[OpenAFS] Byte range locking backed by AFS file locks

Jeffrey Altman jaltman@secure-endpoints.com
Tue, 14 Feb 2006 21:33:22 -0500


This is a cryptographically signed message in MIME format.

--------------ms010305040507050402060208
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit

During the first week of December 2005 there was a discussion on this
mailing list regarding how Byte Range Locking backed by AFS File Locks
would be released in OpenAFS for Windows (and by proxy, AFS clients on
UNIX/Linux.)

Over the last couple of months the Elder's have considered the issues
raised in this thread.  As a result, the Elders agreed that OpenAFS
1.4.1 would *not* ship with Byte Range Locking backed by AFS File Locks.
The Windows client will include the full implementation of Byte Range
Locking in the SMB Server *but* the locking engine will not obtain an
AFS File Lock before issuing locks to the requesting applications.  The
Byte Range Locking in the SMB server will protect files from conflicts
between applications on the local machine.  The UNIX/Linux AFS client
does not currently have a byte range lock engine available.

Having come to this decision the Elders considered the question of how
OpenAFS can begin to back Byte Range Locks with AFS File Locks in future
releases.  The Elders would like the following goals to be satisfied:

 + Byte Range Locking backed by AFS File Locks should be added to
   Windows and UNIX/Linux/MacOS X clients at the same time.

 + AFS File Lock promotion/demotion functionality should be added
   to avoid lock management race conditions.

 + A mechanism should be added that will allow cell administrators
   some ability to advertise a policy advising the client whether
   or not to use AFS File Locks to back locally managed Byte Range
   Locks.

 * The mechanism used for providing advertising policy should be
   general enough to allow it to be used with new features in the
   future.

The first goals is simply a question of coding.  The last three goals
require an architectural decision about extending the AFS3 wire
protocol.  It is believed that adding a new RPC to support lock
promotion/demotion will not be controversial.  Satisfying the last two
goals most likely will result in some significant discussion.  A new
mailing list, afs3-standardization@openafs.org has been created to host
discussions related to extensions to the AFS3 wire protocol.

The Elders considered the following proposal.  The existing OpenAFS
1.4.x clients and file servers implement a GetCapabilities RPC that
return an array of 32-bit masks.  At the present time only one bit
is defined.  It is proposed that in addition to defining new
capabilities (aka features) that bits be allocated to advertise policy.
In particular, it is proposed that a bit be allocated to indicate that
"the client *may* back local byte range lock allocations with AFS File
Locks".  This policy advertisement would be non-binding.

Utilizing the GetCapabilities RPC to advertise this policy will provide
granularity on a per-server basis.  This would allow cell administrators
to run mixed cells in which some servers are used for clients that
may request AFS File Locks and other servers for clients that should not.

Assuming this proposal is acceptable, the mechanism will be extended to
all of the servers by adding GetCapabilities RPCs to those that do not
already support them.  These changes would be made to the forthcoming
1.5.x development release series and then in the 1.6 stable release
series.  In the 1.5/1.6 releases, a compile time option will allow the
file server to be built suppressing the advertisement.  By default, the
file servers will advertise the flag to all clients that ask.

The 1.5/1.6 releases will eventually include the following additional
functionality:

 + The OpenAFS for Windows client will support 64-bit Windows platforms

 + Multiple local Kerberos realms for those organizations that have
   synchronized Windows and MIT/Heimdal Kerberos databases for client
   principals

 + Extensions to the Protection Server to enable multiple names to be
   associated with a single AFS ID.  This will allow separate Kerberos 4
   and Kerberos 5 names to be associated with an ID to address the
   "instance" vs "component" separator conflicts and an ability for
   users to treat both jaltman@ATHENA.MIT.EDU and
   jaltman@SECURE-ENDPOINTS.COM as alternative identifications for
   common user "Jeffrey Altman".

Your feedback is appreciated.

Jeffrey Altman

--------------ms010305040507050402060208
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJXzCC
AwowggJzoAMCAQICAw7NrTANBgkqhkiG9w0BAQQFADBiMQswCQYDVQQGEwJaQTElMCMGA1UE
ChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNv
bmFsIEZyZWVtYWlsIElzc3VpbmcgQ0EwHhcNMDUwNTI3MTc0NzU3WhcNMDYwNTI3MTc0NzU3
WjBzMQ8wDQYDVQQEEwZBbHRtYW4xFTATBgNVBCoTDEplZmZyZXkgRXJpYzEcMBoGA1UEAxMT
SmVmZnJleSBFcmljIEFsdG1hbjErMCkGCSqGSIb3DQEJARYcamFsdG1hbkBzZWN1cmUtZW5k
cG9pbnRzLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKjPyrF+rdjOUSK/
bWwZHdx5p1+y6iiCd4vvYEVDxouYFp5C/fZEWm5n45ubBUbMSUI1MAZN6ooEoH09UTj6BXhM
S8B987ls81dKOIUphTF2jOzq8gsFmeA15yHMRAD20LqUWeLyvYk8FCNQw+dsKMMhX+WdsxOm
RY/1jPkJL6oN8kEwoUFkOX9/OfWWh6oFnV6faiEHUKDMFubsb9X0KVD8iIeR7Cxz7i4kXqRX
wMlp2fyoxcDIJrBaTY8nA++g3p34IkWt1a5po6g683nIgSnGpwYIwuJheBqSEZfLYWa+1KdD
6Sn27Ud94GqUvPVG5jC6zVC5EJ2aWuoAu+nNuV8CAwEAAaM5MDcwJwYDVR0RBCAwHoEcamFs
dG1hbkBzZWN1cmUtZW5kcG9pbnRzLmNvbTAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBAUA
A4GBADtvO//tjiAV6VJGtoNtrl34mB5jGyGTiotzw8riB6zz0GvY11bcWDmp6JKif+pVG+8L
IySDosbuva13qu2HwYUxBmWc7CoNd2k9kRlcrfbDUTTrGOZK8qyqNqT3gQZTAa9ZnUI0su9G
y/n2o5bQcaYdqR3htNrpvdLSPOWhILOXMIIDCjCCAnOgAwIBAgIDDs2tMA0GCSqGSIb3DQEB
BAUAMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5KSBM
dGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgSXNzdWluZyBDQTAeFw0w
NTA1MjcxNzQ3NTdaFw0wNjA1MjcxNzQ3NTdaMHMxDzANBgNVBAQTBkFsdG1hbjEVMBMGA1UE
KhMMSmVmZnJleSBFcmljMRwwGgYDVQQDExNKZWZmcmV5IEVyaWMgQWx0bWFuMSswKQYJKoZI
hvcNAQkBFhxqYWx0bWFuQHNlY3VyZS1lbmRwb2ludHMuY29tMIIBIjANBgkqhkiG9w0BAQEF
AAOCAQ8AMIIBCgKCAQEAqM/KsX6t2M5RIr9tbBkd3HmnX7LqKIJ3i+9gRUPGi5gWnkL99kRa
bmfjm5sFRsxJQjUwBk3qigSgfT1ROPoFeExLwH3zuWzzV0o4hSmFMXaM7OryCwWZ4DXnIcxE
APbQupRZ4vK9iTwUI1DD52wowyFf5Z2zE6ZFj/WM+Qkvqg3yQTChQWQ5f3859ZaHqgWdXp9q
IQdQoMwW5uxv1fQpUPyIh5HsLHPuLiRepFfAyWnZ/KjFwMgmsFpNjycD76DenfgiRa3Vrmmj
qDrzeciBKcanBgjC4mF4GpIRl8thZr7Up0PpKfbtR33gapS89UbmMLrNULkQnZpa6gC76c25
XwIDAQABozkwNzAnBgNVHREEIDAegRxqYWx0bWFuQHNlY3VyZS1lbmRwb2ludHMuY29tMAwG
A1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEEBQADgYEAO287/+2OIBXpUka2g22uXfiYHmMbIZOK
i3PDyuIHrPPQa9jXVtxYOanokqJ/6lUb7wsjJIOixu69rXeq7YfBhTEGZZzsKg13aT2RGVyt
9sNRNOsY5kryrKo2pPeBBlMBr1mdQjSy70bL+fajltBxph2pHeG02um90tI85aEgs5cwggM/
MIICqKADAgECAgENMA0GCSqGSIb3DQEBBQUAMIHRMQswCQYDVQQGEwJaQTEVMBMGA1UECBMM
V2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xGjAYBgNVBAoTEVRoYXd0ZSBDb25z
dWx0aW5nMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9uMSQwIgYD
VQQDExtUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgQ0ExKzApBgkqhkiG9w0BCQEWHHBlcnNv
bmFsLWZyZWVtYWlsQHRoYXd0ZS5jb20wHhcNMDMwNzE3MDAwMDAwWhcNMTMwNzE2MjM1OTU5
WjBiMQswCQYDVQQGEwJaQTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRk
LjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3VpbmcgQ0EwgZ8wDQYJ
KoZIhvcNAQEBBQADgY0AMIGJAoGBAMSmPFVzVftOucqZWh5owHUEcJ3f6f+jHuy9zfVb8hp2
vX8MOmHyv1HOAdTlUAow1wJjWiyJFXCO3cnwK4Vaqj9xVsuvPAsH5/EfkTYkKhPPK9Xzgnc9
A74r/rsYPge/QIACZNenprufZdHFKlSFD0gEf6e20TxhBEAeZBlyYLf7AgMBAAGjgZQwgZEw
EgYDVR0TAQH/BAgwBgEB/wIBADBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsLnRoYXd0
ZS5jb20vVGhhd3RlUGVyc29uYWxGcmVlbWFpbENBLmNybDALBgNVHQ8EBAMCAQYwKQYDVR0R
BCIwIKQeMBwxGjAYBgNVBAMTEVByaXZhdGVMYWJlbDItMTM4MA0GCSqGSIb3DQEBBQUAA4GB
AEiM0VCD6gsuzA2jZqxnD3+vrL7CF6FDlpSdf0whuPg2H6otnzYvwPQcUCCTcDz9reFhYsPZ
Ohl+hLGZGwDFGguCdJ4lUJRix9sncVcljd2pnDmOjCBPZV+V2vf3h9bGCE6u9uo05RAaWzVN
d+NWIXiC3CEZNd4ksdMdRv9dX2VPMYIDOzCCAzcCAQEwaTBiMQswCQYDVQQGEwJaQTElMCMG
A1UEChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBl
cnNvbmFsIEZyZWVtYWlsIElzc3VpbmcgQ0ECAw7NrTAJBgUrDgMCGgUAoIIBpzAYBgkqhkiG
9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0wNjAyMTUwMjMzMjJaMCMGCSqG
SIb3DQEJBDEWBBTEvt+3tjPuGXG0dg/WereL/bIzwjBSBgkqhkiG9w0BCQ8xRTBDMAoGCCqG
SIb3DQMHMA4GCCqGSIb3DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG
9w0DAgIBKDB4BgkrBgEEAYI3EAQxazBpMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3
dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJl
ZW1haWwgSXNzdWluZyBDQQIDDs2tMHoGCyqGSIb3DQEJEAILMWugaTBiMQswCQYDVQQGEwJa
QTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhh
d3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3VpbmcgQ0ECAw7NrTANBgkqhkiG9w0BAQEFAASC
AQCAJb9rEhwojqpuHHOvajVF/pMI9JhLmITDn0faIQaLCpE571BHlREcEvRv1wlygOLshcH5
K6QqRDpmHTXRr4YCC2bO8FS4bsjjU/nur573iWH1PKtQCtVWR7fbFgv/QIgp1vT2r4dPAOsS
gyanu73bYnfhH2aF96vC6HciMI9odyb6Y8tqHEjSY2IuVrftYMubWGz+Wmx3oU6MwFnRMOhI
KWDOgMpxa1rfo17Au7sZXWHty/vL2SggaHn8d5TJ4tK5paxBh+1CCtAiHpfTHfoiGdL4UyrC
BeZR3AQG5MtvUeCdGi/Yq/H70XghsjBRwjk08l6Np8OCxxVSu96ChMGAAAAAAAAA
--------------ms010305040507050402060208--