Last Call Review of draft-ietf-nfsv4-minorversion2-39
review-ietf-nfsv4-minorversion2-39-secdir-lc-kelly-2015-12-03-00
| Request | Review of | draft-ietf-nfsv4-minorversion2 |
|---|---|---|
| Requested revision | No specific revision (document currently at 41) | |
| Type | IETF Last Call Review | |
| Team | Security Area Directorate (secdir) | |
| Deadline | 2015-12-09 | |
| Requested | 2015-11-26 | |
| Authors | Thomas Haynes | |
| I-D last updated | 2022-04-29 (Latest revision 2016-01-28) | |
| Completed reviews |
Genart IETF Last Call review of -39
by Elwyn B. Davies
(diff)
Genart Telechat review of -40 by Elwyn B. Davies (diff) Secdir IETF Last Call review of -39 by Scott G. Kelly (diff) Opsdir IETF Last Call review of -39 by Sheng Jiang (diff) |
|
| Assignment | Reviewer | Scott G. Kelly |
| State | Completed | |
| Request | IETF Last Call review on draft-ietf-nfsv4-minorversion2 by Security Area Directorate Assigned | |
| Reviewed revision | 39 (document currently at 41) | |
| Result | Ready | |
| Completed | 2015-12-03 |
review-ietf-nfsv4-minorversion2-39-secdir-lc-kelly-2015-12-03-00
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This doc describes minor version 2 updates to NFSv4. There are 6 new operations/features supported: Server Side Copy, Application I/O Advise, Space Reservations, Sparse Files, Application Data Blocks, and Labeled NFS. Consistent with other NFS docs, security considerations specific to an operation are described in the section for that operation. Server Side Copy and Labeled NFS each contain their own sub-sections. The main security considerations section states that this revision has all the security considerations of NFS version 4.1 (referencing RFC5661), and also refers to the feature-specific discussions in previous sections. I didn't find any issues not already addressed by the security considerations in this and referenced docs. --Scott