation and write/modify the stack to get the =
desired effects of DDP then he will probably heed to the alignment notes =
in the spec. So if one were to support misaligned segments using a =
slower method then it would be OK.

	=20

	Eddy

		----- Original Message -----=20

		From: Mike Ko <mailto:mako@almaden.ibm.com> =20

		To: Eddy Quicksall <mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net> =20

		Cc: ips@ietf.org=20

		Sent: Tuesday, April 18, 2006 2:16 AM

		Subject: Re: [Ips] MPA alignment

		=20

	=09
		Eddy,=20
	=09
		If your question is about MPA behavior in general, then it should be =
directed to the rddp forum.=20
	=09
		Assuming your question is related to iSER, then if iWARP is =
implemented in software and uses the existing TCP/IP stack, then it =
cannot guarantee that FPDU's will be aligned with TCP segments.  For the =
general case where iWARP is implemented in an RNIC with an integrated =
TCP/IP stack, then it is to the RNIC vendor's advantage to optimize his =
product's performance and therefore FPDU's should be aligned with TCP =
segments.  However, the receiver can still receive FPDU's which are not =
aligned with TCP segments if there are resegmenting middleboxes =
somewhere in the connection path.=20
	=09
		Mike  =20

		To:        <ips@ietf.org>=20
		cc:        =20
		Subject:        [Ips] MPA alignment=20
	=09
	=09
		It is preferable to have TCP sender to align MPA header where a TCP =
segment begins and to keep the MPA FPDU within a TCP segment, so that =
the receiver hardware doesn't need to temporarily buffer the FPDU for =
the CRC checking.  =20
		 =20
		Does anyone know of any software or hardware that is not an FPDU =
alignment sender?=20
		Does anyone have a feel for the likelihood of software or hardware to =
not align FPDU's on a TCP segment?=20
		 =20
		Eddy_______________________________________________
		Ips mailing list
		Ips@ietf.org
		https://www1.ietf.org/mailman/listinfo/ips

	=09
________________________________


		_______________________________________________
		Ips mailing list
		Ips@ietf.org
		https://www1.ietf.org/mailman/listinfo/ips


------_=_NextPart_001_01C666B2.7E04DE86
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word"><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2873" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@font-face {
	font-family: sans-serif;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: =
"Times New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto
}
TT {
	FONT-FAMILY: "Courier New"
}
SPAN.EmailStyle19 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue bgColor=3Dwhite>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D940084508-23042006>I just&nbsp;wanted to note in addition to =
what John=20
said, that ISER is not a symmetric protocol.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D940084508-23042006>Only the target side performs the RDMA =
operations. The=20
initiator does only the setup.</SPAN></FONT></DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D940084508-23042006></SPAN></FONT>&nbsp;</DIV>
<DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#0000ff =
size=3D2><SPAN=20
class=3D940084508-23042006>Dan</SPAN></FONT></DIV><BR>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> John Hufferd=20
  [mailto:jhufferd@Brocade.COM] <BR><B>Sent:</B> Tuesday, April 18, 2006 =
9:56=20
  PM<BR><B>To:</B> Eddy Quicksall; Mike Ko<BR><B>Cc:</B>=20
  ips@ietf.org<BR><B>Subject:</B> RE: [Ips] MPA =
alignment<BR></FONT><BR></DIV>
  <DIV></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">Eddy,<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">I agree =
with your=20
  statement about software RDMA being a bit silly, but only when the =
thought is=20
  about implementations on servers.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">There is at =
least one=20
  type of environment where using RDMA with a software iWARP stack may =
not be=20
  too silly, and that is when the object of the interconnect is to =
optimize the=20
  over all costs and save Server Cycles. &nbsp;In that case is may make =
sense to=20
  operate with a software RDMA stack on the desktop systems or=20
  workstations.&nbsp; Those environments often have a plentiful amount =
of=20
  available CPU cycles on the desktop/workstation.&nbsp; So, the =
approach is to=20
  burn CPU cycles at the desktop/workstation and save CPU cycles on the =
servers,=20
  which have RNICs.&nbsp; This type of a configuration actually seems to =
be a=20
  useful configuration.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">The same =
argument can=20
  be used with iSCSI and iSER, but only in the case where there are =
RNICs in the=20
  target. &nbsp;It is a little bit strange, as you point out, to have =
the=20
  storage controller implement a software version of iSER, except =
perhaps for=20
  some type of compatibility or migration =
reasons.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">.</SPAN></FONT><FONT =
color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">.</SPAN></FONT><FONT =
color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">.</SPAN></FONT><FONT =
color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">John L =
Hufferd</SPAN></FONT><FONT=20
  color=3Dnavy><SPAN style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">Sr. Executive Director of=20
  Technology</SPAN></FONT><FONT color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">Brocade Communications Systems, =

  Inc</SPAN></FONT><FONT color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy"><A =
title=3Dmailto:jhufferd@brocade.com=20
  =
href=3D"mailto:jhufferd@brocade.com">jhufferd@brocade.com</A></SPAN></FON=
T><FONT=20
  color=3Dnavy><SPAN style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">Office Phone: (408) 333-5244; =
eFAX: (408)=20
  904-4688</SPAN></FONT><FONT color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" color=3Dnavy =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy">Alt Office Phone: (408) =
997-6136; Cell:=20
  (408) 627-9606</SPAN></FONT><FONT color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P></DIV>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV>
  <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" =
align=3Dcenter><FONT=20
  face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
  face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma"> Eddy=20
  Quicksall [mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net] =
<BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Tuesday, April 18, 2006 =
5:48=20
  AM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> Mike =
Ko<BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Cc:</SPAN></B> ips@ietf.org<BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> Re: [Ips] MPA=20
  alignment</SPAN></FONT><o:p></o:p></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Thanks,</SPAN></FONT><o:p></o:p></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">Here is my feeling on this. If one were to =
use a=20
  standard TCP/IP stack (that does copying)&nbsp;then it is a bit silly =
to use=20
  iSER. If one were to use a software implementation and write/modify =
the stack=20
  to get the desired effects of DDP then he will probably heed to the =
alignment=20
  notes in the spec. So if one were to support misaligned segments using =
a=20
  slower method then it would be OK.<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt">&nbsp;<o:p></o:p></SPAN></FONT></P></DIV>
  <DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Eddy</SPAN></FONT><o:p></o:p></P></DIV>
  <BLOCKQUOTE=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: =
medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; MARGIN: 5pt 0in 5pt =
3.75pt; BORDER-LEFT: black 1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: =
medium none">
    <DIV>
    <P class=3DMsoNormal><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">----- Original Message =
-----=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV style=3D"font-color: black">
    <P class=3DMsoNormal style=3D"BACKGROUND: #e4e4e4"><B><FONT =
face=3DArial=20
    size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">From:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
    title=3Dmako@almaden.ibm.com =
href=3D"mailto:mako@almaden.ibm.com">Mike Ko</A>=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">To:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
    title=3Deddy_quicksall_iVivity_iSCSI@Comcast.net=20
    href=3D"mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net">Eddy =
Quicksall</A>=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Cc:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> <A=20
    title=3Dips@ietf.org href=3D"mailto:ips@ietf.org">ips@ietf.org</A>=20
    <o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Sent:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">=20
    Tuesday, April 18, 2006 2:16 AM<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><B><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Subject:</SPAN></FONT></B><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"> Re:=20
    [Ips] MPA alignment<o:p></o:p></SPAN></FONT></P></DIV>
    <DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P></DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: 12pt"><BR></SPAN></FONT><FONT face=3Dsans-serif =
size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
sans-serif">Eddy,</SPAN></FONT>=20
    <BR><BR><FONT face=3Dsans-serif size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: sans-serif">If your question =
is about=20
    MPA behavior in general, then it should be directed to the rddp=20
    forum.</SPAN></FONT> <BR><BR><FONT face=3Dsans-serif size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: sans-serif">Assuming your =
question is=20
    related to iSER, then if iWARP is implemented in software and uses =
the=20
    existing TCP/IP stack, then it cannot guarantee that FPDU's will be =
aligned=20
    with TCP segments. &nbsp;For the general case where iWARP is =
implemented in=20
    an RNIC with an integrated TCP/IP stack, then it is to the RNIC =
vendor's=20
    advantage to optimize his product's performance and therefore FPDU's =
should=20
    be aligned with TCP segments. &nbsp;However, the receiver can still =
receive=20
    FPDU's which are not aligned with TCP segments if there are =
resegmenting=20
    middleboxes somewhere in the connection path.</SPAN></FONT> =
<BR><BR><FONT=20
    face=3Dsans-serif size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: sans-serif">Mike =
&nbsp;</SPAN></FONT>=20
    <o:p></o:p></P>
    <P style=3D"MARGIN-BOTTOM: 12pt"><FONT face=3Dsans-serif =
color=3Dpurple=20
    size=3D1><SPAN=20
    style=3D"FONT-SIZE: 7.5pt; COLOR: purple; FONT-FAMILY: =
sans-serif">To: &nbsp;=20
    &nbsp; &nbsp; &nbsp;</SPAN></FONT><FONT face=3Dsans-serif =
size=3D1><SPAN=20
    style=3D"FONT-SIZE: 7.5pt; FONT-FAMILY: =
sans-serif">&lt;ips@ietf.org&gt;</SPAN></FONT>=20
    <BR><FONT face=3Dsans-serif color=3Dpurple size=3D1><SPAN=20
    style=3D"FONT-SIZE: 7.5pt; COLOR: purple; FONT-FAMILY: =
sans-serif">cc: &nbsp;=20
    &nbsp; &nbsp; &nbsp; </SPAN></FONT><BR><FONT face=3Dsans-serif =
color=3Dpurple=20
    size=3D1><SPAN=20
    style=3D"FONT-SIZE: 7.5pt; COLOR: purple; FONT-FAMILY: =
sans-serif">Subject:=20
    &nbsp; &nbsp; &nbsp; &nbsp;</SPAN></FONT><FONT face=3Dsans-serif =
size=3D1><SPAN=20
    style=3D"FONT-SIZE: 7.5pt; FONT-FAMILY: sans-serif">[Ips] MPA=20
    alignment</SPAN></FONT> <BR><BR><BR><FONT face=3DArial =
size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">It is preferable to =
have TCP=20
    sender to align MPA header where a TCP segment begins and to keep =
the MPA=20
    FPDU within a TCP segment, so that the receiver hardware doesn=92t =
need to=20
    temporarily buffer the FPDU for the CRC checking. =
&nbsp;</SPAN></FONT>=20
    <BR>&nbsp; <BR><FONT face=3DArial size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">Does anyone know of =
any software=20
    or hardware that is not an FPDU alignment sender?</SPAN></FONT> =
<BR><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Does=20
    anyone have a feel for the likelihood of software or hardware to not =
align=20
    FPDU's on a TCP segment?</SPAN></FONT> <BR>&nbsp; <BR><FONT =
face=3DArial=20
    size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">Eddy</SPAN></FONT><TT><FONT=20
    face=3D"Courier New" size=3D2><SPAN=20
    style=3D"FONT-SIZE: =
10pt">_______________________________________________</SPAN></FONT></TT><=
FONT=20
    face=3D"Courier New" size=3D2><SPAN=20
    style=3D"FONT-SIZE: 10pt; FONT-FAMILY: 'Courier New'"><BR><TT><FONT=20
    face=3D"Courier New">Ips mailing list</FONT></TT><BR><TT><FONT=20
    face=3D"Courier New">Ips@ietf.org</FONT></TT><BR><TT><FONT=20
    face=3D"Courier =
New">https://www1.ietf.org/mailman/listinfo/ips</FONT></TT></SPAN></FONT>=
<o:p></o:p></P>
    <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" =
align=3Dcenter><FONT=20
    face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
    <HR align=3Dcenter width=3D"100%" SIZE=3D2>
    </SPAN></FONT></DIV>
    <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
    style=3D"FONT-SIZE: =
12pt">_______________________________________________<BR>Ips=20
    mailing=20
    =
list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips<o:p></=
o:p></SPAN></FONT></P></BLOCKQUOTE></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C666B2.7E04DE86--


--===============0805603212==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0805603212==--




From ips-bounces@ietf.org Sun Apr 23 16:03:48 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FXknw-0002tX-Gb; Sun, 23 Apr 2006 16:03:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FXknv-0002tS-TA
	for ips@ietf.org; Sun, 23 Apr 2006 16:03:35 -0400
Received: from sccrmhc11.comcast.net ([204.127.200.81])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FXknv-0006Az-ES
	for ips@ietf.org; Sun, 23 Apr 2006 16:03:35 -0400
Received: from ivvtdkv0981 (unknown[218.75.77.238])
	by comcast.net (sccrmhc11) with SMTP
	id <2006042320033201100qehide>; Sun, 23 Apr 2006 20:03:33 +0000
Message-ID: <006001c66775$93ab7600$2e01a8c0@ivivity.com>
From: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>
To: "Pat Thaler" <pthaler@broadcom.com>,
	"William Studenmund" <wrstuden@wasabisystems.com>, <Jacob_Cherian@Dell.com>
References: <710F16C36810444CA2F5821E5EAB7F23036362@NT-SJCA-0752.brcm.ad.broadcom.com>
Subject: Re: [Ips] Target Behavior Clarifications (with corrections)
Date: Mon, 24 Apr 2006 04:03:27 -0400
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2869
x-mimeole: Produced By Microsoft MimeOLE V6.00.2900.2869
X-Spam-Score: 1.2 (+)
X-Scan-Signature: 9a9ddb14fac983e71b59f23b52a45b4e
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0328319054=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0328319054==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_005D_01C66754.0A58E6B0"

This is a multi-part message in MIME format.

------=_NextPart_000_005D_01C66754.0A58E6B0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

In most cases I feel that if the initiator is going to violate the spec =
then the connection should just be dropped (a reject or UA could still =
be used before the drop). I feel this way because to continue after a =
protocol error will probably lead to other problems that may in fact be =
more serious.

Also I prefer a reject because these errors are usually detected at the =
iSCSI layer and for the iSCSI layer to give a UA means more logic to =
understand the SCSI semantics.

For something like the errors you have mentioned the initiator is not =
going to correct itself and do it right the 2nd time.

Eddy
  ----- Original Message -----=20
  From: Pat Thaler=20
  To: William Studenmund ; Jacob_Cherian@Dell.com=20
  Cc: ips@ietf.org=20
  Sent: Tuesday, April 18, 2006 7:14 PM
  Subject: RE: [Ips] Target Behavior Clarifications (with corrections)






-------------------------------------------------------------------------=
-----
  From: William Studenmund [mailto:wrstuden@wasabisystems.com]=20
  Sent: Tuesday, April 18, 2006 2:00 PM
  To: Jacob_Cherian@Dell.com
  Cc: ips@ietf.org
  Subject: Re: [Ips] Target Behavior Clarifications (with corrections)


   <snip>=20
    2) What should the target behavior be if the initiator sends it more =
data than MaxBurstLength?

    3) What should the target behavior be if the initiator sends more =
data than FirstBurstLength?

    <JC> I have two options here:


    a)    As per the spec: The target reports the "Incorrect amount of =
data" condition if during data output the total data length to output is =
greater than FirstBurstLength and the initiator sent unsolicited =
non-immediate data but the total amount of unsolicited data is different =
than FirstBurstLength. The target reports the same error when the amount =
of data sent as a reply to an R2T does not match the amount requested. =
(0B/0C/0D - Write Error, Incorrect Amount of Data). This should work.


    The only issue here is that the definition of the sense code does =
not match the definition in SPC-3 which says 0Ch 0Dh - WRITE ERROR - NOT =
ENOUGH UNSOLICITED DATA), which is not quite what the iSCSI says.



  I'd say go with what the RFC says.=20
  <PAT> When we wrote that, IMO, we were mainly addressing the case =
where the initiator didn't send enough data because when the command =
starts we need to know how much unsolicited data there will be so we can =
construct the first R2T. There really is no reason that the initiator =
should be sending more than was requested. I have no problem with =
deciding to do b) instead of a).


    b)    Treat this as a really bad error and assume that I have an =
initiator that does not play well and drop the session and kill the =
command.



    I am leaning towards (b). Help!!!

  I think (a) is enough. Actually, I think it's not (a) or (b), but (a) =
or (a) and (b); I think you really need to do the processing in (a). =
Even if you slam the session down, there are internal processing =
consequences of (a). :-)


  Take care,


  Bill


-------------------------------------------------------------------------=
-----


  _______________________________________________
  Ips mailing list
  Ips@ietf.org
  https://www1.ietf.org/mailman/listinfo/ips

------=_NextPart_000_005D_01C66754.0A58E6B0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2873" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY=20
style=3D"WORD-WRAP: break-word; khtml-nbsp-mode: space; =
khtml-line-break: after-white-space"=20
bgColor=3D#ffffff>
<DIV><FONT size=3D2>In most cases I feel that if the initiator is going =
to violate=20
the spec then the connection should just be dropped (a reject or =
UA&nbsp;could=20
still be used before the drop). I feel this way because to continue =
after a=20
protocol error will probably lead to other problems that may in fact be =
more=20
serious.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Also I prefer a reject because these errors are =
usually=20
detected at the iSCSI layer and for the iSCSI layer to give a UA means =
more=20
logic to understand the SCSI semantics.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>For something like the errors you have mentioned the =
initiator=20
is not going to correct itself and do it right the 2nd =
time.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Eddy</FONT></DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV=20
  style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: =
black"><B>From:</B>=20
  <A title=3Dpthaler@broadcom.com =
href=3D"mailto:pthaler@broadcom.com">Pat=20
  Thaler</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A =
title=3Dwrstuden@wasabisystems.com=20
  href=3D"mailto:wrstuden@wasabisystems.com">William Studenmund</A> ; <A =

  title=3DJacob_Cherian@Dell.com=20
  href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</A> =
</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Cc:</B> <A title=3Dips@ietf.org=20
  href=3D"mailto:ips@ietf.org">ips@ietf.org</A> </DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Tuesday, April 18, 2006 =
7:14=20
  PM</DIV>
  <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> RE: [Ips] Target =
Behavior=20
  Clarifications (with corrections)</DIV>
  <DIV><BR></DIV>
  <DIV dir=3Dltr align=3Dleft><FONT face=3DArial color=3D#000080=20
  size=3D2></FONT>&nbsp;</DIV><BR>
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> William Studenmund=20
  [mailto:wrstuden@wasabisystems.com] <BR><B>Sent:</B> Tuesday, April =
18, 2006=20
  2:00 PM<BR><B>To:</B> <A=20
  =
href=3D"mailto:Jacob_Cherian@Dell.com">Jacob_Cherian@Dell.com</A><BR><B>C=
c:</B>=20
  <A href=3D"mailto:ips@ietf.org">ips@ietf.org</A><BR><B>Subject:</B> =
Re: [Ips]=20
  Target Behavior Clarifications (with corrections)<BR></FONT><BR></DIV>
  <DIV></DIV>
  <DIV>
  <DIV><SPAN class=3D873040823-18042006><FONT face=3DArial =
color=3D#000080=20
  size=3D2>&nbsp;&lt;snip&gt;&nbsp;</FONT></SPAN><SPAN =
class=3DApple-style-span=20
  style=3D"WORD-SPACING: 0px; FONT: 12px Helvetica; TEXT-TRANSFORM: =
none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; =
LETTER-SPACING: normal; BORDER-COLLAPSE: separate; border-spacing: 0px =
0px; khtml-text-decorations-in-effect: none; apple-text-size-adjust: =
auto; orphans: 2; widows: 2"></O:P></DIV></DIV>
  <DIV>
  <BLOCKQUOTE type=3D"cite">
    <DIV class=3DSection1>
    <P style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT =
face=3DArial=20
    color=3D#0000a0 size=3D2><SPAN=20
    style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: =
Arial">2)</SPAN></SPAN></FONT><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> =
</SPAN><FONT=20
    face=3DArial color=3D#0000a0 size=3D2><SPAN=20
    style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: =
Arial">What should=20
    the target behavior be if</SPAN></SPAN></FONT><SPAN =
class=3DApple-style-span=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> =
</SPAN><FONT=20
    face=3DArial color=3D#0000a0 size=3D2><SPAN=20
    style=3D"FONT-SIZE: 13px; COLOR: #0000a0; FONT-FAMILY: Arial"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 13px; COLOR: rgb(0,0,160); FONT-FAMILY: =
Arial">the=20
    initiator sends it more data than</SPAN></SPAN></FONT><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> =
</SPAN><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">MaxBurstLength?</SPAN><O:P=20
    style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial"></O:P></SPAN></FONT></P>
    <P style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT =
face=3DArial=20
    size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: Arial"><SPAN=20
    class=3DApple-style-span style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">3) What=20
    should the target</SPAN></SPAN></FONT><SPAN class=3DApple-style-span =

    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> =
</SPAN><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial"><SPAN=20
    class=3DApple-style-span style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">behavior=20
    be if the initiator sends more data than</SPAN></SPAN></FONT><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"> =
</SPAN><FONT=20
    face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial">FirstBurstLength?</SPAN><O:P=20
    style=3D"FONT-SIZE: 13px; FONT-FAMILY: =
Arial"></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D""><SPAN =
class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">&lt;JC&gt; I =
have two=20
    options here:</SPAN><O:P=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D""><O:P=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.5in; TEXT-INDENT: -24px; =
FONT-FAMILY: Times New Roman; mso-list: l1 level1 lfo4"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D"" -24px;=3D""=20
    text-indent:=3D""><SPAN=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New; mso-list: Ignore"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">a)</SPAN><FONT=20
    face=3D"Times New Roman" size=3D1><SPAN=20
    style=3D"FONT-WEIGHT: normal; FONT-SIZE: 7pt; LINE-HEIGHT: normal; =
FONT-STYLE: normal; FONT-VARIANT: normal"=20
    font-size:=3D"" -24px;=3D"" text-indent:=3D"" times=3D"" new=3D"" =
roman?;=3D""=20
    font-family:=3D"" roman;=3D"" 9.33333px;=3D""><SPAN =
class=3DApple-style-span=20
    style=3D"FONT-SIZE: 9px; TEXT-INDENT: -24px; FONT-FAMILY: Times New =
Roman">&nbsp;&nbsp;&nbsp;=20
    </SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT face=3D"Courier New" =

    size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " =
courier=3D"" new?;=3D""=20
    font-size:=3D"" 12.6667px;=3D"" -24px;=3D"" text-indent:=3D""><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">As per=20
    the spec: The target reports the "Incorrect amount of data" =
condition if=20
    during data output the total data length to output is greater than=20
    FirstBurstLength and the initiator sent unsolicited non-immediate =
data but=20
    the total amount of unsolicited data is different than =
FirstBurstLength. The=20
    target reports the same error when the amount of data sent as a =
reply to an=20
    R2T does not match the amount requested. (0B/0C/0D =96 Write Error, =
Incorrect=20
    Amount of Data). This should work.</SPAN><O:P=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D""><O:P=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.25in; FONT-FAMILY: Times =
New Roman"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D""><SPAN =
class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">The only issue =
here is=20
    that the definition of the sense code does not match the definition =
in SPC-3=20
    which says 0Ch 0Dh - WRITE ERROR - NOT ENOUGH UNSOLICITED DATA), =
which is=20
    not quite what the iSCSI=20
    =
says.</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOTE>=

  <DIV><BR class=3Dkhtml-block-placeholder></DIV>
  <DIV>I'd say go with what the RFC says.<SPAN =
class=3D873040823-18042006><FONT=20
  face=3DArial color=3D#000080 size=3D2>&nbsp;</FONT></SPAN></DIV>
  <DIV><SPAN class=3D873040823-18042006><FONT face=3DArial =
color=3D#000080=20
  size=3D2>&lt;PAT&gt; When we wrote that,&nbsp;IMO, we were mainly =
addressing the=20
  case where the initiator didn't send enough&nbsp;data&nbsp;because =
when the=20
  command starts we need to&nbsp;know how much unsolicited =
data&nbsp;there will=20
  be so we can construct the first R2T. There really is no reason that =
the=20
  initiator should be sending more than was requested. I have no problem =
with=20
  deciding to do b) instead of a).</FONT></SPAN><BR></DIV>
  <BLOCKQUOTE type=3D"cite"><SPAN class=3DApple-style-span=20
    style=3D"WORD-SPACING: 0px; FONT: 12px Helvetica; TEXT-TRANSFORM: =
none; COLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; =
LETTER-SPACING: normal; BORDER-COLLAPSE: separate; border-spacing: 0px =
0px; khtml-text-decorations-in-effect: none; apple-text-size-adjust: =
auto; orphans: 2; widows: 2"><O:SMARTTAGTYPE=20
    namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"PersonName">
    <DIV class=3DSection1>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.25in; FONT-FAMILY: Times =
New Roman"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D""><O:P=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal=20
    style=3D"FONT-SIZE: 16px; MARGIN-LEFT: 0.5in; TEXT-INDENT: -24px; =
FONT-FAMILY: Times New Roman; mso-list: l1 level1 lfo4"><FONT=20
    face=3D"Courier New" size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; =
FONT-FAMILY: "=20
    courier=3D"" new?;=3D"" font-size:=3D"" 12.6667px;=3D"" -24px;=3D""=20
    text-indent:=3D""><SPAN=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New; mso-list: Ignore"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">b)</SPAN><FONT=20
    face=3D"Times New Roman" size=3D1><SPAN=20
    style=3D"FONT-WEIGHT: normal; FONT-SIZE: 7pt; LINE-HEIGHT: normal; =
FONT-STYLE: normal; FONT-VARIANT: normal"=20
    font-size:=3D"" -24px;=3D"" text-indent:=3D"" times=3D"" new=3D"" =
roman?;=3D""=20
    font-family:=3D"" roman;=3D"" 9.33333px;=3D""><SPAN =
class=3DApple-style-span=20
    style=3D"FONT-SIZE: 9px; TEXT-INDENT: -24px; FONT-FAMILY: Times New =
Roman">&nbsp;&nbsp;&nbsp;=20
    </SPAN></SPAN></FONT></SPAN></SPAN></FONT><FONT face=3D"Courier New" =

    size=3D2><SPAN style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " =
courier=3D"" new?;=3D""=20
    font-size:=3D"" 12.6667px;=3D"" -24px;=3D"" text-indent:=3D""><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; TEXT-INDENT: -24px; FONT-FAMILY: Courier =
New">Treat=20
    this as a really bad error and assume that I have an initiator that =
does not=20
    play well and drop the session and kill the=20
command.</SPAN></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT class=3DApple-style-span face=3D"Courier =
New"=20
    size=3D3><SPAN class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px"></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3D"Courier New" size=3D2><SPAN=20
    style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " courier=3D"" new?;=3D"" =
font-size:=3D""=20
    12.6667px;=3D""><O:P style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"><SPAN=20
    class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier =
New"></SPAN></O:P></SPAN></FONT></P>
    <P class=3DMsoNormal><FONT face=3D"Courier New" size=3D2><SPAN=20
    style=3D"FONT-SIZE: 9.5pt; FONT-FAMILY: " courier=3D"" new?;=3D"" =
font-size:=3D""=20
    12.6667px;=3D""><SPAN class=3DApple-style-span=20
    style=3D"FONT-SIZE: 12px; FONT-FAMILY: Courier New">I am leaning =
towards (b).=20
    =
Help!!!</SPAN></SPAN></FONT></P></DIV></O:SMARTTAGTYPE></SPAN></BLOCKQUOT=
E></DIV>
  <DIV>I think (a) is enough. Actually, I think it's not (a) or (b), but =
(a) or=20
  (a) and (b); I think you really need to do the processing in (a). Even =
if you=20
  slam the session down, there are internal processing consequences of =
(a).=20
  :-)</DIV>
  <DIV><BR class=3Dkhtml-block-placeholder></DIV>
  <DIV>Take care,</DIV>
  <DIV><BR class=3Dkhtml-block-placeholder></DIV>
  <DIV>Bill</DIV>
  <P>
  <HR>

  <P></P>_______________________________________________<BR>Ips mailing=20
  =
list<BR>Ips@ietf.org<BR>https://www1.ietf.org/mailman/listinfo/ips<BR></B=
LOCKQUOTE></BODY></HTML>

------=_NextPart_000_005D_01C66754.0A58E6B0--



--===============0328319054==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============0328319054==--





From ips-bounces@ietf.org Mon Apr 24 03:46:14 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FXvlg-0000DA-LC; Mon, 24 Apr 2006 03:46:00 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FXvlf-0000Cf-3V
	for ips@ietf.org; Mon, 24 Apr 2006 03:45:59 -0400
Received: from mail53.messagelabs.com ([216.82.249.211])
	by ietf-mx.ietf.org with smtp (Exim 4.43) id 1FXvXV-0004BY-LE
	for ips@ietf.org; Mon, 24 Apr 2006 03:31:28 -0400
X-VirusChecked: Checked
X-Env-Sender: jhufferd@Brocade.COM
X-Msg-Ref: server-4.tower-53.messagelabs.com!1145863879!60741242!1
X-StarScan-Version: 5.5.9.1; banners=-,-,-
X-Originating-IP: [66.243.153.112]
Received: (qmail 28203 invoked from network); 24 Apr 2006 07:31:19 -0000
Received: from f112.brocade.com (HELO blasphemy.brocade.com) (66.243.153.112)
	by server-4.tower-53.messagelabs.com with SMTP;
	24 Apr 2006 07:31:19 -0000
Received: from hq-ex-6.corp.brocade.com (hq-ex-6 [192.168.38.36])
	by blasphemy.brocade.com (Postfix) with ESMTP id 7ECC914269;
	Mon, 24 Apr 2006 00:31:19 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.0.6487.1
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Ips] MPA alignment
Date: Mon, 24 Apr 2006 00:31:19 -0700
Message-ID: <EE86A2987768164188932981F6EBE69E02CD1AA5@hq-ex-6.brocade.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [Ips] MPA alignment
thread-index: AcZi5mdxG+AaU3IYTD+P4zcY/aHSUAAMRZ/gAOavAjAAL4JxgA==
From: "John Hufferd" <jhufferd@Brocade.COM>
To: "Dan Bar Dov" <danb@voltaire.com>,
	"Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>,
	"Mike Ko" <mako@almaden.ibm.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 908e7c498db66256d5e0db08ac2f5506
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1986061786=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1986061786==
Content-Class: urn:content-classes:message
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C66771.1401ECFE"

This is a multi-part message in MIME format.

------_=_NextPart_001_01C66771.1401ECFE
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

Well, the initiator side must still field the RDMA messages sent by the
target (RDMA Read & RDMA write). And that means that the RDMA Read
response must be handled by initiator side, and of course the RDMA write
must be handled and data moved into the appropriate buffers when the
RDMA write message is received from the target. =20

=20

The software RDMA stack on the Initiator is really quite busy.

=20

.

.

.

John L Hufferd

Sr. Executive Director of Technology

Brocade Communications Systems, Inc

jhufferd@brocade.com

Office Phone: (408) 333-5244; eFAX: (408) 904-4688

Alt Office Phone: (408) 997-6136; Cell: (408) 627-9606

=20

  _____ =20

From: Dan Bar Dov [mailto:danb@voltaire.com]=20
Sent: Sunday, April 23, 2006 1:47 AM
To: John Hufferd; Eddy Quicksall; Mike Ko
Cc: ips@ietf.org
Subject: RE: [Ips] MPA alignment

=20

I just wanted to note in addition to what John said, that ISER is not a
symmetric protocol.

Only the target side performs the RDMA operations. The initiator does
only the setup.

=20

Dan

	=20

=09
  _____ =20


	From: John Hufferd [mailto:jhufferd@Brocade.COM]=20
	Sent: Tuesday, April 18, 2006 9:56 PM
	To: Eddy Quicksall; Mike Ko
	Cc: ips@ietf.org
	Subject: RE: [Ips] MPA alignment

	Eddy,

	I agree with your statement about software RDMA being a bit
silly, but only when the thought is about implementations on servers.

	There is at least one type of environment where using RDMA with
a software iWARP stack may not be too silly, and that is when the object
of the interconnect is to optimize the over all costs and save Server
Cycles.  In that case is may make sense to operate with a software RDMA
stack on the desktop systems or workstations.  Those environments often
have a plentiful amount of available CPU cycles on the
desktop/workstation.  So, the approach is to burn CPU cycles at the
desktop/workstation and save CPU cycles on the servers, which have
RNICs.  This type of a configuration actually seems to be a useful
configuration.

	=20

	The same argument can be used with iSCSI and iSER, but only in
the case where there are RNICs in the target.  It is a little bit
strange, as you point out, to have the storage controller implement a
software version of iSER, except perhaps for some type of compatibility
or migration reasons.

	=20

	.

	.

	.

	John L Hufferd

	Sr. Executive Director of Technology

	Brocade Communications Systems, Inc

	jhufferd@brocade.com

	Office Phone: (408) 333-5244; eFAX: (408) 904-4688

	Alt Office Phone: (408) 997-6136; Cell: (408) 627-9606

	=20

=09
  _____ =20


	From: Eddy Quicksall
[mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net]=20
	Sent: Tuesday, April 18, 2006 5:48 AM
	To: Mike Ko
	Cc: ips@ietf.org
	Subject: Re: [Ips] MPA alignment

	=20

	Thanks,

	=20

	Here is my feeling on this. If one were to use a standard TCP/IP
stack (that does copying) then it is a bit silly to use iSER. If one
were to use a software implementation and write/modify the stack to get
the desired effects of DDP then he will probably heed to the alignment
notes in the spec. So if one were to support misaligned segments using a
slower method then it would be OK.

	=20

	Eddy

		----- Original Message -----=20

		From: Mike Ko <mailto:mako@almaden.ibm.com> =20

		To: Eddy Quicksall
<mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net> =20

		Cc: ips@ietf.org=20

		Sent: Tuesday, April 18, 2006 2:16 AM

		Subject: Re: [Ips] MPA alignment

		=20

	=09
		Eddy,=20
	=09
		If your question is about MPA behavior in general, then
it should be directed to the rddp forum.=20
	=09
		Assuming your question is related to iSER, then if iWARP
is implemented in software and uses the existing TCP/IP stack, then it
cannot guarantee that FPDU's will be aligned with TCP segments.  For the
general case where iWARP is implemented in an RNIC with an integrated
TCP/IP stack, then it is to the RNIC vendor's advantage to optimize his
product's performance and therefore FPDU's should be aligned with TCP
segments.  However, the receiver can still receive FPDU's which are not
aligned with TCP segments if there are resegmenting middleboxes
somewhere in the connection path.=20
	=09
		Mike  =20

		To:        <ips@ietf.org>=20
		cc:        =20
		Subject:        [Ips] MPA alignment=20
	=09
	=09
		It is preferable to have TCP sender to align MPA header
where a TCP segment begins and to keep the MPA FPDU within a TCP
segment, so that the receiver hardware doesn't need to temporarily
buffer the FPDU for the CRC checking.  =20
		 =20
		Does anyone know of any software or hardware that is not
an FPDU alignment sender?=20
		Does anyone have a feel for the likelihood of software
or hardware to not align FPDU's on a TCP segment?=20
		 =20
		Eddy_______________________________________________
		Ips mailing list
		Ips@ietf.org
		https://www1.ietf.org/mailman/listinfo/ips

	=09
  _____ =20


		_______________________________________________
		Ips mailing list
		Ips@ietf.org
		https://www1.ietf.org/mailman/listinfo/ips


------_=_NextPart_001_01C66771.1401ECFE
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><o:SmartTagType
 namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags" =
name=3D"place"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PlaceName"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
tt
	{font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:Arial;
	color:navy;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body bgcolor=3Dwhite lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Well, the initiator side must still =
field
the RDMA messages sent by the target (RDMA Read &amp; RDMA write). And =
that
means that the RDMA Read response must be handled by initiator side, and =
of
course the RDMA write must be handled and data moved into the =
appropriate buffers
when the RDMA write message is received from the target. =
&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>The software RDMA stack on the =
Initiator
is really quite busy.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>John L Hufferd</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Sr. Executive Director of =
Technology</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Brocade Communications Systems, =
Inc</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'><a =
href=3D"mailto:jhufferd@brocade.com"
title=3D"mailto:jhufferd@brocade.com">jhufferd@brocade.com</a></span></fo=
nt><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Office Phone: (408) 333-5244; =
eFAX: (408)
904-4688</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Alt Office Phone: (408) 997-6136; =
Cell:
(408) 627-9606</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
<st1:place
w:st=3D"on"><st1:PlaceName w:st=3D"on">Dan</st1:PlaceName> =
<st1:PlaceName w:st=3D"on">Bar</st1:PlaceName></st1:place>
Dov [mailto:danb@voltaire.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Sunday, April 23, =
2006 1:47
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> John Hufferd; Eddy =
Quicksall;
Mike Ko<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [Ips] MPA =
alignment</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>I just&nbsp;wanted to note in =
addition to
what John said, that ISER is not a symmetric =
protocol.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Only the target side performs the =
RDMA
operations. The initiator does only the =
setup.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dblue face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:blue'>Dan</span></font><o:p></o:p></p>

<blockquote style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'=
>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabIndex=3D-1>

</span></font></div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><b><font size=3D2 =
face=3DTahoma><span
style=3D'font-size:10.0pt;font-family:Tahoma;font-weight:bold'>From:</spa=
n></font></b><font
size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma'> John
Hufferd [mailto:jhufferd@Brocade.COM] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 18, =
2006 9:56
PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Eddy Quicksall; Mike =
Ko<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [Ips] MPA =
alignment</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Eddy,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>I agree with your statement about =
software
RDMA being a bit silly, but only when the thought is about =
implementations on
servers.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>There is at least one type of =
environment
where using RDMA with a software iWARP stack may not be too silly, and =
that is
when the object of the interconnect is to optimize the over all costs =
and save
Server Cycles. &nbsp;In that case is may make sense to operate with a =
software
RDMA stack on the desktop systems or workstations.&nbsp; Those =
environments
often have a plentiful amount of available CPU cycles on the
desktop/workstation.&nbsp; So, the approach is to burn CPU cycles at the
desktop/workstation and save CPU cycles on the servers, which have =
RNICs.&nbsp;
This type of a configuration actually seems to be a useful =
configuration.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>The same argument can be used with =
iSCSI
and iSER, but only in the case where there are RNICs in the target. =
&nbsp;It is
a little bit strange, as you point out, to have the storage controller
implement a software version of iSER, except perhaps for some type of
compatibility or migration reasons.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>.</span></font><font =
color=3Dnavy><span
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>John L Hufferd</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Sr. Executive Director of =
Technology</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Brocade Communications Systems, =
Inc</span></font><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'><a =
href=3D"mailto:jhufferd@brocade.com"
title=3D"mailto:jhufferd@brocade.com">jhufferd@brocade.com</a></span></fo=
nt><font
color=3Dnavy><span style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Office Phone: (408) 333-5244; =
eFAX: (408)
904-4688</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:10.0pt;color:navy'>Alt Office Phone: (408) 997-6136; =
Cell:
(408) 627-9606</span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabIndex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> Eddy =
Quicksall
[mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Tuesday, April 18, =
2006 5:48
AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Mike Ko<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> ips@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Re: [Ips] MPA =
alignment</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
10.0pt'>Thanks,</span></font><o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>Here is my feeling on this. If one were to use a standard TCP/IP =
stack
(that does copying)&nbsp;then it is a bit silly to use iSER. If one were =
to use
a software implementation and write/modify the stack to get the desired =
effects
of DDP then he will probably heed to the alignment notes in the spec. So =
if one
were to support misaligned segments using a slower method then it would =
be OK.<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>&nbsp;<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:
10.0pt'>Eddy</span></font><o:p></o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid black =
1.5pt;padding:0in 0in 0in 4.0pt;
margin-left:3.75pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'=
>

<div>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial'>----- Original Message ----- =
<o:p></o:p></span></font></p>

</div>

<div style=3D'font-color:black'>

<p class=3DMsoNormal style=3D'background:#E4E4E4'><b><font size=3D2 =
face=3DArial><span
style=3D'font-size:10.0pt;font-family:Arial;font-weight:bold'>From:</span=
></font></b><font
size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:mako@almaden.ibm.com" title=3D"mako@almaden.ibm.com">Mike =
Ko</a> <o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>To:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:eddy_quicksall_iVivity_iSCSI@Comcast.net"
title=3D"eddy_quicksall_iVivity_iSCSI@Comcast.net">Eddy Quicksall</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Cc:</span></font></b><font size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> <a
href=3D"mailto:ips@ietf.org" title=3D"ips@ietf.org">ips@ietf.org</a> =
<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Sent:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> =
Tuesday, April 18,
2006 2:16 AM<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><b><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;font-weight:bold'>Subject:</span></font></b><font =
size=3D2
face=3DArial><span style=3D'font-size:10.0pt;font-family:Arial'> Re: =
[Ips] MPA
alignment<o:p></o:p></span></font></p>

</div>

<div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><br>
</span></font><font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:
Arial'>Eddy,</span></font> <br>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>If
your question is about MPA behavior in general, then it should be =
directed to
the rddp forum.</span></font> <br>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Assuming
your question is related to iSER, then if iWARP is implemented in =
software and
uses the existing TCP/IP stack, then it cannot guarantee that FPDU's =
will be
aligned with TCP segments. &nbsp;For the general case where iWARP is
implemented in an RNIC with an integrated TCP/IP stack, then it is to =
the RNIC
vendor's advantage to optimize his product's performance and therefore =
FPDU's
should be aligned with TCP segments. &nbsp;However, the receiver can =
still
receive FPDU's which are not aligned with TCP segments if there are
resegmenting middleboxes somewhere in the connection path.</span></font> =
<br>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Mike
&nbsp;</span></font> <o:p></o:p></p>

<p style=3D'margin-bottom:12.0pt'><font size=3D1 color=3Dpurple =
face=3DArial><span
style=3D'font-size:7.5pt;font-family:Arial;color:purple'>To: &nbsp; =
&nbsp; &nbsp;
&nbsp;</span></font><font size=3D1 face=3DArial><span =
style=3D'font-size:7.5pt;
font-family:Arial'>&lt;ips@ietf.org&gt;</span></font> <br>
<font size=3D1 color=3Dpurple face=3DArial><span =
style=3D'font-size:7.5pt;font-family:
Arial;color:purple'>cc: &nbsp; &nbsp; &nbsp; &nbsp; </span></font><br>
<font size=3D1 color=3Dpurple face=3DArial><span =
style=3D'font-size:7.5pt;font-family:
Arial;color:purple'>Subject: &nbsp; &nbsp; &nbsp; =
&nbsp;</span></font><font
size=3D1 face=3DArial><span =
style=3D'font-size:7.5pt;font-family:Arial'>[Ips] MPA
alignment</span></font> <br>
<br>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>It is
preferable to have TCP sender to align MPA header where a TCP segment =
begins
and to keep the MPA FPDU within a TCP segment, so that the receiver =
hardware
doesn&#8217;t need to temporarily buffer the FPDU for the CRC checking. =
&nbsp;</span></font>
<br>
&nbsp; <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Does
anyone know of any software or hardware that is not an FPDU alignment =
sender?</span></font>
<br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Does
anyone have a feel for the likelihood of software or hardware to not =
align
FPDU's on a TCP segment?</span></font> <br>
&nbsp; <br>
<font size=3D2 face=3DArial><span =
style=3D'font-size:10.0pt;font-family:Arial'>Eddy</span></font><tt><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font></tt><font
size=3D2 face=3D"Courier New"><span =
style=3D'font-size:10.0pt;font-family:"Courier New"'><br>
<tt><font face=3D"Courier New">Ips mailing list</font></tt><br>
<tt><font face=3D"Courier New">Ips@ietf.org</font></tt><br>
<tt><font face=3D"Courier =
New">https://www1.ietf.org/mailman/listinfo/ips</font></tt></span></font>=
<o:p></o:p></p>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'>_______________________________________________<br>
Ips mailing list<br>
Ips@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/ips<o:p></o:p></span></font></p>

</blockquote>

</blockquote>

</div>

</body>

</html>

------_=_NextPart_001_01C66771.1401ECFE--


--===============1986061786==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1986061786==--




From ips-bounces@ietf.org Mon Apr 24 09:44:36 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FY1MR-0006be-L3; Mon, 24 Apr 2006 09:44:19 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FY1MQ-0006bZ-MI
	for ips@ietf.org; Mon, 24 Apr 2006 09:44:18 -0400
Received: from sadr.equallogic.com ([66.155.203.134])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FY1MP-0004eH-FO
	for ips@ietf.org; Mon, 24 Apr 2006 09:44:18 -0400
Received: from sadr.equallogic.com (localhost.localdomain [127.0.0.1])
	by sadr.equallogic.com (8.12.8/8.12.8) with ESMTP id k3ODiEks022058
	for <ips@ietf.org>; Mon, 24 Apr 2006 09:44:15 -0400
Received: from M31.equallogic.com (M31.equallogic.com [172.16.1.31])
	by sadr.equallogic.com (8.12.8/8.12.8) with SMTP id k3ODiB3L022053;
	Mon, 24 Apr 2006 09:44:12 -0400
Received: from PKONING.equallogic.com ([172.16.1.176]) by M31.equallogic.com
	with Microsoft SMTPSVC(6.0.3790.211); 
	Mon, 24 Apr 2006 09:44:11 -0400
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <17484.54828.106000.849356@gargle.gargle.HOWL>
Date: Mon, 24 Apr 2006 09:44:12 -0400
From: Paul Koning <pkoning@equallogic.com>
To: eddy_quicksall_iVivity_iSCSI@Comcast.net
Subject: Re: [Ips] Target Behavior Clarifications (with corrections)
References: <710F16C36810444CA2F5821E5EAB7F23036362@NT-SJCA-0752.brcm.ad.broadcom.com>
	<006001c66775$93ab7600$2e01a8c0@ivivity.com>
X-Mailer: VM 7.07 under 21.4 (patch 10) "Military Intelligence (Windows)"
	XEmacs Lucid
X-OriginalArrivalTime: 24 Apr 2006 13:44:11.0857 (UTC)
	FILETIME=[2B318C10:01C667A5]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cf4fa59384e76e63313391b70cd0dd25
Cc: Jacob_Cherian@Dell.com, wrstuden@wasabisystems.com, ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Errors-To: ips-bounces@ietf.org

>>>>> "Eddy" == Eddy Quicksall <eddy_quicksall_iVivity_iSCSI@Comcast.net> writes:

 Eddy> In most cases I feel that if the initiator is going to violate
 Eddy> the spec then the connection should just be dropped ...

I agree.  If the other side doesn't do what the spec says, why keep
talking?  There's no reason to believe that will help matters.

The other argument is that error paths for obscure errors should be
simple, otherwise they are likely to be buggy.  Introducing the risk
of bugs into an iSCSI implementation for the sake of supporting broken
partners it not a good tradeoff.

	  paul



_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips



From ips-bounces@ietf.org Thu Apr 27 08:13:37 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FZ5ND-0001BD-I0; Thu, 27 Apr 2006 08:13:31 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FZ5NB-0001B8-Oe
	for ips@ietf.org; Thu, 27 Apr 2006 08:13:29 -0400
Received: from sccrmhc13.comcast.net ([63.240.77.83])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FZ5NA-0000Lz-Hk
	for ips@ietf.org; Thu, 27 Apr 2006 08:13:29 -0400
Received: from ivvtdkv0981 (unknown[218.75.77.238])
	by comcast.net (sccrmhc13) with SMTP
	id <20060427121326013000lrvre>; Thu, 27 Apr 2006 12:13:27 +0000
Message-ID: <000001c66a58$92bc5440$2301a8c0@ivivity.com>
From: "Eddy Quicksall" <eddy_quicksall_iVivity_iSCSI@Comcast.net>
To: <ips@ietf.org>
Date: Thu, 27 Apr 2006 14:50:28 -0400
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2869
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
X-Spam-Score: 1.3 (+)
X-Scan-Signature: d8ae4fd88fcaf47c1a71c804d04f413d
Subject: [Ips] Targets that don't want to support discovery
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1469907786=="
Errors-To: ips-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1469907786==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0003_01C66A09.ECC2FF10"

This is a multi-part message in MIME format.

------=_NextPart_000_0003_01C66A09.ECC2FF10
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Appendix D says:
   A system that contains targets MUST support discovery sessions on
   each of its iSCSI IP address-port pairs, and MUST support the
   SendTargets command on the discovery session

Suppose I have targets A, B and C. I want target A to be the only target =
that can support discovery. Login to targets B and C will be redirected =
by A.

This is fine except for the fact that once the redirection occurs the =
initiator has the address of B and C and could open a discovery session =
to B or C.

I'm thinking that I could have B and C redirect to A for any discovery =
session hence A would become the only target to support discovery (but =
that would "break the law").

I'm wondering how the community thinks this should be handled.

Eddy
------=_NextPart_000_0003_01C66A09.ECC2FF10
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2900.2873" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>Appendix D says:</FONT></DIV>
<DIV><FONT size=3D2>&nbsp; &nbsp;A system that contains targets MUST =
support=20
discovery sessions on<BR>&nbsp;&nbsp; each of its iSCSI IP address-port =
pairs,=20
and MUST support the<BR>&nbsp;&nbsp; SendTargets command on the =
discovery=20
session</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Suppose I have targets A, B and C. I want target A =
to be the=20
only target that can support discovery. Login to targets B and C will be =

redirected&nbsp;by A.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>This is fine except for the fact that once the =
redirection=20
occurs the initiator has the address of B and C and could open a =
discovery=20
session to B or C.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>I'm thinking that I could have B and C redirect to A =
for any=20
discovery session hence A would become the only target to support =
discovery (but=20
that would "break the law").</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>I'm wondering how the community thinks this should =
be=20
handled.</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2>Eddy</FONT></DIV></BODY></HTML>

------=_NextPart_000_0003_01C66A09.ECC2FF10--



--===============1469907786==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1469907786==--





From ips-bounces@ietf.org Thu Apr 27 19:13:29 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FZFfi-0000k3-Pb; Thu, 27 Apr 2006 19:13:18 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FZFfc-0000Yo-WB
	for ips@ietf.org; Thu, 27 Apr 2006 19:13:13 -0400
Received: from mononoke.wasabisystems.com ([66.173.145.228])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FZFbn-0001lX-VX
	for ips@ietf.org; Thu, 27 Apr 2006 19:09:16 -0400
Received: from [10.0.0.10] (h-66-166-188-91.sndacagl.covad.net [66.166.188.91])
	by mononoke.wasabisystems.com (Postfix) with ESMTP
	id 2397687188; Thu, 27 Apr 2006 19:09:13 -0400 (EDT)
In-Reply-To: <000001c66a58$92bc5440$2301a8c0@ivivity.com>
References: <000001c66a58$92bc5440$2301a8c0@ivivity.com>
Mime-Version: 1.0 (Apple Message framework v749.3)
X-Priority: 3
Message-Id: <83C76124-0CAA-49D7-B635-52C072572B28@wasabisystems.com>
From: William Studenmund <wrstuden@wasabisystems.com>
Subject: Re: [Ips] Targets that don't want to support discovery
Date: Thu, 27 Apr 2006 16:09:04 -0700
To: Eddy Quicksall <eddy_quicksall_iVivity_iSCSI@Comcast.net>
X-Pgp-Agent: GPGMail 1.1.2 (Tiger)
X-Mailer: Apple Mail (2.749.3)
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 5011df3e2a27abcc044eaa15befcaa87
Cc: ips@ietf.org
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>,
	<mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1353136810=="
Errors-To: ips-bounces@ietf.org

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============1353136810==
Content-Type: multipart/signed; protocol="application/pgp-signature";
	micalg=pgp-sha1; boundary="Apple-Mail-2-368419839"
Content-Transfer-Encoding: 7bit

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--Apple-Mail-2-368419839
Content-Type: multipart/alternative; boundary=Apple-Mail-1-368419749


--Apple-Mail-1-368419749
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	delsp=yes;
	format=flowed

On Apr 27, 2006, at 11:50 AM, Eddy Quicksall wrote:

> Appendix D says:
>    A system that contains targets MUST support discovery sessions on
>    each of its iSCSI IP address-port pairs, and MUST support the
>    SendTargets command on the discovery session
>
> Suppose I have targets A, B and C. I want target A to be the only  
> target that can support discovery. Login to targets B and C will be  
> redirected by A.
>
> This is fine except for the fact that once the redirection occurs  
> the initiator has the address of B and C and could open a discovery  
> session to B or C.
>
> I'm thinking that I could have B and C redirect to A for any  
> discovery session hence A would become the only target to support  
> discovery (but that would "break the law").
>
> I'm wondering how the community thinks this should be handled.

I have a feeling that that'd be breaking the rules.

Why do you want to do this?

Another option is that while ports B and C should support discovery  
sessions, they don't have to do it very efficiently. It's fine if  
they use some sort of proxy to internally route the commands to A for  
processing. So only A is very smart, but discovery works everywhere.

Take care,

Bill
--Apple-Mail-1-368419749
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=ISO-8859-1

<HTML><BODY style=3D"word-wrap: break-word; -khtml-nbsp-mode: space; =
-khtml-line-break: after-white-space; "><DIV><DIV>On Apr 27, 2006, at =
11:50 AM, Eddy Quicksall wrote:</DIV><BR =
class=3D"Apple-interchange-newline"><BLOCKQUOTE type=3D"cite"> =
<DIV><FONT size=3D"2">Appendix D says:</FONT></DIV> <DIV><FONT =
size=3D"2">=A0 =A0A system that contains targets MUST support discovery =
sessions on<BR>=A0=A0 each of its iSCSI IP address-port pairs, and MUST =
support the<BR>=A0=A0 SendTargets command on the discovery =
session</FONT></DIV> <DIV><FONT size=3D"2"></FONT>=A0</DIV> <DIV><FONT =
size=3D"2">Suppose I have targets A, B and C. I want target A to be the =
only target that can support discovery. Login to targets B and C will be =
redirected=A0by A.</FONT></DIV> <DIV><FONT size=3D"2"></FONT>=A0</DIV> =
<DIV><FONT size=3D"2">This is fine except for the fact that once the =
redirection occurs the initiator has the address of B and C and could =
open a discovery session to B or C.</FONT></DIV> <DIV><FONT =
size=3D"2"></FONT>=A0</DIV> <DIV><FONT size=3D"2">I'm thinking that I =
could have B and C redirect to A for any discovery session hence A would =
become the only target to support discovery (but that would "break the =
law").</FONT></DIV> <DIV><FONT size=3D"2"></FONT>=A0</DIV> <DIV><FONT =
size=3D"2">I'm wondering how the community thinks this should be =
handled.</FONT></DIV></BLOCKQUOTE><BR></DIV><DIV>I have a feeling that =
that'd be breaking the rules.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Why do you want to do =
this?</DIV><DIV><BR class=3D"khtml-block-placeholder"></DIV><DIV>Another =
option is that while ports B and C should support discovery sessions, =
they don't have to do it very efficiently. It's fine if they use some =
sort of proxy to internally route the commands to A for processing. So =
only A is very smart, but discovery works everywhere.</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Take care,</DIV><DIV><BR =
class=3D"khtml-block-placeholder"></DIV><DIV>Bill</DIV></BODY></HTML>=

--Apple-Mail-1-368419749--

--Apple-Mail-2-368419839
content-type: application/pgp-signature; x-mac-type=70674453;
	name=PGP.sig
content-description: This is a digitally signed message part
content-disposition: inline; filename=PGP.sig
content-transfer-encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFEUU8YDJT2Egh26K0RAmcdAJ4izGjSx1xV2vyaJtmDVtnwUtcyfACeIr/Z
82zDMHEMgLpKVwi4MuIVW3E=
=pOnm
-----END PGP SIGNATURE-----

--Apple-Mail-2-368419839--


--===============1353136810==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips

--===============1353136810==--




