Skip to main content

NFSv4.0 Migration: Specification Update
draft-ietf-nfsv4-rfc3530-migration-update-08

Revision differences

Document history

Date Rev. By Action
2016-07-19
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-07-05
08 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-07-01
08 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2016-05-24
08 (System) RFC Editor state changed to EDIT
2016-05-24
08 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-05-24
08 (System) Announcement was received by RFC Editor
2016-05-24
08 (System) IANA Action state changed to No IC from In Progress
2016-05-24
08 (System) IANA Action state changed to In Progress
2016-05-24
08 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2016-05-24
08 Amy Vezza IESG has approved the document
2016-05-24
08 Amy Vezza Closed "Approve" ballot
2016-05-24
08 Amy Vezza Ballot approval text was generated
2016-05-24
08 Amy Vezza Ballot writeup was changed
2016-05-24
08 Amy Vezza Ballot writeup was changed
2016-05-24
08 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2016-05-24
08 Amy Vezza [Ballot Position Update] Position for Spencer Dawkins has been changed to Yes from No Objection by Amy Vezza
2016-05-10
08 Alissa Cooper
[Ballot comment]
Thanks for addressing my DISCUSS.

---

My comments are about the example given in Section 4.9.

I understand from 4.2 that the requirements …
[Ballot comment]
Thanks for addressing my DISCUSS.

---

My comments are about the example given in Section 4.9.

I understand from 4.2 that the requirements for the construction of the client id are:

1) It should be unique per client.
2) It should persist through reboots.

As best I can tell, embedding the client's IP address in the client id is not a requirement (but I admit to not fully understanding NFS!). So why is it suggested that the client's network address be embedded in the client id?

There are also a few privacy-related issues with the example:

- Some clients will change their IP addresses over time to avoid being tracked. By suggesting that some prior address be used in the client id, there is an implied requirement on the client to maintain a history of previously used addresses, which could be exploited for tracking purposes.

- Permanent device identifiers (such as a serial numbers) should not be embedded in a client id on the wire, again to avoid facilitating tracking by any other party that knows the serial number.

It seems to me that to avoid all of the issues above, perhaps a better example to provide would be hash(some client secret, some source of uniqueness, server identity). That gives the client id a good chance of being unique without exposing other identifiers related to the client. And then if the existing guidance about saving and re-using the value is followed, it won't be necessary to try to shoehorn in an old IP address or persistent device identifiers when the clientid needs to be regenerated.
2016-05-10
08 Alissa Cooper [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss
2016-04-06
08 Cindy Morgan Shepherding AD changed to Spencer Dawkins
2016-02-02
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-02-02
08 David Noveck IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-02-02
08 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-08.txt
2016-01-28
07 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2016-01-26
07 Ben Campbell
[Ballot comment]
[ I've cleared my discuss since discussion is happening. I moved the following two discuss points into the comment section:

This draft recommends …
[Ballot comment]
[ I've cleared my discuss since discussion is happening. I moved the following two discuss points into the comment section:

This draft recommends the use of the uniform client-ID string approach. I admit to not being an NFS expert, but that seems to add a lot of complexity. It seems counter to advice in 7530. Section 4.7 of this draft points out that this may create interop problems with some servers. It seems to increase the privacy impact of persistent and potentially user and hardware identifying client-ID strings. There seems to be an issue of balancing harms here. I'd like to see some text describing how the harm avoided by the uniform approach balances out with the other issues.

The security considerations seem incomplete. This draft makes a number of normative changes and clarifications that are likely to introduce new security and/or privacy considerations that are not mentioned. This is especially true for the guidance about using uniform client-IDs.]


I support Alissa's DISCUSS comments concerning the privacy implications of a persistent client ID.  I am also concerned that the suggested approaches might help enable client fingerprinting.

- 4.2 (occurs twice)
The text says clients MAY send different strings to different servers. I think there may be privacy and tracking implications here, even if the client-ID is constructed without IP addresses or hardware identifiers. Is MAY strong enough? This ties in with the recommendations throughout the document about using persistent IDs across multiple servers. Perhaps there should be guidance to use different strings in general, except in cases where state-sharing is likely to come into play? (e.g. across completely different mount points?)

-4.2, paragraph starting with "As a security measure"
It might be helpful to briefly describe the security concern.
-- paragraph starting with "The difficulty is more severe..."
I think this paragraph warrants some normative guidance.

- 4.3:
How terrible is it if client state is prematurely deleted? Much of this draft, including the guidance to use uniform IDs across servers, seem to treat premature deletion as an ultimate harm, and do not balance that risk against the privacy and complexity issues that it may create.

- 4.7, 2nd bullet list:
How does the client know whether a server might return NFS4ERR_MOVED?

-7.5, 2nd bullet:
"trust relationship" by itself doesn't mean much. Who trusts what to do what?


Editorial:

- 3, paragraph starting with "Specification of requirements for the server..."
The first sentence hard to parse. The last sentence is also confusing. I think you mean to say that NFV4.0 non-normatively encourages the practice? A careless reader is likely to interpret "not 'RECOMMENDED'" as "NOT RECOMMENDED".

-3, paragraph starting with "to further complicate matters":
The paragraph uses confusing language. I _think_ you mean that servers have assumed a particular client implementation pattern, and can’t work with others. But it sounds like it says clients have universally adopted a particular pattern, in which case the interop problem doesn’t make sense.

-3, 4th paragraph from end:
Please don't use 2119 keywords to talk about how the other text uses 2119 keywords. Or at least put "RECOMMENDs" in quotes.

- 4.2, bullet entry starting with "The verifier is a client incarnation identifier..."
The second sentence is hard to parse. (The original version was hard, and this version is harder.)
--bullet starting with "The string MAY...":
redundant to similar guidance earlier in section.
-- paragraph starting with "Distinct servers MAY assign..."
What do you mean by "trunking"? I don't see the term defined anywhere.

- 4.6, "... cause us to RECOMMEND use of the uniform client id string"
I don't think that sentence should use the 2119 "RECOMMEND" keyword.

- 4.8: The repeated use of first person pronouns in this section (and elsewhere) is confusing. It's not always clear if "we" means the draft authors, implementors, or the implementation itself.
-- paragraph before 2nd bullet list:
First sentence is hard to parse.

- 7.4.5, first paragraph:
What does it mean to "make the following notations"?

- 7.5, third bullet:
First sentence is hard to parse.

- section 7.6 and 8:
The structure is confusing. 7.6 says it modifies the security considerations, but is not clear whether that means the security considerations in 7530, or in this document. 8 says "It is to be modified in section 7.6", without a clear antecedent for "It".
2016-01-26
07 Ben Campbell [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss
2016-01-25
07 Gunter Van de Velde Request for Telechat review by OPSDIR Completed: Has Issues. Reviewer: Victor Kuarsingh.
2016-01-22
07 Elwyn Davies Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Elwyn Davies.
2016-01-21
07 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2016-01-21
07 Benoît Claise [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from No Record
2016-01-21
07 Stephen Farrell
[Ballot comment]
I agree with Alissa's discuss about client ids and
apologies also from me for not spotting that in 7530.  The
persistent-across-reboots-forever thing that …
[Ballot comment]
I agree with Alissa's discuss about client ids and
apologies also from me for not spotting that in 7530.  The
persistent-across-reboots-forever thing that this seems to
be encouraging (if I'm reading it correctly) is just a bit
much really. But maybe we're lucky in that we now have a
chance to improve on that. (Further apologies for not
having actually had time to read this properly, I'm happy
to be part of a discussion on how what to do here if
that helps though and will read it properly if involved
in that;-)
2016-01-21
07 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2016-01-21
07 Benoît Claise
[Ballot comment]
Quick update from Victor Kuarsingh, part of the OPS DIR review:
I am still going through the draft.  I is taking me long …
[Ballot comment]
Quick update from Victor Kuarsingh, part of the OPS DIR review:
I am still going through the draft.  I is taking me long then normal since the writing style is making it hard to parse faster.  So far, here is where my analysis is going.

    edits needed to fix up language (very conversational in nature – not sure if that’s what the IETf normally wants)
    it’s hard to extract the updated requirements in the document as they appear both in bullet points, and in paragraphs (thus far)
    Quite a bit of time spent on what should not be done by servers/systems (seems helpful).
    However, the entire document was focused on fixing implementation problems/challenges conducting migrations for NFSv4.0 which should be benefiting (given it’s based on real world implementation challenges)
    I had pre-scanned the document ahead of time, and it appears the guidance in section 5/6 will be where the meat of the discussion is.
    Nothing really bad jumps out at me just yet (other then hard to follow).
2016-01-21
07 Benoît Claise Ballot comment text updated for Benoit Claise
2016-01-21
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2016-01-20
07 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-01-20
07 Martin Stiemerling IESG state changed to IESG Evaluation from Waiting for Writeup
2016-01-20
07 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2016-01-20
07 Barry Leiba [Ballot comment]
My co-ART-ADs have this very much in hand with their DISCUSS points, and I won't add to that.
2016-01-20
07 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2016-01-20
07 Cindy Morgan Changed consensus to Yes from Unknown
2016-01-20
07 Ben Campbell
[Ballot discuss]
This draft recommends the use of the uniform client-ID string approach. I admit to not being an NFS expert, but that seems to …
[Ballot discuss]
This draft recommends the use of the uniform client-ID string approach. I admit to not being an NFS expert, but that seems to add a lot of complexity. It seems counter to advice in 7530. Section 4.7 of this draft points out that this may create interop problems with some servers. It seems to increase the privacy impact of persistent and potentially user and hardware identifying client-ID strings. There seems to be an issue of balancing harms here. I'd like to see some text describing how the harm avoided by the uniform approach balances out with the other issues.

The security considerations seem incomplete. This draft makes a number of normative changes and clarifications that are likely to introduce new security and/or privacy considerations that are not mentioned. This is especially true for the guidance about using uniform client-IDs.
2016-01-20
07 Ben Campbell
[Ballot comment]
I support Alissa's DISCUSS comments concerning the privacy implications of a persistent client ID.  I am also concerned that the suggested approaches might …
[Ballot comment]
I support Alissa's DISCUSS comments concerning the privacy implications of a persistent client ID.  I am also concerned that the suggested approaches might help enable client fingerprinting.

- 4.2 (occurs twice)
The text says clients MAY send different strings to different servers. I think there may be privacy and tracking implications here, even if the client-ID is constructed without IP addresses or hardware identifiers. Is MAY strong enough? This ties in with the recommendations throughout the document about using persistent IDs across multiple servers. Perhaps there should be guidance to use different strings in general, except in cases where state-sharing is likely to come into play? (e.g. across completely different mount points?)

-4.2, paragraph starting with "As a security measure"
It might be helpful to briefly describe the security concern.
-- paragraph starting with "The difficulty is more severe..."
I think this paragraph warrants some normative guidance.

- 4.3:
How terrible is it if client state is prematurely deleted? Much of this draft, including the guidance to use uniform IDs across servers, seem to treat premature deletion as an ultimate harm, and do not balance that risk against the privacy and complexity issues that it may create.

- 4.7, 2nd bullet list:
How does the client know whether a server might return NFS4ERR_MOVED?

-7.5, 2nd bullet:
"trust relationship" by itself doesn't mean much. Who trusts what to do what?


Editorial:

- 3, paragraph starting with "Specification of requirements for the server..."
The first sentence hard to parse. The last sentence is also confusing. I think you mean to say that NFV4.0 non-normatively encourages the practice? A careless reader is likely to interpret "not 'RECOMMENDED'" as "NOT RECOMMENDED".

-3, paragraph starting with "to further complicate matters":
The paragraph uses confusing language. I _think_ you mean that servers have assumed a particular client implementation pattern, and can’t work with others. But it sounds like it says clients have universally adopted a particular pattern, in which case the interop problem doesn’t make sense.

-3, 4th paragraph from end:
Please don't use 2119 keywords to talk about how the other text uses 2119 keywords. Or at least put "RECOMMENDs" in quotes.

- 4.2, bullet entry starting with "The verifier is a client incarnation identifier..."
The second sentence is hard to parse. (The original version was hard, and this version is harder.)
--bullet starting with "The string MAY...":
redundant to similar guidance earlier in section.
-- paragraph starting with "Distinct servers MAY assign..."
What do you mean by "trunking"? I don't see the term defined anywhere.

- 4.6, "... cause us to RECOMMEND use of the uniform client id string"
I don't think that sentence should use the 2119 "RECOMMEND" keyword.

- 4.8: The repeated use of first person pronouns in this section (and elsewhere) is confusing. It's not always clear if "we" means the draft authors, implementors, or the implementation itself.
-- paragraph before 2nd bullet list:
First sentence is hard to parse.

- 7.4.5, first paragraph:
What does it mean to "make the following notations"?

- 7.5, third bullet:
First sentence is hard to parse.

- section 7.6 and 8:
The structure is confusing. 7.6 says it modifies the security considerations, but is not clear whether that means the security considerations in 7530, or in this document. 8 says "It is to be modified in section 7.6", without a clear antecedent for "It".
2016-01-20
07 Ben Campbell [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell
2016-01-20
07 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-01-20
07 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2016-01-20
07 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2016-01-20
07 Brian Haberman
[Ballot comment]
No objection to the publication of this document, but I do have a few non-blocking points:

1. I support Alissa's DISCUSS on the …
[Ballot comment]
No objection to the publication of this document, but I do have a few non-blocking points:

1. I support Alissa's DISCUSS on the privacy issues surrounding the client ID and will be following the discussion intently.

2. It would be nice if pointers to the actual definition of data types like verifier4 and cb_client4 were provided.
2016-01-20
07 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2016-01-19
07 Alissa Cooper
[Ballot discuss]
Per my comment below, it seems like there are some fairly significant privacy considerations related to the choice of how the client id …
[Ballot discuss]
Per my comment below, it seems like there are some fairly significant privacy considerations related to the choice of how the client id is constructed. I think these need to be described in the document so implementors are aware of them. (And my bad for not noticing this before the publication of RFC 7530, since they would have applied there as well.)
2016-01-19
07 Alissa Cooper
[Ballot comment]
My comments are about the example given in Section 4.9.

I understand from 4.2 that the requirements for the construction of the client …
[Ballot comment]
My comments are about the example given in Section 4.9.

I understand from 4.2 that the requirements for the construction of the client id are:

1) It should be unique per client.
2) It should persist through reboots.

As best I can tell, embedding the client's IP address in the client id is not a requirement (but I admit to not fully understanding NFS!). So why is it suggested that the client's network address be embedded in the client id?

There are also a few privacy-related issues with the example:

- Some clients will change their IP addresses over time to avoid being tracked. By suggesting that some prior address be used in the client id, there is an implied requirement on the client to maintain a history of previously used addresses, which could be exploited for tracking purposes.

- Permanent device identifiers (such as a serial numbers) should not be embedded in a client id on the wire, again to avoid facilitating tracking by any other party that knows the serial number.

It seems to me that to avoid all of the issues above, perhaps a better example to provide would be hash(some client secret, some source of uniqueness, server identity). That gives the client id a good chance of being unique without exposing other identifiers related to the client. And then if the existing guidance about saving and re-using the value is followed, it won't be necessary to try to shoehorn in an old IP address or persistent device identifiers when the clientid needs to be regenerated.
2016-01-19
07 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2016-01-19
07 Alvaro Retana [Ballot comment]
No objection, but I have to wonder why this work wasn't folded into RFC7530 (which work seems to have been around long enough).
2016-01-19
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2016-01-19
07 Martin Stiemerling Ballot has been issued
2016-01-19
07 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2016-01-19
07 Martin Stiemerling Created "Approve" ballot
2016-01-19
07 Martin Stiemerling Ballot writeup was changed
2016-01-18
07 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-01-14
07 Jean Mahoney Request for Last Call review by GENART is assigned to Elwyn Davies
2016-01-14
07 Jean Mahoney Request for Last Call review by GENART is assigned to Elwyn Davies
2016-01-11
07 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2016-01-11
07 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-nfsv4-rfc3530-migration-update-07.txt, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-nfsv4-rfc3530-migration-update-07.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-01-07
07 Jean Mahoney Request for Last Call review by GENART is assigned to Elwyn Davies
2016-01-07
07 Jean Mahoney Request for Last Call review by GENART is assigned to Elwyn Davies
2016-01-07
07 Jean Mahoney Closed request for Last Call review by GENART with state 'Withdrawn'
2016-01-07
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alan DeKok
2016-01-07
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alan DeKok
2016-01-04
07 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2016-01-04
07 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2016-01-04
07 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Victor Kuarsingh
2016-01-04
07 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Victor Kuarsingh
2016-01-04
07 Amy Vezza IANA Review state changed to IANA - Review Needed
2016-01-04
07 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: spencer.shepler@gmail.com, mls.ietf@gmail.com, nfsv4-chairs@ietf.org, draft-ietf-nfsv4-rfc3530-migration-update@ietf.org, nfsv4@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: spencer.shepler@gmail.com, mls.ietf@gmail.com, nfsv4-chairs@ietf.org, draft-ietf-nfsv4-rfc3530-migration-update@ietf.org, nfsv4@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (NFSv4.0 migration: Specification Update) to Proposed Standard


The IESG has received a request from the Network File System Version 4 WG
(nfsv4) to consider the following document:
- 'NFSv4.0 migration: Specification Update'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-01-18. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The migration feature of NFSv4 allows for responsibility for a single
  filesystem to move from one server to another, without disruption to
  clients.  Recent implementation experience has shown problems in the
  existing specification for this feature in NFSv4.0.  This document
  clarifies and corrects RFC7530 (the NFSv4.0 specification) to address
  these problems.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-nfsv4-rfc3530-migration-update/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-nfsv4-rfc3530-migration-update/ballot/


No IPR declarations have been submitted directly on this I-D.


2016-01-04
07 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2016-01-04
07 Amy Vezza Last call announcement was changed
2016-01-03
07 Martin Stiemerling Placed on agenda for telechat - 2016-01-21
2016-01-03
07 Martin Stiemerling Last call was requested
2016-01-03
07 Martin Stiemerling Ballot approval text was generated
2016-01-03
07 Martin Stiemerling Ballot writeup was generated
2016-01-03
07 Martin Stiemerling IESG state changed to Last Call Requested from AD Evaluation
2016-01-03
07 Martin Stiemerling Last call announcement was generated
2015-10-14
07 (System) Notify list changed from "Spencer Shepler"  to (None)
2015-09-30
07 Martin Stiemerling IESG state changed to AD Evaluation from Publication Requested
2015-09-27
07 Spencer Shepler
This shepherding write-up is for the following I-D:

draft-ietf-nfsv4-rfc3530-migration-update-07

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or …
This shepherding write-up is for the following I-D:

draft-ietf-nfsv4-rfc3530-migration-update-07

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  The migration feature of NFSv4 allows for responsibility for a single
  filesystem to move from one server to another, without disruption to
  clients.  Recent implementation experience has shown problems in the
  existing specification for this feature in NFSv4.0.  This document
  clarifies and corrects RFC7530 (the NFSv4.0 specification) to address
  these problems.

Working Group Summary

  This I-D represents strong working group consensus and is derived
  from implementation experience of the NFSv4 migration capabilities and
  is therefore representative of needed clarification in specification
  for interoperable implementation.

Document Quality

  As mentioned, this work is derived from implementation experience and
  relates to the needs of the community of NFSv4 implementors such that
  they can create effective and interoperable implementations in the
  context of migration support.

Personnel

  Document Shepherd: Spencer Shepler
  Area Director: Martin Stiemerling

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  I have reviewed the document in full and have followed the working
  group discussions during the development and review of the document.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  I am comfortable with the document's content and breadth/depth of
  coverage of the topic.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  Not applicable.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No issues.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  Yes.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

  The working group is in full support of the document.
 
(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  None applicable.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  Not applicable.

(13) Have all references within this document been identified as
either normative or informative?

  Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  Not applicable.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  No.  This is a clarification/addition to the NFSv4 RFC and will not
  change its current status.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  Not applicable.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  Not applicable

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  Not applicable.
2015-09-27
07 Spencer Shepler Responsible AD changed to Martin Stiemerling
2015-09-27
07 Spencer Shepler IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2015-09-27
07 Spencer Shepler IESG state changed to Publication Requested
2015-09-27
07 Spencer Shepler IESG process started in state Publication Requested
2015-09-27
07 Spencer Shepler Intended Status changed to Proposed Standard from None
2015-09-27
07 Spencer Shepler IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2015-09-27
07 Spencer Shepler Notification list changed to "Spencer Shepler" <spencer.shepler@gmail.com>
2015-09-27
07 Spencer Shepler Document shepherd changed to Spencer Shepler
2015-09-27
07 Spencer Shepler Changed document writeup
2015-08-17
07 Spencer Shepler IETF WG state changed to In WG Last Call from WG Document
2015-07-04
07 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-07.txt
2015-01-04
06 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-06.txt
2014-09-24
05 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-05.txt
2014-03-30
04 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-04.txt
2013-10-12
03 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-03.txt
2013-08-09
02 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-02.txt
2013-02-15
01 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-01.txt
2012-11-20
00 David Noveck New version available: draft-ietf-nfsv4-rfc3530-migration-update-00.txt