Skip to main content

Internet Storage Name Service (iSNS)
draft-ietf-ips-isns-22

Revision differences

Document history

Date Rev. By Action
2020-01-21
22 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2017-05-16
22 (System) Changed document authors from "Kevin Gibbons, Franco Travostino, Josh Tseng" to "Kevin Gibbons, Franco Travostino, Josh Tseng, Joe Souza"
2015-10-14
22 (System) Notify list changed from <Elizabeth.rodriguez@dothill.com>, <black_david@emc.com> to <Elizabeth.rodriguez@dothill.com>
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Bert Wijnen
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Steven Bellovin
2012-08-22
22 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2005-09-23
22 Amy Vezza State Changes to RFC Published from RFC Ed Queue by Amy Vezza
2005-09-23
22 Amy Vezza [Note]: 'RFC 4171' added by Amy Vezza
2005-09-21
22 (System) RFC published
2004-09-30
22 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2004-09-29
22 Amy Vezza IESG state changed to Approved-announcement sent
2004-09-29
22 Amy Vezza IESG has approved the document
2004-09-29
22 Amy Vezza Closed "Approve" ballot
2004-09-29
22 Allison Mankin State Change Notice email list have been change to <Elizabeth.rodriguez@dothill.com>, <black_david@emc.com> from <ElizabethRodriguez@ieee.org>, <black_david@emc.com>
2004-09-29
22 Allison Mankin State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Allison Mankin
2004-09-29
22 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2004-09-28
22 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Discuss by Bert Wijnen
2004-03-02
22 Allison Mankin State Changes to IESG Evaluation::AD Followup from IESG Evaluation::Revised ID Needed by Allison Mankin
2004-03-02
22 Allison Mankin [Note]: 'Mail sent to Chairs, Chairs updated WG, about IESG Review (see Web Ballot).' has been cleared by Allison Mankin
2004-02-13
22 (System) New version available: draft-ietf-ips-isns-22.txt
2004-01-02
22 Bert Wijnen
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better …
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better to say
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero when sending and SHOULD be ignored when
  received.

On page 16:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  manually download the desired record for "dev C", and then directly
  upload it to the local iSNS server. Once the record is transferred
  to the local iSNS server in Network A, "dev C" becomes visible and
  accessible (provided firewall boundaries can be negotiated) to other
  devices in Network A.
I understand what I think is intended. But the language used is pretty
foreign in SNMP terms. I wonder if the following would be better:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  (manually) retrieve (GET) the desired record for "dev C", and then
  directly store (SET) it on the local iSNS server. Once the record
  is transferred to the local iSNS server in Network A, "dev C"
  becomes visible and accessible (provided firewall boundaries can
  be negotiated) to other devices in Network A.

Section 2.8 has:
  determined through non-response to periodic echo messages (using
  iSNSP, SNMP, or other protocols).
But SNMP does not have something like an "echo message". In the SNMP
case, one would poll some MIB object to see if a response is still
received. Not that I cannot live with the text, but it sounds weird.

Page 28 shows for requests:
  RESERVED                                0x0200-0x8000
and for responses
  RESERVED                                0x8200-0xFFFF
So it seems to me that if request 0x8000 ever gets defined, then
you cannot define a logical answer!? In fact, scect 5.1.2 states
that if the leading bit is set that it is a response, so 0x8000
could never be a request.
Just a theoretical and not a practical issue I guess. Anyway,
Probably for requests, one should also resever value 0x0000 and
instead of 0x0200-0x8000 one should do 0200-0x0fff.
For responses, value 0x8000 should probably also be reserved.
Same for requests/responses on page 32.

Section 5.1.4.
  Since the FLAGS field is 16 bits long, it feels strange that
  the bit positions listed are 16-32. I can see/understand what
  is meant. But still? I think I would list them as position
  0-15.

Sect 5.6.5.13 page 56
  Would it not be usefull to say something about the size of the
  various fields? Or are the TLV fields, I don't get that impression.

Incorrect Author(s) for
  [RFC3411]  M. MacFaden, et al., An Architecture for Describing
              Simple Network Management Protocol (SNMP) Management
              Frameworks, RFC 3411, December 2002
But RFC-Editor will catch that I guess

Page 104 has:
  |                          |(or SNMP trap)    |                  |
I would rather call that SNMP notifiation.
Occurs a few more times on following pages.

I wonder of it is wise that IPv4 addresses are sometimes represented
as an IPv4-mapped IPv6 address (as per RFC2373), so 16 bytes with 10
leading zeroes, 0xFFFF and the IPv4 address.
At other times and IP v4 address is represented in 16 bytes with 12
leading zeroes and then the IPv4 address.
2004-01-02
22 Bert Wijnen
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better …
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better to say
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero when sending and SHOULD be ignored when
  received.

On page 16:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  manually download the desired record for "dev C", and then directly
  upload it to the local iSNS server. Once the record is transferred
  to the local iSNS server in Network A, "dev C" becomes visible and
  accessible (provided firewall boundaries can be negotiated) to other
  devices in Network A.
I understand what I think is intended. But the language used is pretty
foreign in SNMP terms. I wonder if the following would be better:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  (manually) retrieve (GET) the desired record for "dev C", and then
  directly store (SET) it on the local iSNS server. Once the record
  is transferred to the local iSNS server in Network A, "dev C"
  becomes visible and accessible (provided firewall boundaries can
  be negotiated) to other devices in Network A.

Section 2.8 has:
  determined through non-response to periodic echo messages (using
  iSNSP, SNMP, or other protocols).
But SNMP does not have something like an "echo message". In the SNMP
case, one would poll some MIB object to see if a response is still
received. Not that I cannot live with the text, but it sounds weird.

Page 28 shows for requests:
  RESERVED                                0x0200-0x8000
and for responses
  RESERVED                                0x8200-0xFFFF
So it seems to me that if request 0x8000 ever gets defined, then
you cannot define a logical answer!? In fact, scect 5.1.2 states
that if the leading bit is set that it is a response, so 0x8000
could never be a request.
Just a theoretical and not a practical issue I guess. Anyway,
Probably for requests, one should also resever value 0x0000 and
instead of 0x0200-0x8000 one should do 0200-0x0fff.
For responses, value 0x8000 should probably also be reserved.
Same for requests/responses on page 32.

Section 5.1.4.
  Since the FLAGS field is 16 bits long, it feels strange that
  the bit positions listed are 16-32. I can see/understand what
  is meant. But still? I think I would list them as position
  0-15.

Sect 5.6.5.13 page 56
  Would it not be usefull to say something about the size of the
  various fields? Or are the TLV fields, I don't get that impression.

Incorrect Author(s) for
  [RFC3411]  M. MacFaden, et al., An Architecture for Describing
              Simple Network Management Protocol (SNMP) Management
              Frameworks, RFC 3411, December 2002
But RFC-Editor will catch that I guess

Page 104 has:
  |                          |(or SNMP trap)    |                  |
I would rather call that SNMP notifiation.
Occurs a few more times on following pages.

I wonder of it is wise that IPv4 addresses are sometimes represented
as an IPv4-mapped IPv6 address (as per RFC2373), so 16 bytes with 10
leading zeroes, 0xFFFF and the IPv4 address.
At other times and IP v4 address is represented in 16 bytes with 12
leading zeroes and then the IPv4 address.

they are represented in a 16 byte field with 12 leading
2004-01-02
22 Bert Wijnen
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better …
[Ballot comment]
Section 1.1
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero.
Would probably be better to say
  All unused fields and bitmaps, including those that are RESERVED,
  SHOULD be set to zero when sending and SHOULD be ignored when
  received.

On page 16:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  manually download the desired record for "dev C", and then directly
  upload it to the local iSNS server. Once the record is transferred
  to the local iSNS server in Network A, "dev C" becomes visible and
  accessible (provided firewall boundaries can be negotiated) to other
  devices in Network A.
I understand what I think is intended. But the language used is pretty
foreign in SNMP terms. I wonder if the following would be better:
  The above diagram illustrates a second example of how iSNS records
  can be shared. This method uses an SNMP-based management station to
  (manually) retrieve (GET) the desired record for "dev C", and then
  directly store (SET) it on the local iSNS server. Once the record
  is transferred to the local iSNS server in Network A, "dev C"
  becomes visible and accessible (provided firewall boundaries can
  be negotiated) to other devices in Network A.

Section 2.8 has:
  determined through non-response to periodic echo messages (using
  iSNSP, SNMP, or other protocols).
But SNMP does not have something like an "echo message". In the SNMP
case, one would poll some MIB object to see if a response is still
received. Not that I cannot live with the text, but it sounds weird.
2003-11-22
22 Allison Mankin Mail sent to Chairs, Chairs updated WG, about IESG Review (see Web Ballot).
2003-11-22
22 Allison Mankin [Note]: 'Mail sent to Chairs, Chairs updated WG, about IESG Review (see Web Ballot).' added by Allison Mankin
2003-11-21
22 Amy Vezza Removed from agenda for telechat - 2003-11-20 by Amy Vezza
2003-11-20
22 Amy Vezza [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Amy Vezza
2003-11-20
22 Amy Vezza [Ballot Position Update] New position, No Objection, has been recorded for  by Amy Vezza
2003-11-20
22 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2003-11-20
22 Bert Wijnen
[Ballot discuss]
Page 20 has this text:
  SNMP uses an Object Identifier (OID) for object identification.  The
  size of each OID is restricted …
[Ballot discuss]
Page 20 has this text:
  SNMP uses an Object Identifier (OID) for object identification.  The
  size of each OID is restricted to a maximum of 128 characters or
  less.  Both the iSCSI and iFCP protocol contain identifiers, such as
  the iSCSI Name, that are greater the 128 characters in length.  In
And it is not correct to claim/suggest that OIDs exist of "characters".
Better text would be:
  SNMP uses an Object Identifier (OID) for object identification.  The
  size of each OID is restricted to a maximum of 128 sub-identifiers or
  less.  Both the iSCSI and iFCP protocol contain identifiers, such as
  the iSCSI Name, that are greater the 128 characters in length. Using
  such Names as an index would result in more that 128 sub-identifiers
  per OID. In

Could be addressed with an RFC-Editor note.

I need to do some more checking on the doc. Hope to get to it later today
(Thur 20th of Nov). Will update this text when I am done.
2003-11-20
22 Bert Wijnen [Ballot Position Update] Position for Bert Wijnen has been changed to Discuss from Undefined by Bert Wijnen
2003-11-20
22 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for  by Jon Peterson
2003-11-20
22 Thomas Narten [Ballot Position Update] New position, No Objection, has been recorded for  by Thomas Narten
2003-11-20
22 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for  by Ted Hardie
2003-11-20
22 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for  by Bill Fenner
2003-11-20
22 Bert Wijnen [Ballot Position Update] New position, Undefined, has been recorded for  by Bert Wijnen
2003-11-20
22 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for  by Alex Zinin
2003-11-19
22 Margaret Cullen [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Undefined by Margaret Wasserman
2003-11-19
22 Margaret Cullen
[Ballot comment]
Just a nit:

  [RFC2373]  Hinden, R., IP Version 6 Addressing Architecture,
              RFC2373, …
[Ballot comment]
Just a nit:

  [RFC2373]  Hinden, R., IP Version 6 Addressing Architecture,
              RFC2373, July 1998

This has been updated by RFC 3513.
2003-11-19
22 Margaret Cullen [Ballot Position Update] New position, Undefined, has been recorded for  by Margaret Wasserman
2003-11-19
22 Russ Housley
[Ballot discuss]
Section 5.5 says:
 
    ... this field contains the binary ASN.1 encoding of output
    values from the DSA with …
[Ballot discuss]
Section 5.5 says:
 
    ... this field contains the binary ASN.1 encoding of output
    values from the DSA with SHA-1 signature calculation.

This is not sufficient detail to write interoperable code.  I suggest a normative reference to RFC 279, section 2.2.2.  Also, references to DSA and SHA-1 seem desirable.  The  selction of these algorithms imposes some requirements on the certificats associated with the validation of the signatures.  These are not discussed in the certificate-related sections.

Why does this document reference X.509 instead of RFC 3280?  What feature of X.509 that is not supported in RFC 3280 is needed by this protocol?  If none, please reference RFC 3280.

Further, there are several entities that might have certificates, but no guidance is provided about the proper way to populate the subject field and the subjectAltName extension in the certificates.  Without this guidance, how does the certificate validator know that the certificate is appropriate for this use?
2003-11-19
22 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Discuss from No Objection by Russ Housley
2003-11-19
22 Russ Housley
[Ballot comment]
Please delete the last paragraph of the Abstract.

Section 1.1 says:
  iSNS refers to the framework consisting of the storage network model …
[Ballot comment]
Please delete the last paragraph of the Abstract.

Section 1.1 says:
  iSNS refers to the framework consisting of the storage network model
  and associated services.
This begs for a reference.  Does an approriate RFC exist?

In section 5.5, 3rd parahraph:
  s/X.509 certificate authority/X.509 Certification Authority (CA)/
2003-11-19
22 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for  by Russ Housley
2003-11-19
22 Ned Freed [Ballot Position Update] New position, No Objection, has been recorded for  by Ned Freed
2003-11-18
22 Steven Bellovin
[Ballot discuss]
Section 5.5:

Do you really want an 8-byte field for an integer number of seconds?

More seriously -- the description of the authentication …
[Ballot discuss]
Section 5.5:

Do you really want an 8-byte field for an integer number of seconds?

More seriously -- the description of the authentication block is inadequate to permit implementation.  It says "if a PKI is available...", but doesn't say what to do if a PKI is not available.  I *think* that what you mean is "calculate the authentication block as described in RFC 2608 9.2.2", but even that leaves unclear exactly what to feed into SHA-1.
2003-11-18
22 Steven Bellovin [Ballot Position Update] New position, Discuss, has been recorded for  by Steve Bellovin
2003-11-11
22 Allison Mankin State Changes to IESG Evaluation from Waiting for Writeup by Allison Mankin
2003-11-11
22 Allison Mankin Placed on agenda for telechat - 2003-11-20 by Allison Mankin
2003-11-11
22 Allison Mankin [Note]: 'On 11/20 agenda.' added by Allison Mankin
2003-11-11
22 Allison Mankin [Ballot Position Update] New position, Yes, has been recorded for Allison Mankin
2003-11-11
22 Allison Mankin Ballot has been issued by Allison Mankin
2003-11-11
22 Allison Mankin Created "Approve" ballot
2003-11-11
22 (System) Ballot writeup text was added
2003-11-11
22 (System) Last call text was added
2003-11-11
22 (System) Ballot approval text was added
2003-11-06
22 Allison Mankin [Note]: 'Will place on 11/20 agenda.' added by Allison Mankin
2003-11-06
22 Allison Mankin State Changes to Waiting for Writeup from Waiting for AD Go-Ahead by Allison Mankin
2003-10-14
21 (System) New version available: draft-ietf-ips-isns-21.txt
2003-07-03
22 Allison Mankin State Changes to Waiting for AD Go-Ahead from In Last Call by Mankin, Allison
2003-06-27
20 (System) New version available: draft-ietf-ips-isns-20.txt
2003-06-25
22 Michael Lee Last call sent
2003-06-25
22 Michael Lee State Changes to In Last Call from Last Call Requested by Lee, Michael
2003-06-25
22 Allison Mankin State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Mankin, Allison
2003-06-25
22 Allison Mankin Waiting for rev 20 before Last Call - authors have found belated fixes after requesting LC.  (They rev'd twice in fact).
2003-06-23
22 Allison Mankin State Changes to AD Evaluation  :: Revised ID Needed from AD Evaluation by Mankin, Allison
2003-06-10
19 (System) New version available: draft-ietf-ips-isns-19.txt
2003-03-06
22 Allison Mankin State Changes to AD Evaluation from Publication Requested by Mankin, Allison
2003-03-06
18 (System) New version available: draft-ietf-ips-isns-18.txt
2003-02-18
22 Allison Mankin Draft Added by Mankin, Allison
2003-01-28
17 (System) New version available: draft-ietf-ips-isns-17.txt
2003-01-10
16 (System) New version available: draft-ietf-ips-isns-16.txt
2002-12-11
15 (System) New version available: draft-ietf-ips-isns-15.txt
2002-10-30
14 (System) New version available: draft-ietf-ips-isns-14.txt
2002-09-27
13 (System) New version available: draft-ietf-ips-isns-13.txt
2002-08-12
12 (System) New version available: draft-ietf-ips-isns-12.txt
2002-07-01
11 (System) New version available: draft-ietf-ips-isns-11.txt
2002-05-20
10 (System) New version available: draft-ietf-ips-isns-10.txt
2002-04-01
09 (System) New version available: draft-ietf-ips-isns-09.txt
2002-02-14
08 (System) New version available: draft-ietf-ips-isns-08.txt
2002-01-11
07 (System) New version available: draft-ietf-ips-isns-07.txt
2001-11-29
06 (System) New version available: draft-ietf-ips-isns-06.txt
2001-10-31
05 (System) New version available: draft-ietf-ips-isns-05.txt
2001-06-27
04 (System) New version available: draft-ietf-ips-isns-04.txt
2001-05-31
03 (System) New version available: draft-ietf-ips-isns-03.txt
2001-04-20
02 (System) New version available: draft-ietf-ips-isns-02.txt
2001-03-02
01 (System) New version available: draft-ietf-ips-isns-01.txt
2001-01-09
00 (System) New version available: draft-ietf-ips-isns-00.txt